Quantcast
Channel: Cisco Talos Blog
Viewing all 2039 articles
Browse latest View live

The sights and sounds from the Talos Threat Research Summit

$
0
0

More than 250 threat hunters, network defenders and analysts gathered ahead of Cisco Live for the second annual Talos Threat Research Summit on Sunday.

The conference by defenders, for defenders, returned this year after the inaugural event in 2018 to San Diego, where speakers passed on their knowledge of writing detection, stopping phishing attacks responding to ransomware, and more.

Liz Wharton, the vice president of operations and strategy at security firm Prevailion, kicked off the day with her keynote address, where she passed on her first-hand knowledge from handling a recent ransomware attack in Atlanta that took the city government offline for weeks.

Wharton discussed how governments and organizations can prepare ahead of time for these attacks, and what the appropriate responses are to these attackers.

You can view a recorded, livestreamed version of her keynote below (apologies for the low-quality audio).

Other speakers included James Cox, a network server team manager for Howard County, Maryland. Cox was at the forefront of the response to a recent denial-of-service attack on the county's 911 system. You can read a full breakdown of Cox's talk, and the attack, over at the Cisco Newsroom.

We ended the day with a Q&A session with Talos leadership. Attendees asked about the appropriate responses to ransomware attacks, how we develop protections, and more. You can view to entire Q&A below.


Thanks to everyone who came out to this year's Threat Research Summit. We look forward to being back (and bigger) in 2020.

Vulnerability Spotlight: Multiple vulnerabilities in Schneider Electric Modicon M580

$
0
0

Jared Rittle of Cisco Talos discovered these vulnerabilities.

Executive summary

There are several vulnerabilities in the Schneider Electric Modicon M580 that could lead to a variety of conditions, including denial of service and the disclosure of sensitive information. The Modicon M580 is the latest in Schneider Electric's Modicon line of programmable automation controllers. The majority of the bugs we will discuss exist in UMAS requests made while operating the hardware.

In accordance with our coordinated disclosure policy, Cisco Talos worked with Schneider Electric to ensure that these issues are resolved and that an update is available for affected customers.

Vulnerability details

Schneider Electric Modicon M580 UMAS release reservation denial-of-service vulnerability (TALOS-2018-0735/CVE-2018-7846)

An exploitable denial-of-service vulnerability exists in the UMAS Release PLC Reservation function of the Schneider Electric Modicon M580 Programmable Automation Controller, firmware version SV2.70. A specially crafted UMAS command can cause the device to invalidate a session without verifying the authenticity of the sender, resulting in the disconnection of legitimate devices. An attacker can send unauthenticated commands to trigger this vulnerability.

For more information on this vulnerability, read the complete advisory here.

Schneider Electric Modicon M580 UMAS strategy transfer denial-of-service vulnerability (TALOS-2018-0737/CVE-2018-7849)

An exploitable denial-of-service vulnerability exists in the UMAS strategy transfer functionality of the Schneider Electric Modicon M580 programmable automation controller firmware version SV2.70. A specially crafted UMAS command can cause the device to enter a recoverable fault state, resulting in a stoppage of normal device execution. An attacker can send unauthenticated commands to trigger this vulnerability.

For more information on this vulnerability, read the complete advisory here.

Schneider Electric Modicon M580 UMAS block read strategy denial-of-service vulnerability (TALOS-2018-0738/CVE-2018-7843)

An exploitable denial-of-service vulnerability exists in the UMAS memory block read function of the Schneider Electric Modicon M580 programmable automation controller, firmware version SV2.70. A specially crafted UMAS command can cause the device to enter a non-recoverable fault state, resulting in a complete stoppage of remote communications with the device. An attacker can send unauthenticated commands to trigger this vulnerability.

For more information on this vulnerability, read the complete advisory here.

Schneider Electric Modicon M580 UMAS information disclosure vulnerability (TALOS-2018-0739/CVE-2018-7844)

An exploitable information disclosure vulnerability exists in the UMAS read memory block function of the Schneider Electric Modicon M580 programmable automation controller, firmware version SV2.70. A specially crafted UMAS command can cause the device to return blocks of memory, resulting in the disclosure of plaintext read, write and trap SNMP community strings. An attacker can send unauthenticated commands to trigger this vulnerability.

For more information on this vulnerability, read the complete advisory here.

Schneider Electric Modicon M580 UMAS strategy read information disclosure vulnerability (TALOS-2018-0740/CVE-2018-7848)

An exploitable information disclosure vulnerability exists in the UMAS strategy read functionality of the Schneider Electric Modicon M580 Programmable Automation Controller firmware version SV2.70. A specially crafted UMAS command can cause the device to return blocks of the programed strategy, resulting in the disclosure of plaintext read, write, and trap SNMP community strings. An attacker can send unauthenticated commands to trigger this vulnerability.

For more information on this vulnerability, read the complete advisory here.

Schneider Electric Modicon M580 UMAS improper authentication vulnerability (TALOS-2018-0741/CVE-2018-7842)

An exploitable improper authentication vulnerability exists in the UMAS PLC reservation function of the Schneider Electric Modicon M580 Programmable Automation Controller, firmware version SV2.70. A specially crafted UMAS command can allow an attacker to masquerade as an authenticated user, resulting in the ability to bypass password protections in place on the device. An attacker can send unauthenticated commands to trigger this vulnerability.

For more information on this vulnerability, read the complete advisory here.

Schneider Electric Modicon M580 UMAS strategy file write vulnerability (TALOS-2018-0742/CVE-2018-7847)

An exploitable unauthenticated file write vulnerability exists in the UMAS strategy programming function of the Schneider Electric Modicon M580 programmable automation controller, firmware version SV2.70. A specially crafted sequence of UMAS commands can cause the device to overwrite its programmed strategy, resulting in a wide range of effects, including configuration modifications, disruption of the running process and potential code execution. An attacker can send unauthenticated commands to trigger this vulnerability.

For more information on this vulnerability, read the complete advisory here.

Schneider Electric Modicon M580 UnityPro reliance on untrusted inputs vulnerability (TALOS-2018-0743/CVE-2018-7850)

An exploitable reliance on untrusted inputs vulnerability exists in the strategy transfer function of the Schneider Electric UnityProL Programming Software. When a specially crafted strategy is programmed to a Modicon M580 Programmable Automation Controller, and UnityProL is used to read that strategy, a configuration different from that on the device is displayed to the user. This results in the inability for users of UnityProL to verify that the device is acting as intended. An attacker can send unauthenticated commands to trigger this vulnerability.

For more information on this vulnerability, read the complete advisory here.

Schneider Electric Modicon M580 UMAS read memory block out-of-bounds information disclosure vulnerability (TALOS-2018-0745/CVE-2018-7845)

An exploitable information disclosure vulnerability exists in the UMAS memory block read functionality of the Schneider Electric Modicon M580 Programmable Automation Controller. A specially crafted UMAS request can cause an out-of-bounds read, resulting in the disclosure of sensitive information. An attacker can send unauthenticated commands to trigger this vulnerability.

For more information on this vulnerability, read the complete advisory here.

Schneider Electric Modicon M580 UMAS function code 0x6d multiple denial-of-service vulnerabilities (TALOS-2019-0763/CVE-2018-7852)

Multiple denial-of-service vulnerabilities exist in the UMAS protocol functionality of the Schneider Electric Modicon M580 Programmable Automation Controller, firmware version SV2.70. Specially crafted UMAS commands can cause the device to enter a non-recoverable fault state, resulting in a complete stoppage of remote communications with the device. An attacker can send unauthenticated commands to trigger these vulnerabilities.

For more information on this vulnerability, read the complete advisory here.

Schneider Electric Modicon M580 UMAS function code 0x28 denial-of-service vulnerability (TALOS-2019-0764/CVE-2018-7853)

An exploitable denial-of-service vulnerability exists in the UMAS function code 0x28 functionality of the Schneider Electric Modicon M580 Programmable Automation Controller, firmware version SV2.70. A specially crafted UMAS command can cause the device to enter a non-recoverable fault state, resulting in a complete stoppage of remote communications with the device. An attacker can send unauthenticated commands to trigger this vulnerability.

For more information on this vulnerability, read the complete advisory here.

Schneider Electric Modicon M580 UMAS function code 0x65 denial-of-service vulnerability (TALOS-2019-0765/CVE-2018-7854)

An exploitable denial-of-service vulnerability exists in the UMAS function code 0x65 functionality of the Schneider Electric Modicon M580 Programmable Automation Controller, firmware version SV2.70. A specially crafted UMAS command can cause the device to enter a non-recoverable fault state, resulting in a complete stoppage of remote communications with the device. An attacker can send unauthenticated commands to trigger this vulnerability.

For more information on this vulnerability, read the complete advisory here.

Schneider Electric Modicon M580 UMAS set breakpoint denial-of-service vulnerability (TALOS-2019-0766/CVE-2018-7855)

An exploitable denial-of-service vulnerability exists in the UMAS set breakpoint functionality of the Schneider Electric Modicon M580 Programmable Automation Controller, firmware version SV2.70. A specially crafted UMAS command can cause the device to enter a non-recoverable fault state, resulting in a complete stoppage of remote communications with the device. An attacker can send unauthenticated commands to trigger this vulnerability.

For more information on this vulnerability, read the complete advisory here.

Schneider Electric Modicon M580 UMAS memory block write denial-of-service vulnerability (TALOS-2019-0767/CVE-2018-7856)

An exploitable denial-of-service vulnerability exists in the UMAS memory block write functionality of the Schneider Electric Modicon M580 Programmable Automation Controller, firmware version SV2.70. A specially crafted UMAS command can cause the device to enter a non-recoverable fault state, resulting in a complete stoppage of remote communications with the device. An attacker can send unauthenticated commands to trigger this vulnerability.

For more information on this vulnerability, read the complete advisory here.

Schneider Electric Modicon M580 UMAS write system coils and holding registers denial-of-service vulnerability (TALOS-2019-0768/CVE-2018-7857)

An exploitable denial-of-service vulnerability exists in the UMAS write system coils and holding registers functionality of the Schneider Electric Modicon M580 Programmable Automation Controller, firmware version SV2.70. A specially crafted UMAS command can cause the device to enter a non-recoverable fault state, resulting in a complete stoppage of remote communications with the device. An attacker can send unauthenticated commands to trigger this vulnerability.

For more information on this vulnerability, read the complete advisory here.

Schneider Electric Modicon M580 UMAS read system blocks and bits information disclosure vulnerability (TALOS-2019-0769/CVE-2019-6806)

An exploitable information disclosure vulnerability exists in the UMAS Read System Blocks and Bits functionality of the Schneider Electric Modicon M580 Programmable Automation Controller, firmware version SV2.70. A specially crafted UMAS command can cause the device to return blocks of memory, resulting in the disclosure of plaintext read, write, and trap SNMP community strings. An attacker can send unauthenticated commands to trigger this vulnerability.

For more information on this vulnerability, read the complete advisory here.

Schneider Electric Modicon M580 UMAS write system bits and blocks denial-of-service vulnerability (TALOS-2019-0770/CVE-2019-6807)

An exploitable denial-of-service vulnerability exists in the UMAS write system bits and blocks functionality of the Schneider Electric Modicon M580 Programmable Automation Controller, firmware version SV2.70. A specially crafted set of UMAS commands can cause the device to enter a non-recoverable fault state, resulting in a complete stoppage of remote communications with the device. An attacker can send unauthenticated commands to trigger this vulnerability.

For more information on this vulnerability, read the complete advisory here.

Schneider Electric UnityPro PLC simulator remote code execution vulnerability (TALOS-2019-0771/CVE-2019-6808)

An exploitable remote code execution vulnerability exists in the UMAS strategy programming functionality of the Schneider Electric Unity Pro L Programming Software PLC Simulator. A specially crafted sequence of UMAS commands sent to the software's PLC simulator can cause a modified strategy to be programmed, resulting in code execution when the simulator is switched into the start mode. An attacker can send unauthenticated commands to trigger this vulnerability.

For more information on this vulnerability, read the complete advisory here.

Versions tested

Talos tested and confirmed that that the Schneider Electric Modicon M580, BMEP582040 SV2.70 is affected by these vulnerabilities.



Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 48521 - 48528

How Cisco Talos helped Howard County recover from a call center attack

$
0
0

On Aug. 11, 2018 the 911 non-emergency call center in Howard County, Maryland was in crisis — not for the types of calls flooding into dispatchers, but simply for the sheer numbers. The center, which usually receives 300 to 400 calls a day was now getting 2,500 in a 24-hour span of time. The center, which takes calls for everything from home security alarms going off to cats getting stuck in trees was overwhelmed. What was going on?

James Cox, a network-server team manager for the Howard County government was tasked with answering that question. It turns out, a lone foreign actor created this crisis. “The phone system doesn’t care who you are,” Cox explained. “You hit that 10-digit number and the phone rings. There’s no check and there’s no balance.”

At this point, Howard County called on Cisco Talos for assistance. Cox talked about the lessons he learned from this during the second annual Talos Threat Research Summit, a sold-out one-day conference for security professionals who are also attending Cisco Live.

Read the complete story over at the Cisco Newsroom here.

Microsoft Patch Tuesday — June 2019: Vulnerability disclosures and Snort coverage

$
0
0

Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday covers 88 vulnerabilities, 18 of which are rated “critical," 69 that are considered "important" and one "moderate." This release also includes a critical advisory regarding security updates to Adobe Flash Player.

This month’s security update covers security issues in a variety of Microsoft’s products, including the Chakra scripting engine, the Jet database engine and Windows kernel. For more on our coverage of these bugs, check out the Snort blog post here, covering all of the new rules we have for this release.

Critical vulnerabilities

Microsoft disclosed 19 critical vulnerabilities this month, 10 of which we will highlight below.

CVE-2019-0988, CVE-2019-0989,CVE-2019-0991, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003 and CVE-2019-1024 are all memory corruption vulnerabilities in the Chakra scripting engine. An attacker could exploit any of these bugs by tricking a user into visiting a specially crafted, malicious website while using the Microsoft Edge browser. If successful, the attacker could then corrupt memory in such a way that would allow them to take control of an affected system.

CVE-2019-0620 is a remote code execution vulnerability in Windows Hyper-V that exists when Hyper-V fails to properly validate input on a host server from an authenticated user using a guest operating system. An attacker could exploit this bug by running a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code.

CVE-2019-0888 is a remote code execution vulnerability that exists in the way ActiveX Data Obejcts handles object in memory. An attacker could exploit this vulnerability by tricking the user into visiting a specially crafted, malicious website. If successful, the attacker could then execute code in the context of the current user.

The other critical vulnerabilities are:

                Important vulnerabilities

                This release also contains 65 important vulnerabilities, one of which we will highlight below.

                CVE-2019-1065 is an elevation of privilege vulnerability that occurs when the Windows kernel improperly handles objects in memory. An attacker would first have to log onto the system in order to exploit this vulnerability, and then run a specially crafted application to take control of the system. They would then have the ability to run arbitrary code in kernel mode.

                The other important vulnerabilities are:


                Moderate vulnerability

                There is one moderate vulnerability, CVE-2019-0948, which is an information disclosure vulnerability in Windows Event Manager.

                Coverage 

                In response to these vulnerability disclosures, Talos is releasing the following SNORTⓇ rules that detect attempts to exploit them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Firepower customers should use the latest update to their ruleset by updating their SRU. Open Source Snort Subscriber Rule Set customers can stay up-to-date by downloading the latest rule pack available for purchase on Snort.org.

                Snort rules: 44813-44814, 48051-48052, 49762-49765, 50162-50163, 50183-50184, 50198-50199, 50357-50376, 50393-50408, 50411-50414

                Threat Roundup for June 7 to June 14

                $
                0
                0

                Today, Talos is publishing a glimpse into the most prevalent threats we've observed between June 07 and June 14. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

                As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

                For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found here that includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.

                The most prevalent threats highlighted in this roundup are:

                • Win.Trojan.Gh0stRAT-6993126-0
                  Trojan
                  Gh0stRAT is a well-known family of remote access trojans designed to provide an attacker with complete control over an infected system. Capabilities include monitoring keystrokes, collecting video footage from the webcam, and uploading/executing follow-on malware. The source code for Gh0stRAT has been publicly available on the Internet for years, significantly lowering the barrier for actors to modify and reuse the code in new attacks.
                   
                • Win.Worm.Vobfus-6992861-0
                  Worm
                  Vobfus is a worm that copies itself to external drives and attempts to gain automatic code execution via autorun.inf files. It also modifies the registry so that it will launch when the system is booted. Once installed, it attempts to download follow-on malware from its command and control (C2) servers.
                   
                • Win.Dropper.Nymaim-6992731-0
                  Dropper
                  Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.
                   
                • PUA.Win.Adware.Qjwmonkey-6992589-0
                  Adware
                  Qjwmonkey is adware that modifies the system and browser settings to display advertisements to the user.
                   
                • Win.Packed.NjRAT-6992540-1
                  Packed
                  njRAT, also known as Bladabindi, is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes and remotely turn on the victim's webcam and microphone. njRAT was developed by the Sparclyheason group. Some of the largest attacks using this malware date back to 2014.
                   
                • Win.Malware.Tofsee-6992280-0
                  Malware
                  Tofsee is multi-purpose malware that features a number of modules used to carry out various activities, such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages in an effort to infect additional systems and increase the overall size of the botnet under the operator’s control.
                   
                • Win.Malware.Yobrowser-6992453-0
                  Malware
                  Yobrowser is adware that typically masquerades as cracked versions of legitimate software
                   

                Threats

                Win.Trojan.Gh0stRAT-6993126-0


                Indicators of Compromise


                Registry KeysOccurrences
                <HKCU>\Software\Microsoft\Windows Script Host\Settings 26
                MutexesOccurrences
                guduyinan.gnway.net6
                127.0.0.12
                soiufnrfjowieursmpwoeirfujaiurvnapoai39w452
                y927.f3322.org2
                ddos-cc.vicp.cc2
                192.168.1.1002
                linchen1.3322.org2
                \BaseNamedObjects\linchen1.3322.org2
                119.98.51.1291
                115.28.32.1381
                203.156.199.111
                q727446006.gicp.net1
                zy520.f3322.org1
                169.254.22.151
                118.244.153.461
                121.199.6.2421
                192.168.1.681
                850967012.f3322.org1
                169.254.25.1001
                a678157.oicp.net1
                192.168.0.131
                192.168.0.1011
                cfhx.f3322.org1
                xueyang22.gicp.net1
                \BaseNamedObjects\www.touzi1616.com1
                See JSON for more IOCs
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                118[.]5[.]49[.]62
                197[.]4[.]4[.]122
                115[.]28[.]40[.]122
                49[.]2[.]123[.]562
                118[.]244[.]185[.]1132
                116[.]255[.]131[.]1452
                174[.]128[.]255[.]2451
                189[.]163[.]17[.]51
                54[.]76[.]135[.]11
                188[.]5[.]4[.]961
                61[.]142[.]176[.]231
                27[.]9[.]199[.]2171
                110[.]251[.]189[.]651
                114[.]239[.]19[.]1011
                222[.]186[.]27[.]2161
                115[.]28[.]44[.]1161
                123[.]131[.]15[.]1091
                120[.]9[.]228[.]61
                119[.]98[.]51[.]1291
                101[.]16[.]198[.]981
                203[.]156[.]199[.]111
                115[.]28[.]32[.]1381
                169[.]254[.]22[.]151
                121[.]199[.]6[.]2421
                118[.]244[.]153[.]461
                See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                guduyinan[.]gnway[.]net5
                y927[.]f3322[.]org2
                ddos-cc[.]vicp[.]cc2
                linchen1[.]3322[.]org2
                xm974192128[.]3322[.]org1
                guduyinan[.]gnway[.]com1
                278267882[.]f3322[.]org1
                a3328657[.]f3322[.]org1
                www[.]touzi1616[.]com1
                jie0109[.]hackxd[.]net1
                zy520[.]f3322[.]org1
                q727446006[.]gicp[.]net1
                850967012[.]f3322[.]org1
                a678157[.]oicp[.]net1
                cfhx[.]f3322[.]org1
                xueyang22[.]gicp[.]net1
                Files and or directories createdOccurrences
                %TEMP%\jnbxmapdsg.vbs1
                %TEMP%\rlzocrfujx.vbs1
                %TEMP%\bvjkzncqf.vbs1
                %TEMP%\mxoejtdhe.vbs1
                %TEMP%\ofcspybli.vbs1
                %TEMP%\imopeshvj.vbs1
                %TEMP%\paybqnqnd.vbs1
                %TEMP%\ntvxzbqf.vbs1
                %TEMP%\rvxmapdsgv.vbs1
                %TEMP%\dkaqshjynd.vbs1
                %TEMP%\vbdsgvjy.vbs1
                %TEMP%\noqftiwlzo.vbs1
                %TEMP%\ovxncegixm.vbs1
                %TEMP%\qhxurnkcs.vbs1
                %TEMP%\eyaodrgujx.vbs1
                %TEMP%\zyvhdvlis.vbs1
                %TEMP%\zdrshixlao.vbs1
                %TEMP%\waoqethv.vbs1
                %TEMP%\ulabqeth.vbs1
                %TEMP%\othjxmapd.vbs1
                %TEMP%\zdeguvky.vbs1
                %TEMP%\gzgjxmoqeg.vbs1
                %TEMP%\fqwzqhkh.vbs1
                %TEMP%\ulabqrguix.vbs1
                %TEMP%\vrfxlaods.vbs1
                See JSON for more IOCs
                File Hashes
                • 0477c2b9ba7eecc8b0827400576860257e62a306a3e0c310eb84c537ec47e018
                • 13287e727a2be4b6a3533e768b4babfd9191ec65002abcdf77c43e69278963be
                • 1d7633311c1f671c60422a4d6723aa10a37e833e2d5df732f3988b3e379b2ee9
                • 2a38fbbcef4bc83582ccd98c9bf96ff29e4c915d90802ec799420420f2cad6e6
                • 2b19de056a388d0ee3672be895f4e446c42053034c68675585dd3fb54b8d1eb7
                • 3821a10495fb4759fbab1ef7868eeb1e207ea6bf4211370f072b0215a14b46c8
                • 3ae58dca3ce80c3ed4b65f610eee921dbeb3343619caace78c6afe21ec237f08
                • 3d54f0fbd50f0b91f635a9ecc89ef8cb58c021bb60326b5fa2db75989d1bff5a
                • 3fdd3b5333f7e526e80599add12fdeef663c59ad79ef4e714912043038377730
                • 47c349433e77aefb18ea384f6ab4759f7bd49466f7a747255d19d4648fecc762
                • 49752684078dfa74cd25adbbdc9bbf7a98e6f96f5355cd52b8b77738506673e7
                • 4e5a282c7230242d090844875c9f5c432dc2c4bad3ba13fa2a7df86843785f75
                • 53e08241abdfe3f13d6aa875642638d1badc6ec59cdb9757fe0fd598dc736927
                • 57fc8d1737521cb0af37fcf70079603dc0eb5da1b3bbef9bad334dfe79176068
                • 5ba20f4aaf94b4f418501ae977d1f6cf947accf8134c3b9487b42cdd65ef715b
                • 5fab1a54d1338b2cb906aae3b2f5292d47445aae2af383c2a0e99b4ccf863262
                • 60f6548844d59e59dc90a12fcb97396793c20687947a6eb5cc543debecf607d1
                • 61caab6c70480cd6db4f33234cfc86467bff26c2e19b804211be8c822218a940
                • 623fbdc46be1a797f743894e3e1cc003a29692d6fb9b3246de80282207d99b9c
                • 63746003a0c8fcdf11f9367ca5102c8413ee5e2cd298079de5a3ab0ba5493ea7
                • 66b770d0d2e02739e0495d30f9f56c717989eec3f1da96c7ffa01b05deffeb37
                • 68d644144b33f4766a3e11a33c471cf877d5801e1833d1d1813d4a06125ff2a9
                • 6a820f70fc59abd8d0b5202de65a9fc51312d18322e55b24d1f63a2339ff13d3
                • 6cb616c3229fd37e2615de709496215cc9138436b16eab265e9feae9d81cfac2
                • 6ed77af0d3929a62256c7aac5068ff7ca337460cb813863d7c528e95f503cc59
                • See JSON for more IOCs

                Coverage


                Screenshots of Detection

                AMP




                ThreatGrid



                Win.Worm.Vobfus-6992861-0


                Indicators of Compromise


                Registry KeysOccurrences
                <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WindowsUpdate 25
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
                Value Name: ShowSuperHidden
                25
                <HKLM>\SOFTWARE\WOW6432NODE\Policies 25
                <HKLM>\SOFTWARE\Wow6432Node\Policies\Microsoft\Windows\WindowsUpdate\AU 25
                <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU 25
                <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU
                Value Name: NoAutoUpdate
                25
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: jauxec
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: qiusooj
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: mokiy
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: wiiorit
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: kuivuo
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: viezus
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: fonef
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: znxaaq
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: reiiraj
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: wauul
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: wlcug
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: wzzuf
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: laociek
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: tioila
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: tstoj
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: yeeuqov
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: vyjuos
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: zeuub
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: teozuim
                1
                MutexesOccurrences
                \BaseNamedObjects\A25
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                216[.]218[.]206[.]691
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                ns1[.]helpchecks[.]com25
                ns1[.]helpchecks[.]info25
                ns1[.]helpchecks[.]at25
                ns1[.]helpchecks[.]eu25
                ns1[.]helpchecks[.]by25
                ns1[.]helpcheck1[.]org25
                ns1[.]helpcheck1[.]com25
                ns1[.]helpcheck1[.]net25
                Files and or directories createdOccurrences
                \??\E:\autorun.inf25
                \autorun.inf25
                \??\E:\System Volume Information.exe25
                \System Volume Information.exe25
                \$RECYCLE.BIN.exe25
                \??\E:\$RECYCLE.BIN.exe25
                \Secret.exe25
                \??\E:\Passwords.exe25
                \??\E:\Porn.exe25
                \??\E:\Secret.exe25
                \??\E:\x.mpeg25
                \Passwords.exe25
                \Porn.exe25
                \Sexy.exe25
                %HOMEPATH%\Passwords.exe25
                %HOMEPATH%\Porn.exe25
                %HOMEPATH%\Secret.exe25
                %HOMEPATH%\Sexy.exe25
                \??\E:\Sexy.exe24
                %HOMEPATH%\Passwords.exe (copy)24
                %HOMEPATH%\Porn.exe (copy)24
                %HOMEPATH%\RCX1.tmp24
                %HOMEPATH%\RCX2.tmp24
                %HOMEPATH%\RCX3.tmp24
                %HOMEPATH%\RCX4.tmp24
                See JSON for more IOCs
                File Hashes
                • 03f2507d1db297b7176fddce8540639e2a8986045af7d4cf27b09a424629a08d
                • 181896288ffa6cfea0d847eda1cbce7462fbdfbf6536c6b6d874155f8d23058c
                • 366c47a2774078e135f48b03f4facbbba80aa4e294d523f0112d1cf001a93e4a
                • 59570b2c73227359544e6c7fde4ba2368170ca48482cdb530de097bb833c177d
                • 5a8e8c501cc8864d928beddb8837e0ce70f272a9a6ae13d175dfcbe52d2f3d7e
                • 5b4ebc908f6cff3ad1acc262790b3b7ad1e2e65031c7b0f8c55f700ae499f40d
                • 5c314363a05429b3a76149ed8a0ab9b9342b69d76794ba9d02e3ab09092ff4ad
                • 5f06f5540689bd9346ae76995c25e8efd60d10c22ec9f6723cd6467dabd0b78e
                • 60398eff74f6a02cd6dad118d7dc028102b56b20dc6ff7bc0c383b6accdac8e9
                • 60b898046d99e11912349e895685616d5c59a1d0e6d05fa23fdb654a96c67931
                • 62070e7ac4e86195d915ffecd132823e178fb7eaad331fea65926fa2bb80f23b
                • 6b63b301a133703b5a6fe3c99c4e2c5a421490daf2a26682a83b95b1eaecb186
                • 71999972c8bd0259bab9d76a6e2d9525a141ad7ba151d0b8bf77876b6d6660c7
                • 7271cb745dcca0d0bb516b7ff4cd69d2c5c261df33e48091890450ca789ae081
                • 753c11420e4a06bcb790a51918923c564c6da62c46d923eeb3541e342667a453
                • 75a188c634a0c857220ee7c6ad848293ec08d1d8a9f6027f39a02194665edffe
                • 7da2c1a73cfa87b1a66d4c0bbe2b1b18ae7540e3ae4de407092fe5f56a44d772
                • 80107ca033df25818e9bb64aed5f088c98b4c75d8a3ed3d3a47bb0f2660a2b2d
                • 8b76268bc5255134ff460ee3356797657f98f8a0cc6fef98d0e173e367b6734b
                • 92944feb88a896a922c9a88fef2683e864b931fd919c4405eeab4ed6cc2a7e02
                • a3b82b5badf315c723973a8e8d8441351a6aea76541d888bdf1db29fd4b3721b
                • ae5a2a2a0cd106146aa40390596bba6c72fa7d8c75ab237b3cbb040946fcac19
                • afb4401b564b6330f107b4a8d95e7d28429957929140a84ee99f01eae3fc5619
                • b3f564ef2e4550601f2728da6eec584fadcb7b5060a0df91ed2cbf4e306c5189
                • c80909dfb38fc5646008338b31bf576275d59c5880403adc8e5bb072eec9ce1b
                • See JSON for more IOCs

                Coverage


                Screenshots of Detection

                AMP



                ThreatGrid



                Umbrella



                Win.Dropper.Nymaim-6992731-0


                Indicators of Compromise


                Registry KeysOccurrences
                <HKCU>\Software\Microsoft\GOCFK 24
                <HKCU>\SOFTWARE\MICROSOFT\GOCFK
                Value Name: mbijg
                24
                MutexesOccurrences
                Local\{369514D7-C789-5986-2D19-AB81D1DD3BA1}24
                Local\{D0BDC0D1-57A4-C2CF-6C93-0085B58FFA2A}24
                Local\{F04311D2-A565-19AE-AB73-281BA7FE97B5}24
                Local\{F6F578C7-92FE-B7B1-40CF-049F3710A368}24
                Local\{306BA354-8414-ABA3-77E9-7A7F347C71F4}24
                Local\{F58B5142-BC49-9662-B172-EA3D10CAA47A}24
                Local\{C170B740-57D9-9B0B-7A4E-7D6ABFCDE15D}24
                Local\{764A5E5B-9D8B-4E3E-3AE5-6BA089B04B34}24
                Local\{D6E0445C-66CF-7E18-EE4D-5700342376D0}24
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                66[.]220[.]23[.]11424
                64[.]71[.]188[.]17818
                184[.]105[.]76[.]25018
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                jexzc[.]in24
                nenpzs[.]com23
                Files and or directories createdOccurrences
                %ProgramData%\ph24
                %ProgramData%\ph\fktiipx.ftf24
                %TEMP%\gocf.ksv24
                %TEMP%\fro.dfx23
                \Documents and Settings\All Users\pxs\pil.ohu23
                %LOCALAPPDATA%\giy4vh35
                %APPDATA%\io77x5
                %LOCALAPPDATA%\av1165d5
                %APPDATA%\tv25
                %ProgramData%\0c74
                %LOCALAPPDATA%\g8164
                %APPDATA%\p3f4
                %LOCALAPPDATA%\r4v2rp4
                %APPDATA%\3w74
                %ProgramData%\3e9sq3
                %ProgramData%\qi393
                %LOCALAPPDATA%\yp870bk3
                %ProgramData%\4b8s23
                %ProgramData%\q8216p3
                %ProgramData%\94z2
                %ProgramData%\igzk42
                %LOCALAPPDATA%\ycq1ac2
                %APPDATA%\867j2
                %ProgramData%\9d0g92
                %ProgramData%\0186d9m2
                See JSON for more IOCs
                File Hashes
                • 08beb94545dabf135ef630b432f00fc603f3797328b5a9681d9d1a8041238147
                • 0be51b6a0e11b6d807c4e6d2eea49b0c9e60c23babbb48ff17c27ee2e2050eef
                • 0fee18d7562b359c642e4a953d08251b36c3971f8fc9dbfce46af98fe26f04e8
                • 160fb874c1e78de9cb2e7d6a829e5f1e40aba2edae9de7a274a9639b80b6df9d
                • 17b5939fc77e2acb9a76c9baa6c4de01822ef4633da4732a49c4cd26f2ff024c
                • 1bef5f7889b5b8528bd9f20d6218dd4faa6ff70ad60cfd182e80374045ff9faf
                • 281bae2b93ae03725217deac68fd1f513d0a0267dda486e4d2d51f92044c8fca
                • 41d57f15b7c1ffd1c4bc5af862da97963405eace4c67574d68fcd39eb4dbe6c0
                • 44b688082d3305d8e0d29bf7d6d78b60078592f1bda83a90ec6d227823d0e297
                • 4cde92c748f5aa5912a83d075dae2241de2496d4f4cf8e69a04a65c2080ff0b8
                • 507340f713f0c6f4172253b20bab21bdc6dbdd7ad4866d037894acdf167c60dc
                • 50a3f7c98b739d33ff4ba7b3ef38e553a42d7b47bc8b34f2d877055da9eaa1e9
                • 514affb7cd921abb88040abc8beb7af9139488da9f625dfb8647fdab665c38c5
                • 5bf35c74cfc5908e266e3d59615a16b30eb9b6de68759fe346257b420edf6748
                • 67989a565971fbe6f02c909b0696edc0de6ec1234129c4df4455a1f63a702189
                • 69f167f13f7e93a17d8dfaf59eb97014aa1446db339e300982aa8dc5ca3f14e3
                • 70e414e8f7895b3ed7dec9e71693f1f8ca9ad6421fe9b3c0d38280cdb1c4608a
                • 74bb6e3a0ddaf3f2d7ad6e12513004c6efd77ad6a21f2faeef0fedd214f5f3fc
                • 74d43a9e8803c815e03184619fe2ea10029e8db22c68a24290495b506fcea48e
                • 7b6a3b68714b06b9f749a20c22461ff0c7e0759f7a5ca8d51e318dec2d88be51
                • 7eb6295c6f70a823a6a02f1728cb16827c545737e0b7a0a5a1cb06ebbcf965a5
                • 82c92424c692ee6769d9e2f3e9e9accf5c45794cd27b95a68f507eff88850a98
                • 83929ceb3274a34650127a4cb9ccac5b5bcb559fd43f39b6b64081bd3255dccb
                • 8c665d48bddc2f4436223689fd97f11790481f8df7f0e4c91af31aed0b4a4711
                • 91e25ed856ffb9ea7cea06e4de5e5eb689063324e9268730e03cd34f4dc3ee68
                • See JSON for more IOCs

                Coverage


                Screenshots of Detection

                AMP



                ThreatGrid



                PUA.Win.Adware.Qjwmonkey-6992589-0


                Indicators of Compromise


                Registry KeysOccurrences
                N/A-
                MutexesOccurrences
                ATL:MemData03EAPC10
                \BaseNamedObjects\ATL:MemData03EA8995521
                \BaseNamedObjects\ATL:MemData03EA8300211
                \BaseNamedObjects\ATL:MemData03EA8416751
                \BaseNamedObjects\ATL:MemData03EA3580751
                \BaseNamedObjects\ATL:MemData03EA6750521
                \BaseNamedObjects\ATL:MemData03EA1343491
                \BaseNamedObjects\ATL:MemData03EA4144081
                \BaseNamedObjects\ATL:MemData03EA1244061
                \BaseNamedObjects\ATL:MemData03EA6516891
                \BaseNamedObjects\ATL:MemData03EA1728921
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                47[.]102[.]38[.]1510
                39[.]108[.]27[.]1739
                47[.]95[.]181[.]452
                36[.]99[.]227[.]2331
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                x[.]93ne[.]com10
                cdn[.]zry97[.]com1
                Files and or directories createdOccurrences
                %System32%\d3d9caps.dat (copy)10
                %System32%\d3d9caps.tmp10
                %APPDATA%\GlobalMgr.db10
                File Hashes
                • 068eda364702ce61530d3b06ff1edb490fa157572ebf936ad9ad0d913c44e46d
                • 0c748be9a32bc9ce08709f67a45fc9e3e76a06b6e30091ea6e75014651449bd6
                • 1211299848ddadcaefe019ade6a5394a744297e5fbe8182d0156faffe2f40e34
                • 275b0dad9af4cad57d9fe546b7f8c11e55b848b2ca68959bbe8d45fc3195a85b
                • 326d9df48f47cad42b8a6bac64061b9e2592d62ad5c8fd2a727865f84a79b6c9
                • 32a0d53d2716251728d4120e5cceb4eb8894fd830841d9476820cd868420d37a
                • 6f5854d4dce3170393d74fb216573d08b694d7ec2982f02d3e46fe34b3ba0ed7
                • 70ab5cb1653e39937408d71b70c9bd3952c572a2b54bc2b039794130efe5ae77
                • 8da41212571b8b910ec657bc8f1b67ef22dd3c15e40280d5c6f93a5104227c0f
                • 90a457c02c2e659902d1be908c53c38eec47574101f14477c22ec87968b5b870
                • 9ae31bf1c30051d3438f3548d5f7593c24aa9297cb9f89b26b04d01482f77622
                • 9dcb833bbac2d4fabafe49babb53b127349be1ee1444031cccb77d2752206813
                • c3e2f2e2e17f0408b11bd9cc8dc3ea97364fec6d3dea07ba896901d24f89fef4
                • c48b5755d64f2fa9fe6bdeec4605d5352e196db78d507608fc9f181be93f9da1
                • c4e26e43528d8be9dba86a1b7c30b4ef8bdca67b56bbcab2d7fc76cb12004b14
                • c88992429426ed40e4a5ff37c0ff0b3ecdb52a07f7e6b4b2377a6c4160263419
                • d29b9fa55f21577991f220bec9bbc89969e843b6b03f7dad0084e80b86961c97
                • d2bcb4e712ee873f8cce82a2783b84bf2a11f275e9064581cf00fd88323e803d
                • dace1d73cd93785decdc4993f12de1b214b0a836539063c5fac8b154ce948eb1
                • db55da939400d9d718b39e20280da3317cd1d35a522ec4927b059fefea4aa754
                • df38320eb4d1eedf53b9927cb734bf2506e3d38d04c9279e65aea08391bc6caa
                • e8a913bb3211a926e04ce387dadf74d262e287070ad08192153b4a07f8914544
                • ed613488a7bdde693d5b819ce946a8e9865426b9ea7cbbab8a867dc4db79d483

                Coverage


                Screenshots of Detection

                AMP



                ThreatGrid



                Win.Packed.NjRAT-6992540-1


                Indicators of Compromise


                Registry KeysOccurrences
                <HKLM>\System\CurrentControlSet\Services\NapAgent\Shas 32
                <HKLM>\System\CurrentControlSet\Services\NapAgent\Qecs 32
                <HKLM>\System\CurrentControlSet\Services\NapAgent\LocalConfig 32
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\Enroll\HcsGroups 32
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\UI 32
                <HKU>\S-1-5-21-2580483871-590521980-3826313501-500
                Value Name: di
                32
                <HKCU>\ENVIRONMENT
                Value Name: SEE_MASK_NOZONECHECKS
                32
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
                Value Name: ParseAutoexec
                32
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 7a6058fe5633bcc68b913467734f0f12
                1
                <HKCU>\SOFTWARE\7A6058FE5633BCC68B913467734F0F12
                Value Name: [kl]
                1
                <HKCU>\Software\5d6c253999006e0a364768488fca8056 1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 5d6c253999006e0a364768488fca8056
                1
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 5d6c253999006e0a364768488fca8056
                1
                <HKCU>\SOFTWARE\5D6C253999006E0A364768488FCA8056
                Value Name: [kl]
                1
                <HKCU>\Software\81d13862f7a9e91b88ef1cf04880f30b 1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 81d13862f7a9e91b88ef1cf04880f30b
                1
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 81d13862f7a9e91b88ef1cf04880f30b
                1
                <HKCU>\Software\c4356a2f1cc184765354ac346ff3c760 1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: c4356a2f1cc184765354ac346ff3c760
                1
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: c4356a2f1cc184765354ac346ff3c760
                1
                <HKCU>\SOFTWARE\81D13862F7A9E91B88EF1CF04880F30B
                Value Name: [kl]
                1
                <HKCU>\SOFTWARE\C4356A2F1CC184765354AC346FF3C760
                Value Name: [kl]
                1
                <HKCU>\Software\92c90be64c51c97abffcb0136889e008 1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 92c90be64c51c97abffcb0136889e008
                1
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: 92c90be64c51c97abffcb0136889e008
                1
                MutexesOccurrences
                \BaseNamedObjects\23f0e3bce589df29a3e6f3e8879b41c11
                cf56ee275cc59274062dc1b03224ca991
                7224ecb50ef565a251e4dca6d8280c721
                ddb5e6e34f69e8c18573f23e18eb66b51
                dbac86ee556aeefaf987b893994aa8a61
                9933a39bcdb4ca2ba91ddfbf0eb49c281
                27e6ba15367cfc6ccdb30fd12c8ebc9a1
                551c2891c1a5b14d85bd8205beca398a1
                6f548f49442e3cf6cd712e1421ced30b1
                ea48d06232228d6119e51286c4c0d7cb1
                6843bfb57b172a29eaca1016ea14dd341
                b6a24dab009c0449997c4b895176ddee1
                b17b3051ec3895b563f6189b117c71031
                61d4512a2b96204a3981459fa733229e1
                b1471de1dda54e505e7a2fe5dc250cbd1
                5b9aa31356f88f5efd2d650bab2fd2051
                227ae895ae9adabb3c9cc7efd9b8f1801
                cf10c5de3b577ea5f5b8886499972c211
                89ced9869827e13512140dfd15310bdb1
                7a6058fe5633bcc68b913467734f0f121
                5d6c253999006e0a364768488fca80561
                81d13862f7a9e91b88ef1cf04880f30b1
                c4356a2f1cc184765354ac346ff3c7601
                92c90be64c51c97abffcb0136889e0081
                d8cff2de0df1355a3d74ec30295aa1da1
                See JSON for more IOCs
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                2[.]91[.]138[.]2112
                197[.]206[.]180[.]2051
                85[.]170[.]230[.]1631
                185[.]17[.]1[.]2451
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                youwave932[.]no-ip[.]biz10
                dmar-ksa[.]ddns[.]net3
                karem[.]no-ip[.]org3
                alkhorsan[.]linkpc[.]net2
                sabridz[.]no-ip[.]biz1
                alkhorsan2016[.]no-ip[.]biz1
                amiramir[.]noip[.]me1
                MSKGH[.]DDNS[.]NET1
                mskhe[.]ddns[.]net1
                paleb[.]no-ip[.]org1
                yeswecan[.]duckdns[.]org1
                megatn[.]publicvm[.]com1
                Files and or directories createdOccurrences
                %TEMP%\server.exe4
                %TEMP%\svchost.exe2
                %TEMP%\svhost.exe1
                %APPDATA%\google.exe1
                %TEMP%\system.exe1
                %TEMP%\win32.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\9933a39bcdb4ca2ba91ddfbf0eb49c28.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\27e6ba15367cfc6ccdb30fd12c8ebc9a.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\551c2891c1a5b14d85bd8205beca398a.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\6f548f49442e3cf6cd712e1421ced30b.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\cb0bc0e4b97025e4a12cd7655f373600.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\ea48d06232228d6119e51286c4c0d7cb.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\6843bfb57b172a29eaca1016ea14dd34.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\b17b3051ec3895b563f6189b117c7103.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\b6a24dab009c0449997c4b895176ddee.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\61d4512a2b96204a3981459fa733229e.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\b1471de1dda54e505e7a2fe5dc250cbd.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\5b9aa31356f88f5efd2d650bab2fd205.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\cf10c5de3b577ea5f5b8886499972c21.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\89ced9869827e13512140dfd15310bdb.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\7a6058fe5633bcc68b913467734f0f12.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\5d6c253999006e0a364768488fca8056.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\81d13862f7a9e91b88ef1cf04880f30b.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\c4356a2f1cc184765354ac346ff3c760.exe1
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\92c90be64c51c97abffcb0136889e008.exe1
                See JSON for more IOCs
                File Hashes
                • 04675d38c3f123c6cfe12a8b96c840894985d77a044aa009b6f6a2d1d9bd42a5
                • 070a2b244bfb020dc8c3203831e14d3f27f3a3d5a7bc0df2e1a1acc1b7a5b48a
                • 0bfae405fffc2cb791f7eefb7c4d2efe4b76235289e5a043718bc6ed7480c4f1
                • 0c75f012571cc271d8c19d95b714f425bf6f5ef7b09a646c18cd0b99e0050ede
                • 0e37c0759ded6594cf671c82ea8d8404b2c8ad34c8b7c772d4f4bcdbc01f6b28
                • 133d714e145400b9adc0ac24584745443fee2a9cdcda31bd3251264e46c84607
                • 1444bf151e764ffe3402827f60a142f20a0e6060ad8fb80255e1a82c63ec70e0
                • 146054936453e72343079c7c89517cef5a8e270ba827c321ce6c6740775df7c4
                • 19b06c7cf56e2148202b8051d64823817d8c81afd9e6061e6e625b953439b9eb
                • 26f3184e05046a17a8a470a0ca2088a8774641729eb86c6f84310707014dfb6b
                • 2d4c6b0074ca4866f50c7242882e467a65da7f7dc28fd9c2bbd09caa6f99a8d6
                • 369f407ad2e8321d87ac5f32241d7cf2a0e72aae0b8c0caed4f30faa042ed85e
                • 3bb55a41fa1c485c018b03b521beb74a4baea14bc2b89b8b69713e07079771f9
                • 3d0946ab360b335a58789cc81cb5711e438f312426b2477b2777a256f2b772c6
                • 452ec0f00cee0a7ea6c104d9835af5f3999c50b37d22081dee4b47e75b794cad
                • 469d100e0e62a4099313c485e24f134abd32e598a7f65f147342ac7ea9274f2a
                • 4cd937a9a1914666ebe671b2b9f4db59806dbacd6ae784b10f5b625e1448649f
                • 560a570d89a632b81d34cf4d1e20a86c35657d9211ac4061c419883e2b108e63
                • 5da16143a544f7c51cdd146540b5393113a6768162328cfccb5e484c64472ec6
                • 619b638736132bd02470c09508cb63a3fb753c6ee0f8dab4f4af6c2694f9095f
                • 6323174f37df70906257ac7b545eeed4e1cfaea1cbbba74d5acc49230fadcf73
                • 64f50c68d48d152eba786380b7a1db84f94f28c63f34ccb499008e1889ee0675
                • 694a3485ae77c8e024295e34caf2f335eeb61d4ebcda6fd5789086526ae44a9f
                • 6aacdb0640cda4db32f307b91e4d0d6bb4d88429a14308fb90ec573a9c892afb
                • 7530fc29bdc4ae5be727789818541dafcb590bdd708e64e8bde0a4c99b37b2f7
                • See JSON for more IOCs

                Coverage


                Screenshots of Detection

                AMP



                ThreatGrid



                Win.Malware.Tofsee-6992280-0


                Indicators of Compromise


                Registry KeysOccurrences
                <HKLM>\System\CurrentControlSet\Services\NapAgent\Shas 17
                <HKLM>\System\CurrentControlSet\Services\NapAgent\Qecs 17
                <HKLM>\System\CurrentControlSet\Control\SecurityProviders\Schannel 17
                <HKLM>\System\CurrentControlSet\Services\NapAgent\LocalConfig 17
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\Enroll\HcsGroups 17
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\UI 17
                <HKU>\.DEFAULT\Control Panel\Buses 17
                <HKU>\.DEFAULT\CONTROL PANEL\BUSES
                Value Name: Config3
                17
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\wpdjiqwl
                3
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\wpdjiqwl 3
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WPDJIQWL
                Value Name: Type
                3
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WPDJIQWL
                Value Name: Start
                3
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WPDJIQWL
                Value Name: ErrorControl
                3
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WPDJIQWL
                Value Name: DisplayName
                3
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WPDJIQWL
                Value Name: WOW64
                3
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WPDJIQWL
                Value Name: ObjectName
                3
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WPDJIQWL
                Value Name: Description
                3
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WPDJIQWL
                Value Name: ImagePath
                3
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Windows\SysWOW64\gzntsagv
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\gzntsagv 2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\GZNTSAGV
                Value Name: Type
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\GZNTSAGV
                Value Name: Start
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\GZNTSAGV
                Value Name: ErrorControl
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\GZNTSAGV
                Value Name: DisplayName
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\GZNTSAGV
                Value Name: WOW64
                2
                MutexesOccurrences
                N/A-
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                239[.]255[.]255[.]25017
                69[.]55[.]5[.]25017
                192[.]0[.]47[.]5916
                144[.]76[.]199[.]4315
                176[.]111[.]49[.]4315
                46[.]4[.]52[.]10915
                144[.]76[.]199[.]215
                85[.]25[.]119[.]2515
                43[.]231[.]4[.]715
                172[.]217[.]164[.]13215
                94[.]23[.]27[.]3815
                216[.]146[.]35[.]3514
                208[.]76[.]51[.]5113
                172[.]217[.]192[.]2613
                74[.]6[.]141[.]4013
                212[.]82[.]101[.]4612
                98[.]136[.]96[.]7312
                98[.]136[.]101[.]11612
                67[.]195[.]228[.]8712
                66[.]218[.]85[.]15112
                213[.]205[.]33[.]6312
                98[.]137[.]157[.]4312
                87[.]250[.]250[.]8912
                74[.]125[.]193[.]2612
                172[.]217[.]6[.]22811
                See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                250[.]5[.]55[.]69[.]in-addr[.]arpa17
                250[.]5[.]55[.]69[.]zen[.]spamhaus[.]org17
                250[.]5[.]55[.]69[.]cbl[.]abuseat[.]org17
                250[.]5[.]55[.]69[.]dnsbl[.]sorbs[.]net17
                250[.]5[.]55[.]69[.]bl[.]spamcop[.]net17
                250[.]5[.]55[.]69[.]sbl-xbl[.]spamhaus[.]org17
                microsoft-com[.]mail[.]protection[.]outlook[.]com17
                whois[.]iana[.]org16
                whois[.]arin[.]net16
                sweety2001[.]dating4you[.]cn16
                honeypus[.]rusladies[.]cn16
                katarinasw[.]date4you[.]cn16
                marina99[.]ruladies[.]cn16
                mx-aol[.]mail[.]gm0[.]yahoodns[.]net13
                hotmail-com[.]olc[.]protection[.]outlook[.]com13
                mx1[.]emailsrvr[.]com13
                aol[.]com13
                mx-eu[.]mail[.]am0[.]yahoodns[.]net12
                tiscali[.]it12
                mxs[.]mail[.]ru12
                mx[.]yandex[.]net12
                mx[.]yandex[.]ru12
                msx-smtp-mx2[.]hinet[.]net12
                tiscalinet[.]it11
                inmx[.]rambler[.]ru11
                See JSON for more IOCs
                Files and or directories createdOccurrences
                %SystemRoot%\SysWOW64\config\systemprofile:.repos17
                %SystemRoot%\SysWOW64\config\systemprofile17
                %HOMEPATH%15
                %SystemRoot%\SysWOW64\wpdjiqwl3
                %SystemRoot%\SysWOW64\gzntsagv2
                %SystemRoot%\SysWOW64\athnmuap2
                %SystemRoot%\SysWOW64\slzfemsh2
                %TEMP%\utjfmin.exe1
                %TEMP%\evorylxw.exe1
                %TEMP%\gstniefc.exe1
                %TEMP%\otggjiyd.exe1
                %TEMP%\edtpwsx.exe1
                %TEMP%\uutzkyfi.exe1
                %TEMP%\rlnkeakp.exe1
                %TEMP%\azlhmwgt.exe1
                %TEMP%\wytkbvcv.exe1
                %TEMP%\uboorcup.exe1
                %TEMP%\uxffdbfo.exe1
                %TEMP%\ondzgch.exe1
                %TEMP%\arknuhts.exe1
                %TEMP%\tyllondi.exe1
                %TEMP%\qpfbiej.exe1
                %TEMP%\jhokjsqh.exe1
                %TEMP%\lkwsxhre.exe1
                %TEMP%\pjlicyin.exe1
                See JSON for more IOCs
                File Hashes
                • 116bb71b6e6866ba5862d18e5361fe70ad2f9adb3ed8f5f1606e2561bff9fa79
                • 2b9c74a2ffb4d1164048adec4381d151922244be8855026bff683abbf4122684
                • 397ad676785c8e47422e723c081e44172dd935bcfe1389a039ac4bb1013c50c0
                • 59639b75a9ebe2fdcf6ec9623454f06455a5fa6f0a23e47cece96d98c8c0f324
                • 650c6dae8c1553d599d15e7c3d2235a393f498b743538674c7a1d87a8b627d90
                • 7b962ff72c455f123c5ee0ba29aeea11e6fa23d595a0be8aad7b0235d5280d79
                • 85bd864d585a37662a1c6a28daef2ac8c97996e52bf37209e76b0a8a9d6494e1
                • a1fd580e38af18c70ede2540e309a513e85b9a06423aee45f35fbbf1bfa517b9
                • a94cea85efa1c6842892248e1724cd17fb66a34435c9797d9809c3e25a5e6770
                • bad0767a0cf7088aed7904551b26bafd66b4bbc1257518275a1b277f27d1f7a9
                • c3bb4a36939e8f6d2acf8b57b0676ca8c7bafea33cfd15bedecf192f0610e6e9
                • c5ed772f6cb0aa202fb87049bd20063741fd62023f7d9c924876e28711dab3f2
                • de76a7d7af2c38342333014608b75117a2d1868d9020f62fdd117cdfb5ed30fa
                • e1cfadc86259f90b2f1fb5cd23bd267a94ed8c8a2d72035b6e335fd5e68d5866
                • ec4960b3885c4bb63032883cd088585e4f347c4ac9659f49982f999775d90a21
                • f1e790bcc0711047ab255646e07ef7d2fb644c45b24a4bc67250e2c8ee9318a1
                • f7699a1eafb0aded81818b28fd1c897e3e2e22d9d7b4297d97654a5aca09da49

                Coverage


                Screenshots of Detection

                AMP



                ThreatGrid



                Umbrella



                Win.Malware.Yobrowser-6992453-0


                Indicators of Compromise


                Registry KeysOccurrences
                <HKCU>\Software\Microsoft\RestartManager\Session0000 33
                <HKCU>\SOFTWARE\MICROSOFT\RESTARTMANAGER\SESSION0000
                Value Name: Sequence
                33
                <HKCU>\SOFTWARE\MICROSOFT\RestartManager 33
                <HKCU>\SOFTWARE\MICROSOFT\RESTARTMANAGER\SESSION0000
                Value Name: Owner
                33
                <HKCU>\SOFTWARE\MICROSOFT\RESTARTMANAGER\SESSION0000
                Value Name: SessionHash
                33
                MutexesOccurrences
                Local\RstrMgr-3887CAB8-533F-4C85-B0DC-3E5639F8D511-Session000033
                Local\RstrMgr3887CAB8-533F-4C85-B0DC-3E5639F8D51133
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                N/A-
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                N/A-
                Files and or directories createdOccurrences
                %LOCALAPPDATA%\Programs33
                %LOCALAPPDATA%\Programs\Common33
                %TEMP%\is-C6FN7.tmp\32dfee8be7cca7d0ed5b84fe8deff6d7177042a802586d16c26176ec58952309.tmp1
                %TEMP%\is-9HDTO.tmp\_isetup\_setup64.tmp1
                %TEMP%\is-9HDTO.tmp\_isetup\_shfoldr.dll1
                %TEMP%\is-9HDTO.tmp\trithiweate.dll1
                %TEMP%\is-7CPIN.tmp\36ca931623f279c6683ace47e425666510034f5e18441f90e895a3fc6cd2bbdb.tmp1
                %TEMP%\is-0142V.tmp\_isetup\_setup64.tmp1
                %TEMP%\is-0142V.tmp\_isetup\_shfoldr.dll1
                %TEMP%\is-0142V.tmp\trithiweate.dll1
                %TEMP%\is-CRK4O.tmp\42827e85051a54995e67aeb54b9418968224f6c299887e4afca574e08b2b76c1.tmp1
                %TEMP%\is-Q964A.tmp\482675e5774d1714ae17b5daefd13697fe3a921feb20fc4360065c2135b9c7b0.tmp1
                %TEMP%\is-9AA9G.tmp\3f2c22316bc2184f740f39499e41002c6d525a2c4c18dd0b9170c90410a5e4d1.tmp1
                %TEMP%\is-T68TS.tmp\4a55c9ceaa100182f6fc1ce9c8ec3c0f9eb58b7841c46c7d1d66fa5eaa4f410e.tmp1
                %TEMP%\is-8V9B2.tmp\_isetup\_setup64.tmp1
                %TEMP%\is-8V9B2.tmp\_isetup\_shfoldr.dll1
                %TEMP%\is-8V9B2.tmp\trithiweate.dll1
                %TEMP%\is-P9KOG.tmp\_isetup\_setup64.tmp1
                %TEMP%\is-P9KOG.tmp\_isetup\_shfoldr.dll1
                %TEMP%\is-FPHCP.tmp\_isetup\_setup64.tmp1
                %TEMP%\is-P9KOG.tmp\trithiweate.dll1
                %TEMP%\is-FPHCP.tmp\_isetup\_shfoldr.dll1
                %TEMP%\is-FPHCP.tmp\trithiweate.dll1
                %TEMP%\is-3SHVR.tmp\_isetup\_setup64.tmp1
                %TEMP%\is-3SHVR.tmp\_isetup\_shfoldr.dll1
                See JSON for more IOCs
                File Hashes
                • 02be7ea7484ce02344237e4aab046aaa3af0f67f5b5bc7530b7757c182008374
                • 0912999b354d903202f981d327670d3dd5a6f37f3c3374cfbf29b9d5dce86e5a
                • 0bd58e14131755d1671174225ea1349a9c9ca54e76a29c2696aab762859ed6ea
                • 1150e22d4d164cd9a07ee28a6c6d33e657e10e1af6f06a3423c56a5f0449b02c
                • 1609b08dc860872a1a37967ec01e9c8d90813e42f4c32a4a5c7651b226bf1c7f
                • 16ee969920278d950596ee85505d40ed1b4265d6fdfa35dc55dd6d188c432614
                • 18c140ae4eb5f0bdff9f07ba176fba6873e5359ff689145bf4d41defec9f635f
                • 224b4f9f98e7d9887ebcae15c02d8973264f31d12ff87a30d696139a316e2cf9
                • 259546449e9e630fbe3bdcfbda7c51de9c1e7bb93022bda08d89bea95ad23a24
                • 26b5593a4e7c8b5accf97029cf6c646c7769cecd36d105153f228f03a20f24be
                • 2e39806e189e988a6bb094359db5aab14638a1737fded6ab00095425672aa13d
                • 2fc0b64cf4ab9d6a6a3b607b999b1e47551bfb62acf143bd08faebf0485157d7
                • 32dfee8be7cca7d0ed5b84fe8deff6d7177042a802586d16c26176ec58952309
                • 36c8f82ff5ebd1647044f14b83dbfb93e1ad5e8e80d95cb2f6e3f463cf4ac94e
                • 36ca931623f279c6683ace47e425666510034f5e18441f90e895a3fc6cd2bbdb
                • 3f2c22316bc2184f740f39499e41002c6d525a2c4c18dd0b9170c90410a5e4d1
                • 42827e85051a54995e67aeb54b9418968224f6c299887e4afca574e08b2b76c1
                • 482675e5774d1714ae17b5daefd13697fe3a921feb20fc4360065c2135b9c7b0
                • 4843bffb11be8da31b059e63973b2f97a3a093cf80b537cb19629f49099a35c4
                • 4a55c9ceaa100182f6fc1ce9c8ec3c0f9eb58b7841c46c7d1d66fa5eaa4f410e
                • 4f349d22bc1cb7e4defbd97debebe906a5408351e7069cf5cc2333338d5be8ed
                • 5677386b0050cff2f5a2c12430999d569dc744944f2f2d9c29f3bab6d5d43edf
                • 5ca1ade829002a58684dc8ff37b11e7b07d91b61a26d89a6736f884d14a0d00f
                • 5ddbe11ee1e50f6a198f1e331e55621fcfc02870f6e8b4e4d5d171bf008938b5
                • 64543ddc78b58da0236310fcee0b447e153d94a4cd393c1975bbe6b000acc960
                • See JSON for more IOCs

                Coverage


                Screenshots of Detection

                AMP



                ThreatGrid



                Exprev

                Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
                • Madshi injection detected (3267)
                  Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
                • Kovter injection detected (2041)
                  A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
                • Process hollowing detected (1016)
                  Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
                • Excessively long PowerShell command detected (676)
                  A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
                • Dealply adware detected (284)
                  DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
                • Gamarue malware detected (197)
                  Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
                • PowerShell file-less infection detected (53)
                  A PowerShell command was stored in an environment variable and run. The environment variable is commonly set by a previously run script and is used as a means of evasion. This behavior is a known tactic of the Kovter and Poweliks malware families.
                • Atom Bombing code injection technique detected (45)
                  A process created a suspicious Atom, which is indicative of a known process injection technique called Atom Bombing. Atoms are Windows identifiers that associate a string with a 16-bit integer. These Atoms are accessible across processes when placed in the global Atom table. Malware exploits this by placing shell code as a global Atom, then accessing it through an Asynchronous Process Call (APC). A target process runs the APC function, which loads and runs the shellcode. The malware family Dridex is known to use Atom Bombing, but other threats may leverage it as well.
                • Fusion adware detected (35)
                  Fusion (or FusionPlayer) is an adware family that displays unwanted advertising in the form of popups or by injecting into browsers and altering advertisements on webpages. Adware is known to sometimes download and install malware.
                • Installcore adware detected (32)
                  Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.

                Vulnerability Spotlight: Two bugs in KCodes NetUSB affect some NETGEAR routers

                $
                0
                0


                Dave McDaniel of Cisco Talos discovered these vulnerabilities.

                Executive summary

                KCodes’ NetUSB kernel module contains two vulnerabilities that could allow an attacker to inappropriately access information on some NETGEAR wireless routers. Specific models of these routers utilize the kernel module from KCodes, a Taiwanese company. The module is custom-made for each device, but they all contain similar functions.

                The module shares USB devices over TCP, allowing clients to use various vendor-made drivers and software to connect to these devices. An attacker could send specific packets on the local network to exploit vulnerabilities in NetUSB, forcing the routers to disclose sensitive information and even giving the attacker the ability to remotely execute code.

                In accordance with our coordinated disclosure policy, Cisco Talos reached out to KCodes and NETGEAR regarding this vulnerability. After working with KCodes, they provided an update to NETGEAR, which is scheduled to release an update. Talos decided to release the details of our vulnerability after surpassing our 90-day deadline.

                Vulnerability details

                KCodes NetUSB unauthenticated remote kernel arbitrary memory read vulnerability (TALOS-2018-0775/CVE-2019-5016)

                An exploitable arbitrary memory read vulnerability exists in the KCodes NetUSB.ko kernel module which enables the ReadySHARE Printer functionality of at least two NETGEAR Nighthawk Routers and potentially several other vendors/products. A specially crafted index value can cause an invalid memory read, resulting in a denial of service or remote information disclosure. An unauthenticated attacker can send a crafted packet on the local network to trigger this vulnerability.

                Read the complete vulnerability advisory here for additional information.

                KCodes NetUSB unauthenticated remote kernel information disclosure vulnerability (TALOS-2018-0776/CVE-2019-5017)

                An exploitable information disclosure vulnerability exists in the KCodes NetUSB.ko kernel module that enables the ReadySHARE Printer functionality of at least two NETGEAR Nighthawk Routers and potentially several other vendors/products. An unauthenticated, remote attacker can craft and send a packet containing an opcode that will trigger the kernel module to return several addresses. One of which can be used to calculate the dynamic base address of the module for further exploitation.

                Read the complete vulnerability advisory here for additional information.

                Versions tested

                Talos tested and confirmed that TALOS-2019-0776 and TALOS-2019-0775 affects the NETGEAR Nighthawk AC3200 (R8000), firmware version 1.0.4.28_10.1.54 — NetUSB.ko 1.0.2.66. The NETGEAR Nighthawk AC3000 (R7900), firmware version 1.0.3.8_10.0.37 (11/1/18) — NetUSB.ko 1.0.2.69 is also affected by TALOS-2019-0775.



                Coverage

                The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                Snort Rules: 49087

                Threat Source newsletter (June 20, 2019)

                $
                0
                0

                Newsletter compiled by Jonathan Munshaw.

                Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

                This week, we disclosed two vulnerabilities in KCodes’ NetUSB kernel module contains that could allow an attacker to inappropriately access information on some NETGEAR wireless routers. An attacker could send specific packets on the local network to exploit vulnerabilities in NetUSB, forcing the routers to disclose sensitive information and even giving the attacker the ability to remotely execute code.

                We also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week.

                Upcoming public engagements with Talos

                Event: “It’s never DNS...It was DNS: How adversaries are abusing network blind spots” at SecTor
                Location: Metro Toronto Convention Center, Toronto, Canada
                Date: Oct. 7 - 10
                Speaker: Edmund Brumaghin and Earl Carter
                Synopsis: While DNS is one of the most commonly used network protocols in most corporate networks, many organizations don’t give it the same level of scrutiny as other network protocols present in their environments. DNS has become increasingly attractive to both red teams and malicious attackers alike to easily subvert otherwise solid security architectures. This presentation will provide several technical breakdowns of real-world attacks that have been seen leveraging DNS for a variety of purposes such as DNSMessenger, DNSpionage, and more. 

                Cyber Security Week in Review

                • The U.S. is reportedly stepping up its offensive cyber attacks against Russia’s power grid. Sources told the New York Times that the new efforts are a quiet effort to respond to Russia’s meddling in the 2018 midterm elections.
                • The U.S. Department of Homeland Security released an advisory urging Microsoft users to patch all of their products. The government warned users against the potential exploitation of a “wormable” bug Microsoft disclosed in May.
                • A security researcher was able to access and publicly post more than seven million Venmo transactions. The researcher says it was all done to urge users to set their accounts to private on the money-sending app.
                • Several malicious Android apps have been able to bypass two-factor authentication. Once logging into some other apps installed on the users’ phone, these apps attempt to steal Bitcoin.
                • Two new class-action lawsuits allege that Amazon’s Alexa devices unknowingly record small children’s voices. The suit claims this is illegal because minors cannot consent to having their voices recorded.
                • Cisco disclosed several critical vulnerabilities this week in a variety of their products, including DNA Center and SD-WAN.
                • New malware is targeting cryptocurrency exchange employees using Windows and Mac systems. The attacks exploit a zero-day vulnerability in Mozilla Firefox that Mozilla patched earlier this week.
                • The Florida city of Riviera paid $600,000 to hackers who infected their computer system with ransomware. The attack apparently originated from a phishing email one employee opened. 
                • Notable recent security issues

                Notable recent security issues

                Title: Attackers redirect users to RIG exploit kit, downloads ransomware
                Description: A new malvertising campaign in the wild attempts to trick users into clicking on malicious ads, then sending them to a web page containing the RIG exploit kit. Once infected, the kit then downloads the Buran ransomware. Buran is a fairly straightforward ransomware, implementing its encryption process and then displaying a ransom note to the victim.
                Snort SIDs: 50457, 50458


                Title: New Linux malware believed to use code from past Chinese malware
                Description: A new malware known as “HiddenWasp” has been spotted in the wild targeting Linux machines. HiddenWasp contains several methods to avoid detection by antivirus solutions, and the attackers are still actively deploying it. Researchers discovered that the malware contains code that is copy and pasted from other, past attacks from Chinese actors.
                Snort SIDs: 548521 - 48528 

                Most prevalent malware files this week

                SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3 
                MD5: 47b97de62ae8b2b927542aa5d7f3c858
                Typical Filename: qmreportupload.exe 
                Claimed Product: qmreportupload
                Detection Name: Win.Trojan.Generic::in10.talos

                SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510 
                MD5: 4a50780ddb3db16ebab57b0ca42da0fb
                Typical Filename: wup.exe
                Claimed Product: N/A
                Detection Name: W32.7ACF71AFA8-95.SBX.TG

                SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b 
                MD5: 799b30f47060ca05d80ece53866e01cc
                Typical Filename: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b.bin 
                Claimed Product: N/A 
                Detection Name: W32.Generic:Gen.22fz.1201

                SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f 
                MD5: e2ea315d9a83e7577053f52c974f6a5a
                Typical Filename: Tempmf582901854.exe
                Claimed Product: N/A
                Detection Name: W32.AgentWDCR:Gen.21gn.1201

                SHA 256: 46b241e3d33811f7364294ea99170b35462b4b5b85f71ac69d75daa487f7cf08
                MD5: db69eaaea4d49703f161c81e6fdd036f
                Typical Filename: xme32-2141-gcc.exe
                Claimed Product: N/A
                Detection Name: W32.46B241E3D3-95.SBX.TG

                Threat Roundup for June 14 to June 21

                $
                0
                0
                Today, Talos is publishing a glimpse into the most prevalent threats we've observed between June 14 and June 21. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

                As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

                For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found here that includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.

                The most prevalent threats highlighted in this roundup are:

                • Win.Malware.Remcos-6996918-1
                  Malware
                  Remcos is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes, interact with a webcam, and capture screenshots. Remcos is commonly delivered through Microsoft Office documents with macros, sent as attachments on malicious emails.
                   
                • Win.Dropper.Nymaim-6996892-0
                  Dropper
                  Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.
                   
                • Win.Ransomware.Sage-6995951-1
                  Ransomware
                  The Sage ransomware encrypts files and then demands a payment for the files to be recovered. Sage typically spreads via malicious email attachments, and the encrypted file extensions vary.
                   
                • Win.Malware.Ursnif-6995948-1
                  Malware
                  Ursnif is used to steal sensitive information from an infected host and can also act as a malware downloader. It is commonly spread through malicious emails or exploit kits.
                   
                • Win.Malware.Zusy-6995723-0
                  Malware
                  Zusy, also known as TinyBanker or Tinba, is a trojan that uses man-in-the-middle attacks to steal banking information. When executed, it injects itself into legitimate Windows processes such as "explorer.exe" and "winver.exe." When the user accesses a banking website, it displays a form to trick the user into submitting personal information.
                   
                • Win.Ransomware.Sodinokibi-6995593-0
                  Ransomware
                  Sodinokibi is a ransomware family that is frequently spread via attacks exploiting recently patched zero-day vulnerabilities. Most recently, it was observed being spread after an Oracle WebLogic vulnerability was exploited.
                   
                • Win.Malware.Dridex-6995476-1
                  Malware
                  Dridex is a well-known banking trojan that aims to steal credentials and other sensitive information from an infected machine.
                   
                • Win.Trojan.Shiz-6994953-0
                  Trojan
                  Shiz is a remote access trojan that allows an attacker to access an infected machine in order to harvest sensitive information. It is commonly spread via droppers or by visiting a malicious site.
                   
                • Win.Virus.Expiro-6994921-0
                  Virus
                  Expiro is a known file infector and information stealer that hinders analysis with anti-debugging and anti-analysis tricks.
                   

                Threats

                Win.Malware.Remcos-6996918-1


                Indicators of Compromise


                Registry KeysOccurrences
                <HKCU>\Software\remcos_gerjisumsvyvegw 25
                <HKCU>\SOFTWARE\REMCOS_GERJISUMSVYVEGW
                Value Name: EXEpath
                25
                MutexesOccurrences
                Remcos_Mutex_Inj25
                remcos_gerjisumsvyvegw25
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                185[.]84[.]181[.]9025
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                N/A-
                Files and or directories createdOccurrences
                %APPDATA%\remcos25
                %APPDATA%\remcos\logs.dat25
                %APPDATA%\Machree1.exe25
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\Machree1.vbe25
                %HOMEPATH%\Start Menu\Programs\Startup\Machree1.vbe24
                File Hashes
                • 008d108ecd6f5ddc1a83ddde9a5610dc7c545bafa8d08a5f334cf6c18b8f8c48
                • 0532cb4b98868c1ca8c6679a128649ef4db64ce7aa495c43b43a1c63622e9fb3
                • 05914740255f1e48bd2267145f374d982a6d84a52666a51064f3a4a2d53ca667
                • 061345d5cb07ed337651b14172d5881c7f940225f777e97162d3bb5d13b9f303
                • 061699059a6bb9fe01566d062f1425eab0a8b67f47b088f45f4ac2b44c04bbe0
                • 06cb29e96868854c02e5121d9c72e8ea17ed97a519bc7d2c8cc4fc55d56cb621
                • 0771087cc5d55f25b3ef398fbe3303e46fca47c4b56a84a611f567b5d2999390
                • 08242c0494c9cedf45cb27f447848661ea57f1598734ced8d0ac6e529a52eb0d
                • 09dfabb291531d5d9b5250bce1b0e53a4ac318d9c16712190ff0197f42b05117
                • 0e30994864e21d987ef62a0d26d280c35680c151853c93d7b591dc5b711a859c
                • 0f11daf971e9e8777a01b3892de3cf14d4f2eb8ba3bee6c589832e42e512e23f
                • 15a34dc9368201767521a71133fc51442bbaf87b5f7449895f32e9dd6860e5b9
                • 15fa9cfaaba597d539b6037789bab5817e878c391a684fe24226b085822a5f5c
                • 18e4d4f751a9b0dd98c1d44f5ee6a711850074244b452541a1807bf06dfaebcf
                • 1d608c4f6f5461bd282fa372a7142214aac8581b767f8c961bcfd1e0b67a7773
                • 22586b36679b18e7f560cb3382c4d5b10e173dcce3f9c038d6cb6c0bdb30021e
                • 26952825987d9fa2ecbf59acf74cc46f546acafc9212130b77c66d442a888468
                • 2c707b9f5c691c03a36e0b77b83572abd481197aa9d4ad075a8921b54a0e2ac2
                • 2d1286793d988e5f5fb49857d40ed6fc6626b81a7fc15436611230b03b8cb236
                • 38fb84780fe10c9d89765365cf3a7e96b992a9efb8e049605139fb75da1971d5
                • 3aa207171befd54d8d3e1c4cabd692c6a59c9dfc24e2ad1be15e66cfe972c631
                • 3ae0b911a9934ad510b86b86cb74c891754fdecf26bb537d603869e559cf6f80
                • 3e662b8b705b1d3d6f7d731bf341d0c328cab969d36b9c1d7ed36941f5c1d2e6
                • 3ec95e210408d3e195af15058ea02b93abe0be5d88364da0927921deaced8fdc
                • 3ee483a19e47433b5b36b6df2456d713d9737083652300651b19e5d56d803526
                • See JSON for more IOCs

                Coverage


                Screenshots of Detection

                AMP



                ThreatGrid

                Win.Dropper.Nymaim-6996892-0


                Indicators of Compromise


                Registry KeysOccurrences
                <HKCU>\Software\Microsoft\GOCFK 26
                <HKCU>\SOFTWARE\MICROSOFT\GOCFK
                Value Name: mbijg
                26
                MutexesOccurrences
                Local\{369514D7-C789-5986-2D19-AB81D1DD3BA1}26
                Local\{D0BDC0D1-57A4-C2CF-6C93-0085B58FFA2A}26
                Local\{F04311D2-A565-19AE-AB73-281BA7FE97B5}26
                Local\{F6F578C7-92FE-B7B1-40CF-049F3710A368}26
                Local\{306BA354-8414-ABA3-77E9-7A7F347C71F4}26
                Local\{F58B5142-BC49-9662-B172-EA3D10CAA47A}26
                Local\{C170B740-57D9-9B0B-7A4E-7D6ABFCDE15D}26
                Local\{B888AC68-15DA-9362-2153-60CCDE3753D5}26
                Local\{2DB629D3-9CAA-6933-9C2E-D40B0ACCAC9E}18
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                34[.]227[.]185[.]1531
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                olmcehndmyhb[.]in25
                thxwvxr[.]pw25
                wjztocdw[.]net25
                gxmxojjk[.]com25
                mmyuf[.]in25
                dlycu[.]net25
                oxkkvlewktdt[.]in25
                hlexdsgcio[.]com25
                yayksuheo[.]net25
                fjfrix[.]pw25
                rqpdg[.]com25
                sqbxpxuhgs[.]in25
                wmimqpx[.]pw25
                nnhquzhcvm[.]in25
                clbnstusmu[.]net25
                kttasj[.]in1
                qthupu[.]net1
                bqdkoibgkrw[.]in1
                rakacljgisdb[.]in1
                nefhn[.]in1
                bkbyvpcgbcnc[.]net1
                xabzrrutxu[.]com1
                yckmgwft[.]com1
                deueijrnywe[.]pw1
                tazhibvbczf[.]com1
                See JSON for more IOCs
                Files and or directories createdOccurrences
                %ProgramData%\ph26
                %ProgramData%\ph\fktiipx.ftf26
                %TEMP%\gocf.ksv26
                %TEMP%\fro.dfx24
                \Documents and Settings\All Users\pxs\pil.ohu24
                %LOCALAPPDATA%\7z210
                %APPDATA%\s26910
                %LOCALAPPDATA%\28706
                %APPDATA%\710i5v86
                %ProgramData%\05n35
                %ProgramData%\0m25
                %ProgramData%\pj57siq4
                %ProgramData%\02zs4
                %ProgramData%\j91z3
                %LOCALAPPDATA%\9b83
                %APPDATA%\mb313
                %LOCALAPPDATA%\lnt03
                %LOCALAPPDATA%\uhs3
                %ProgramData%\hm94p642
                %ProgramData%\9qa32
                %LOCALAPPDATA%\4y3432
                %APPDATA%\h652
                %APPDATA%\30842
                %LOCALAPPDATA%\c5a2
                %LOCALAPPDATA%\q0n01
                See JSON for more IOCs
                File Hashes
                • 00e353db4270f10024bfecdb87176625a79fe79c8fc5447c117cf65231df3dc2
                • 0172d0c9b2ea9f408e17941f47aa45e81fb83d15897e2a49c1213abb725387d6
                • 069f16f2659e165ff2b29f2e539af61e986955738187d987b83fe36dd18ce721
                • 082e25b44250cb9eb2771c72ab79acda6bd6846090d4ac3d839e201b0782a2e2
                • 0cc0e127d86659ecf3fcbcdf04fcf72217a3ce12081b48831e739e5001dd2e04
                • 0fac2d86d39cc022dea6a0ba072ac88985fc9f0bd9dcd7246f3395daea9d5c2b
                • 17094de48ed74622c81a08504bc65c32c518784ac791197a8fe40f315a5db41d
                • 1753a38b2c5f994198409c1f706d61a7e3059502a40fe577cc2071e7765ffdd5
                • 1d04d5db2cee469d6a6de02bddb26a0ebd648ecac8a8437e700c448d48f4a4bd
                • 1f8ded1f7ff186d6cf02db9a9fb32837cf32afc2c9cce54862ed8332e8f7afed
                • 3611e930dff5d525411c09b000d4c3f39e4ca3c3de408222e32efeef36f6bee9
                • 388fd291540103637daaca22f40ed1219e60713e01d00943e57b56c50b8bb0af
                • 4cf78bec349135e62405097f3c7ecbc496d9ac82357ba36563cbb0dc77ef73ea
                • 578ac45673bbf7516027b31626390893dc95e9646fd5860f23562c660c23ebf8
                • 6557ecfaa38148a9b4f6652b5f0f0dabe2fb9c27ad44b86e2fe9db38baf2e944
                • 6fd12db488909e16ad2bbfddc8cd1ea8a405e3846a3f08d2ef17b9abce598840
                • 743acd3870df235c506231e1da30d55549b878b950d0a7e31b9a1b2299c2172c
                • 779f163a69ad38fe61dab7bfcea1a2fedaa951c7f957774acf4f3d5e1ed4487a
                • 783ad0bb502ddba1fc42383b34bd8252568fff178dcb387b25984a36f3801ff5
                • 79c279315079c1307b73a49591b441e8ba19f169321d343b129d374b0f10d37d
                • 7a3a5142c6d45c5bbf24a6a841cd494487ab83561a7e3f8221ac1a6f019e3a68
                • 901a670c01ef2f5b81eb5b2914d6f642aa513adae76e7714e5bf49ccd1a4386c
                • 9cd58d1690a4dd35c764097538edd119e5ed4a6ebea2bf08054c7e6fb43b599c
                • ab8eef993a40335c73bd970654e1342a1c0c1e9081b59c45027e6db608971e6f
                • af527cf0ab22c9d7acaf33ceec3996185c0aef59bd9fa2784dd9ac602d85fa19
                • See JSON for more IOCs

                Coverage


                Screenshots of Detection

                AMP



                ThreatGrid



                Umbrella



                Win.Ransomware.Sage-6995951-1


                Indicators of Compromise


                Registry KeysOccurrences
                <HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER
                Value Name: PendingFileRenameOperations
                25
                <HKCU>\SOFTWARE\MICROSOFT\SPEECH\CURRENTUSERLEXICON\{C9E37C15-DF92-4727-85D6-72E5EEB6995A} 18
                <HKCU>\SOFTWARE\MICROSOFT\SPEECH\CURRENTUSERLEXICON
                Value Name: CLSID
                18
                <HKCU>\SOFTWARE\MICROSOFT\SPEECH\CURRENTUSERLEXICON 18
                <HKCU>\SOFTWARE\MICROSOFT\SPEECH\CURRENTUSERLEXICON
                Value Name: Generation
                18
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER
                Value Name: GlobalAssocChangedCounter
                18
                <HKCU>\Software\Classes 18
                <HKCR>\.sage 18
                <HKCR>\sage.notice\DefaultIcon 18
                <HKCR>\sage.notice 18
                <HKCR>\sage.notice\FriendlyTypeName 18
                <HKCR>\sage.notice\shell\open\command 18
                <HKCR>\SAGE.NOTICE\shell 18
                <HKCR>\SAGE.NOTICE\SHELL\open 18
                <HKCR>\htafile\DefaultIcon 18
                <HKCR>\htafile 18
                <HKCU>\CONTROL PANEL\DESKTOP
                Value Name: Wallpaper
                18
                <HKCR>\.SAGE 18
                <HKCR>\SAGE.NOTICE\DEFAULTICON 18
                <HKCR>\SAGE.NOTICE\FRIENDLYTYPENAME 18
                <HKCR>\SAGE.NOTICE\SHELL\OPEN\COMMAND 18
                <HKCR>\HTAFILE\DEFAULTICON 18
                <HKCU>\SOFTWARE\MICROSOFT\SPEECH\CURRENTUSERLEXICON\{C9E37C15-DF92-4727-85D6-72E5EEB6995A}\FILES
                Value Name: Datafile
                18
                MutexesOccurrences
                zHUoNUQ725
                Local\30F1B4D6-EEDA-11d2-9C23-00C04F8EF87C18
                \BaseNamedObjects\PFShggN316
                \BaseNamedObjects\adX9ZN6Z16
                Local\{3AE0DB4C-C01E-4DAE-8FDC-24ACF3B28941}-Mutex15
                Local\{609C30CE-E266-4A73-A27F-BD103B3FA847}-Mutex2
                Local\{7C86DD40-D457-4186-A852-0F98388A1834}-Mutex1
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                5[.]45[.]6[.]13825
                5[.]45[.]159[.]1925
                5[.]45[.]140[.]625
                139[.]59[.]93[.]18125
                5[.]45[.]226[.]23725
                138[.]197[.]136[.]19625
                138[.]197[.]105[.]6825
                211[.]114[.]30[.]725
                5[.]45[.]247[.]2225
                138[.]197[.]196[.]1925
                138[.]197[.]122[.]6825
                139[.]59[.]227[.]17225
                211[.]114[.]64[.]6325
                5[.]45[.]129[.]5225
                138[.]197[.]22[.]15125
                211[.]114[.]47[.]8025
                211[.]114[.]28[.]23525
                138[.]197[.]109[.]7925
                5[.]45[.]242[.]19725
                139[.]59[.]219[.]23725
                5[.]45[.]24[.]23625
                139[.]59[.]185[.]425
                5[.]45[.]238[.]9025
                211[.]114[.]135[.]13625
                211[.]114[.]84[.]14225
                See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                mbfce24rgn65bx3g[.]we0sgd[.]com25
                mbfce24rgn65bx3g[.]y8lkjg5[.]net25
                Files and or directories createdOccurrences
                %TEMP%\__config252888.bat25
                %APPDATA%\Rj3fNWF3.exe25
                %APPDATA%\s1qoaKDO.tmp25
                %HOMEPATH%\Documents\!HELP_SOS.hta25
                %System32%\Tasks\N0mFUQoa25
                \!HELP_SOS.hta22
                %TEMP%\f1.vbs22
                %APPDATA%\f1.hta22
                %HOMEPATH%\Desktop\!HELP_SOS.hta22
                %TEMP%\DDx.bmp18
                %PUBLIC%\Desktop\!HELP_SOS.hta18
                %PUBLIC%\Documents\!HELP_SOS.hta18
                File Hashes
                • 002681facd1401892d38d6b2fb8a4a601cb6097e2036807d960088e3a11518bd
                • 07ea28b71fa40819e50c191eeb968029564ea50c1be7f9fa9c60c9e0949c238b
                • 0866e68a80127122197155713e6a88ee77833f5a309ee5a78f172fcda338ad42
                • 0c022132886217e726f6c199a7336da8153b17477740dbbfb381c246253e98b8
                • 0c2c36fb7443677b044a0d9802caced6ef9ed367ad8d22941d22ce5b7c62015b
                • 0d873b512bb9419c70d5d9a173de936a4fb88e78e62cea33f8e7588efb13a986
                • 0f05b4134b3474c2c3f9f715ab625515e4dc74d175f224dbd743034ca7fd5f0c
                • 19c7fa10cdb6af0a317b898fca0c2f8dec17766ee7c486be6d2d4e8151943cc3
                • 277a53be722f0af119fe7ec952391fce2ba5dffe53499b6b066a0a7760c549f4
                • 27f2a66812448c1a9e157d6814c1622a15ef098ddc5bd79c5ed5c0faa1fb683c
                • 2cf2814a79c30a107bf7b765f7fbd8f7f12fd7feceed7d7948c777ef4862a2bf
                • 4264426561ed818abc86cadef408e0501efd8a377d668d5ba08e7634aef1ee4e
                • 484afc576a95445933cdee2304f015758a3f1979460a7fabffdc7680be48f6f6
                • 4c78e95297bd4e39c874b5405db0cabc9543bd586db72d7396a4854e57b4ccf4
                • 5069703a5f06e1ca23ea7ae6cf5b12d1e8a22c38b71712927491633541cae496
                • 54791783603a6ac3e74a6d64276b6f6160da289130d42fc7c6a58632c6b7bccd
                • 5b947d3510afaa28ca3bfe81cb35d3f50e1d0a88960be5ea3da634599337deb7
                • 5dd1cb4b4f8a339024c010d10343093671db5cbac4b9653789488843434a16bc
                • 65a1582b598001becc4c95c429097481b4572d5e012991912a0269db77dad137
                • 6b8921856dfbc5ae21bb2cca0def18769ed855f3d9a2d0e90b2a9776bdb0e709
                • 6cd837db9ee3984c5bbeb23ec892a4fa298cd10d698ebcfbf8379f944fce39f3
                • 73573450b01ab7f8da715315f5bfca23fb80c1c6be629f36a68f0ba70beb7885
                • 7e0aa71c458ed642ed6d210aac13b088bc4e0ab15c73699dc279d0a0c6af0637
                • 805f4e981b4f67c65492734466d6089a44a56cd7555cb7e01513f2a318fd4632
                • 878156061f18393a0889e3fd6eba8138d33f29ac1dc3f39ec3e54e5693c966b6
                • See JSON for more IOCs

                Coverage


                Screenshots of Detection

                AMP



                ThreatGrid



                Malware



                Win.Malware.Ursnif-6995948-1


                Indicators of Compromise


                Registry KeysOccurrences
                <HKCU>\SOFTWARE\MICROSOFT\IAM
                Value Name: Server ID
                15
                <HKCU>\Software\AppDataLow\Software\Microsoft\02BAB7FD-7931-84AC-1356-BDF8F7EA41AC 15
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: aclutxml
                15
                <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\02BAB7FD-7931-84AC-1356-BDF8F7EA41AC
                Value Name: Client
                15
                <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\02BAB7FD-7931-84AC-1356-BDF8F7EA41AC
                Value Name: {D7908994-4AF8-210B-0CFB-1EE5005F32E9}
                15
                <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\02BAB7FD-7931-84AC-1356-BDF8F7EA41AC
                Value Name: {344BD002-037D-867E-2DA8-E71AB15C0BEE}
                15
                MutexesOccurrences
                Local\{31F7CC8D-DC06-8BF4-6EF5-D0EF82F90493}15
                Local\{73A713E4-3646-1D08-D857-CAA18C7B9E65}15
                Local\{C955B29C-9464-E306-E60D-08C77A91BCEB}15
                {D647E266-3DDD-787D-776A-C12C9B3E8520}15
                {EA4B00BD-410A-AC5E-1BBE-05A07FD209D4}2
                {5E33275E-2503-40DA-9F72-297443C66DE8}1
                {9AA3B82F-319E-DC81-8B6E-F5D0EF82F904}1
                {B2A0D287-6908-B436-8306-AD28679A31DC}1
                {16F26DB9-7D02-B8E1-B7AA-016CDB7EC560}1
                {2EBBEFAB-B5C8-9042-AF42-B9C45396FD38}1
                {6618B948-8DD4-88EC-47FA-113C6BCED530}1
                {C6705878-6D91-E8C3-275A-F19C4B2EB590}1
                {C6978AC4-6D8C-E882-275A-F19C4B2EB590}1
                {F2232C8E-A932-F4DB-C346-ED68A7DA711C}1
                {82016989-F9D2-04E0-93D6-3D78776AC12C}1
                {F6025C5D-DD1D-9885-178A-614C3B5E2540}1
                {2AB58D90-81E2-ECD9-5BFE-45E0BF124914}1
                {22C3958C-1968-A432-B376-5D18970AE1CC}1
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                208[.]67[.]222[.]22215
                52[.]58[.]78[.]1615
                87[.]106[.]18[.]14115
                62[.]149[.]142[.]16015
                62[.]149[.]142[.]16615
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                schema[.]org15
                api[.]w[.]org15
                gmpg[.]org15
                maxcdn[.]bootstrapcdn[.]com15
                resolver1[.]opendns[.]com15
                222[.]222[.]67[.]208[.]in-addr[.]arpa15
                myip[.]opendns[.]com15
                ogp[.]me15
                themeisle[.]com15
                www[.]addthis[.]com15
                atomi[.]org15
                www[.]capoverso[.]info15
                capoverso[.]info15
                cyberplay[.]at15
                smashballoon[.]com15
                www[.]azzurrabiagi[.]com15
                Files and or directories createdOccurrences
                %APPDATA%\Mozilla\Firefox\Profiles\1lcuq8ab.default\prefs.js15
                %APPDATA%\Microsoft\Cicprov15
                %APPDATA%\Microsoft\Cicprov\api-draw.exe15
                \{5D9E0C27-180C-9720-0AE1-CCBBDEA5C01F}15
                %TEMP%\70B2.bi11
                %TEMP%\E304\10.bat1
                %TEMP%\716D.bi11
                %TEMP%\E536\F29B.bat1
                %TEMP%\6E32.bi11
                %TEMP%\E110\10.bat1
                %TEMP%\90EE.bi11
                %TEMP%\F56C\FAB6.bat1
                %TEMP%\8E8E.bi11
                %TEMP%\F490\10.bat1
                %TEMP%\A143.bi11
                %TEMP%\520C\2906.bat1
                %TEMP%\9DD9.bi11
                %TEMP%\3F66\1FB3.bat1
                %TEMP%\89BD.bi11
                %TEMP%\1460\A30.bat1
                %TEMP%\99A5.bi11
                %TEMP%\3BDC\10.bat1
                %TEMP%\81B2.bi11
                %TEMP%\B7A1
                %TEMP%\B7A\5BD.bat1
                See JSON for more IOCs
                File Hashes
                • 03acbc64c9b3989a76dd27df76ce1d8cbe73ecb9b44b3573db48dc1f68812009
                • 092491d78943b29e6fd44893c945ff8fc4ac6915288c91e63ea9995fbcbf076e
                • 0a7fdfc7765dc8c7b1b7163ac790eabd225565110ae21ca6459cdae317480237
                • 1673c7630dba0d13ddf37fd41d3df713716636d6e17a0783339688928c0094cb
                • 189a2e65781d3f026a1a8a19b21fbf2e305504e7e8317865ad4e538e055f5571
                • 306c7d52c2c6d02bc243dbdaea2084f9b32346dd48f6bb436b947fed783744de
                • 32b005dbb3c48e6aa483c078b4a67361bf913d6204549f635a8a88e42097d9ea
                • 741a2e9f54703f4b79bae3d2824e0b675817bbdaf3c9863bbe1457584edc2501
                • 7e97b034ba57094f287acac4a02bfa379db09366aed17f0dc12dd63b32e4cb58
                • 85ca78bd8452b966c035a15c9cdad1822f252e4fa89373d249927951c16ac305
                • 8abd4e0b76d245ea7d3f05bb4c51a67aebdbc3acef4d9f2f4724397d9c3cccd9
                • a0f4837e429db7efdbdaa6cdbedd4a8c2af20b995aecfdecaf6438651d6c4a55
                • c139ae8e6b92853d8c2d189ef3bb100782e4bb820cbd16cd6901067d4187ad96
                • c523e34ec9d8af73d08cb1208e31e22f0de9a32c7d0dc57a7fe96311fcbabac4
                • da646594016fbbf3eeaf875fb01c4d35ab8c72837a99152a8cd696eeb32863d7

                Coverage


                Screenshots of Detection

                AMP



                ThreatGrid



                Umbrella

                Win.Malware.Zusy-6995723-0


                Indicators of Compromise


                Registry KeysOccurrences
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: EEFEB657
                16
                MutexesOccurrences
                EEFEB65725
                \BaseNamedObjects\4A60888F24
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                216[.]218[.]185[.]16224
                216[.]218[.]206[.]691
                104[.]238[.]198[.]1901
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                brureservtestot[.]cc19
                qytufpscigbb[.]com3
                Files and or directories createdOccurrences
                %APPDATA%\4A60888F\bin.exe24
                %LOCALAPPDATA%Low\EEFEB65716
                %APPDATA%\EEFEB65716
                %APPDATA%\EEFEB657\bin.exe16
                File Hashes
                • 028d11679340a1b6c63a10553cb3d3eefd898994d8abb6555c2b516976def7af
                • 02cfd52d13be87eb03002bb503650e9039fa30322f43ca6e7df23596b4e79129
                • 0584391d84c0d39e853958be9a3a01d6a2c77513c5731ab50f81a0f7234381e3
                • 0634e2abbcc9e55b84c1f144b381c3e0f7ea5f5f2cff8e5f9a8f07b4407bbd2f
                • 0e12e7bed943fdbffe284ff143034204f1473dccbb3605526988972f88d227e8
                • 0ec0197b47f0585471b4121a1b84dde9c50fcb4265cdf30b4da57a4a408c8543
                • 11e972658b8649e229fcd4272bcf68ee7c52b99ee11b91a08231faef4d554eeb
                • 15ac577f5b198fc6db81c854fb08beabe75f3dbba190375058192c06faa1635e
                • 16be38687d00e7c50c4f6b68d9d52ecdb9b7f195ff7c96250aa54de9b8483a92
                • 177c118622bcd7ce78f740dc7ae6501bed20fa581c9d75b9f183e065badb89b0
                • 1cc2fb4f39d0b5991c9d2a9f85fc61a359d7f53105325b53dfd70ec807be0904
                • 1cc93e8839a9cdc79a9165baa61b43065210b6204fb43e8dd66479d8fe0b5a37
                • 1d34ffabc85ec962b3c2ff8b4107154e7d56debf9723cf6466bfa1552a8035de
                • 20b1b90aa72891d632067d92b5aff513219b46ae0166a275f979f0a8553882de
                • 24a906c73eb7e2fd33ea90f714e0950d267dd852cb38232162a9cfd4bd9b43ea
                • 27a6628ffadf218081c50c05b098956f83c54dfc0820d4216851a9cfb85b7c42
                • 29d7b8cab5b08106a011bc74908638168f91578dec2478b2f245e091eb44c3d9
                • 2a5b2b31e2aca479bff24922f4170a74cfe70914589af4b1f30ac93103933973
                • 2d29e10bad213d8eb768b306d24dc3bc40af3127e39af12934c13b69b2a50cb3
                • 2dc9fcb48596f3660e37b004504dd4cdd147a317f1d91c4f1af0858798ee6350
                • 3d665290548cb0ca8bb65daf166c8fa5781bdccb6854f658749becb84f1de731
                • 3e1d13408d35361b3880ed7081c4cad0cc8af48e3fa72e57c9fd00b33cb3e1d7
                • 477b06ead8877f7b3dfffc7263d2a3740ed978797730cedcbe2274ba783c4c01
                • 47d6ff0d66e8a2aa608682894f37e3fac9504f499eba421ee7f921896b622ffe
                • 48484ab467c9a716ce6d0fbd9cfed614657ff1e7f317bfe40849bcf1f92b2736
                • See JSON for more IOCs

                Coverage


                Screenshots of Detection

                AMP



                ThreatGrid



                Umbrella



                Win.Ransomware.Sodinokibi-6995593-0


                Indicators of Compromise


                Registry KeysOccurrences
                <HKLM>\SOFTWARE\Wow6432Node\recfg 15
                <HKLM>\SOFTWARE\WOW6432NODE\RECFG
                Value Name: pk_key
                15
                <HKLM>\SOFTWARE\WOW6432NODE\RECFG
                Value Name: sk_key
                15
                <HKLM>\SOFTWARE\WOW6432NODE\RECFG
                Value Name: 0_key
                15
                <HKLM>\SOFTWARE\WOW6432NODE\RECFG
                Value Name: rnd_ext
                15
                <HKLM>\SOFTWARE\WOW6432NODE\RECFG
                Value Name: stat
                15
                <HKCU>\CONTROL PANEL\DESKTOP
                Value Name: Wallpaper
                14
                <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
                Value Name: Blob
                11
                <HKLM>\SOFTWARE\WOW6432NODE\RECFG
                Value Name: sub_key
                6
                <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\490A7574DE870A47FE58EEF6C76BEBC60B124099 3
                <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\490A7574DE870A47FE58EEF6C76BEBC60B124099
                Value Name: Blob
                3
                <HKCU>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\CA\CERTIFICATES\A9CE8E8879AB0CCB17A1FEEED83E720F3D925DF8 3
                <HKCU>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\CA\CERTIFICATES\96002650CC3818ADB7BC358B15AF098A0BD0AEB6 3
                <HKCU>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\CA\CERTIFICATES\A9CE8E8879AB0CCB17A1FEEED83E720F3D925DF8
                Value Name: Blob
                3
                <HKCU>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\CA\CERTIFICATES\96002650CC3818ADB7BC358B15AF098A0BD0AEB6
                Value Name: Blob
                3
                MutexesOccurrences
                Global\206D87E0-0E60-DF25-DD8F-8E4E7D1E3BF06
                Global\FDC9FA6E-8257-3E98-2600-E72145612F095
                Global\6CAC559B-02B4-D929-3675-2706BBB8CF664
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                192[.]35[.]177[.]6412
                87[.]98[.]154[.]1467
                50[.]116[.]71[.]866
                141[.]138[.]169[.]2156
                213[.]186[.]33[.]35
                52[.]28[.]116[.]694
                213[.]52[.]129[.]2484
                109[.]73[.]231[.]1004
                193[.]124[.]179[.]134
                46[.]30[.]215[.]774
                188[.]213[.]19[.]1674
                109[.]237[.]212[.]704
                80[.]158[.]2[.]414
                185[.]197[.]130[.]804
                159[.]203[.]88[.]134
                46[.]45[.]134[.]704
                107[.]180[.]57[.]284
                185[.]103[.]16[.]1884
                188[.]165[.]53[.]1853
                213[.]186[.]33[.]243
                185[.]52[.]2[.]1543
                66[.]228[.]32[.]513
                85[.]214[.]26[.]1043
                198[.]71[.]233[.]1043
                52[.]9[.]200[.]1513
                See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                apps[.]identrust[.]com13
                apps[.]digsigtrust[.]com12
                kellengatton[.]com7
                ziliak[.]com6
                matthieupetel[.]fr4
                bd2fly[.]com4
                jefersonalessandro[.]com4
                silkeight[.]com4
                the-cupboard[.]co[.]uk4
                lovetzuchia[.]com4
                stabilisateur[.]fr4
                fskhjalmar[.]se4
                atma[.]nl4
                naukaip[.]ru4
                bundan[.]com4
                iactechnologies[.]net4
                oscommunity[.]de4
                www[.]acibademmobil[.]com[.]tr4
                ronaldhendriks[.]nl4
                activeterroristwarningcompany[.]com4
                acibademmobil[.]com[.]tr4
                LSNGROUPE[.]COM3
                funworx[.]de3
                taulunkartano[.]fi3
                energosbit-rp[.]ru3
                See JSON for more IOCs
                Files and or directories createdOccurrences
                N/A-
                File Hashes
                • 0aebc3c9dd12779c489012bf45a19310576ec0e767ac67d1c455839302465afa
                • 1501f261a66eefce47dc47cb8a426107c4b694a41b5b9fd000d0ad2ea76d8e34
                • 17d153a225ea04a229862875795eeec0adb8c3e2769ba0e05073baaf86850467
                • 1937098609fbbda1b470811a7ffe5fa044058655722d84bd029050d54f2b1496
                • 2ea781140f7e86c63b636249b5fdba9828661bdd846fd95c195c5b986b84a507
                • 36fa3f72afc2dd6f206a295fc618038fef5e241bc48bd5451ac9bab9128734dd
                • 4748e9729f2e0b1bb151950cdaa75d51ad74612a1c12ff124a492a9a67c2f49b
                • 6727edbb5d6abee908851a8c5fd7b4aca6d664634fdcdfc15e04502b960abbc5
                • 6efd9aae5e112418bd43ab48ec4a1fce191c7503fcd11fdb95e89ad0217adb7a
                • 7bafd5de1b6724962ab920f71031978a101055f061ae3cc21db8bb9fa64c5829
                • 861bc212241bcac9f8095c8de1b180b398057cbb2d37c9220086ffaf24ba9e08
                • 89d80016ff4c6600e8dd8cfad1fa6912af4d21c5457b4e9866d1796939b48dc4
                • 9fa3a004576f357b5174dd1c29ef7d13005d996d5f9fb4b86d6d978d1a4a84ae
                • a389e24bf0af9bc81b8133a600a2b6c875d32aa0885964d0b9f3ac6db5fee762
                • e281347d6faf8fa17e9bcd79d0f815187506c89e8bca9ffae78170e31ff07438

                Coverage


                Screenshots of Detection

                AMP



                ThreatGrid



                Umbrella



                Malware



                Win.Malware.Dridex-6995476-1


                Indicators of Compromise


                Registry KeysOccurrences
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
                Value Name: trkcore
                21
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
                Value Name: DisableTaskMgr
                21
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.CHECK.0
                Value Name: CheckSetting
                21
                MutexesOccurrences
                onXWzc331S1
                x1I78jI7dI1
                3BudAKaa5l1
                IY1oUapMVy1
                LAme40hNU11
                PqPmiKaxbT1
                VlpnDSgg3g1
                oW2bMc607G1
                rzHJChsIaJ1
                uKmWBwWy5R1
                2kGkONAtb21
                GPTOF7ZR0p1
                JRfp790lHH1
                K4EN0HOyBN1
                QiWTz8nBr01
                hvUL9X1ymZ1
                kaqW5ROCus1
                w4Ith2QyiY1
                7flTFqBJ2g1
                A7OrpJ4YZw1
                Jjcx5gKyG41
                SV3OytSaAP1
                kKOjeZFyh31
                lBeTaukWiI1
                p74m9DtouU1
                See JSON for more IOCs
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                172[.]217[.]12[.]17421
                104[.]20[.]208[.]2117
                104[.]20[.]209[.]214
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                pastebin[.]com21
                www[.]0kgr0svsdw[.]com1
                www[.]11exvnzpds[.]com1
                www[.]tqzvsormbw[.]com1
                www[.]egntxfch2f[.]com1
                www[.]p8o6adliq7[.]com1
                www[.]1di9yqmr4e[.]com1
                www[.]ahzu9hhyqj[.]com1
                www[.]x6n5szq1jb[.]com1
                www[.]0hox6fnkju[.]com1
                www[.]ahy9qgaqjw[.]com1
                www[.]uxnyhqblpm[.]com1
                www[.]1ohvaomcea[.]com1
                www[.]v2xeifg35d[.]com1
                www[.]wzykyninkd[.]com1
                www[.]tkhrjexxyn[.]com1
                www[.]u6vpjfufqz[.]com1
                www[.]05p60clujw[.]com1
                www[.]ijzuyfo6m9[.]com1
                www[.]nnd9bsodkx[.]com1
                www[.]ikzjlvrxat[.]com1
                www[.]ejglgrlsfv[.]com1
                www[.]49jucwch3k[.]com1
                www[.]dpnrq4kpe7[.]com1
                www[.]3rw4hwziej[.]com1
                See JSON for more IOCs
                Files and or directories createdOccurrences
                \388987352.exe1
                \old_388987352.exe (copy)1
                File Hashes
                • 147861778f0693429684b6d52fddf6e8b5f1c09901aecf8da095d4e011813d61
                • 2fcd0b9a9bd223ba0a04490a631b3bf92b537a006e060fbf4a0bb0541573c3ae
                • 450e7f78b43b060e3b55fb82ad75a914ce440ed365a3c74c5d9905bca3871f1e
                • 4b8384d3b9ba817e2c139fff74f289a2f9c75af1fb805d85d5fc798e8546a0f0
                • 51e29a5685b27518cfc295d6f978c38d4c8a035f87f09d3c65a6e0c3ef8a5cf9
                • 59397962406f67de80d7c4c98caf8253541b0707504facdc752bd1f1a35a834b
                • 6c9b8580f46ce7548254f1aa2e809a2e94cf41be58921c19f8d08a431c12ff3a
                • 6f8329e22dfeecb70fbe230e66cb4007e88e1dc3ef225d3207fff8046b26e3bf
                • 713a7b0b36eba38c569c59f337198d21860e04fd8277b7f2eb27cc071c97d6e2
                • 88ed47a4401efef21a0f4168a04912f5577a2edb2ee14c4e8f77a9618e42d928
                • 96b4d6688b0d482ba1230fb3198bd9c79a43faea6f861e430f52b250da2745d2
                • a2eb8d64d5dc33f8f89345b8574eb12d3122f6a32ee87d0935288e9650c76a37
                • a8329c903e0d9d3f41301e110b490a3986260169c73adc539eaea21b155d3346
                • af9428d1830d0e4b676000732ea0d99284f1db6a972ee6f776709491b85b5c16
                • b64e8a3d377c8e16581540721c068c2d65d78e33254475a848fe23f1d6646c23
                • bee09de2744b8ce8e11ab8d0eba4668d22a7083e4648835cc77f3742f3d4d8bc
                • cea99fa3855ef7bfe2651bd1e2ba1ab9725b2af7d07a70f70848348ad0993a71
                • d3515980b07364781e8105a155009bcd7902380a74a9a4c81ed7f429c53b2074
                • dd0bb344ab3e9de4812af9bc80c32fac182a31a6d144bb6c193bcc91628ee53b
                • df342abf5940fb9a6dfb7013b3766af13899873c7725fd43f8f4b115550eb8fb
                • ed9f38d2128c8d621140760571953d9d26bfba041309491cd6bc08d477f9326a

                Coverage


                Screenshots of Detection

                AMP



                ThreatGrid

                Win.Trojan.Shiz-6994953-0


                Indicators of Compromise


                Registry KeysOccurrences
                <HKLM>\SOFTWARE\MICROSOFT
                Value Name: 67497551a
                27
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
                Value Name: 98b68e3c
                27
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
                Value Name: userinit
                27
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
                Value Name: System
                27
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS
                Value Name: load
                27
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS
                Value Name: run
                27
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: userinit
                27
                MutexesOccurrences
                Global\674972E3a27
                Global\MicrosoftSysenterGate727
                internal_wutex_0x0000012027
                internal_wutex_0x0000042427
                internal_wutex_0x0000047424
                \BaseNamedObjects\Global\C3D74C3Ba21
                \BaseNamedObjects\internal_wutex_0x000005b86
                internal_wutex_0x000004a05
                internal_wutex_0x000002104
                \BaseNamedObjects\internal_wutex_0x0000069c4
                \BaseNamedObjects\internal_wutex_0x000003844
                internal_wutex_0x000006203
                \BaseNamedObjects\internal_wutex_0x000000e03
                \BaseNamedObjects\internal_wutex_0x000000dc3
                internal_wutex_0x000003b43
                internal_wutex_0x000001383
                internal_wutex_0x000006a82
                \BaseNamedObjects\internal_wutex_0x000006a02
                \BaseNamedObjects\internal_wutex_0x000005b42
                \BaseNamedObjects\internal_wutex_0x000005b02
                \BaseNamedObjects\internal_wutex_0x000000ec2
                internal_wutex_0x0000017c2
                \BaseNamedObjects\internal_wutex_0x000000f41
                \BaseNamedObjects\internal_wutex_0x000002d41
                \BaseNamedObjects\internal_wutex_0x000003e41
                See JSON for more IOCs
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                23[.]253[.]126[.]5827
                208[.]100[.]26[.]25127
                104[.]239[.]157[.]21027
                198[.]187[.]30[.]24927
                35[.]229[.]93[.]4618
                204[.]79[.]197[.]20015
                13[.]107[.]21[.]20012
                35[.]231[.]151[.]78
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                TUFAMUGEVIH[.]EU27
                tupazivenom[.]eu27
                qeburuvenij[.]eu27
                rytahagemeg[.]eu27
                tunarivutop[.]eu27
                GANAZYWUTES[.]EU27
                KERABORIGIN[.]EU27
                nojepofyren[.]eu27
                LYKEMUJEBEQ[.]EU27
                XUXETIRYQEM[.]EU27
                nozapekidis[.]eu27
                CILYNITISEG[.]EU27
                NOVACOFEBYZ[.]EU27
                lyvoguraxeh[.]eu27
                xubifaremin[.]eu27
                DIKUVIZIGIZ[.]EU27
                JENUPYDACES[.]EU27
                QEGEFAVIPEV[.]EU27
                NORUMIKEMEM[.]EU27
                xukafinezeg[.]eu27
                FODAVIBUSIM[.]EU27
                PUPUCUVYMUP[.]EU27
                vocupotusyz[.]eu27
                gaherobusit[.]eu27
                MAGOFETEQUB[.]EU27
                See JSON for more IOCs
                Files and or directories createdOccurrences
                %HOMEPATH%\NTUSER.DAT27
                %HOMEPATH%\ntuser.dat.LOG127
                %TEMP%\C.tmp3
                %TEMP%\1F.tmp3
                %TEMP%\E5AB.tmp2
                %TEMP%\E689.tmp2
                %TEMP%\5702.tmp2
                %TEMP%\D26E.tmp2
                %TEMP%\C6C5.tmp2
                %TEMP%\C6D6.tmp2
                %TEMP%\5742.tmp2
                %TEMP%\BB8D.tmp2
                %TEMP%\E56C.tmp2
                %TEMP%\EAA7.tmp2
                %TEMP%\6021.tmp1
                %TEMP%\BA52.tmp1
                %TEMP%\6920.tmp1
                %TEMP%\D079.tmp1
                %TEMP%\BEA3.tmp1
                %TEMP%\E11F.tmp1
                %TEMP%\D59F.tmp1
                %TEMP%\CBAF.tmp1
                %TEMP%\4915.tmp1
                %TEMP%\214C.tmp1
                %TEMP%\5EBA.tmp1
                See JSON for more IOCs
                File Hashes
                • 056d3a8dae02d04ba1312003791e46fe1ddaf1e850d1b847ad736637367fc718
                • 071b2028f9ddc54cf5bd04b3439c3937fd05d62c5ef70e6b5b07f81579e5806d
                • 0877c2c5e086884cd5654375483d6944286cb6351b0de2b2b8115daede3a440a
                • 09302a98d751e7b8097e2f98be7e747c42ae54e7906e8e7cbc1e5f273d793d12
                • 0c214a0484f1e1d9197ca13159f71248dcf5f2576a93a6326471f2d02f9944de
                • 14ec15d83bb6ec592a7ef19d8b6d8d6e1a56475c512200721af9214c765f4b05
                • 16f65725e09cf3d55347eab4252481e65db4bbfae3113fac140f724c6eb94a1f
                • 182b84454c4674dc61e3215c6f07d0f546c4197ae688987e30a2fadb77898f75
                • 1f10bb3822d7bf6dbe6cc2dfd72bc60e00197db5819d098e0e75c3ac2b4baaf6
                • 214ead8b6a5ba4205258abd256934c05316b4c02a0ec20f92e4415f36ca4f723
                • 24f43e78a195f256f4802e02851cc4dd69e912d92dcd7d2e33d6590716c86f03
                • 271f96ac65a9b97c4aecc1eee799a29a6244306e1e027df541f277a03fc66b7e
                • 32abd7d95eb9018ce1618fa0e48c3173dae0d0590c73b3200641b01d2897bf9d
                • 33bc6b06e7d06133c1872fc9fe3d734e382bc6577f2094ec60ab00d456a9ed44
                • 3424ab4d70f930cd177b2ccdd96d81601efb6b51bb9bc51d64f913f8af5e960e
                • 34bebadd666db3fcfac273330324da52f1ac0c4fc794139be0e4d96504c34715
                • 353bb53dbcf5965e2d3afb933564dfb97b404327ad38a57d7cecbbd2013f3576
                • 36d6f0252c5b39edd7784c048b14cc4e8b890274f9583bc91b79f2d45ca14128
                • 3cee73fa5fb4bfe11d8eb751476a68e49222763b22dc3e35a13eaaf6af855ede
                • 3e4007511f5cd14c58fe373e3d78cb3c34e5cd5a16cce5a6aae1b8db373bfd0d
                • 41a4e635fb0542ebff2a9e533f3f7b10a6b6bed30dd7a67199d285e90bcd3a83
                • 431755f57af0005b3a27561c423cdbbfdcad11c18c709c2dead91a29b3a45f28
                • 4332e8161e092aa143ac96b0e40241ba332fa300469f74329f43e7f83bbbd2e4
                • 44671196bb73250589214bea72307d928d62cdef74877113e550b5fbdf59b958
                • 48117ef8d2fc9fc72e9529012eff094a1792915fd7e3147d52d4fedc7d596514
                • See JSON for more IOCs

                Coverage


                Screenshots of Detection

                AMP



                ThreatGrid



                Umbrella



                Win.Virus.Expiro-6994921-0


                Indicators of Compromise


                Registry KeysOccurrences
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\COMSYSAPP
                Value Name: Type
                23
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\COMSYSAPP
                Value Name: Start
                23
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MSISERVER
                Value Name: Type
                23
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MSISERVER
                Value Name: Start
                23
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\AELOOKUPSVC
                Value Name: Type
                23
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\AELOOKUPSVC
                Value Name: Start
                23
                <HKCU>\Software\Microsoft\Osk 23
                <HKCU>\SOFTWARE\MICROSOFT\OSK
                Value Name: Setting
                23
                <HKCU>\SOFTWARE\MICROSOFT\OSK
                Value Name: Stepping
                23
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.101
                Value Name: CheckSetting
                23
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.103
                Value Name: CheckSetting
                23
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.100
                Value Name: CheckSetting
                23
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.102
                Value Name: CheckSetting
                23
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.104
                Value Name: CheckSetting
                23
                MutexesOccurrences
                kkq-vx_mtx123
                gazavat-svc23
                kkq-vx_mtx7523
                kkq-vx_mtx7623
                kkq-vx_mtx7723
                kkq-vx_mtx7823
                kkq-vx_mtx7923
                kkq-vx_mtx8023
                kkq-vx_mtx8123
                kkq-vx_mtx8223
                kkq-vx_mtx8323
                kkq-vx_mtx8423
                kkq-vx_mtx8523
                kkq-vx_mtx8623
                kkq-vx_mtx8723
                kkq-vx_mtx8823
                kkq-vx_mtx8923
                kkq-vx_mtx9023
                kkq-vx_mtx9123
                kkq-vx_mtx9223
                kkq-vx_mtx9323
                kkq-vx_mtx9423
                kkq-vx_mtx9523
                kkq-vx_mtx9623
                kkq-vx_mtx9723
                See JSON for more IOCs
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                N/A-
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                N/A-
                Files and or directories createdOccurrences
                %SystemRoot%\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{33EC2C09-9668-4DE7-BCC0-EFC69D7355D7}.crmlog23
                %SystemRoot%\SysWOW64\dllhost.exe23
                %SystemRoot%\SysWOW64\msiexec.exe23
                %SystemRoot%\SysWOW64\svchost.exe23
                %SystemRoot%\SysWOW64\dllhost.vir23
                %SystemRoot%\SysWOW64\msiexec.vir23
                %SystemRoot%\SysWOW64\svchost.vir23
                %SystemRoot%\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{9161210E-9C65-434F-8957-2AD799206FF1}.crmlog23
                File Hashes
                • 0a5bc7465c0efc59aee85312a1abba14d691b3345d4b6630c3bb83dbae749dc7
                • 12bd3e823cbb4a3e56ec5c17f69e28261f8cb39212c89e910780e7372a018c36
                • 17c037d9e0cbf4f6e11dc5f61c341484abcc28f9bb86e9052b6504af9d6dd5ae
                • 1f8a91163a60b9969ab43b6229c3715373f3a3974d74a74c08457a2af25d5ccb
                • 203ee856844e57afef69c3be268efb92ce466ba0ec541b0f56b8bdb336bdefc1
                • 2a5ebd020ca217c6062d94212f3a47f229d24eb39a8b538795b04bba67499631
                • 41d9bb9c11ecadd28283770fc6a8580bd5ad9ba86df2e58e72672bced2a558f7
                • 445086ca6b9015865a25d5fb21d651153cab0e80b4b8958ee927803f7100417f
                • 4df7f7733ba6cc1d43683d036f2107eb909d07fb1f074ec6a8ebf595daedda18
                • 560ef4c5743def36e9b820378ad8dbf1f50d1cba83e1803db8931b734786de08
                • 5ab01f91a3fe2c14e6a91098ac901502ddf68d676ed8317608c8f774c9df093e
                • 684f5c54d43bd1ef6bbd5b4781238e7d4d2411df9891240f5ec0a6e78d492191
                • 7aa38eac44171d5f764b58b1a5fe92334b5de3f8e187389405526362ee7f80be
                • 8d8b6d6b7269115b1aa4ab705b23a0fe890a75de5c56e91100d97bff1aaf885e
                • 90a43627c9897dd6f6e4ddc43bf2c911911f97dc7815955dd83855d0077862f5
                • bb7cce3ef02d2a64fd37406f9e23975a7ac6fafab26669c908e369d872664010
                • bfda0bc4f6756125e4a6fc0f3395bf1571ec00f2076a0480fcae7ba9a840c7dc
                • cab81316437f0ae434102ca0c5468688ed96cb802dc7db6f7d0786ff4824d57d
                • d0e57c67a026d8d3e88997fff1e763b0747f1e770e19deabb3c52580213558d2
                • e282f45eeac6018884c47130708572f962452e5c3db37dade2b8f2e292ad0276
                • ea062e5dd432ffd64454bbb56566ea196d16df63ace79a59b59b727bae9eae63
                • ebe6a5d9838b97702e6bd5c26bed23856f606514403e2d9cf8464f929fd10b87
                • faebeeed682999de6f01135e8032fa377b6f1e54bd965ea79fb91d1590743b11

                Coverage


                Screenshots of Detection

                AMP



                ThreatGrid

                Exprev

                Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
                • Excessively long PowerShell command detected (2608)
                  A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
                • Madshi injection detected (2504)
                  Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
                • Kovter injection detected (1026)
                  A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
                • Process hollowing detected (952)
                  Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
                • Dealply adware detected (264)
                  DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
                • Atom Bombing code injection technique detected (262)
                  A process created a suspicious Atom, which is indicative of a known process injection technique called Atom Bombing. Atoms are Windows identifiers that associate a string with a 16-bit integer. These Atoms are accessible across processes when placed in the global Atom table. Malware exploits this by placing shell code as a global Atom, then accessing it through an Asynchronous Process Call (APC). A target process runs the APC function, which loads and runs the shellcode. The malware family Dridex is known to use Atom Bombing, but other threats may leverage it as well.
                • Gamarue malware detected (188)
                  Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
                • PowerShell file-less infection detected (153)
                  A PowerShell command was stored in an environment variable and run. The environment variable is commonly set by a previously run script and is used as a means of evasion. This behavior is a known tactic of the Kovter and Poweliks malware families.
                • Fusion adware detected (64)
                  Fusion (or FusionPlayer) is an adware family that displays unwanted advertising in the form of popups or by injecting into browsers and altering advertisements on webpages. Adware is known to sometimes download and install malware.
                • Installcore adware detected (50)
                  Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.

                Beers with Talos Ep. #55: Live from San Diego!

                $
                0
                0


                Beers with Talos (BWT) Podcast Ep. #55 is now available. Download this episode and subscribe to Beers with Talos:

                If iTunes and Google Play aren't your thing, click here.

                Recorded June 12, 2019 — God knows why, but we bring you another live episode from the Talos Threat Research Summit at Cisco Live U.S. in San Diego, California. We are joined by TTRS keynote speaker (as is tradition) Liz Wharton.

                Catch the highlights of the show and stick around for hot takes from the live audience. Thanks to everyone who showed up to the recording, especially those brave enough to step up to the mic at the end.

                This is our annual reminder of why we don’t do this more often. We think you'll whole-heartedly agree.

                The timeline:

                • 01:00 — Roundtable: The Dark Time delusion, Matt has a fit with an important lesson, UrbanSimulator 
                • 11:00 — Talos Threat Research Summit recap: It’s live, we wander. I think someone mentioned biomes?
                • 38:00 — Parting shots and closing thoughts
                • 44:00 — Parting shots part 2: WITH THE AUDIENCE

                Some other links:

                • Nah
                ==========

                Featuring: Craig Williams (@Security_Craig), Joel Esler (@JoelEsler), Matt Olney (@kpyke) and Nigel Houghton (@EnglishLFC).

                Hosted by Mitch Neff (@MitchNeff) with special guest Liz Wharton (@LawyerLiz).

                Subscribe via iTunes (and leave a review!)


                Subscribe to the Threat Source newsletter


                Give us your feedback and suggestions for topics: beerswithtalos@cisco.com

                Threat Source newsletter (June 27, 2019)

                $
                0
                0

                Newsletter compiled by Jonathan Munshaw.

                Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

                You never want to fall behind on Beers with Talos. So make sure to listen to the latest episode on your commute home today. This episode — featuring special guest and Talos Threat Research Summit keynote speaker Liz Wharton — was recorded live in San Diego as part of Cisco Live. So yes, there’s audience participation, and no, you are not prepared for it.

                We also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week.

                Upcoming public engagements with Talos

                Event: “It’s never DNS...It was DNS: How adversaries are abusing network blind spots” at SecTor
                Location: Metro Toronto Convention Center, Toronto, Canada
                Date: Oct. 7 - 10
                Speaker: Edmund Brumaghin and Earl Carter
                Synopsis: While DNS is one of the most commonly used network protocols in most corporate networks, many organizations don’t give it the same level of scrutiny as other network protocols present in their environments. DNS has become increasingly attractive to both red teams and malicious attackers alike to easily subvert otherwise solid security architectures. This presentation will provide several technical breakdowns of real-world attacks that have been seen leveraging DNS for a variety of purposes such as DNSMessenger, DNSpionage, and more. 

                Cyber Security Week in Review

                • For the second time this month, a Florida city agreed to pay roughly half a million dollars to the hackers behind a ransomware attack. The government of Lake City, Florida agreed to pay $460,000 in exchange for the return of its email services and several servers attackers had seized. 
                • The U.S. Department of Homeland Security warned American users of an uptick in wiper attacks originating from Iran. The advisory came as military tensions continue to rise between the two countries. 
                • Dell warned of a critical vulnerability in its pre-installed SupportAssist software on millions of its PCs. The bug could allow an attacker to trick the machine into running a malicious DLL file. 
                • Hackers stole roughly $4.2 million worth of cryptocurrency from Sigaporean exchange Bitrue. The attackers exploited a vulnerability in the exchange’s site and accessed the personal funds of 90 users. 
                • Attackers tracked roughly 20 global officials with ties to China by infiltrating 10 cellphone carriers’ networks. A recent report states the attackers stole text messages, location data and call logs. 
                • The head of the U.S. House Homeland Security cyber subcommittee says he will introduce a bill to create two new security grants. Both funds would grant money to state and local governments to prepare for cyber attacks and secure election technology. 
                • The European Union plans to run new military exercises to plan for potential major cyber attacks from Russia and China.  

                Notable recent security issues

                Title: Netwire malware delivered through Firefox vulnerability  
                Description: Attackers are exploiting a now-patched Mozilla Firefox vulnerability to deliver the Netwire malware. At the time of first exploitation, there was no fix for the bug. Netwire uses two separate functions to persist — once as a launch agent and again as a login item. New Snort rules prevent the malware from downloading its final payload.
                Snort SIDs: 50498, 50500

                Title: Cisco patches critical bugs in DNA Center, SD-WAN  
                Description: Cisco has patched a slew of critical and high-severity flaws in its DNA Center and SD-WAN. In all, the company issued fixes for 25 vulnerabilities last week across a variety of its products. Two of the most severe bugs exist on access ports necessary for Cisco Digital Network Architecture (DNA) Center. There is another critical vulnerability in SD-WAN's command line interface.
                Snort SIDs: 50467, 50469 – 50472, 50485 – 50489, 50492 

                Most prevalent malware files this week

                SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3 
                MD5: 47b97de62ae8b2b927542aa5d7f3c858
                Typical Filename: qmreportupload.exe 
                Claimed Product: qmreportupload
                Detection Name: Win.Trojan.Generic::in10.talos

                SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f 
                MD5: e2ea315d9a83e7577053f52c974f6a5a
                Typical Filename: Tempmf582901854.exe
                Claimed Product: N/A
                Detection Name: W32.AgentWDCR:Gen.21gn.1201

                SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b 
                MD5: 799b30f47060ca05d80ece53866e01cc
                Typical Filename: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b.bin 
                Claimed Product: N/A 
                Detection Name: W32.Generic:Gen.22fz.1201

                SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510 
                MD5: 4a50780ddb3db16ebab57b0ca42da0fb
                Typical Filename: wup.exe
                Claimed Product: N/A
                Detection Name: W32.7ACF71AFA8-95.SBX.TG

                SHA 256: f118e52a73227b85fbb0cb7d202c3753916e518c516286c441a2dc92ede1f023
                MD5: 4f551cb9a7c7d24104c19ac85e55defe
                Typical Filename: watchdog.exe
                Claimed Product: N/A
                Detection Name: W32.Trojan:Trojangen.22hu.120

                Welcome Spelevo: New exploit kit full of old tricks

                $
                0
                0
                Nick Biasini authored this post with contributions from Caitlyn Hammond.


                Executive summary

                Exploit kits are an ever-present and often forgotten threat on the landscape today. Their popularity seemed to peak several years ago with the success and eventual downfall of some of the best compromise platforms ever created, including the Angler Exploit Kit. These kits generated millions of dollars from their victims and they are still effective. One of their biggest appeals today is the removal of reliance on user assistance. Increasingly, on the crimeware landscape today, user assistance is required, whether it's through blatant social engineering attacks like ongoing sextortion campaigns or through the countless malspam messages traversing the globe daily, users are required to help achieve infection. That is where exploit kits stand alone as an effective web-based platform for compromise that only requires users to surf the internet.

                Today, Cisco Talos is unveiling the details of a new exploit kit campaign that proves exploit kits are still a threat and should be taken seriously by defenders: Spelevo. This recent campaign leveraged a compromised business-to-business site to deliver Spelevo, one of the first new kits we've seen in months.

                Spelevo illustrates many of the challenges associated with protecting against these threats and preventing their spread. In compromising this particular website, the attackers did little more than add four lines to the code rendering the webpage — but those four lines did a lot of damage and can compromise all visitors that have poor security hygiene. Even though Angler did make use of a zero-day in Adobe Flash Player years ago, exploit kits largely depend on existing, patched exploits. However, all it takes is one missed patch on one system to lead directly to compromise. That's why you need things like a thorough defense-in-depth approach with various technologies in place to help mitigate any residual risk that comes with running an enterprise.

                Background on exploit kits

                Exploit kits are something Talos has covered in the past, including some more memorable deep dives. The goal of exploit kits is fairly straightforward: compromise random victims on the internet using disclosed vulnerabilities to deliver a malicious payload. It achieves this through a couple of components: a traffic direction system (TDS) or gate, landing page and exploit page. The challenge for most adversaries is getting traffic to their kits — and there are a couple of different methods to get it there.

                Today, most exploit kit activity Talos observes is powered through malvertising, or the use of malicious ads. These ads are usually hosted on a variety of different web pages and platforms, but most commonly is associated with illicit streaming services and adult content. However, this is not the only way users can be directed to exploit kits, as Spelevo shows. Spelevo leveraged compromised websites, another popular method, to infect victims.

                Exploit Kits have one large limitation: Internet Explorer. For exploit kits to operate effectively, adversaries need to take advantage of an antiquated web browser that lacks many of the modern protections designed to defeat this specific type of attack. But the amount of people actively using Internet Explorer continues to dwindle as they migrate either to modern Windows-native web browsers like Edge or to some of the other open-source solutions like Mozilla Firefox and Google Chrome. However, Internet Explorer remains somewhat popular, and exploit kits will always be there to take advantage of its users.


                Spelevo details

                Cisco Talos began observing an increase in exploit kit activity and started looking into one campaign in particular. It was during this investigation that one of the compromised web servers was identified and the full campaign came into focus. The activity appeared to originate from a business-to-business (B2B) contact website. This website initially appeared to just have a single page compromised, but as the investigation continued, it appeared that the compromise was more significant with multiple pages, including the main homepage redirecting to the gate used for the campaign. To their credit, while the investigation was ongoing, the site was already dealing with the compromise. The actual compromise is subtle, adding only a few short lines.
                There are actually two different connections that these couple of lines establish and start the infection process. One thing to note is that this particular kit opens a new tab when they are compromising the system. In this case, the actual gate is being hosted at ezylifebags[.]com[.]au with a 302 cushion.
                As you can see, this isn't the only additional script dropped on the compromised website. There is also a request for another JavaScript file being hosted at your-prizes-box[.]life. However, this request doesn't result in anything but additional requests for the same file via 301 redirect and could be used as an additional tracker to ensure the victim is getting to the gate via the proper channels, a compromised website, and are not direct connects from researchers.
                It's at this point that the exploit kit itself becomes involved. This starts with a request for the landing page. The landing page is typically where an initial vetting of the system occurs and some level of reconnaissance is done. This will include things like the operating systems being used, the type and version of web browser, and type and versions of applicable plugins, most notably Adobe Flash. This reconnaissance phase wasn't easily identifiable when initially looking at the landing page. As shown below, at the top of the document there appeared to be a base64-encoded blob that was assigned to a variable. However, there was a failed attempt at decoding, which led to the discovery of an extra effort by the attackers.
                When we began analyzing the code on the page, we found why the decoding was failing: The actors used rot13 encoding first, as highlighted below.
                Once we decoded the rot13 and then decoded the resulting base64, we found the code needed to probe the system to determine vulnerability.
                This code will probe the operating system, web browser, and plugin information. As the try statement found below shows, after this is done a decision tree exists. If a vulnerable version of flash is found, the first path is taken which likely leads to CVE-2018-15982, which has been widely abused by exploit kits including Spelevo. If a match isn't found, the second path is followed, which delivers another exploit.
                The specific infection path we are following did not go down the Flash path, and instead served the other exploit. We began to analyze the exploit, and after some investigation, determined that CVE-2018-8174 is being exploited — another use-after-free vulnerability in the VBScript engine of Internet Explorer. This particular exploit has been widely abused and can be found in several other exploit kits, most notably the Fallout Exploit Kit.

                It's not surprising to find this exploit being added to multiple exploit kits, as most kits copy one another and once an exploit is available in one, the others typically are not far behind. This particular vulnerability still requires the use of Internet Explorer and relies on the user being behind on updates, since the patch for this particular bug has been available since May 2018.

                Once the system has been compromised and the payload is delivered, Spelevo does something a bit novel for exploit kits: It redirects to Google, post compromise. The practical effect of which is that a user would see a tab open which loads the gate, followed by the landing page, an exploit page, and then finally to Google.
                This could lead the user to miss the fact that they've been compromised and assume they were opening up a normal web page.


                Payload

                The payload that exploit kits deliver varies. In the instances that Talos observed banking trojans as the primary payload — specifically both IcedID and Dridex have been observed being delivered from Spelevo during this campaign. These types of payloads are common to exploit kits since this is a purely financially motivated attack and banking trojans are an attractive avenue for monetization.


                Familiar Techniques

                Spelevo is a relatively new exploit kit that was first seen a couple of months ago. Since its discovery, it has gone through some minor changes, including modification of URL structure and some obfuscation changes in the landing and exploit pages themselves. It makes use of a lot of common techniques for exploit kits that we've seen over the years.

                Unlike the Rig exploit kit, Spelevo is being hosted using domains instead of hard coded IP addresses. Additionally, they appear to be leveraging domain shadowing, a technique Talos discovered several years ago, leveraging compromised registrant accounts to host malicious activity using subdomains. Talos also found several instances of 302 cushioning where the gates and exploit kits will leverage a series of HTTP 302 redirects to eventually point to the landing page. The core functionality remains the same: Compromise anyone who interacts with it.


                Spelevo Exploit Kit Video


                Conclusion

                In much the same way that we see old threats like MyDoom and Stuxnet circulating on the internet today, exploit kits will be a permanent part of the threat landscape. They are still incredibly effective at leveraging existing vulnerabilities to randomly compromise victims on the internet to deliver a malicious payload. However, in today's world, systems that utilize Internet Explorer and have unpatched vulnerabilities are continuing to become harder and harder to find. As such, adversaries have many other attractive routes to try and get malicious software onto end systems. Increasingly, we see the Traffic Direction Systems (TDS) point to other monetization routes. These commonly include threats like tech support scams and fake Flash players. The common difference is both of those attacks require the user to interact to earn money off of the attack, rather than leveraging a vulnerability. Regardless, the majority of the traffic redirection we see lands in these two buckets, leaving exploit kits as the odd man out.

                We expect this trend to continue as the amount of systems vulnerable to these types of threats decreases daily. Talos recommends removing Internet Explorer as the default web browser on most machines, especially for users who may not be as tech-savvy as a security researcher. Additionally, in today's internet, there is little need to have a plugin like Adobe Flash installed. Soon, it will even be deprecated completely. Taking small steps like these will help protect that increasingly small amount of users that are still being terrorized by this small yet extremely effective attack platform that still lurks on the internet today.


                Coverage

                To detect this new exploit kit, Cisco Talos released SNORTⓇ rules 50509 - 50511.

                Additional ways our customers can detect and block this threat are listed below.

                Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware detailed in this post. Below is a screenshot showing how AMP can protect customers from this threat. Try AMP for free here.

                Cisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

                Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

                AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

                Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

                Additional protections with context to your specific environment and threat data are available from the Firepower Management Center.

                Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.


                Indicators of compromise

                Domains:
                open[.]nylonsneak[.]top
                hailey[.]nylonsneak[.]top
                goddess[.]nylontruth[.]top
                calientes[.]nylontruth[.]top
                clasica[.]santarough[.]top
                famili[.]clearnubile[.]top
                colombia[.]clearnubile[.]top
                swallowing[.]flavorideal[.]top
                diary[.]motoribyron[.]top
                bologna[.]vediocorset[.]top
                54[.]armlessdance[.]top
                perv[.]armlessdance[.]top
                homosexual[.]armlessdance[.]top
                clara[.]awesomeablam[.]top
                different[.]beestkilroys[.]top
                race[.]belarusapple[.]top
                charmane[.]belarusapple[.]top
                katsumi[.]carmanexteme[.]top
                bww[.]cosbyfunnies[.]top
                arnold[.]cosbyfunnies[.]top
                vodeos[.]galeriebeths[.]top
                veronica[.]galeriebeths[.]top
                lithuania[.]galeriebeths[.]top
                get[.]guerradanger[.]top
                name[.]preitymutter[.]top
                the[.]sandeerugrat[.]top
                marge[.]sandeerugrat[.]top
                emule[.]unicornbrune[.]top
                candye[.]brunetbebitas[.]top
                adora[.]dailysexpress[.]top
                famose[.]dailysexpress[.]top
                trailery[.]dailysexpress[.]top
                mulatas[.]damitahustler[.]top
                chaild[.]denizprivatne[.]top
                combustion[.]denizprivatne[.]top
                talent[.]denudaskalani[.]top
                abu[.]fightingsatan[.]top
                anziane[.]fightingsatan[.]top
                world[.]italyalemanes[.]top
                converted[.]minorikeibler[.]top
                beastyality[.]minorikeibler[.]top
                gore[.]natachafetish[.]top
                binary[.]playingactive[.]top
                tes[.]satanicenanos[.]top
                window[.]aphroditedrink[.]top
                breitny[.]barbiereallity[.]top
                dyre[.]bloggerlolicon[.]top
                filmmaking[.]bloggerlolicon[.]top
                asturias[.]freakylanguage[.]top
                delco[.]graffitoandnot[.]top
                tanto[.]ingyenesrusian[.]top
                punker[.]militarymagyar[.]top
                break[.]periodherstory[.]top
                chantelle[.]periodherstory[.]top
                tes[.]teannapostales[.]top
                absolutely[.]caballerosricky[.]top
                pete[.]clothedcalcutta[.]top
                foley[.]clothedcalcutta[.]top
                natural[.]fantasygisselle[.]top
                copii[.]gratuitekrystal[.]top
                bailey[.]gratuitekrystal[.]top
                dating[.]leilanihardcord[.]top
                powerpuff[.]mancicdreadlock[.]top
                adina[.]teasingfreehome[.]top
                animay[.]tranniefotologs[.]top
                qwerty[.]virusemoticonos[.]top
                erotic[.]bridgettepromise[.]top
                socal[.]carmellanightelf[.]top
                ameuter[.]carmellanightelf[.]top
                high[.]cartoonseverinin[.]top
                sample[.]cartoonseverinin[.]top
                groups[.]chabertcigarette[.]top
                book[.]emblemliterotica[.]top
                diary[.]ghanaiansorority[.]top
                taylors[.]ghanaiansorority[.]top
                spit[.]natashayoungster[.]top

                IPs:
                95.211.5[.]242

                Threat Roundup for June 21 to June 28

                $
                0
                0

                Today, Talos is publishing a glimpse into the most prevalent threats we've observed between June 21 and June 28. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

                As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

                For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found here that includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.

                The most prevalent threats highlighted in this roundup are:

                • Win.Trojan.Zeroaccess-7002138-0
                  Trojan
                  ZeroAccess is a trojan that infects Windows systems, installing a rootkit to hide its presence on the affected machine and serves as a platform for conducting click fraud campaigns.
                   
                • Win.Packed.Blackshades-7002008-1
                  Packed
                  Blackshades is a prevalent trojan with many capabilities including logging keystrokes, recording video from webcams, and downloading and executing additional malware.
                   
                • Win.Malware.Gamarue-7001972-0
                  Malware
                  Gamarue, also known as Andromeda, is a botnet used to spread malware, steal information and perform activities such as click fraud.
                   
                • Win.Trojan.Lokibot-7001391-1
                  Trojan
                  Lokibot is an information-stealing malware designed to siphon off sensitive information stored on an infected device. It is modular in nature, supporting the ability to steal sensitive information from a number of popular applications. It is commonly pushed via malicious documents delivered via spam emails.
                   
                • Win.Malware.Ponystealer-7001707-0
                  Malware
                  Ponystealer is known to be able to steal credentials from over 100 different applications and may also install other malware such as a remote access trojan (RAT).
                   
                • Win.Malware.Upatre-6997681-0
                  Malware
                  Upatre is a trojan that is often delivered through spam emails with malicious attachments or links. It is known to be a downloader and installer for other malware.
                   
                • Win.Virus.Ramnit-6997840-0
                  Virus
                  Ramnit is a banking trojan that monitors web browser activity on an infected machine and collects login information from financial websites. It also has the ability to steal browser cookies and attempts to hide from popular antivirus software.
                   
                • Win.Dropper.Kovter-6998646-0
                  Dropper
                  Kovter is known for its fileless persistence mechanism. This family of malware creates several malicious registry entries which store its malicious code. Kovter is capable of reinfecting a system, even if the file system has been cleaned of the infection. Kovter has been used in the past to spread ransomware and click-fraud malware.
                   
                • Win.Dropper.Gh0stRAT-7003005-0
                  Dropper
                  Gh0stRAT is a well-known family of remote access trojans designed to provide an attacker with complete control over an infected system. Capabilities include monitoring keystrokes, collecting video footage from the webcam, and uploading/executing follow-on malware. The source code for Gh0stRAT has been publicly available on the internet for years, significantly lowering the barrier for actors to modify and reuse the code in new attacks.
                   

                Threats

                Win.Trojan.Zeroaccess-7002138-0


                Indicators of Compromise


                Registry KeysOccurrences
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
                Value Name: DeleteFlag
                25
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\Epoch 25
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\BROWSER
                Value Name: Start
                25
                <HKCU>\Software\Classes\clsid 25
                <HKCR>\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9} 25
                <HKCR>\CLSID\{FBEB8A05-BEEE-4442-804E-409D6C4515E9}\InprocServer32 25
                <HKCR>\CLSID\{FBEB8A05-BEEE-4442-804E-409D6C4515E9}\INPROCSERVER32
                Value Name: ThreadingModel
                25
                <HKCR>\CLSID\{FBEB8A05-BEEE-4442-804E-409D6C4515E9}\INPROCSERVER32 25
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Windows Defender
                25
                <HKLM>\SOFTWARE\CLASSES\CLSID\{5839FCA9-774D-42A1-ACDA-D6A79037F57F}\INPROCSERVER32 25
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
                Value Name: Type
                25
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
                Value Name: ErrorControl
                25
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS
                Value Name: Type
                25
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS
                Value Name: ErrorControl
                25
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IPHLPSVC
                Value Name: Type
                25
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IPHLPSVC
                Value Name: ErrorControl
                25
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IPHLPSVC
                Value Name: DeleteFlag
                25
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
                Value Name: Type
                25
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
                Value Name: ErrorControl
                25
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
                Value Name: Type
                25
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
                Value Name: ErrorControl
                25
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\CATALOG_ENTRIES\000000000010
                Value Name: PackedCatalogItem
                25
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\CATALOG_ENTRIES\000000000009
                Value Name: PackedCatalogItem
                25
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\CATALOG_ENTRIES\000000000008
                Value Name: PackedCatalogItem
                25
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\CATALOG_ENTRIES\000000000007
                Value Name: PackedCatalogItem
                25
                MutexesOccurrences
                N/A-
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                88[.]254[.]253[.]25421
                92[.]254[.]253[.]25421
                71[.]254[.]253[.]25421
                87[.]254[.]253[.]25421
                180[.]254[.]253[.]25421
                166[.]254[.]253[.]25421
                135[.]254[.]253[.]25421
                117[.]254[.]253[.]25421
                119[.]254[.]253[.]25421
                115[.]254[.]253[.]25421
                134[.]254[.]253[.]25421
                206[.]254[.]253[.]25421
                222[.]254[.]253[.]25421
                182[.]254[.]253[.]25421
                190[.]254[.]253[.]25421
                184[.]254[.]253[.]25421
                83[.]133[.]123[.]2016
                130[.]185[.]108[.]1329
                68[.]43[.]104[.]319
                143[.]106[.]5[.]2428
                69[.]73[.]14[.]568
                65[.]25[.]8[.]2387
                174[.]50[.]46[.]177
                50[.]4[.]85[.]697
                198[.]91[.]176[.]537
                See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                j[.]maxmind[.]com25
                Files and or directories createdOccurrences
                %System32%\config\AppEvent.Evt25
                %System32%\config\SysEvent.Evt25
                @25
                L25
                U25
                \$Recycle.Bin\S-1-5-1825
                \$Recycle.Bin\S-1-5-18\$0f210b532df043a6b654d5b43088f74f25
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$0f210b532df043a6b654d5b43088f74f25
                n25
                \$Recycle.Bin\S-1-5-18\$0f210b532df043a6b654d5b43088f74f\@25
                \$Recycle.Bin\S-1-5-18\$0f210b532df043a6b654d5b43088f74f\n25
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$0f210b532df043a6b654d5b43088f74f\@25
                \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$0f210b532df043a6b654d5b43088f74f\n25
                \systemroot\assembly\GAC_32\Desktop.ini25
                \systemroot\assembly\GAC_64\Desktop.ini25
                %System32%\logfiles\scm\e22a8667-f75b-4ba9-ba46-067ed4429de825
                %SystemRoot%\assembly\GAC_32\Desktop.ini25
                %SystemRoot%\assembly\GAC_64\Desktop.ini25
                \RECYCLER\S-1-5-18\$ad714f5b8798518b3ccb73fd900fd2ba\@25
                \RECYCLER\S-1-5-18\$ad714f5b8798518b3ccb73fd900fd2ba\n25
                \RECYCLER\S-1-5-21-1258710499-2222286471-4214075941-500\$ad714f5b8798518b3ccb73fd900fd2ba\@25
                \RECYCLER\S-1-5-21-1258710499-2222286471-4214075941-500\$ad714f5b8798518b3ccb73fd900fd2ba\n25
                %SystemRoot%\assembly\GAC\Desktop.ini25
                File Hashes
                • 076954251dae552c90215a067aac007bf0ad679029fbb1b82a698d3de09e7300
                • 08d7b4f347a16b79a62d245459cf9ab131c2df9fc1838e02802bfb9a6aca6112
                • 1181cc286159851699c0e9c1390dfca7006c8d6d4c92108c34c082941f848129
                • 1ebcb2ef3bf9c2ed7375b7948e3a0dec8b0ff0be6e059e8922c4b1547bb52e18
                • 51fdc7e0e25ecf5d90ae3c95c1c16187f2dfda8491bdd0ab9ef1378c2150c764
                • 58d8666816aad58ab24ef3ec21216266f96a3173ee8e3113ba7844b70bdd8d0d
                • 7738ac853462f4e1ed29d9d3a55319be75b952feacbb68ce1ecc21e5e3c3351e
                • 813358d1ceafa1065613f42c7f78a432c4a72f267d7a0340090d7651785bc32e
                • 84b1758b4545308192ce7ef2ea44b808fdc208bfe0d119e46e3c9a2e2a492c35
                • 9a93a769b759fd3e562b7dbd6c981e8c70942b5b9216589e57f11362af662fd0
                • a00d8e76a72f9ff877de789727c1e95b356e4fd2191445fcfc039903bd3e88d1
                • b7c20720b36e4c882c933ebb02793d40da26fa31a81b34b2ddc888c9ede3ae97
                • ba957b265fd5c148f3bbb6f8bdbbdd1a4f0559d3dd9bf35d31f1d3a4d4f7a5ef
                • bf4e99cdf812b134bba7a56bca65f17916eb8fff3b9827f71c7de8d00bc37e4e
                • c16a37d1a3f20d45179658151aacecec34708951c0de088d2038f7e5f9543f5e
                • c74110419cab5a72722b929492a9df2a236d71053b5d2198f7da1084fa50b1c8
                • ccdf01be4f8b32eb501ca6a521ae08275cc10391b0d653b4cfc2e0ddbd105df6
                • d6a15841b35a33683e7d47e9237a5011a1d66d08900b9238e2352bcc4d361fe4
                • dc2e56ce69095d93fb0a64f6c337572136dd90325908b1d273a6fda47a155047
                • df6455604ab4475f164609b573cdc60bf0f0cc0df507a2101b764b15113193c6
                • e30a7c87a93dcf2d1620e0e96fe8d4c419df59bc35ec00b5da835281546015ec
                • e52780b7e43765cff93f396b7a6721f5d41e30a169cc2beff2c0e33814a51594
                • ea07d6c283c6230f60ba73481c6304b42435a129814bbe28ad22d413af23db02
                • ea2aef3063a846658ab0e44cc2061117a9253e4d2f450f484660d671b162cce2
                • ebe860b9c6041c0704c54da28f09d82f86fd6af142c3db365fb380c54a706aa6
                • See JSON for more IOCs

                Coverage


                Screenshots of Detection

                AMP



                ThreatGrid



                Win.Packed.Blackshades-7002008-1


                Indicators of Compromise


                Registry KeysOccurrences
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
                Value Name: DoNotAllowExceptions
                15
                <HKLM>\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 15
                <HKLM>\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 15
                <HKCU>\Software\VB and VBA Program Settings\SrvID\ID 15
                <HKCU>\SOFTWARE\VB and VBA Program Settings 15
                <HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\SrvID 15
                <HKCU>\Software\VB and VBA Program Settings\INSTALL\DATE 15
                <HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\INSTALL 15
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
                Value Name: C:\Users\Administrator\AppData\Roaming\svchost.exe
                15
                <HKLM>\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\policies\Explorer\run 15
                <HKLM>\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E94B570B-EA1A-7B9E-DDDE-F6ADFD39B3EB} 15
                <HKCU>\SOFTWARE\Microsoft\Active Setup\Installed Components\{E94B570B-EA1A-7B9E-DDDE-F6ADFD39B3EB} 15
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
                Value Name: Manager
                15
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Manager
                15
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Manager
                15
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{E94B570B-EA1A-7B9E-DDDE-F6ADFD39B3EB}
                Value Name: StubPath
                15
                <HKCU>\SOFTWARE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{E94B570B-EA1A-7B9E-DDDE-F6ADFD39B3EB}
                Value Name: StubPath
                15
                <HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\SRVID\ID
                Value Name: BRQY4LY7WY
                15
                <HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\INSTALL\DATE
                Value Name: BRQY4LY7WY
                15
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
                Value Name: C:\TEMP\b426eed44205d22b31ddc9bba93777d66418725cc7389e33e94eaf82ed5a9eb5.exe
                1
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
                Value Name: C:\TEMP\93fdc3817676fae502836a274aa2444aac753f0295324c6ee1a6ba9456122323.exe
                1
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
                Value Name: C:\TEMP\f488d4abe7e53940581174ee39fa0bba3e101dcd1014e17b83eaf46ef524cd3a.exe
                1
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
                Value Name: C:\TEMP\c35c172e3ec61d1c9295eefc369e6364071b3e242bd0b7e3fe1d53e8598e5267.exe
                1
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
                Value Name: C:\TEMP\cbdc183665f526d08d30f2b9d58ecb9263d896ef89bf350354436e4ac9e084b1.exe
                1
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
                Value Name: C:\TEMP\e514982ad751e1c4d206e29300afa21d80ec2d4ab9975ef1e4fe4a0282ad1d7a.exe
                1
                MutexesOccurrences
                \BaseNamedObjects\BRQY4LY7WY14
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                212[.]117[.]50[.]22814
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                8synnanonymous[.]no-ip[.]info15
                9synnanonymous[.]no-ip[.]info15
                3synnanonymous[.]no-ip[.]info14
                synnanonymous[.]no-ip[.]info14
                2synnanonymous[.]no-ip[.]info14
                4synnanonymous[.]no-ip[.]info14
                5synnanonymous[.]no-ip[.]info14
                7synnanonymous[.]no-ip[.]info14
                6synnanonymous[.]no-ip[.]info14
                1synnanonymous[.]no-ip[.]info14
                4synnanonymous[.]no-ip[.]info[.]example[.]org1
                1synnanonymous[.]no-ip[.]info[.]example[.]org1
                5synnanonymous[.]no-ip[.]info[.]example[.]org1
                7synnanonymous[.]no-ip[.]info[.]example[.]org1
                2synnanonymous[.]no-ip[.]info[.]example[.]org1
                synnanonymous[.]no-ip[.]info[.]example[.]org1
                6synnanonymous[.]no-ip[.]info[.]example[.]org1
                Files and or directories createdOccurrences
                %APPDATA%\svchost.exe15
                %APPDATA%\sysinfo15
                %SystemRoot%\Temp\scs1.tmp11
                %SystemRoot%\Temp\scs2.tmp11
                %TEMP%\6JUNY.exe1
                %TEMP%\IC12M9RR.exe1
                %TEMP%\FJR17ZE.exe1
                %TEMP%\2A7HNDZJJJ1Q15.exe1
                %TEMP%\CVFV5OH.exe1
                %TEMP%\IH53AYOW.exe1
                %TEMP%\DWWWW46.exe1
                %TEMP%\MJXXI5LRM.exe1
                %TEMP%\YB5JQ8UA2LW2C.exe1
                %TEMP%\GGZD9TW0.exe1
                %TEMP%\WUHWJ6WIC603.exe1
                %TEMP%\04RP9MOSL3GEBE.exe1
                %TEMP%\Q9JX06QPQW7.exe1
                %TEMP%\EJ1ENZ6.exe1
                %TEMP%\EO4KXVJ.exe1
                %TEMP%\SBK2S44SS10.exe1
                %TEMP%\21T4BJS31T30T0.exe1
                %TEMP%\GBST7SCK.exe1
                %TEMP%\840AG7.exe1
                %TEMP%\XYNVF6Z8GZ52.exe1
                %TEMP%\DRSSEYO.exe1
                See JSON for more IOCs
                File Hashes
                • 89cec5949ed0d34c5e4acdff49fd25899aa99935fab559007b5e7f74eea11449
                • 8eeb0e3d9cce9b3cd1d3cff8747905d083ae4e8c3139b8b48fbcee00289960b1
                • 923a9f3de724c4b19dfd4915d65cb7e185e2b6e3174a6d60839b456bc87f4aa6
                • 93fdc3817676fae502836a274aa2444aac753f0295324c6ee1a6ba9456122323
                • ae44c2d406dd0d76dfb26776ba7e085a34d57b1565ac81c78fa0f0d3c1de55df
                • af5e730507faf8fa7d8f14fc2daa6d253a1a947e8227cb46fb0549cba5bd1483
                • b426eed44205d22b31ddc9bba93777d66418725cc7389e33e94eaf82ed5a9eb5
                • b8be6562a523ed101548cee88735f16778294ac8f8404d2fdf84c0353cf39987
                • c35c172e3ec61d1c9295eefc369e6364071b3e242bd0b7e3fe1d53e8598e5267
                • c4611e26199efce41b4a3daced46fbdc8e6f6cd19163f401334dc7d0086c900f
                • cbdc183665f526d08d30f2b9d58ecb9263d896ef89bf350354436e4ac9e084b1
                • e3306af770fd17f779fa3579656ffc1279e4c6a4ffb4fb317d5257070f25c39b
                • e514982ad751e1c4d206e29300afa21d80ec2d4ab9975ef1e4fe4a0282ad1d7a
                • f488d4abe7e53940581174ee39fa0bba3e101dcd1014e17b83eaf46ef524cd3a
                • ffe5d67e939edc9ff1543f61e395451af223654dd14eb33b9d6a3b106ebfa5d0

                Coverage


                Screenshots of Detection

                AMP



                ThreatGrid



                Win.Malware.Gamarue-7001972-0


                Indicators of Compromise


                Registry KeysOccurrences
                <HKLM>\software\Wow6432Node\microsoft\windows\currentversion\Policies\Explorer\Run 25
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
                Value Name: 36412
                25
                MutexesOccurrences
                256210079625
                \BaseNamedObjects\100929968424
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                64[.]95[.]103[.]18425
                71[.]209[.]210[.]6425
                71[.]209[.]248[.]20125
                52[.]249[.]24[.]1037
                104[.]45[.]185[.]1756
                40[.]91[.]94[.]2035
                52[.]230[.]217[.]1954
                20[.]186[.]50[.]834
                40[.]81[.]11[.]1944
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                amnsreiuojy[.]ru25
                morphed[.]ru25
                www[.]update[.]microsoft[.]com[.]nsatc[.]net24
                Files and or directories createdOccurrences
                %ProgramData%\Local Settings25
                %ProgramData%\Local Settings\Temp25
                %TEMP%\ccudefqw.com2
                %TEMP%\ccpaittr.scr1
                %TEMP%\ccvcbrqp.scr1
                %ProgramData%\Local Settings\Temp\ccaohaqb.scr1
                %ProgramData%\Local Settings\Temp\ccioodfy.pif1
                %ProgramData%\Local Settings\Temp\cccyokze.exe1
                %ProgramData%\Local Settings\Temp\ccfahy.exe1
                %ProgramData%\Local Settings\Temp\ccceirah.exe1
                %ProgramData%\Local Settings\Temp\cckyaew.com1
                %ProgramData%\Local Settings\Temp\ccauqse.scr1
                %ProgramData%\Local Settings\Temp\cclrzzfm.pif1
                %ProgramData%\Local Settings\Temp\ccokzu.com1
                %ProgramData%\Local Settings\Temp\ccablfq.scr1
                %ProgramData%\Local Settings\Temp\ccidop.cmd1
                %ProgramData%\Local Settings\Temp\cceazb.exe1
                %ProgramData%\Local Settings\Temp\ccraqi.exe1
                %ProgramData%\Local Settings\Temp\ccipousa.scr1
                %ProgramData%\Local Settings\Temp\ccacqvoes.pif1
                %ProgramData%\Local Settings\Temp\cciacuqeh.exe1
                %ProgramData%\Local Settings\Temp\ccyaykc.com1
                %ProgramData%\Local Settings\Temp\ccfayx.exe1
                %ProgramData%\Local Settings\Temp\cclygipzk.pif1
                %ProgramData%\Local Settings\Temp\ccuqhey.com1
                See JSON for more IOCs
                File Hashes
                • 88b83d7940351d57a7415257a5c764c250796735b84dac723227090cd1583604
                • 90de0eb62d02f63a793ee83399dca3a0a26ef5778561127cdc3b7a12fdd14c20
                • 9a557649beffab5fa440fe296b033302019f588fd2a2a55f96424247ab503d5a
                • 9dbfc5901b71f9329d1df2304c04a5dc23f841fbc23ab93f1b5162bbfbd17d19
                • a5b91c4a675620e083a2469ec7e6835f4f0aeb5f8080fc86e06acf51c46af45f
                • a6e33529f62b1a06b6ebb82d262b7c271db69436cd0147bbe78b668046f14c0b
                • ae51fd15c7b341e451607a0c451b8dc202b20a4f07f9698ae03db3fc10a9b7b8
                • aeb375b2ec7bedb7cd130419135de45182b2472c854315142b237b7f458b5a3a
                • b6e98593c8e5bcafaffc7d08f59f5dce7e31248f44901a5b96977e0a93a5cf9e
                • bf272f51af40e07225731aa1ef5b558a92eca5a170b27d6830d096a10dbe5387
                • c06e2844838c870cab80f096ec83674a94a3630232eae7fd7094b83c944aad1c
                • c4968a5878f0ca3c5486b46b02ee12bb162070771acd199c1c0ae153a8b5f893
                • c50836bcdb9bd118afa149c9fa69f522cb5cd73cfafca6e39dee9c0da9fc041b
                • c543cbb30540aa3fb12bc61d2c389e0243e0cb71209e5737200403888c6c4170
                • c5dc3ca6227c7cba83899d74f040de24a681a5e4ae14563a22e3575ca26782dd
                • cd31b2573b597e43cfb6a5d83083457d01d260326d5ff50649cf7fb7facebc98
                • d26052594814c437cdef01ba6ae431f6dddb03d0e091498b4a724f555b883796
                • db657ca04f33f4a4923663d90e0b53bfab9616fea6c1b023170ac4eb2437f145
                • e4030fe726df1c3b36b5819d8189eba5ceca082d6768349d97d0f9a89ec63d3c
                • e6ba8ddeb72c376ac8bdb707fa1cf1d7afa3783f040e7ff186d3ddf2e73214ab
                • e70ed5d11dc4820b873be149df9ba68a884b03631e4b5c931698d4eb11e51213
                • ecbce2866468b9d94c979a8b947d943682846c439f76b65880f6606bd6f8141e
                • edf58c5f3dc245b7f12ecfb376f30e2be4dffaa8e4e7cfe519d521d12d70d80b
                • efc850ea39ff6f82b21d1a1036c065bd65ee251e6ef66134be6cf6aab3b27aa6
                • f054a006bb89514411ae9e9611c9acf8979e9d3ab2365d059e61eb59f6c04440
                • See JSON for more IOCs

                Coverage


                Screenshots of Detection

                AMP



                ThreatGrid




                Umbrella



                Win.Trojan.Lokibot-7001391-1


                Indicators of Compromise


                Registry KeysOccurrences
                <HKCU>\SOFTWARE\VB and VBA Program Settings 13
                <HKCU>\Software\VB and VBA Program Settings\yl6S81871663781\Cm4RF771904693 13
                <HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\yl6S81871663781 13
                <HKCU>\SOFTWARE\VB AND VBA PROGRAM SETTINGS\YL6S81871663781\CM4RF771904693
                Value Name: dvQ6A283412628
                13
                None 3
                None 3
                <HKLM>\http://tmjchange.com/Aw_/Panel/five/fre.php 2
                MutexesOccurrences
                3749282D282E1E80C56CAE5A13
                \BaseNamedObjects\3BA87BBD1CC40F3583D4668013
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                212[.]1[.]211[.]484
                193[.]29[.]187[.]293
                85[.]187[.]128[.]82
                78[.]135[.]65[.]201
                161[.]117[.]85[.]2071
                47[.]52[.]60[.]1501
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                stcatherinescollegeug[.]com4
                theoutlookglow[.]co[.]ke3
                matbin[.]com2
                api[.]w[.]org1
                tmjchange[.]com1
                bteenerji[.]com1
                Files and or directories createdOccurrences
                %APPDATA%\D282E1\1E80C5.lck13
                %ProgramData%\Microsoft\Vault\AC658CB4-9126-49BD-B877-31EEDAB3F204\Policy.vpol13
                %LOCALAPPDATA%\Microsoft\Vault\4BF4C442-9B8A-41A0-B380-DD4A704DDB28\Policy.vpol13
                %APPDATA%\D282E113
                %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2580483871-590521980-3826313501-500\a18ca4003deb042bbee7a40f15e1970b_d19ab989-a35f-4710-83df-7b2db7efe7c513
                %SystemRoot%\win.ini13
                %APPDATA%\D1CC40\0F3583.lck13
                %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-1258710499-2222286471-4214075941-500\a18ca4003deb042bbee7a40f15e1970b_8f793a96-da80-4751-83f9-b23d8b735fb113
                %APPDATA%\D1CC40\0F3583.hdb11
                %APPDATA%\D1CC40\0F3583.exe (copy)4
                %APPDATA%\Microsoft1
                %System32%\winevt\Logs\Microsoft-Windows-Resource-Exhaustion-Detector%4Operational.evtx1
                %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2580483871-590521980-3826313501-5001
                File Hashes
                • 0accf0fcb86d4fb3367ac3f7c70665a67ce8c83f564db604759cb3836b7f4ac8
                • 18723bb19eebe8e4e6e01c1a652b85e7359aaadcbd0ec0c57d073426b26b036d
                • 1fd0f0bb055544d562e8f44675ff0e8205149af12ce68d4ab74e2800e84618d5
                • 3f589cd475b1211115dd0acea7483819d6e6d78f3d9a9e9b389374c9afdbaad0
                • 42af756837b1c4213219b7deda4c4432dff3b35e09483f63a3acc9211e08cae6
                • 51d37cda477215a5da7872f8a178d82279f652023be289c70cd2ae983e6a2460
                • 9c71815e65a5717ab07352f76960cebd49a16c376c0853d6ac7685fbfca8e38e
                • 9c9b0cfbd7a7b04f11611f60c7f2defdbe5db81e30a7cc01cfd123f0a6b97174
                • b3c350aaeae1b1b066fd23002a3732130b3cfdf57d39a11f04112382a0594d7f
                • d0fe5eee1cfe7b595c9d69362de5d4b823ef35933f5bfbe38b19d3488a040220
                • d110960c25e29d8b687ef5000aa3761721af5510d1d7c8a72355485d82c5ce89
                • d8c181a8be250796f8ad9583393b326c3d76f6e86a81c89225660cc7bed38e61
                • ef69508adf938a083db4f91b3c40c67338623dc192983f03385a4510d3826e58

                Coverage


                Screenshots of Detection

                AMP



                ThreatGrid



                Umbrella



                Win.Malware.Ponystealer-7001707-0


                Indicators of Compromise


                Registry KeysOccurrences
                N/A-
                MutexesOccurrences
                MUTEX_s2azEwonPXfon4JrAD25
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                69[.]195[.]146[.]13025
                213[.]183[.]40[.]3125
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                ip-api[.]com25
                Files and or directories createdOccurrences
                %System32%\Tasks\svchost25
                %APPDATA%\Logs25
                %APPDATA%\SubDir25
                %APPDATA%\Appelinstansen0.scr25
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\Appelinstansen0.vbe25
                %APPDATA%\SubDir\svchost.exe25
                %APPDATA%\Logs\06-26-201925
                %HOMEPATH%\Start Menu\Programs\Startup\Appelinstansen0.vbe24
                File Hashes
                • 176d0695e5f9bba1761b1288d40c70381a607474edefa4b96bfdae58097775a5
                • 1f44ab287b2068f0cd7f179ae8a9fc749f54a4b75c02c1a19289820a4c5abfde
                • 20e65a6e2ef74c18fd2ec2c0df19c972cfe5271b53fbaca72f2b276e07f4c9b3
                • 30ff31bdea7abfada4022dfc4a7ff283d8d280d1778229d994924df95edf6db2
                • 3140b0c479fd50ccabe59d2a687bcd30c8d8c358e8097a3ae74b97510cc33c86
                • 321bc48ccceaa8fd3492c9713d457db00670f336e26857055e0e2c1009069032
                • 329d9e96a9dd0b45592e948cc691eee9a5b0d55f6129f25507e1f5fb40a3e02c
                • 36018abd322d8b0cf3a2e9264046a544b6ef58fe48ebd22f7df0db20b9a40ab6
                • 45e8bc09f684e9d83abab87b8f8cc6d1a498968d0aca65f0ef668f8541f8a826
                • 47d1a8a70c173cba1dcc36e26bf38b206b738eb93493a0c9d9a3d09b235e9740
                • 4dda62fdee6cdb3b592956fba1326f1b418c9d81ba2577a3ec00011fa17487e4
                • 4df99361addca5c1c414fbddf48181ff65db954bd940fd0f6a1c87fa9961edf5
                • 5143e2500885ee10fa43369052dcc02576210e566e7d26102307f554b348d231
                • 53a0d0a143bf9c4e6fa96873643d1c3d148a02180664bfe575ffaabccb9ac45c
                • 61b2848c773403ccee8ebaf8b3e72ded01728ea958f1461c72442dd84fcf29a7
                • 65bb863b0e339f8f5d97e40f0ff2883bbb3d5fc9fe8b31c1d712384da7eb7aec
                • 6730bba3452b7b977186d80c34abd839dcaf731ff0b9befdb8323254c22c4fc2
                • 707d60c52242ddb3676a351faf3f96af40b547e548b32ef4c8f6751ab3cb5ffb
                • 7117534af19394d2d394c0d39005c2a06b97326b0e51f75ec53fab2f9b76c963
                • 71708c36ae65505b44dd9bdf9e7a01a3899eb5a68015c584474bc1888d2badfe
                • 7d51854e8e23a3458d9babe9f30395161256e614c0083e9adc9da561432f837f
                • 859c8e53eeba8e4ea3721673e7beefdfff3139fcc248b118a8a6c06c17594d03
                • 937ec4452c22ae6e45ea0b2d6d75442984dc2fcf2f087ba9c7d082639ee39951
                • 9ca2236b18368afca7c75b8eebda5b64eb0d98f30351ad9eb49210a63dbb12d7
                • 9df66dd5010ff85999d78be0345b529dc1ca197fb327b42e1d6d9593f708177b
                • See JSON for more IOCs

                Coverage


                Screenshots of Detection

                AMP



                ThreatGrid



                Win.Malware.Upatre-6997681-0


                Indicators of Compromise


                Registry KeysOccurrences
                N/A-
                MutexesOccurrences
                N/A-
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                104[.]239[.]157[.]2109
                23[.]253[.]126[.]587
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                rockthecasbah[.]eu16
                electriciansdublinireland[.]com3
                dcmsservices[.]com3
                Files and or directories createdOccurrences
                %TEMP%\budha.exe19
                %SystemRoot%\SysWOW64\secur32.dll14
                %SystemRoot%\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll13
                %SystemRoot%\SysWOW64\webio.dll10
                %SystemRoot%\SysWOW64\winhttp.dll10
                %SystemRoot%\SysWOW64\api-ms-win-downlevel-shlwapi-l2-1-0.dll2
                %SystemRoot%\SysWOW64\dnsapi.dll1
                File Hashes
                • 05e4fbd158d8b712eb2293bd7a8586ff451d50a4336de23277837e94ba56e8e1
                • 1dd50c279fa213938cc50b7e8d52b74598c86edcc33fdcbf7555eb529f35d7cb
                • 3198e6958489e008a41f72821b311d9e6611f33ce387f1114d6ad82bf85e25bd
                • 3d9fa6ff93769c89a6bd7cf0ab136eefe350231f433a16289f21edd1bb6adcb0
                • 5d38cb5ad7bbee701da5987a516d446ec6664e91c6f24ca01a94b19a6ecc60dd
                • 65378641d80eeec0caf4a616d2526ecdf8013c521d3f80fabceb0bbd11588da8
                • 668c8706dd4a85a2a92a04e47034faf3627a68985c2017ad76c3261c38f98cab
                • 6b78d89491561dc032767651a7fd7e4fc365ddbb3f30a61247160c5ccac56982
                • 6d61d43ea9fbb883c0eb2b18a4fdba086dc74946af12947f9cfdbddb0cbbaef6
                • 6ee66ed2e08789b99387238c1a96306e8ee9d18c16e4a3e64258ed5e03da6634
                • 810e29feb32471fb3b003f719ecf4332ac155ad4ad915a7cf78499cdc05cb85b
                • 8a18b650ec0d0dfb38d93b0504ac777a794de50b83d702b381906dd2b91c2055
                • 8e8214b61c2f9b5146541703c7c7fb176701f70bf7797d5be3202892268f8174
                • 95c3d556aa3cc4ce02a64457e948434b66727b85379b7f575e45a936420833a4
                • a0762390da8246251848bb0bddae2cfdea3b1511cba5b428b74073809c67c42d
                • a893d80022e464d48589d7a76f94108e42ac583c235ea3abd18cc6202fb15357
                • cb9857baaba1d49fdff5a644acc7bd0781d69fb3d74b3d62a17e3e9e3cdbf1da
                • e144eaf549ee6641f2689917057b6d8acf44179c0b7606961a157dd136edb715
                • e333d13bb84a89a53c7f69ebb4c435558291ead7df9acdd17ff12f5017771ec3

                Coverage


                Screenshots of Detection

                AMP

                ThreatGrid

                Umbrella

                Win.Virus.Ramnit-6997840-0


                Indicators of Compromise


                Registry KeysOccurrences
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
                Value Name: AntiVirusOverride
                24
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
                Value Name: AntiVirusDisableNotify
                24
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
                Value Name: FirewallDisableNotify
                24
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
                Value Name: FirewallOverride
                24
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
                Value Name: UpdatesDisableNotify
                24
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
                Value Name: UacDisableNotify
                24
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
                Value Name: EnableLUA
                24
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
                Value Name: EnableFirewall
                24
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
                Value Name: DoNotAllowExceptions
                24
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
                Value Name: DisableNotifications
                24
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
                Value Name: Start
                24
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
                Value Name: Start
                24
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
                Value Name: Start
                24
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION
                Value Name: jfghdug_ooetvtgk
                24
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: JudCsgdy
                24
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WUAUSERV
                Value Name: Start
                24
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Windows Defender
                24
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
                Value Name: Userinit
                24
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
                Value Name: Userinit
                24
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\CPC\VOLUME\{509D0DCA-5840-11E6-A51E-806E6F6E6963}
                Value Name: Generation
                5
                <HKLM>\SYSTEM\CONTROLSET001\ENUM\PCIIDE\IDECHANNEL\4&A27250A&0&2
                Value Name: CustomPropertyHwIdKey
                5
                <HKCU>\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{509d0dca-5840-11e6-a51e-806e6f6e6963} 5
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\{509D0DCA-5840-11E6-A51E-806E6F6E6963}\shell\Autoplay\DropTarget 5
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\{509D0DCA-5840-11E6-A51E-806E6F6E6963}\shell 5
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MOUNTPOINTS2\{509D0DCA-5840-11E6-A51E-806E6F6E6963}\SHELL\Autoplay 5
                MutexesOccurrences
                {7930D12C-1D38-EB63-89CF-4C8161B79ED4}24
                {79345B6A-421F-2958-EA08-07396ADB9E27}24
                \BaseNamedObjects\{137A1518-4964-635A-544B-7A4CB2C11D0D}20
                \BaseNamedObjects\{137A1A2C-4964-635A-544B-7A4CB2C11D0D}20
                \BaseNamedObjects\{137A2419-4964-635A-544B-7A4CB2C11D0D}20
                \BaseNamedObjects\{137A1A2D-4964-635A-544B-7A4CB2C11D0D}20
                \BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB3B51D0D}1
                \BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB9291D0D}1
                \BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB61D1D0D}1
                \BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB4BD1D0D}1
                \BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB5111D0D}1
                \BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB58D1D0D}1
                \BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB91D1D0D}1
                \BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB7391D0D}1
                \BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB7211D0D}1
                \BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB9411D0D}1
                \BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB3751D0D}1
                \BaseNamedObjects\{137A1956-4964-635A-544B-7A4CBA451D0D}1
                \BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB4711D0D}1
                \BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB9A51D0D}1
                \BaseNamedObjects\{137A1956-4964-635A-544B-7A4CBFD91D0D}1
                \BaseNamedObjects\{137A1956-4964-635A-544B-7A4CBA691D0D}1
                \BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB4911D0D}1
                \BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB9F51D0D}1
                \BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB9351D0D}1
                See JSON for more IOCs
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                208[.]100[.]26[.]25122
                172[.]217[.]12[.]17422
                87[.]106[.]190[.]15322
                46[.]165[.]220[.]14522
                89[.]185[.]44[.]10021
                172[.]217[.]164[.]14217
                35[.]224[.]232[.]2394
                172[.]217[.]7[.]2381
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                wstujheiancyv[.]com22
                kbivgyaakcntdet[.]com22
                yrkbpnnlxrxrbpett[.]com22
                qislvfqqp[.]com22
                bungetragecomedy9238[.]com22
                oeuwldhkrnvxg[.]com22
                kbodfwsbgfmoneuoj[.]com22
                wdgqvaya[.]com22
                ypwosgnjytynbqin[.]com22
                jlaabpmergjoflssyg[.]com22
                ausprcogpngdpkaf[.]com22
                fmsqakcxgr[.]com22
                OAWVUYCOY[.]COM21
                GFARONVW[.]COM21
                dvwtcefqgfnixlrdb[.]com21
                citnngljfbhbqtlqlrn[.]com21
                Files and or directories createdOccurrences
                \Boot\BCD24
                \Boot\BCD.LOG24
                %LOCALAPPDATA%\Microsoft\Windows\UsrClass.dat24
                %LOCALAPPDATA%\Microsoft\Windows\UsrClass.dat.LOG124
                %HOMEPATH%\NTUSER.DAT24
                %HOMEPATH%\ntuser.dat.LOG124
                %LOCALAPPDATA%\bolpidti24
                %LOCALAPPDATA%\bolpidti\judcsgdy.exe24
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\judcsgdy.exe24
                %SystemRoot%\bootstat.dat24
                %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2580483871-590521980-3826313501-500\e6944fe95a45c918aa3f2953cd29d8f6_d19ab989-a35f-4710-83df-7b2db7efe7c524
                %TEMP%\yowhywvr.exe21
                %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-1258710499-2222286471-4214075941-500\e6944fe95a45c918aa3f2953cd29d8f6_8f793a96-da80-4751-83f9-b23d8b735fb121
                %TEMP%\guewwukj.exe20
                %HOMEPATH%\Local Settings\Application Data\hmqphkgx\pseqpmjy.exe20
                %HOMEPATH%\Local Settings\Application Data\jpnfmrvn.log20
                %HOMEPATH%\Start Menu\Programs\Startup\pseqpmjy.exe20
                %ProgramData%\wtvakgao.log20
                \nBm4h9I4
                nBm4h9I4
                \TEMP\nBm4h9I4
                oTKCR233
                \TEMP\oTKCR233
                \oTKCR233
                \Device\HarddiskVolume32
                See JSON for more IOCs
                File Hashes
                • 020eb6da1196582c52e823a5bb222b4bfeff859c1007404e146694be17b79c0a
                • 15d31a8b30de2cc620bfaee8377fb8c2542e1fc8b3ad3ab8a19ee6d12dd0d7e8
                • 227a7a24686b80036eb0bbb6d42dc8f22c629889284dbc086c43a375b8aa4bcc
                • 2904815a1c7eccacf480673b7deb8e4f5fd0a6bd4dcc69fc2ef42e9059595b73
                • 2e324aa5b5c88f484ec89457a3d586ee17291249a053342252327876322f7ea5
                • 38dbc28e1a410c4d5b7740c2c5ad12abc72c5c4eb26961365313edee3808dc2d
                • 3e939542ad68cf7d18c4638b4ebc8f721f5d1357f8fa6068f03a5dd2f1c15a39
                • 4052f05c6345ef6306d1122f478d241ce395b6abec43af1230ad110a1fde5333
                • 4ce65aba2b6f06cb625374eb55eab94391f44f98acae5e62d38676312fb9fd23
                • 5e9441f982564e65ec1b0ddde1a164ba5d72ed18d93c28bc91d909f31134fc6c
                • 6503c9a444c480014378fc6dcc0d2bade62d0ee0a6dc9af2f8fa4e4261e5f7c1
                • 6d39754a92431ff4462ef5f4355b8f06aa371be911159507b774ee3dbfdf4bc2
                • 8b80167746d58c26a133e5f30ab82d4c295b6c2332d72b25dafedf61243e6a5b
                • 90d91197518a0e66012b8dfa52583f49968736187018ae7c821d0014184be0b5
                • 9a60fb85f32d6c9adfeaa27e2cd07752109aeaab22f9745f74de26f0eeda3cf2
                • 9e65eb141fd680acb220134c3ba615c83cc4a8d4368f0d5e659b17d5fdf3c102
                • a847ef0c0091cc8c75336551dc64bd02e21f2bcc843df68bcaeb1cfd7051e0f0
                • d58f75aa97d0bb3e3d8933f6b568bd28775f7a315d1d9f4e86fa233b3abbf32a
                • dab8c5868ad964e90df10ea1470f660076ec93532a0d5bb2e31310669c799e05
                • e7c461cba22f92a1082995142d9371d062a1788f587075c6ec3358a03f32dba9
                • e8e5366efa6d00f9a21620a3f74d65ee9eb68bced11461886c789392627ef1cf
                • f0827924286a0aaf731f2c0b8734798c42601250c12364878661d9cc8ccdc47e
                • fad70a7a283976a5409bf17038c091947bfdaa45e17e83302a1fc843c5f75f27
                • fb94f2d201e2eeaae73c43f6299225eb31d888018d2931d7385023385f455dab

                Coverage


                Screenshots of Detection

                AMP



                ThreatGrid



                Umbrella



                Win.Dropper.Kovter-6998646-0


                Indicators of Compromise


                Registry KeysOccurrences
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: internat.exe
                10
                <HKCU>\SOFTWARE\07771b47 10
                <HKLM>\SOFTWARE\WOW6432NODE\07771b47 10
                <HKLM>\SOFTWARE\WOW6432NODE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 10
                <HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION
                Value Name: explorer.exe
                10
                <HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION
                Value Name: iexplore.exe
                10
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION
                Value Name: explorer.exe
                10
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION
                Value Name: iexplore.exe
                10
                <HKLM>\SOFTWARE\WOW6432NODE\07771B47
                Value Name: 956299e5
                10
                <HKCU>\SOFTWARE\07771B47
                Value Name: 956299e5
                10
                <HKLM>\SOFTWARE\WOW6432NODE\07771B47
                Value Name: 18f8f764
                10
                <HKCU>\SOFTWARE\07771B47
                Value Name: 18f8f764
                10
                <HKLM>\SOFTWARE\WOW6432NODE\07771B47
                Value Name: 8de2c2e8
                10
                <HKCU>\SOFTWARE\07771B47
                Value Name: 8de2c2e8
                10
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.104
                Value Name: CheckSetting
                10
                <HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION
                Value Name: dllhost.exe
                10
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION
                Value Name: dllhost.exe
                10
                <HKLM>\SOFTWARE\WOW6432NODE\07771B47
                Value Name: 412841e8
                10
                <HKCU>\SOFTWARE\07771B47
                Value Name: 412841e8
                10
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.101
                Value Name: CheckSetting
                10
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.103
                Value Name: CheckSetting
                10
                <HKCU>\SOFTWARE\07771B47
                Value Name: e1616c62
                10
                <HKLM>\SOFTWARE\WOW6432NODE\07771B47
                Value Name: e1616c62
                10
                <HKCU>\SOFTWARE\07771B47
                Value Name: 921a72e2
                10
                <HKLM>\SOFTWARE\WOW6432NODE\07771B47
                Value Name: 921a72e2
                10
                MutexesOccurrences
                C77D0F2510
                Global\07771b4710
                244F241810
                906A266910
                \BaseNamedObjects\A146B82F9
                \BaseNamedObjects\20D5C1BD9
                \BaseNamedObjects\Global\7df04eda9
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                96[.]17[.]191[.]12110
                23[.]218[.]40[.]1619
                23[.]196[.]65[.]1939
                104[.]215[.]148[.]634
                40[.]113[.]200[.]2012
                40[.]76[.]4[.]151
                110[.]19[.]64[.]91
                46[.]17[.]33[.]571
                192[.]79[.]201[.]181
                110[.]165[.]194[.]2021
                75[.]129[.]131[.]2451
                14[.]252[.]183[.]41
                43[.]234[.]203[.]2461
                51[.]202[.]78[.]2271
                64[.]43[.]110[.]1601
                102[.]186[.]146[.]1071
                220[.]120[.]41[.]191
                105[.]10[.]131[.]341
                40[.]39[.]16[.]1041
                33[.]239[.]167[.]1361
                79[.]87[.]240[.]451
                101[.]144[.]113[.]421
                176[.]37[.]192[.]1061
                64[.]128[.]116[.]361
                171[.]137[.]160[.]1841
                See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                fpdownload[.]macromedia[.]com10
                e13678[.]dspb[.]akamaiedge[.]net9
                clipsource[.]com1
                Files and or directories createdOccurrences
                %TEMP%\install_flash_player_18_active_x.exe10
                File Hashes
                • 0405d046f18b12fa283aae775dfc86b7f37b3c9187c478b408b1d1df56e4946e
                • 0f7d26164358095c5e09500102a4fffd4bcabd86f8a8da20ce6d4b1257c6cfe7
                • 3579e91f3bbe9c7f0930e1ae804ed334d7cc7e5edea3477cc1d725cfc9721e6a
                • 4ae693d59ba77b5de104649fa4b0fbfcd4863910253219358e0b60534373d736
                • 62190bdab2b81d6af487289107c0ae880b6f4ac005c81feeefad042fd5cdd864
                • 63ab82c5bb8e3105847973879c43fc754c886bf713a3d2377efd2832ee103e99
                • 7fc0a306813ca939ecb32640b534a3686cad7146930edd8f0b947b490e976419
                • 99f3b3710f26b15d3b9e1363bd12de968651c4a6266838a0d51212dcfd80898a
                • b2859d76620c0dabaed848832f08be73e78cd4deddf9bf34c80ddd243c887f87
                • f3f4621e74ef38c9c05f34fb33fe092db859f16efbff734022617ad72ed2ddf0

                Coverage


                Screenshots of Detection

                AMP



                ThreatGrid



                Win.Dropper.Gh0stRAT-7003005-0


                Indicators of Compromise


                Registry KeysOccurrences
                <HKLM>\SYSTEM\CurrentControlSet\Services\BITS 25
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\BITS
                Value Name: InitTime
                25
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\BITS
                Value Name: Group
                25
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\BITS
                Value Name: Version
                25
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\Stuvwx Abcdefgh Jkl 2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\STUVWX ABCDEFGH JKL
                Value Name: Type
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\STUVWX ABCDEFGH JKL
                Value Name: Start
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\STUVWX ABCDEFGH JKL
                Value Name: ErrorControl
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\STUVWX ABCDEFGH JKL
                Value Name: DisplayName
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\STUVWX ABCDEFGH JKL
                Value Name: WOW64
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\STUVWX ABCDEFGH JKL
                Value Name: ObjectName
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\DirectX jrq 2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRECTX JRQ
                Value Name: Type
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRECTX JRQ
                Value Name: Start
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRECTX JRQ
                Value Name: ErrorControl
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRECTX JRQ
                Value Name: DisplayName
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRECTX JRQ
                Value Name: WOW64
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRECTX JRQ
                Value Name: ObjectName
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRECTX JRQ
                Value Name: Description
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\STUVWX ABCDEFGH JKL
                Value Name: Description
                2
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: SVCSHOST
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\DIRECTX JRQ
                Value Name: ImagePath
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\STUVWX ABCDEFGH JKL
                Value Name: ImagePath
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\NQUFHIVF
                Value Name: WOW64
                1
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\NQUFHIVF
                Value Name: ObjectName
                1
                MutexesOccurrences
                C:\Windows\SysWOW64\hevtam.exe3
                wenxiaoyan.3322.org2
                xiaocheng780.3322.org2
                sjj184901537.wicp.net2
                a009188.f3322.org2
                C:\progra~1\Common Files\svchost.exe2
                tcjzzf.f3322.org2
                xinshoutouliezhe.vicp.net1
                \BaseNamedObjects\944413269.3322.org1
                104.194.20.121
                wytcn.com1
                liwtao.f3322.org1
                182.92.223.281
                C:\Windows\SysWOW64\akqukc.exe1
                C:\Windows\SysWOW64\lijlio.exe1
                103.40.100.1911
                C:\Windows\SysWOW64\wgccga.exe1
                C:\Windows\SysWOW64\eoemoe.exe1
                C:\Windows\SysWOW64\scokyy.exe1
                mama520.f3322.org1
                108.171.243.191
                23.94.244.171
                23.94.244.181
                C:\progra~1\Common Files\SVCH0ST.EXE1
                125.46.39.661
                See JSON for more IOCs
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                61[.]142[.]176[.]233
                123[.]249[.]34[.]1722
                125[.]109[.]109[.]302
                27[.]54[.]252[.]2522
                174[.]139[.]226[.]1781
                42[.]236[.]77[.]1851
                104[.]194[.]20[.]121
                182[.]92[.]223[.]281
                103[.]40[.]100[.]1911
                198[.]13[.]108[.]2451
                108[.]171[.]243[.]191
                23[.]94[.]244[.]171
                23[.]94[.]244[.]181
                125[.]46[.]39[.]661
                154[.]95[.]54[.]461
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                sjj184901537[.]wicp[.]net2
                wenxiaoyan[.]3322[.]org2
                xiaocheng780[.]3322[.]org2
                tcjzzf[.]f3322[.]org2
                a009188[.]f3322[.]org2
                xinshoutouliezhe[.]vicp[.]net1
                944413269[.]3322[.]org1
                wytcn[.]com1
                liwtao[.]f3322[.]org1
                lbaabb123[.]f3322[.]org1
                sjj184901537[.]xicp[.]net1
                mama520[.]f3322[.]org1
                westexpired[.]dopa[.]com1
                Files and or directories createdOccurrences
                %SystemRoot%\SysWOW64\hevtam.exe3
                %System32%\tgvbgq.exe2
                %CommonProgramFiles%\svchost.exe2
                %System32%\ggiogq.exe1
                %System32%\jwzvwy.exe1
                %System32%\hufzuk.exe1
                %System32%\kkwgks.exe1
                %SystemRoot%\SysWOW64\totbau.exe1
                %System32%\ycuuyi.exe1
                %SystemRoot%\SysWOW64\akqukc.exe1
                %SystemRoot%\SysWOW64\lijlio.exe1
                %SystemRoot%\SysWOW64\wgccga.exe1
                %SystemRoot%\SysWOW64\eoemoe.exe1
                %SystemRoot%\SysWOW64\scokyy.exe1
                %CommonProgramFiles%\SVCH0ST.EXE1
                %SystemRoot%\SysWOW64\wgccca.exe1
                %System32%\dqrhqi.exe1
                File Hashes
                • 0403e7f8d9892722756918c24801cad3d661815f5c306c8c5391f1ab8a630ec4
                • 04d45c30a242afecf9a8d9e6cbf583029f794f13b22c22108cc0f5a6d79aff1f
                • 0a18fd63c2489ee27c7f4802ef60011cf270fd035ca3153ff0587fb201683c07
                • 0b88e2e952e057d1e67eb9aced20ed79cdb4ec00b4de5c306394d5996f6c1cb3
                • 0d9854cb571a8ef781ef4ebfd82bd461b47273fb637e80b8863388eaa7325c37
                • 19268cf4f3d3e6f37cea8d3eb6c67bd4f9abbe0dee6cba4c5ee623904e781574
                • 3464e90e1b93df7d1bf837fa799be811665b1d12d5320a2419d5cdb354cfe6c8
                • 429cca47e464202273ccf9a33f2e08aa366fe1bb59cee9ebbb1735b401b72be3
                • 4675518e7355804e0134dbb26889ae2fa0e3857110645076082087fd0c9d7517
                • 4f64ef87e5b5094f0f3b501f46f8029f0ddb47054a2d1810b50b149d6f179ae6
                • 4fcfea79eaf6fcb55cf0fdf5feab7217f949af742f52a6e12ed8e6590b19494b
                • 51b8854b75c9c928ef77a2d76ecdab13ff6aab4399960005acd4a9dd8ed4df18
                • 526e31726b1a3109312721f5d210db6e384a799951fbb9b2170a34672cd15f18
                • 553d09ad92a5abcb4987335fba0ca0fda30ceef2c33e8f72747dcc1de969ae32
                • 5ba1e4767e5e9f9d0c10d64d5399e13f83e727b96d68c68413a40773f11d1690
                • 5c2d5a7e9fe0721c8c00bc61b8b32db9bdfdd874cf2cdc3542c719b289535f87
                • 5c9a6cded235870fc95ca7e3a2aea98d642da688a7fdef40391bcd52435723ca
                • 5fb34b0666b3e21e5835c2f7d05ccab2b076e462c6982175eb638d9c08b9f138
                • 64f8a4a03ed33a6ce0b19e52411ecb58a834840db6f1fbaa46ee815a667cd362
                • 681e1d899c9342f6cf5a2600b1af723f1ea0216467050f023ed7f33da078ec72
                • 6cf9e25edd01d958328923af88edfc9224d26e1ce72a677f6f0f4c64cff11600
                • 70bb286abdffddf3137e5f8c2f3fde94fbb3c58dacc9bd7ac5c2e816829429a6
                • 712e9f3f962722317243c52aec1edeaecc59d53180873b67b108eeacc27ba84c
                • 7433255788cf4f6761369a89313ed5786b32049c7bd48c50fb8f62328744f5aa
                • 77e44b92cd3403248e82b31b16efa7b4114e872c5c1206600c2222d8020cc2b7
                • See JSON for more IOCs

                Coverage


                Screenshots of Detection

                AMP



                ThreatGrid



                Exprev

                Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
                • Atom Bombing code injection technique detected (10876)
                  A process created a suspicious Atom, which is indicative of a known process injection technique called Atom Bombing. Atoms are Windows identifiers that associate a string with a 16-bit integer. These Atoms are accessible across processes when placed in the global Atom table. Malware exploits this by placing shell code as a global Atom, then accessing it through an Asynchronous Process Call (APC). A target process runs the APC function, which loads and runs the shellcode. The malware family Dridex is known to use Atom Bombing, but other threats may leverage it as well.
                • Madshi injection detected (1932)
                  Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
                • Trickbot malware detected (1694)
                  Trickbot is a banking Trojan which appeared in late 2016. Due to the similarities between Trickbot and Dyre, it is suspected some of the individuals responsible for Dyre are now responsible for Trickbot. Trickbot has been rapidly evolving over the months since it has appeared. However, Trickbot is still missing some of the capabilities Dyre possessed. Its current modules include DLL injection, system information gathering, and email searching.
                • Process hollowing detected (941)
                  Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
                • Kovter injection detected (727)
                  A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
                • Dealply adware detected (605)
                  DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
                • Gamarue malware detected (231)
                  Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
                • PowerShell file-less infection detected (61)
                  A PowerShell command was stored in an environment variable and run. The environment variable is commonly set by a previously run script and is used as a means of evasion. This behavior is a known tactic of the Kovter and Poweliks malware families.
                • Fusion adware detected (45)
                  Fusion (or FusionPlayer) is an adware family that displays unwanted advertising in the form of popups or by injecting into browsers and altering advertisements on webpages. Adware is known to sometimes download and install malware.
                • Excessively long PowerShell command detected (43)
                  A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.

                Vulnerability Spotlight: Google V8 Array.prototype memory corruption vulnerability

                $
                0
                0

                The V8 JavaScript engine in Google Chrome contains a memory corruption vulnerability that could allow an attacker to gain the ability to execute arbitrary code on the victim’s machine. V8 is the core JavaScript engine that runs in the Chrome browser. As part of Chrome and node.is, it is the most popular JavaScript engine currently available.

                In accordance with our coordinated disclosure policy, Cisco Talos worked with Google to ensure that these issues are resolved and that an update is available for affected customers. Google initially fixed this vulnerability in March and merged it in April. However, the company just publicly disclosed it on June 26, per its vulnerability disclosure policies.

                Vulnerability details

                Google V8 Array.prototype memory corruption vulnerability (TALOS-2019-0791/CVE-2019-5831)

                A specific JavaScript code can trigger a memory corruption vulnerability in V8 7.3.492.17 which could potentially be abused for remote code execution. In order to trigger this vulnerability in the context of a browser, such as Google Chrome, the victim would need to visit a malicious web page.

                Read the complete vulnerability advisory here for additional information.

                Versions tested

                Talos tested and confirmed that Google V8, version 7.3.492.17 is affected by these vulnerabilities.

                Coverage

                The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                Snort Rules: 49442, 49443

                RATs and stealers rush through “Heaven’s Gate” with new loader

                $
                0
                0

                Executive summary

                Malware is constantly finding new ways to avoid detection. This doesn't mean that some will never be detected, but it does allow adversaries to increase the period of time between initial release and detection. Flying under the radar for just a few days is enough to infect sufficient machines to earn a decent amount of revenue for an attack. Cisco Talos recently discovered a new campaign delivering the HawkEye Reborn keylogger and other malware that proves attackers are constantly creating new ways to avoid antivirus detection. In this campaign, the attackers built a complex loader to ensure antivirus systems to not detect the payload malware. Among these features is the infamous "Heaven's Gate" technique — a trick that allows 32-bit malware running on 64-bit systems to hide API calls by switching to a 64-bit environment. In this blog, we will show how to analyze this loader quickly, and provide an overview of how these attackers deliver the well-known HawkEye Reborn malware. During our analysis, we also discovered several notable malware families, including Remcos and various cryptocurrency mining trojans, leveraging the same loader in an attempt to evade detection and impede analysis.

                Technical overview

                First, let's go through a high-level overview of the loader that's used to hide and execute HawkEye Reborn. The "technical details" section will describe these stages in detail. Even if the final malware is packed and coming with its own obfuscation, it is never written to the disk. It's always hidden inside the loader, so it's difficult for antivirus systems to detect it.
                1. Find and resolve some basic API calls by CRC32.
                2. Decode encoded code from the .data section.
                3. Jump to this code.
                4. Perform some anti-debug/anti-analysis checks.
                5. Load two resources (in this case, UDXCUSCK and SCCJZ) from the loader's PE file.
                6. Decode the configuration stored in the UDXCUSCK resource.
                7. Copy loader to %APPDATA% folder and make it persistent via StartUp link.
                8. Decode the malware payload (in this case HawkEye) stored in SCCJZ resource.
                9. Start the legitimate RegAsm.exe process.
                10. Inject and execute malware payload (HawkEye) into this process via process-hollowing.
                11. Protect injected malware code.
                12. Exit loader process.
                The majority of API calls are executed by a function we called "Exec_Function":
                • This function takes a custom hash value for the wanted API call as one of its arguments.
                • It finds the kernel.dll address via its CRC32 checksum.
                • Then, it resolves the addresses of basic API calls by name by iterating over the InMemoryOrderModuleList in the PEB_LDR_DATA structure.
                • Next, it resolves the address of the wanted API call by using a custom hash
                  function.
                • Finally, it uses CallWindowProcW to execute the resolved API call.
                Besides the aforementioned obfuscation techniques, some API calls are additionally obfuscated by using direct syscalls via the sysenter instruction on 32-bit systems and the Heaven's Gate technique on x64 systems. The latter means the code switches between 32- and 64-bit systems. Some antivirus applications and debuggers are missing these calls as far as they are not expecting a 32-bit application running under the Microsoft WOW64 technology on a 64-bit system to use 64-bit calls directly.

                Technical details

                The sample starts with some interesting calls to sub_401000.

                _main - Function


                This function is iterating through the function list names in the export table of the PE header in memory. Then, it generates the CRC32 checksum for the function name string and compares it with the given argument arg_4 (see 1881CADEh above). Finally, it returns the address for the exported API function. We renamed this function "Find_API_Function_by_CRC32."

                Sub_401000 (Find_API_Function_by_CRC32) function.

                The returned API function address is then stored in a register or local variable, which is called when the sample needs the API function. The sample is using this and similar API call obfuscations for most of its API calls. This makes it more difficult to understand what the sample is actually doing during static analysis. The bad news is, this is the simplest one of the obfuscation techniques the sample is using.

                After some initialization and decoding of the data at 415DB0 (upper right part of the picture below), the next notable call is 'call eax,' which calls the formerly decoded code at 415DB0 (see below).

                Beginning of the second stage.

                The function arguments aUdtizdmfiv and aSccjz are pointing to the names of two resource sections in the PE header of the sample file and DTIZDMFIV is their resource type. This makes it even more interesting. So let's look into this function. Unfortunately, we can't in our static analysis, because the data is encoded and then decoded at runtime.

                Encoded next stage of the dropper.

                We wrote an IDA Python script which decodes this data for us.

                addr = 0x415db0
                end = 0x5A05

                magicval = [ 0x34, 0x39, 0x38, 0x37 ]

                for j in range(0, end):
                    a = idc.GetManyBytes(addr+j, 1)
                    b = int(a.encode("hex"),16)
                    b ^= magicval[j % 4]
                    patch_byte(addr+j, b)

                The script decodes the bytes and allows us to convert it into code.

                Jump to main malware function.

                The code at 415DB0 is actually a jump to the start of the main malware function at 415DF5.

                String obfuscation.

                The sample stores all characters of its strings, such as "kernel32.dll" in local variables (see above). It does this in many other locations, too. The next call at 416C74 is also worth breaking down.

                Call to sub_41B285 (Exec_Function).

                Following the call into the function, we see another call at the beginning (41B28B).

                Call to sub_41AF15 (FindKernel32DLL).

                After analysing it, we see it resolves the address of the loaded kernel32.dll. It uses a typical shellcode technique by parsing the PEB and some underlying structures. By finding the InMemoryOrderModuleList in PEB_LDR_DATA, it can iterate through all loaded module names and find kernel32.dll by comparing the generated checksum (6A4ABC5B).

                FindKernel32DLL function.


                Now, let's go back to the upper function, the one which has called "FindKernel32DLL_addr." After storing the kernel32.dll address and initializing more local variables with some strings (not shown in the picture), the code resolves a bunch of API function addresses (ex. LoadLibrary, CallWindowsProcedure, etc.) by using the function Find_API_function_addr_by_name (see below).

                Exec_Function find API call address.

                Then, it uses the given third argument (arg_8 - 7554284Ch, the custom hash of the API function) to find the corresponding API function address. The used custom hashing function is based on the following pseudocode algorithm:

                i = 112186;
                while ( *a1 )
                    i = (char)*a1++ + 33 * i;
                return i;

                Finally, it uses CallWindowProcW to execute the resolved API function (see below). The latter is also an old shellcode trick used by many exploits to execute position independent code stored in some buffer. It misuses the CallWindowProcW function and leverages the fact that CallWindowProcW is simply executing the function pointer in the first argument, assuming it is either the address of a window or dialog box procedure. From an obfuscation point, this makes the static analysis more difficult and might also confuse weak antivirus products.

                Exec_Function (sub_41B285).

                We can rename the sub_41B285 function "Exec_Function." The picture below shows how it works. It can be used to execute most of the important Windows API calls. It is no surprise that the sample is leveraging it for most of its API calls.

                Exec_Function parameters.

                As far as "call Exec_Function" doesn't tell us which API function is called, we wrote another small IDA Python script, which parses all XREFs to this function, checks arg_8 (e.g. 7554284Ch) and resolves the given hash to an API function call name (e.g. VirtualAlloc). Then it writes a comment to the call Exec_Function, which names the API function name that is going to be executed.

                Next, the sample executes some anti-analysis checks. This includes a function, which is checking for certain processes by parsing the processlist and comparing the names against a CRC32 checksum. We called it "Scan_ProcessList_byCRC32." These checks are not only done at this location, they are distributed all over the sample and looking for the following names:

                • 0x388f3adb = mple.exe
                • 0xe84126b8 = sample.exe
                • 0x6b68c4c6 = avastui.exe
                • 0x923d5594 = avgui.exe
                • 0x6b68c4c6 = avastui.exe
                • 0x923d5594 = avgui.exe
                • 0x6b68c4c6 = avastui.exe
                • 0x923d5594 = avgui.exe
                • 0x958e9b43 = extsszf.exe


                We haven't checked every location, but where we did, the sample kills itself if those processes are found.

                Debug checks.

                After the debug checks, the sample is extracting the two resources UDXCUSK and SCCJZ from the PE resource section and stores them in two buffers for later use (see below). Then, it decodes the configuration stored in the UDXCUSK buffer. The function DecodeConfigFromResourceUDXCUSK stores pointers to the decoded data blobs on the stack. It finds them later via dword ptr ss:[ebp+eax-2C8], where eax is the offset to the different data blobs/config parameters. Later on, these parameters help to decrypt the actual final malware embedded in the SCCJZ resource.

                Load resources and decode configuration.

                Then, makes itself persistent by copying over to <%APPDATA%>/kgehorzlnr/zqwlnpeijybtmkv.exe and placing a link to the file into the Windows startup folder.

                Copy loader and make it persistent.

                CopyFilesAndCreateStartupLink is a complex function with a few sub functions. It is mostly using the obfuscation techniques that we've already seen, but it is also uses Heaven's Gate for some of the API calls, such as CloseFile.

                Leveraging syscalls for obfuscation.


                If we dig into the CloseFile_Via_syscall_SysEnter function, we see that it is checking if it is running as a 32-bit process on a 64-bit system under the SysWOW64 technology. Depending on this check, it either uses the 32-bit sysenter instruction or the Heaven's Gate trick to execute the API call directly via the 64-bit syscall instruction. If it is using the 64-bit world, it is getting the syscall number in a similar way to what we've seen before with the API calls. It is parsing ntdll.dll for the hash of the function — such as NtCloseFile = 0D09C750h — and then it finds the corresponding syscall number.

                WOW64 check and syscall resolution.

                We can see the switch from 32-bit to 64-bit code inside of the SysCallwrapper_SwitchTox64_HeavensGate function. First, it pushes 33h onto the stack. Then, it performs the call $+5 trick, which means it just calls the next instruction at 419D59, but the call instruction is also pushing the instruction pointer address to the stack (419D54). The 'add' instruction adds five to this value. In other words, we have the values 419D5E and 33h on the stack. If the CPU executes 'retf,' it is jumping to 419D5E and changing the CS register to 33h (far jump). The latter means switching to 64-bit mode. You can read the details here.

                Heaven's Gate


                Unfortunately, this means we need to switch to the 64-bit version of IDA for the code starting at 41D55E. In 64-bit, we can see that it is simply preparing the function arguments and then calling the syscall instruction. The sample uses this for calls listed in the disassembler comments in the picture below.

                64-bit code — syscall execution.


                Executing 64-bit calls in a 32-bit application can also cause certain antivirus products to miss these calls, thus missing the real behavior of the application.

                Now we are going back to the main malware routine. Remember that the malware has already extracted the SCCJZ resource into the res_SCCJZ_buffer. It has also already decoded the configuration that includes the "089377328364273...981972063544" string to decode the SCCJZ resource. It is stored in ebp+eax+var_2c8_config_base, where eax is 0x18 (-> "089377328364273...981972063544").

                Decoding the dropped malware.
                The next step is starting the legitimate RegAsm.exe process and injecting the decoded data from the resource section via the typical process-hollowing technique. Using the same obfuscation tricks previously described, we called this function "InjectIntoRegAsm" below.

                InjectIntoRegAsm


                In this case, the final malware injected into RegAsm.exe is our old information-stealer friend HawkEye Reborn v9, Version=9.0.1.6. As usual, it is obfuscated with ConfuserEx described in our previous research. The stolen data is exfiltrated via the email account sartaj@jaguarline.com to the mail server mail.jaguarline.com. The HawkEye Reborn configuration decryption password is: 0cd08c62-955c-4bdb-aa2b-a33280e3ddce.

                Hawkeye password

                Distribution activity

                After analyzing the previously described loader, we began to analyze what malware families may be leveraging it to infect victims. The most widely observed malware family at this time is HawkEye Reborn, version 9.0.1.6. Talos already broke down this malware in a previous post. We also observed several other commodity malware distribution campaigns leveraging the same loader to infect victims with Remcos, as well as cryptocurrency mining malware. This activity demonstrates how advanced techniques such as Heaven's Gate can be quickly integrated across large portions of the threat landscape. In many cases, the cybercriminals leveraging these kits lack the expertise to implement this type of functionality natively, but can instead leverage available loaders to achieve the same goal.

                Email distribution

                In all of the malware distribution campaigns we observed, the infection process starts very consistent with what we previously observed from threats like HawkEye Reborn, Remcos, Agent Tesla, and other commodity malware. The attackers send emails to victims disguised as invoices, banking statements and other financial-related topics.

                These emails typically contain Microsoft Excel spreadsheets or Microsoft Word documents that leverage CVE-2017-11882, a vulnerability affecting Microsoft Equation Editor. When opened by victims, these malicious documents function as malware downloaders, reaching out to web servers on which the attacker is hosting their malware payload. The contents of the documents varies, but one example is below:



                These campaigns are ongoing, with new binaries being hosted and new emails being sent on a regular basis.



                Below is a graph showing DNS resolution activity associated with one of the domains that is being used to host the malicious PE32 executables, and is reflective of the consistent, ongoing nature of these campaigns.



                Conclusion


                This campaign is the latest example of what modern malware uses to fly under the radar. With the described process, the actors are able to hide the original malware inside the loader. The Malware is only decrypted at runtime and injected into memory — it's never unencrypted on the hard drive. This means, if any antivirus tools scans the malware, it has no chance to identify the malware on the disk.

                The adversaries in this case used sophisticated loaders that leverage several different low-level operating system techniques to make it as hard as possible for antivirus programs to detect the malware. By using these loaders, they can quickly and easily change the final malware or in other words the payload of the loader. 

                Coverage

                Additional ways our customers can detect and block this threat are listed below.

                Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware detailed in this post. Below is a screenshot showing how AMP can protect customers from this threat. Try AMP for free here.

                Cisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

                Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

                AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

                Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

                Additional protections with context to your specific environment and threat data are available from the Firepower Management Center.

                Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

                Indicators of Compromise (IOCs)

                The following indicators of compromise can be used to identify malicious activity associated with these malware distribution campaigns.

                Domains:

                www[.]kemostarlogistics[.]co[.]ke
                www[.]terryhill[.]top
                mail[.]jaguarline[.]com

                IP Addresses:

                173.254.126[.]115
                164.160.128[.]110

                Email:

                Email: sartaj@jaguarline.com
                Mailserver: mail.jaguarline.com

                Link in Windows Startup folder:

                L"[InternetShortcut]\nURL=file:///C:\\Users\\Dex Dexter\\AppData\\Roaming\\kgehorzlnr\\zqwlnpeijybtmkv.exe"

                Malicious Document Hashes (SHA256):

                cf0a3dadba03f32d90e84401451c9acc1a1d2378d5bdae8e87fc2ab9c6ff0f12
                e23d16a5b770a04664dd42f8d2153ad62ce5fbf65af2a6dfd791ad70deef61b0

                PE32 Hashes (SHA256) analyzed:

                01349f0b7a30d36f2171145548602451643d670870f8863f8baeec4f76cf83a0
                10149bf87feb3276a7d6bfb864864c655b4e11aa2ed6d677c177353dbffdfc25
                c2e98978063f02f9769d8372d10abc3fe734cd7e686c6ab5dedb08dd57076b17
                fc31b4107bec4352fac3e1a13d91031b6b49969e21abff2301609219c43cd472

                SHA256 of related samples using very likely the same loader:

                b97d550a3d4e5bc0f5f01fb3989f30e0047a8cac56b9e6be4e46ad527c9835df
                53b2eead3c1b8e4652c3ec079dbf0f9cb2e1bbf51a9883b7c5c2c5414e43b54b
                3c1f585dd6df5cc0e0391f2924768da9fb2c9ac2f46af9a1f50325cb362728a6
                5839edf29a8841b66e6da0a821ea1e2be60a4c9c0765c1ab27df03c2d8b3d22a
                c6544c438662421fda4ebb8212526f64588081bf54e233da78a8720b9e0f5532
                d8977770d90fcda7b502db771ca6398ae90601ac8f2eddf1484285c2a7b4a098
                f067364aa4d565aba90d38afca9c21d67253b16fec8a5c36c6cfb84d6295c108
                2b139cdc6423fed45dfb5adfb18e3a141eeb7df9248bf2ac9be1696778851484
                0cfa75e3eebaff86209b51e8647ecd091308a6b0083f59e011c8a8fa21af27b6
                8025eaa9dad0eeecb73f95d4336dbab72d711189846c5196dba37d3846c276d8
                9e25b13c1f12e1e61935b763692c204ccb8427192d83b1e4c248782fc8c6af15
                4c03059b3a796b093a754a767b18f7945357bb410779d8cd3d447ff02e1ea88b
                3fffc31eb23a2838069284a3de74399601cb1b2846b5615c1032232f3c0e5c41
                b51afa3b4cca3020daff7a93ca38060794d5f02e7e1925db17d01e5aa8031492
                1a76083a711946b9a6cf9c8b14985e7ae4872784ec8e16ca3e129aa385243e57
                94392d43e99f605f189219c25d61051b92d3e0089d261226be49a69768fd170f
                e0f293cbdb97cfec3e0307783e0a1065d38745fd80035ba4c04999c2dce0ebe6
                d47f46adfdcc0925ebcd3d29c7ddeb8528a90bf7aa43067c9247713ee3199c45
                fc04f3f5f993e0743cdebfe26820f1a2ae9ab101318577ddcfaf2b5864eb7808
                780b1e40fc5b8a2f3d0cbd5c02455064606281fb2a24ee88633340178e021bae
                254af6d5f33bd179b07dff10836e86574567c5f2bdee0e8e26a90af601d16d0a
                d746ee2369a12c0c37acc3f3812f926e3345cf7edfd736774304e4d3c27c42ad
                e61a9672421d30c721ff58deb54961736bb62bbbc34dd3890edf9062370c48d4
                efa28604a547613b68480f7e8ac59f8d02931f5b8d4be6971ea96aff253d5d1a
                08c4f972f9e712adc66e7b51b4843ddc6399fdfcc64e2b8245b1eca42ff5359d
                e8cc0d6364caf0231c6b48d7eb44a10645b739bb5659d81e31dd5924eed29110
                a3b39af055b7432c7098a01736877b036fd88ffadb54502ef88d517dd5715f33
                d0ab8fa84459da9cfcbe85fc5bfe2ac3e1613aba4272698847d49efaad110587
                ba63feae30f438dac75134670d2f250b4a4154b7d71bbaf793a12b7a7b1227a5
                b3538b49f8d864f30c5f38d1358e7e44e1290193586a0ae4541e06bf8696b70a
                f48d377a6dd312fd8572be77793984db7c0e381243dad5f5a66f5d1444e52af7
                765b183479a088f6dfd2242ddd88e52c44f39f92f0d03edd44b27c22fec0ffac
                813ba89c3dea3342d34b35f56fb27a53c0487d9de9444090448e2904581bac9d
                b08521e9d4c442477c2f67ddc64faddb0ab13f95838b140f80dbe4dbe47ac7f3
                a39ebe0acc9dfc0b22f642fd953d3f729ff976e7076fc788e8cd2be4d0b196e6
                79a91c943baca8578abaddc8e4d5c96d91deb60281e71118e4b1931ff58f8107
                87b0e89cb6cf9d14c36004996558ab6da6e0f8ca4e357674417a4296fd247bc2
                8090fbedfcdfc8e646ff20d1f1405b9e5b9e1223c5a6260cbccf298fdd1e2ff9
                cbfb44b652ca595d4125f81910e29095c679fd9ea031b31068ab85b9b5e268b1
                5eb0c3a8b143b7c96fa61435d8753b6ae6650054d35ad1d0ebc357424e27e472
                c2233de1fba765c99ca87f7d77af842344003291469a9e6333347ce73651939f
                22076a5556127a3f4bddfcc0ac67abf85bcf76d4fdd4df9245a8f90ce41421c7
                8f72b6b45672692941c78f4abc473ef4c7c93c905ccaa13090b4fa8c9ae8a94b
                097e633b34a4a827a2f900bad46831716b8eb1efdc3a48e122f6676786ea3b58
                373ef46e431d3ef483549bed093830ec544c28202bd552d54992a3d9bce6ebc5
                0fa49302f135ddbc06d290dcc4801f87e9249ce9f313b3ebed2e42337171a9c3
                358eecbf97a739a88051c3131a9957c874c86d3bc920daf1b903c7945fd7948d
                00d4d2851bb0b7570b20722a82b2f2d844bcda76d44042382cfe3a7be94804b7
                01349f0b7a30d36f2171145548602451643d670870f8863f8baeec4f76cf83a0
                2228980ef182ccaed184556e2f3347ea5d7877da8eeddd18969df7f0e98474db
                5a5ddd3a9fd0af5628754cfdb2fbcbec80d0e1c09e2e7238eac99ab7c26b850e
                5d70909670129df76288c83041e686b334170b1944e1393354a8a40f8386915d
                4a42df7490d910a91d3ad0d2b22a7386ac89e799ca91755e719d39eb9ce3105f
                bd65e1f2474187ec69980e3bcc237d5eb5953c413e858b57f75bbc1efab13087
                550778509464f5cd5e7be0b21a01fb80cff8857133cff9d65290c1dbb4b13f4b
                c9117b4e20a2f439c2a4a3e9fb8554f1aee832d615666021d5cf5f6a62a15109
                e33066539456b2b4b16ca938cea71ceea097320d8445d7a48d461b65accc4d7c
                8a4d4491deaea94a51586c5098055c335831b37c17f3d8449fba197dfe73a83d
                1191a2a9d100e235358f4b737a1bda17d27731721403d53cb4cba09979987bad
                0f8572fbce7270f8462acf1b3a54d249630f138dea29203f95a35a647a150f92
                78e7eb147b419da410064536a83e8856c50ddd42fefe2f84616d90bc5aa96c9b
                4dc9503ba10fcaa9d2db3e031dc7854a6f7e6815efa24baba670f1f3e3c192f0
                9b811b1b8d88cbb2f6ad92a7ff042c1112520bdcff7e9ce42b801de4bb241979
                057eba3c5e001c212b565f5136119234ebd54f2e652d9092dfb3ba32439e9770
                c217bd6a78e26c783b13d6ef935271758ac81115a7fd86133f8905329168ec7e
                26ecac734753116e6afae428ede31eda76499caa52ed76e54f094b0ab04a24af
                3f512ccc3610441d90a33d7aaaa72303541b57d28e7e98b46d446b99534659fc
                9a4680547af935cc1f5369f60e77d148de3e318ff6b2cbe63e75b8fad051d8b6
                20293acec1ea7c8b3c26b34e4715f8a9796315f3d5a19aeeff86f660bb62a379
                ed01ab2b61aa9a68e7a3a0961ff9e60c3bbba7c944f1a1a7a9bf674c44c97ad2
                c2e98978063f02f9769d8372d10abc3fe734cd7e686c6ab5dedb08dd57076b17
                319d22b549bcbabce103c5d1359ac65f8e8ae49bff6287de21f3f9ef3138646d
                f62e27717a0a9d7c5271697a65c9052362aa7a273ab78aa981b23ffa7f37f569
                e3f6293b7214b9c5d51a12ca7de2ea0b82d909971abaac73143d40de6fb46168
                a278d236c958536e57adf595d742021bf9249f18ec08d89f292a38e4adeecfa3
                923a10cd5a45810a4f50fd88d630835d7476183ff53e2056e7e2b71cbc488684
                f1fc25ceb569ee834f38061b3a0f176f58802e09b2e2987596a1ae843bf50b04
                2bf7904fb0720d95ddf88e68d256f63adbe228a99e65a650faaca64101afce27
                64aebb452f4208ae53a8dda999c4af052ad46030b536b161ceb4ab09a1d1320b
                4687b4ccaee1db427df6649218aec766083cf28345edfb48fb2e5efc0366f0ca
                37034b8e9d3889a7959aa13d99dc7ac3027d03effeb1ccdc62c39f937b303026
                3111c73f9faf4127711feaf94c68cb1e08918c0b3c00b7066e2336ca7a28ae81
                4897c42869fe16f3658f5f75cf0e8632c63ae424524afdce93947a5f03d0f804
                ab8505cfd29a70606abe22e655741412bae9db3f18eee63f5bfa13114655d651
                2b4f00ad30839c2a2c37801bb86dab1ab5df209d58788f840e4dbdd00ad06d4a
                1e73aba842ebacff5998c303e91a7de845d74020fdf951506cd60b658dbaef2e
                96232a85116e9c9fd3a864586055ddd7bd762a321dbc64b3e6daa2cc650eca2d
                ebb8a01f413b16233df797a0d5db5c4d93e91ec5dcd09f42da9a1e367584d0dd
                84d57f57ddb11d8d46db94d3cdfc06593902797833a98a623f267c5d2640823c
                6376344a3e5c38687912533c5d1535173981c10e16d448b76a9deb2e8695e62c
                deb037f991f1ffa4e6e9b48d6f40834fb192c04dec3afe740a4768206255ca65
                9bd4ac435b07d0f7a76dfb17608b1b1027a459b10a5aa9ca5233416d2fce0448
                3644203a80018fd90877d658d18452bc693b046a2a76461851294f44f4fd163f
                291eed0d38fe2a0e08bf8bf207b4e1a521bce442e675fe3621c545ac1223c069
                b19e62bf6617aec9cdc3d7f96fcfc23a63c1587099e632fff025ef51278d7dd4
                1fe03f53fca1151eae46b3026d3b4f54f33dd3f235abb8b613adebe6ff31e385
                3e5685381ca9ecc0fe592a39410b1ce079d069c2642537614852bfb4bd925003
                02c10ef570d587d798c1e996fcec2d60b23be098e77694e4bfcc35818a8c9b20
                7a29eb9a38d43b86698fa5a9e245eb8b27a0a27407e7d1ac8025db93b3926449
                bd7510baa936badee2c828d9e563994e489396baf5538eda224482e54766554c
                433ed1c9ca574cc7d179252d94d1a0b6afe5cfcb6724491c86ae230f0a5c692e
                eecf481a6429117419fba24552a0a2ad690e40fdebfc51b4d83c5560188b32a7
                737b0f10471e7d73ec2227dba9250c5130f16b083bc34773e112d72ded4f9e8b
                8553959c6311aa9d127ada87a60ff1a9b50fe6a90388978ed1edea76277d2191
                750995e29c178cb75e2602a1640276c08f73055a70657dbc274a0a32b81b3f9c
                f0b067ded59292e46d0591dc9e609f0f9ee44d2a20f94613b3055abc525fc5ec
                10149bf87feb3276a7d6bfb864864c655b4e11aa2ed6d677c177353dbffdfc25
                f17863323f4b772be857efe9727d619a678c633b1bb2f97f0d885f584685cb60
                76ddb6dbbbc196bd72f6c243f96cb564e43711d95fe8bef0e0c384d7a2629790
                38e1ff632d9ac836a9f66d5b011ba7bd4ccbe097518135d9c6223b1287eb4711
                e7254c9407d43e354acc21c0758c2cbb55a7cfb505abfff189d81cea5743f3b6
                04971450515772684479fb5287933f0b2c7ad93433e3c69b7f235b57a1e2f128
                f1076ddd97862d36741a916fd6d08ef1397d1c7cb540240a0a11821e65339e27
                a310e24a341bcdee48a8809624b83ea3936109e85781f678faa1e689e79f6987
                ec2c6d2747c6c64d66c84ec2fbfc826d564dbf8d682069ca928a13df4aea19e5
                e9bad189d2ddd095081b8f3021ce208a18b4acab7c91b1b03dac152c8f5d9479
                be072317ffe55b115fe4487d40dbe5540be7ac70f438441c9e04a8cadb15fea4
                4101c74a521ffd0b9b3612fb68463219546bcee5de025e550a107d9b166fb014
                66921675bfb81e0d421558f3040788294c1187facdb6d995c3ff01e07dd90b87
                9000027ab595bd189e817e81d04ac0da6eed31435905186c063fd97d4faf050a
                34409c20c3fa37509b3005ae1ca46b79927668636a596edaa2aba17168620c80
                c27897d027f65dfcf24736f29c833122d336b2f81ce81a7e2ec1f4790ad14a81
                4ed52fa4dcfa57186321211eec23375b7aee513cb3768e7f73d3fdaa56e04711
                15934abb6f87f6524821c1b705e930284294a9d1bf5c82f18f3c85acb97a514a
                295ec383bca0df3673988083545301e787970d770de470b4c95e9e1e071adf5e
                e667a01dcadcc35b8c9c2c995e5e421f308de18f1b7c025dbb119375dc70ff0c
                66c12d55e157dc4a0eb24f766e650daf516553455d789598fbe84e69eeecc7c4
                7fbceb75a87b853c2a654ad50022a7a1d3e6aad60316719a2cc6b1ac20cb4e43
                0836b272ffce3f1b521062ca1c38f748a26d06cec15ea0356638633cbdb2ba53
                b8747a987023ed3f0c2037004cfa79b179e3cb4f45ef867529ee7c803d030e14
                6bb8477fb9fcfb71db0826c700f47ef2d80606b7c9077dbce4b7254ae3db31eb
                68cb2951432abdd01fcc8deab8b532c86a885a28dbb153f0ac3e344f94b0d700
                00648ec07eb8960c8575f4895c7144a60bcc0ae377a7f2cf494461460e8c6e7e
                5c760518415d0bb341c74333c70edd3a2881439a033fac7d4f97aa9d7d67c870
                060ca8f51ea06930057376c297e0ec63228f1f3d7c76b526729d8ddd7abb0882
                1be9bbc42dd8893e2eada6fbc2f6213f76d1500a467ac3ab5f3cc95745509f0e
                2bd52bf833bfdda313e96a734f9860893d4e2f93974b3531faf5af88f10db84b
                1e9fd0235b73788a8501fff71650129a445f4fe2b0ad97a15a63d9f0c19f349d
                b7263ca0af63c8ec330a4ff62d3c2c77aca4092b9c855cfa4b0a934108e43924
                277e472088dead8947e72e03387b670b85b14d73bed01d6de03bb7c42a5cb9ad
                316522e4f97f2d4f6d568093a043624cbb02d46eb5a7e0f6accfdb188cf1528f
                ce49da92395aac3471bce77e49d84c527aaacfadf7b517a192ff9edb02655a06
                b0d0e414f0cfbf44ded2ce467bd483d566aa5aaeab6d1fba75338a9fc04f6fb3
                e1a882a28f8053e96c4b6ab5648956b108cfe79170cb608d396ba455da099ec6
                491a055581260b3b5c639bbec3c6c04bbc0db7d17e0b8b9cc5109c86b6aa3ad1
                277d27828068293d9b9887482f5e77a787f83212289901c485480bfb0fce26bb
                13d17a83959f398a303329eb63317791ed03ae30b15696de9c136cc3d97f953d
                03655588004affd0d5761d961f20648086458a97bf973a9011cae56968c8e96d
                8ace05215d51668fa14ca0ec731e59823d0cb392cf1313868da5750562771651
                e2aed629ae9a752d1ba02149b2225a7cc1ed246131cddcba0f0b0540bf0dc045
                3824d9ec7507fd567da81996592ff8003c8d7041a26f4faae98a901127644bdf
                3c22205d4adc025ea1325fe8879e5d8f2c12270a5fe22da325c297c744826644
                59fc7c8e2c8bed1f381630c6016ecacc4ecd9f1bcbf4b5a6139be9d47083a8ae
                7149d25fe6e1a335322087f7be5494a24e246d43267286b945f4db1307764883
                5e767ab245543fc4edb71cf5a3b54bdbc96ec7e3f84e171ee65ecf59f8884090
                b342bc2b980b2ede862c104224dbb4784df5019b6f338bbd0c6784f27696715f
                f11e2320f00e1737dcb44c433cbda5a7c84a00f547e108a185c21bd350a913a6
                82bb3154f394418dc7664935de651ded32e12e85d289a27c75211d4037b1957f
                6d0606c4fcb65639c8d1ce5e7995268a2a89f21bac9f91096fe00da157517d66
                dae8d642c9911371c9c435e980239d262c179d0797d4dea959002f14e7613a17
                09dd021835938eb6c6ec930950b41815cd4d7702f35c06faccf3b133e4004861
                f0c30f73412470e8411770b12b2d4f6ab917cabce55517ae348a7697e23a2c3f
                fe6e0f82a1f503d5d595691f6bff426fd8381477d21b9d23c4ee103de5e6a6a6
                52bb518a4e7906fa68a4a0bb1813dc4c4ae575a891ae9730573738e032c24c5f
                bf6aeb53a7beb8460e18f5b546fa3ea215837fe6819021e3306dbdfa2dde0789
                62068961c64d65544dcabb5640fcbd50a05694732823b53cadb82cddc0d72c64
                98ece7de8b60e356d6a965c8fecc089b86e67e2c29faa941f7cae0a64537abb9
                39b14c7b01c68dbd67963156b813ff89c3755b4f12643e6bc92f6ff4b14f40ee
                7d7245b0e82b6f570c65da62720f419cbfc11ae4abeb7d062bef1fccb7dd667c
                cc84071ebf2a49ff92f12efec31736d0dfcb8a028d62ed65668c9b6641012d97
                ecd96450a7f835bbd469dfec0e439cb6aa83b45830a6732e622b092e6173514d
                959e75dbe87d962c5e65ad9059f2f73e3f1ce6e4e13cd349adc1bb209cbade5f
                cf83ef20629f4ef2cd3ffe3dd7861e321bc3d2dfe6f6aeaf8447bb0a1ca8b042
                a42fdf3685f82a662136a36099ba05ef38d2282fac999ce29d4dc183f8bfb01a
                b576fa9d8cdc7ff7e788f2cc4b460dfe284c8abf0cbdc16f26704c0e82771bd1
                3357103a936771b6a07ad55ee10d2fba8c3bc287d9a7761bb773f242ef979357
                ccbe1d4c7ad7296788dfca1e0a2f45a3c065defcbd2d639ac98809d5d469c124
                aa024428adc6a1eb38fb1c26a73224f5a9d221b1b0c92de2fedd6fba7322d415
                84919891e03f6de5bce0855627644a13ad5c616bcb654d1509e60308640de678
                4dd4374787c01ce4de4c389b03442e6b0ebed570bfad642d4cf42ce6b30a38e2
                6ec195c71e7f5b2561381e6457ff3c90255cde408d6c2451bc7342c945767161
                ba0c598fb174eb943d66e908065566e7698f0946a368f05135b004761239761f
                2c1d4304c0ac9b2481669e6aefef515aa69f8f8cea4f2cac41dafae8d76ac2a8
                0cfb09396d1891b95710302b0bc2e8031279805510b7b47ee151daaecb79f7fa
                0b84d8793c5362b0d10f238fd2bcf8fc4a1d063ea1c4e767f2d7081872b1a050
                a35863cf5014a3c7c3aeee5f80e59635885c0893b3fb9325869c9a4de8df412f
                7a7be7f6e662a8f7c2039de122ca08da4193d681b8a8a4ac5a25de6223ebcdf4
                be2870dc539c827d85401d865166db981ba2a136629fe25ea466ec0ecbbf6e48
                78e536063c280fadb0a78c24c976cd70c0bc0139908b8ec1805c8faa676a8027
                9e030cd415efb6e040d03a3f69dada5d4f08c0c430cf8400be706c2d254c42ec
                f8e27ad560a6b5a2fe9f156cf8bcf2dd2fc57cb6c620cd1a3159f124e41af8c0
                50d35c2baa8045c6455d26370142942bcc6d7c648250cdeb76f1a771c2ad13e2
                f4c44d4c9f98f0a738837b3bc5965558915522be3f44a9c31fa5560546ff96fc
                f504e794ee3f7f537177a22afdd0a830e4a96e1531734171919c86f96909f334
                f70997b46388f104340a35e901dd3172a4a98b2bc08cf75ea5a9f79831b0f84d
                ea123c9b6299186b1319ec6572bd16fb6a28185f2e9ddb9aa1bf3e52f1911b5d
                76baee103f6d1e0f63a22deefff38e815e53c1f9627f41b9220cc08cd32e5434
                de88e75b519fd4c118e3756b2ca48ebfbbeae1c084603e642022c074676de362
                7ccb34bd9651f6f27d531128d839d8d0c1853f2b6f29fed69b7e19448bfd3024
                faad82acc0652954a8dced1b5b119189be888e897fe7b4378587627d9a1ab0ed
                53bbc252c80c752c62dab6a1c8f9d200c20e1e35789bf87716b866c649401e5f
                2dc6944f17feefdcb4ed6f2faef0abe0af4f3e883c3d1dbed136a7458438398f
                32422502bcdeeea7371d8a17307da010af8d30ae20eb3d6d6c52685448646931
                76229d35d18642da6e365259353937c22b4e2dfb933e6dd9f6e5825c33f39681
                9918d0b4a9d3a2775d8fa813db7d8110b47903c23056a60ce70e200dc33ed019
                66ad5506a0b31b6ad852f2609354d507085b311f6bd67d68ec3f6c7f73b36bf8
                3a8d43e2d37874ed3dfcb68d3f77ffed07e7ba5a0fc91707c9a920427410ed34
                b720c635fcade5e16367ab730b6b7ef09a31d0cf579ffe5bb115b8d3264047bc
                24de434e2c57449c820f49c0c6e49b529964904b2e534edf6d2e92515d9546ee
                44320a15b6bead25ac56454e8ecc65071136d25e55074356bfa9ceabbeb62012
                a8714f23b9805dd8421f2817381fbe1a8d4141ee612a452b954394481ccd19ab
                9f4c4e2f52ef3c30949d2b12e69062a434f3413aff92f6460a9b3151a4850514
                0df480f2bec98324d9a870e5019eb64f4858bcb8daf66163700e0cb6a2937767
                3d3c726175d7b31be7471eb3198861a1642aa1226d9634bf6aa593a4fb9d3bcc
                f71e494c7c028b165f7956fea8144ffc0edaf538c0147e59754f61788c47938a
                35fd7e301a0e78a759cd50414b9d0cfe1b4d6c5c9316bf3f8dc5afb388f0ad7e
                526e70806ea478014016fb49cd9f297d15e3c9d322aae366f9b0a521c8ea0efa
                4f62a36d85afcaf7b6417b60a45f17d5a921aaa5614c83135b29c0419c02e199
                85eb95c03b47f3f5c0f4003a444ee976ebbc1d36a427d9ba576e5b7fe51f23f3
                f3f85da23f46c34b270c1d82c01521586e2130ded1c3b55ae8f5a5a0f59f1001
                813ebe94ed822fc8c2b42904602e62363b1a24ac95d8d0d56990e1d92afdd8c1
                33f54e062132e8846af89f6f6e37ee191a177c6c9eff3cfe1b784e2ad14e8c43
                385827beab7a004fd55ac137b9a19f88829e3f4d4bfbca6b6ffce6d49d1dcd37
                29db21426f77a935c7b82a973ec62f97a3627b5967b0a2a8bb4c4a078c6f02de
                ec8da89ced1ba93ff9e9ad0674cf487b40bc8aa66ef37d52bdb6972d20059886
                bda55e17c599b80c688e93249375fb027754aef373ecf8a05f205f1ff4bbf21d
                07c38e258efe82eae706fa4b53826082e1246188383910e13e7e524d02b8c814
                d6cee6f5c99675818a8a523df6864c6b8cec92729b1e4e5aa5aa1e11b87be528
                81e5f237a9432a1068290a0bf59f5e3e889009ab38c4113ffe587445f452e396
                8992be7dcc77bbe8d2010b49c71b99badf860d4ca064e71005076801ff9fb9fd
                67a823dd0acd8fc0d86e402b90564670b6c88d6872d263f31169acba325a18ba
                1aad661acc01d544c084fa5f1957c1f61480feebc28e0e63c42b9f0324b4b651
                36ba85a2d278fb599de9dd36adbe289c39264055996b764d8979f45bcf123535
                8f241077b523d9db54c5075303fb88e1416804a33fa2575d64650b714c0dc94b
                c082a8a175ffa2d35a93851a8c963224fe29938eac91fbadfe299c7a1e72139c
                5eb5e0022df44e595f2b362f6eb5278a2211d317fed684e584901bf507d5a033
                99cd4d6be9a58331cb148cf0696d60c40ac72c8a46ba592c984bf9bfffb07ede
                c05402a8708719dde5ad315d9e4236c5128ad8cd7ca1fc28228b4836061d7503
                bc0e103c8eae02eba219cfa761eef4924385c7328dd59e6b72f49babf8f3189a
                159d09cdbd90e5ce221f9ca7fd30646268cb2521d4279d707b346602b0eda59d
                d6c67ba1b4a3cfdd48e8f835e12d898b79e5741bab699c3956f615fe6bf28572
                636137367dd6f556f0740e9361edfc2418d3f4cac4fc166f174da18c3e2c7131
                655d514709f31f22ab07b16fbd33c2cffbf8abc1331027a3f144558e09970d4b
                b54b0c73ba7f1b37b7af59ad459aefae4dbc3cc0c7a324ac94ca39bc23580c0c
                2171f379b875969f797ebe9c23bc46d827ff221c5da4ed8cdd65bc4b2855ce7d
                ef80c882447928a079e7d786fd680d6b6c2a1a3751841165a49b00226aebc2ff
                37af5ff460fc62d754829b7ade4ae1e0b6c4881fece1e3f089032d12301c0bb0
                1fa15197c1e9a1fa5dfb1916c6a514778a609889193f9b65f24383a4b7693ec5
                e432256ff7867c4abeb51885011d5f65b09566e11782147a9e2b47d55b8adf8d
                42409f1eb65931970e4063c2ed63a8ee44d2f5c6c5853bf2ec35686d2766e268
                18622af49909851dfdfc7926fd23285784b5efd3adfd4293663003825025d88f
                4dc61ea009d78dfe1399c5c7fc9c60ed6a144378cc51753cf495819c22c247ee
                d21f035e7429a0f801155a1ccb22d8d782867aa46b960b6909b74212749bd821
                64f5687a6b2e99953e18c218fd184883cea7009a10fc680da520ecefda5338c1
                a06e1dc7e077b073bf3b8e616efcf67b8ff9428293fcb89ae6f937a1a0a5b3d8
                ba11b9b4c9e0084e5ae5d0de45761b6bd6ebbb62d41c93c7a23ceeda8461d4b1
                d608b33a3c5695e828b7afec1ff9276b42cf750f7fb42a14079b4b29a7b59c3e
                57baab61c3e3e5af27c22ef7a6c9ebdc6c280cc9ac3840572c76827954656a54
                6f93663fdea32014c733f460385ed3a55cabaafbc798283edf1ec1b1c12203a2
                f091381bb04045479f969e5f5dbcb8325590bf278b29d760bbc9bc08adb97e63
                988316a8842a2be9636a222a8b6f1d22f6587e4f648473d2b9166946c2b2b90f
                1602287d45ea448e91c4605cc8c5301d264cc2785c8ecb0aa3526bcf0e6b74a8
                bfefbd8050f0dfbe1047ddcc07e951967a5b8395190127d97d0c3a4441c919bf
                517dc095b262c6eeb7d80c3b025728278cc251f4e244af1c7eafff135a41ba4a
                f13de5281ef8a3bdec7e6f309870ffe9613da4796baa4ba8a37b748002bc06ab
                9c748ece1010fa49b15faf8e589709381b08e5451c00774b538ad3020e2291bf
                757bdd96c6547a00d13e88c58995fd3d9372bc7ff0fa717402337d9ea7cff513
                dbbc786378fb59ade9c6c99baec054206ac4504328e4be7044a624170a6c1863
                8cd8d977dc8764927c9d7dd24b79c984fa94ef9aa1b309363d61a759ed9ad8e5
                909ffaca9d78ba1e391fa62382770774f37204fdc5de24ec4234d5bc636d38b0
                2c78fce765f51d101fb68e4cc3e98ee2cf949ca8a8d987f4b5d01fa4158239b2
                62f655f3e9766e9923c6241859d567339c643ee5bad7f6ebe43b2ffd94e93d0e
                1f9d3dc21f1f816e5b816d3633ad9ec2696138519d2da972f179a8ccb4689f83
                fc31b4107bec4352fac3e1a13d91031b6b49969e21abff2301609219c43cd472
                7f2413783e24f161a06e13fa1e3ba14d8455e9e6de1bb71eb5082f80251c1e30
                97878c51723426766561d3c3c319cf649d049514b1330c90389c2b5d45cbc759
                74e9408af14a09e5c8af61780dc62112054876ae357da3f6ebf8319799b14d14
                a10486e5696f8585ed7c88e4bcfb440eea7b67ece05e6a871572282916f72d0b
                885bc554e5fc03b250b359afd5a360431bd4768f60772a60a66c65a241909e49
                46fda32fdf5d29190b8315e30e1fd6df3a4aaf43308c8a354a6be203a892e6ab
                c3d4e6bb0c9f22101a14c8455677acf98fdae3e2cb8063c76c5119b92c73e0d7
                243460e5b641862bed80bd004ff280f3ae97fe18415616401ce33988402a14dd
                3eb2472ea1d712d6285ca3a442debdad94575a4d1fb9b9caf67c41dd255e98c0
                4e987f55eabd6f9efd1947dbcdf85af455a1f7087962019f23f66a308a1073c8
                451057e11ab32bd3f6e7d71b8709c287c1d82e4e2036df712d688f7e0afc73b6
                9679abcdadaf4dfb9f3ae2a79b7bbaec08921483ae45e4486397dbd4afcbd462
                9a43f3338818991e28edd5e4be7531bfe2c5dbd4ffb3f55a05969e99141c8001
                6e6b891c5b86dc44cf37398291e01e623408e2bf7c47b88fc557e5fd222e140e
                490ae3ed23b6e40d1e7b6fd8b20ba69d4c20d9cbc5e7a53d9bc3a1824d4c45e9
                1977b89113e160518a917cd3a0da2e1e61c466251a0690464d425c191e3efbe5
                1efb2130e792e899d3fee5b0582e61b54f9bdafd00ae43e727d618d462a64a42
                8772387a55e177ff01fa20b6941dddde054c594eee8098cdf96a57e2ccb78b7d
                abed1f8ff3882e4737125b583f703683c3ac5786c8732832953e4e528d3af5f9
                0484de9ff7c50e22ba4cbc6d9e20fe5d680ee352af1d3a650df0c770848d9b90
                44821f79cf871b34e62aa86ee3e4577a18dca74a39f743081e2a8dec994025e8
                cf830a8c2868b346090401ff03c4ab44b13f50e33534add2c101ee8ff362776e
                28c495032494011c1b70b68ce584a929841ba9ba0d22a83e4084e886f6db2721
                88543e7295c60ecbd0063c71bb6d4a9d2a3397c79cc19c6f3213d88527a4d3bc
                b5ceafde9b29c186afd1a17ab534ccb1f578ff9a3de9d8b20ad55f437fc030cc
                e560a9c1961eff0a0cc1dc309dd03511b43d7bba36571caa6dc2e36132126e65
                f74fec6680f946ad601522ba1f87d58c0fd8c4747ec181083134fc4d353fc0f0
                19782d2daa25113c0d57c2a3e980bc224150055159acfe852e520803a905e908
                5e43116e3b18615353968d8d7acd8f535aa8cb95568e78bb6ad926db6688d37e
                aa54bce71f6e34a0f20f87085150a5060764fa4a594a7f6d91d01779f03023a9
                d55319e0315279969ce264b10da904aaf38fc16ea29b4ea30624a0c2fcf7fc5d
                939aeff288528182c81cbadce24a687fc962fa8c50b1e696169be8f4e7c4fcc9
                195e76b41f7256e146e5b3aedd8dcdb6e15fd40deb8159b46c8e8b2af157aae5
                e287aea0eb69b9b98dda453b22c3defbd00f344b2258ec2fb57677e77571d089
                2238e42e6cd3db765c046bdecb28bab4142f9b9c8df59a1f55bfb93e499e5825
                b9f7c411d951fa455180aa9e293ce1bcc9939b8040b726cb57f9afdf718603b5
                cf8d41d14f7d2ed82b6b0199a0335b15c2956c403607fc92af11378e4c02f577
                37f5b2c50274063c5948e5a425e50528205bb0adfe4d7084b4d756b0de594289
                5aaedf8c7d06cab042b23025ec4c0ab1215009178a6dbd44d1e6edad527356eb



                Vulnerability Spotlight: Remote code execution vulnerabilities in Simple DirectMedia Layer

                $
                0
                0

                Marcin “Icewall” Noga of Cisco Talos discovered these vulnerabilities.

                Simple DirectMedia Layer contains two vulnerabilities that could an attacker to remotely execute code on the victim’s machine. Both bugs are present in the SDL2_image library, which is used for loading images in different formats. There are vulnerabilities in the function responsible for loading PCX files. A specially crafted PCX file can lead to a heap buffer overflow and remote code execution in both cases.

                In accordance with our coordinated disclosure policy, Cisco Talos worked with SDL to ensure that these issues are resolved and that an update is available for affected customers.

                Vulnerability details

                Simple DirectMedia Layer SDL2_image IMG_LoadPCX_RW code execution vulnerability (TALOS-2019-0820/CVE-2019-5051)

                An exploitable heap-based buffer overflow vulnerability exists when loading a PCX file in SDL2_image, version 2.0.4. A missing error handler can lead to a buffer overflow and potential code execution. An attacker can provide a specially crafted image file to trigger this vulnerability.

                Read the complete vulnerability advisory here for additional information.

                Simple DirectMedia Layer SDL2_image IMG_LoadPCX_RW signed comparison code execution vulnerability (TALOS-2019-0821/CVE-2019-5052)

                An exploitable integer overflow vulnerability exists when loading a PCX file in SDL2_image 2.0.4. A specially crafted file can cause an integer overflow, resulting in too little memory being allocated, which can lead to a buffer overflow and potential code execution. An attacker can provide a specially crafted image file to trigger this vulnerability.

                Read the complete vulnerability advisory here for additional information.

                Versions tested

                Talos tested and confirmed that Simple DirectMedia Layer SDL2_image, version 2.0.4 is affected by these vulnerabilities.



                Coverage

                The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                Snort Rules: 46143 - 46146, 50035, 50036


                Threat Source newsletter (July 3, 2019)

                $
                0
                0

                Newsletter compiled by Jonathan Munshaw.

                Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

                We disclosed several vulnerabilities this week, including two in Simple DirectMedia Layer, and a memory corruption bug in the V8 JavaScript engine in Google Chrome.

                This week also saw the rise of an old favorite — exploit kits. While we don’t see them as often as we used to, Talos recently discovered a campaign using the infamous “Heaven’s Gate” technique to deliver a series of remote access trojans and information-stealers.

                We also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week. Due to the Fourth of July holiday in the U.S., expect our blog and social media to be fairly quiet over the next few days.

                Upcoming public engagements with Talos

                Event: “It’s never DNS...It was DNS: How adversaries are abusing network blind spots” at SecTor
                Location: Metro Toronto Convention Center, Toronto, Canada
                Date: Oct. 7 - 10
                Speaker: Edmund Brumaghin and Earl Carter
                Synopsis: While DNS is one of the most commonly used network protocols in most corporate networks, many organizations don’t give it the same level of scrutiny as other network protocols present in their environments. DNS has become increasingly attractive to both red teams and malicious attackers alike to easily subvert otherwise solid security architectures. This presentation will provide several technical breakdowns of real-world attacks that have been seen leveraging DNS for a variety of purposes such as DNSMessenger, DNSpionage, and more. 

                Cyber Security Week in Review

                • The U.S. Food and Drug Administration recalled a line of insulin pumps due to security concerns. The agency cited a vulnerability disclosure from the company behind the pumps that says "an unauthorized person” could exploit a bug to connect to the devices wirelessly and change its settings. 
                • The U.S. Food and Drug Administration recalled a line of insulin pumps due to security concerns. The agency cited a vulnerability disclosure from the company behind the pumps that says "an unauthorized person” could exploit a bug to connect to the devices wirelessly and change its settings.
                • new variant of the Dridex ransomware contains anti-virus evasion techniques that makes it more difficult to detect. Security researchers say the new variant, which first appeared last month, uses Application Whitelisting techniques to disable or bypass Windows Script Host.  
                • A new malware strain known as “Silexbot has bricked more than 4,000 internet-of-things devices so far. Researchers believe a teenager may even be behind the attack. 
                • security breach at a major cloud services provider may have exposed its customers’ emails and other data. PCM Inc. says it discovered the attack earlier this year, and believes malicious actors may have gained access to some of its clients’ email and file-sharing systems. 
                • U.S. Cyber Command urged Microsoft Outlook users to patch their software as soon as possible. The agency says its discovered attacks that exploit a specific Outlook vulnerability that appear to originate from Iran. 
                • Google removed more than 100 adware-infected apps from its store. Security researchers say the apps had been downloaded a combined 9.3 million times, often using victim’s phones to boost advertising revenue. 
                • Hackers took down the network of Georgia’s court system with a ransomware attack this week, though the system was restored relatively quickly. Government leaders say it appears the attack originated from a foreign country. 
                • Facebook removed 30 accounts that have helped spread malware over the past five years. The social media site said the attacks centered around fake Libya news websites, tempting users to open malicious sites and then downloading a remote access trojan. 
                • A Chinese tech company that produces smart home devices has been leaking users’ logs for years. Researchers discovered a database belonging to Orvibo sitting on an ElasticSearch server with no password protection. 

                Notable recent security issues

                Title: Spelevo exploit kit pops up to deliver banking trojans 
                Description: Researchers at Cisco Talos discovered a new exploit kit known as “Spelevo.” While exploit kit activity has quieted down over the past few years, this new campaign uses some old tricks — such as exploiting Adobe Flash Player vulnerabilities — to infect victims. It then delivers various payloads, but mainly banking trojans such as IcedID and Dridex. The actors behind Spelevo seem to be strictly financially motivated.  
                Snort SIDs: 50509 - 50511 
                  
                Title: Firefox patches critical zero-day used to target Macs 
                Description: Firefox patched a series of bugs in its latest update, but most notably fixed a vulnerability that attackers exploited to install cryptocurrency miners. Last week, the web browser released a fix for a code-execution vulnerability in a JavaScript programming method known as “Array.pop,” and then a sandbox breakout bug the next day. Two new Snort rules from Talos protect against the Array vulnerability. 
                Snort SIDs: 50518, 50519 

                Most prevalent malware files this week

                SHA 256: 440944ab47cc3140207179f5449ddacb32883a74a9cff11141fdf494eaf21592   
                MD5: dd77416ab164d3423b00f33380cf06ca  
                Typical Filename: SafeInstaller  
                Claimed Product: SafeInstaller  
                Detection Name: PUA.Win.Downloader.Installiq::tpd  

                SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3  
                MD5: 47b97de62ae8b2b927542aa5d7f3c858  
                Typical Filename: qmreportupload.exe  
                Claimed Product: qmreportupload  
                Detection Name: Win.Trojan.Generic::in10.talos  

                SHA 256: 64f3633e009650708c070751bd7c7c28cd127b7a65d4ab4907dbe8ddaa01ec8b   
                MD5: 42143a53581e0304b08f61c2ef8032d7  
                Typical Filename: N/A  
                Claimed Product: JPMorganChase Instructions SMG 82749206.pdf  
                Detection Name: Pdf.Phishing.Phishing::malicious.tht.talos  

                SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f  
                MD5: e2ea315d9a83e7577053f52c974f6a5a  
                Typical Filename: Tempmf582901854.exe  
                Claimed Product: N/A  
                Detection Name: W32.AgentWDCR:Gen.21gn.1201  

                SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b  
                MD5: 799b30f47060ca05d80ece53866e01cc  
                Typical Filename: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b.bin  
                Claimed Product: N/A  
                Detection Name: W32.Generic:Gen.22fz.1201    

                Beers with Talos Ep. #56 - Flatlined: Breach to Bankrupt

                $
                0
                0


                Beers with Talos (BWT) Podcast Ep. #56 is now available. Download this episode and subscribe to Beers with Talos:

                If iTunes and Google Play aren't your thing, click here.

                Recorded 6/24/19 - Back in the studio for EP 56 and off the top, Matt got some new audio toy for his side hustle as a Twitch star - I still can’t figure out exactly how he did what he did, but it was not helpful from a producer’s perspective. It’s repaired, but still enough to apologize for. This is why we can’t have nice things. We discuss the issues around the AMCA data heist - a breach that caused a bankruptcy - and the complexity of securely moving sensitive data, like PII and HIPAA data, to the cloud. As we get deeper, we end up discussing the issues inherent in medical data - namely, it’s sensitivity and data security issues so systemic in nature that not even HIPAA can help.

                The timeline:

                • 01:00 - Roundtable - The usual collection of smack talk - wrong numbers, arson, etc.
                • 10:30 - From breached to bankrupt - AMCA files chap.11 after losing undetermined amounts of data
                • 29:00 - Growing your teams skills and sorting out what you need your consultants to know for you
                • 32:30 - Medical data - a valuable target passing through so many hands
                • 38:30 - Closing shots and parting thoguhts (trying to move the car while Craig is inside paying edition)

                Some other links:

                ==========

                Featuring: Craig Williams (@Security_Craig), Joel Esler (@JoelEsler), Matt Olney (@kpyke) and Nigel Houghton (@EnglishLFC).

                Hosted by Mitch Neff (@MitchNeff) with special guest Liz Wharton (@LawyerLiz).

                Subscribe via iTunes (and leave a review!)


                Subscribe to the Threat Source newsletter


                Give us your feedback and suggestions for topics: beerswithtalos@cisco.com

                Threat Roundup for June 28 to July 5

                $
                0
                0
                Today, Talos is publishing a glimpse into the most prevalent threats we've observed between June 28 and July 5. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.
                As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.
                For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
                The most prevalent threats highlighted in this roundup are:
                Threat NameTypeDescription
                Win.Packed.Bladabindi-7008528-0 Packed njRAT, also known as Bladabindi, is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes and remotely turn on the victim's webcam and microphone.
                Win.Trojan.Gamarue-7008527-0 Trojan Gamarue, also known as Andromeda, is a botnet used to spread malware, steal information and perform activities such as click fraud.
                Win.Worm.Vobfus-7008428-0 Worm Vobfus is a worm that copies itself to external drives and attempts to gain automatic code execution via autorun.inf files. It also modifies the registry so that it will launch when the system is booted. Once installed, it attempts to download follow-on malware from its command and control (C2) servers.
                Win.Packed.Zeroaccess-7008376-0 Packed ZeroAccess is a trojan that infects Windows systems, installing a rootkit to hide its presence on the affected machine and serves as a platform for conducting click fraud campaigns.
                Win.Malware.Upatre-7004553-0 Malware Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.
                Win.Dropper.Gh0stRAT-7003946-0 Dropper Gh0stRAT is a well-known family of remote access trojans designed to provide an attacker with complete control over an infected system. Capabilities include monitoring keystrokes, collecting video footage from the webcam, and uploading/executing follow-on malware. The source code for Gh0stRAT has been publicly available on the internet for years, significantly lowering the barrier for actors to modify and reuse the code in new attacks.
                Win.Malware.Ramnit-7003027-0 Malware Ramnit is a banking trojan that monitors web browser activity on an infected machine and collects login information from financial websites. It also has the ability to steal browser cookies and attempts to hide from popular antivirus software.
                Win.Dropper.TrickBot-7003081-0 Dropper Trickbot is a banking trojan targeting sensitive information for select financial institutions. This malware is frequently distributed through malicious spam campaigns. Many of these campaigns rely on downloaders for distribution, such as VB Scripts.
                Win.Malware.RevengeRAT-7004697-0 Malware The RevengeRAT remote access tool allows the operator to perform a wide range of actions on the infected system, including eavesdropping on the user, exfiltrating data, and running additional malicious software.

                Threat Breakdown

                Win.Packed.Bladabindi-7008528-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\System\CurrentControlSet\Services\NapAgent\Shas 14
                <HKLM>\System\CurrentControlSet\Services\NapAgent\Qecs 14
                <HKLM>\System\CurrentControlSet\Services\NapAgent\LocalConfig 14
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\Enroll\HcsGroups 14
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\UI 14
                <HKU>\S-1-5-21-2580483871-590521980-3826313501-500
                Value Name: di
                14
                <HKCU>\ENVIRONMENT
                Value Name: SEE_MASK_NOZONECHECKS
                14
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
                Value Name: ParseAutoexec
                14
                <HKCU>\Software\c7434f9594f3950a2e05d45cc97e0b51 14
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: c7434f9594f3950a2e05d45cc97e0b51
                14
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: c7434f9594f3950a2e05d45cc97e0b51
                14
                <HKCU>\SOFTWARE\C7434F9594F3950A2E05D45CC97E0B51
                Value Name: [kl]
                14
                MutexesOccurrences
                c7434f9594f3950a2e05d45cc97e0b5114
                Unknown10
                Global\ecc6d100-9d83-11e9-a007-00501e3ae7b51
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                starwydadi[.]ddns[.]net14
                Files and or directories createdOccurrences
                %TEMP%\winup.exe14
                %TEMP%\dw.log10
                %TEMP%\89A2.dmp1

                File Hashes

                02391e42f63b5367dd990e4327dc12dfaa24ea51e96a2ae52ba3de90c732d112 02c044948ea9f53a2ab5740af1688038ed5f0b863ce1de01caf8add16dd7f595 02c34b54efedc2927061af36e7726f1545b18842ab4df21e033e90d2d153dd45 03423dab0bddc03e0cffd0f9a5b9860fc58d4cf8a3b18b6f41afe66f6b193d97 044f80bf00154486576861f9305f13aeb3152893ccc1894e89237d5964cb3791 069615e1617ba0247fee741f107516e7bf67ba227d34d44b301bb1053f2b252b 077287b6cedd20cbf323939a3d14f080ddc1489dcf9d4989764cb09cd577b205 07dc6f0502e5689ec3cc8bc8e91323084bcb028fed68a1d407c1d25364e7ad07 07f3a667a62d0ec2cb36bafd67e0b2c8e59a62223179bfb3fe8629195bbb8ed4 090856974744db766df4757083b3dadb518dfd0e3ef1c96eee63cd7076151c4c 0c5faa63bdaa0026ab4ddbce9ccb3dfb31226befc7f5e1b38873a1d2e299f1c2 0ec95d587d006803cad956a88e6a5812c3ece5b03716cdfd9fe94ce0dd3725ee 0eed80e6a87334a1c24891bb9a0fe5c8b9cd8a92167eabcbae1b5728dc5a1e93 0f56694a00ff58c317303cdf6976e81a95cb71156e79c29ee97a32cf8600c233 0fd0606df5a28446ba55b449c8276477f3dc17dadfd8897b02fddd8e70f4dc3c 101a22afcaa749c11d119751cf03c96b8fdd2bdfc759e30a1215d19fcb4ce0c2 117c818509b04bb51ccd89cffb9e59b71dc32d73d372d01517094d1516cc58d9 13e1e5dd28c015f418232c75d88a742e5102bda4b276e90c60dc588281b0e20d 14f0f8c7ab95de503728d70d30efeae2df255f2919e9ffb61d86c728d79d54d6 154d32a8d39c2a55e71a23e126cbb141bf2a860cef997a092bd5e987f463fb64 15b960b6c2eeaed4f2d8ea53172d1bfc403a36e570c92e2a569ed4b7e781e304 1711e3dd4c2a37ee762798b13e78b2aaf1f92862089055e36d4e3889bd3cacb9 179102ea1a9e3eeac268236fe006e250625376764e931f22dd41125ddf640f6f 1804e34830d4f49a6e9686d195fdd7c178fccc31841385e8fc9a712bcd22a711 18d89015080e39d8bd13c550ecef302727f58beea070897cb62d53162b7707ed
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WSAThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Trojan.Gamarue-7008527-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 24
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Microsoft Windows Manager
                24
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Microsoft Windows Manager
                24
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
                Value Name: C:\Windows\M-5050452834348584929485695758050\winmgr.exe
                6
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
                Value Name: C:\Windows\M-5050452048050540508045\winmgr.exe
                6
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
                Value Name: C:\Windows\M-5050324589790225392040235\winmgr.exe
                4
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
                Value Name: C:\Windows\M-505045204850142040560305045\winmgr.exe
                3
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
                Value Name: C:\Windows\M-5050402562050603850256869070\winmgr.exe
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
                Value Name: C:\Windows\M-5050452042050540508045405080\winmgr.exe
                2
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
                Value Name: C:\Windows\M-5050452048050540508045405040\winmgr.exe
                1
                MutexesOccurrences
                t66
                trk166
                t504
                trk123
                t592
                t202
                t181
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                195[.]22[.]26[.]24824
                199[.]247[.]8[.]1324
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                srv1300[.]ru24
                srv1400[.]ru24
                srv1000[.]ru24
                srv1100[.]ru24
                srv1200[.]ru24
                TRKHAUS[.]RU12
                ad[.]yieldmanager[.]com5
                audience[.]tapad[.]com5
                docbook[.]org2
                nwalsh[.]com2
                Files and or directories createdOccurrences
                \??\E:\autorun.inf24
                \autorun.inf24
                \??\E:\Secret.exe24
                \??\E:\Documents.exe24
                \??\E:\Movies.exe24
                \??\E:\Pictures.exe24
                \??\E:\windrv.exe24
                \??\E:\Private.exe24
                \Documents.exe24
                \Movies.exe24
                \Pictures.exe24
                \Private.exe24
                \Secret.exe24
                \windrv.exe24
                \??\E:\Music.exe20
                \Music.exe20
                \??\E:\Porn.exe12
                \??\E:\505050.exe12
                \505050.exe12
                \505040.exe12
                \Porn.exe12
                E:\505040.exe12
                %TEMP%\njabdkadwvuiajkdlawuvi1ba9
                %TEMP%\05 - Exchange.mp36
                %TEMP%\g3OdSbf__bigger.jpeg6
                *See JSON for more IOCs

                File Hashes

                1f4cf029dfbf7eb7ab7349a996c714929ad997be0e09311777b84b75d8f2163b 459a89a03a6f46e5901f2c2ce54b2c47dd12777eb4b0d95caa7cf00394b5a862 50fcf4110822d9272e706ac3661f5374a00ffed48da20f6f1503c612288ca2a9 59c9b977a95e516ffffd77a72e16314a80df92cd1d59b0b16f7e1f06e72a2398 5b31e2845b9ff0c262f09eb2ea2b4cc6896eb78402c4fddf41c76fe1ebf37b79 673dfd5ddcc565679db5739f992e0b4de8c61c1628aa151cf690278afe28fa23 86982deca7af6d4d0cf0118afec263b97d4a5975eec187093d1f730334e35144 8ce0ab86f7d3fb858373ae9bc44dc058d7f4322d56d38d0b32e485c9bb27c630 9ad466fb4e695905f2c8328fef7b4917c4c97ca2377c2002ad5cea3892b69a62 a004a9cf108c93981ad0f5891215169376336c9e13cffb2fe56e68d1af5d75f6 aecde0e15dae5f0fdac6f927f39341b40158898554b25739c7cfbbc88442ddb7 b07245addc6dac3ec4c4e258016ca457d56474ad93c11b43d0b55b6f4a5e5b5d b383ca1d776204776c643a020e71bcce8990ec6768de84e7ed6fe5bef7d692d7 c3f480a13b31de10baca5e1973ff774453c6c298b13781ace209523f055a9d74 c6faca00d7e4fa656c574de14d475bccd353aa622495a8a475f4fc52031c658d c79b3cc43f74d8b0afc8db7b1d7fefe694076b06b97c7dde85f561cdb132c529 d0293d2660844495ee219f03a9a0a13ba8b364c510f65c8325367649db499cc6 d5c3e89984dcf0346a8726bd95bc00bfc269bb96c991db729c3068aa08e18f01 d6029469cfe0aa53e619ac0a3311f9b56663be048ed51e3fdb6fdde6a5e4f07c d871f17f1609e257ee0586cc9bce74acf1d0289cf9a8264b62cb4ba82b6a94c3 d97fe58b643226abaa1f9bf4ef8acd0c7810cab3d048503f4a84cd0cf196b970 e7ba39323ddb88229cb9339e051da857a2ed5c243f2d8ea41dbd6ae70117eaf6 e8531ab3f02f293c3eb42067ba92ee8cf1513201fd4089ad0db570dc2218cb2c ec58b08efd428ad04d32f3d883b1a693cfe97fff89385d9fc8b01535b2ec2052 ef8bb975c2ec5413dfd82ea1b161ad50ba684f7f01b1e2a8bf12a41ac8a58148
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WSAThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid



                Umbrella




                Win.Worm.Vobfus-7008428-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KAVSVC.EXE
                Value Name: Debugger
                13
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\FPAVSERVER.EXE
                Value Name: Debugger
                13
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\EWIDO.EXE
                Value Name: Debugger
                13
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CPF.EXE
                Value Name: Debugger
                13
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CLAMAUTO.EXE
                Value Name: Debugger
                13
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BULLGUARD.EXE
                Value Name: Debugger
                13
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MSASCUI.EXE
                Value Name: Debugger
                13
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\WERFAULT.EXE
                Value Name: Debugger
                13
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\UI0DETECT.EXE
                Value Name: Debugger
                13
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CTFMON.EXE
                Value Name: Debugger
                13
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\WUAUCLT.EXE
                Value Name: Debugger
                13
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\HIJACKTHIS.EXE
                Value Name: Debugger
                13
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MBAM.EXE
                Value Name: Debugger
                13
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MBAMGUI.EXE
                Value Name: Debugger
                13
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\MBAMSERVICE.EXE
                Value Name: Debugger
                13
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SBIESVC.EXE
                Value Name: Debugger
                13
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SANDBOXIEWUAU.EXE
                Value Name: Debugger
                13
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SANDBOXIEBITS.EXE
                Value Name: Debugger
                13
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SANDBOXIECRYPTO.EXE
                Value Name: Debugger
                13
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SANDBOXIEDCOMLAUNCH.EXE
                Value Name: Debugger
                13
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SANDBOXIERPCSS.EXE
                Value Name: Debugger
                13
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SBIECTRL.EXE
                Value Name: Debugger
                13
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\COMBOFIX.EXE
                Value Name: Debugger
                13
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\PEV.EXE
                Value Name: Debugger
                13
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\HIDEC.EXE
                Value Name: Debugger
                13
                MutexesOccurrences
                ©Úü×À»¢Íéõèò©13
                \BaseNamedObjects\ 13
                Local\https://www.hugedomains.com/13
                Local\https://tiny.cc/11
                Local\https://www.google.com/1
                Local\https://www.ashleymadison.com/1
                Local\https://www.jcpenney.com/1
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                72[.]21[.]81[.]20013
                172[.]217[.]12[.]13813
                172[.]217[.]9[.]23813
                72[.]52[.]179[.]17513
                216[.]87[.]78[.]2513
                172[.]217[.]10[.]22713
                18[.]211[.]9[.]20613
                107[.]22[.]223[.]16313
                204[.]79[.]197[.]20012
                104[.]25[.]37[.]10812
                67[.]225[.]218[.]5012
                192[.]241[.]240[.]8912
                23[.]20[.]239[.]1212
                185[.]53[.]179[.]2911
                104[.]25[.]38[.]10811
                172[.]217[.]6[.]22611
                104[.]20[.]2[.]4711
                104[.]20[.]3[.]4711
                172[.]217[.]10[.]3610
                172[.]217[.]12[.]1319
                104[.]28[.]29[.]329
                104[.]20[.]218[.]428
                172[.]217[.]15[.]728
                172[.]217[.]15[.]1008
                13[.]107[.]21[.]2007
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                fonts[.]gstatic[.]com13
                static[.]hugedomains[.]com13
                c[.]statcounter[.]com13
                www[.]directorio-w[.]com13
                sstatic1[.]histats[.]com13
                www[.]easycaptchas[.]com13
                www[.]hugedomains[.]com13
                secure[.]statcounter[.]com13
                HDRedirect-LB6-54290b28133ca5af[.]elb[.]us-east-1[.]amazonaws[.]com13
                directorio-w[.]com13
                cdnjs[.]cloudflare[.]com12
                bit[.]ly12
                www[.]gstatic[.]com12
                www[.]google-analytics[.]com12
                parking[.]parklogic[.]com12
                www[.]qseach[.]com12
                tiny[.]cc12
                cdn[.]pubguru[.]com12
                ajax[.]googleapis[.]com11
                ib[.]adnxs[.]com11
                securepubads[.]g[.]doubleclick[.]net11
                www[.]googletagservices[.]com11
                d1lxhc4jvstzrp[.]cloudfront[.]net11
                ssl[.]google-analytics[.]com11
                fastlane[.]rubiconproject[.]com11
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                \??\E:\autorun.inf13
                \autorun.inf13
                %APPDATA%\Mozilla\Firefox\Profiles\1lcuq8ab.default\prefs.js13
                %APPDATA%\Mozilla\Firefox\Profiles\iv5rtgu3.default\prefs.js13
                %HOMEPATH%\27F6471627473796E696D6461413
                %HOMEPATH%\27F6471627473796E696D64614\winlogon.exe13
                %System32%\drivers\etc\hosts13
                \??\E:\$RECYCLE.BIN .LnK13
                \$RECYCLE.BIN .LnK13
                \??\E:\System Volume Information .Lnk13
                \System Volume Information .Lnk13
                %HOMEPATH%\Local Settings\Application Data\Google\Chrome\User Data\Default\Preferences13
                \??\E:\lE8z54f35yL4uFzESl0145FQ0e8zzsyhXVP13
                \??\E:\lE8z54f35yL4uFzESl0145FQ0e8zzsyhXVP\S-1-3-01-4631041401-4114748267-464015834-150513
                \??\E:\lE8z54f35yL4uFzESl0145FQ0e8zzsyhXVP\S-1-3-01-4631041401-4114748267-464015834-1505\Desktop.ini13
                \lE8z54f35yL4uFzESl0145FQ0e8zzsyhXVP\S-1-3-01-4631041401-4114748267-464015834-1505\Desktop.ini13
                %HOMEPATH%\Local Settings\Application Data\Microsoft\Internet Explorer\DOMStore\Z17N57WM\www.hugedomains[1].xml10
                %APPDATA%\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A3
                %APPDATA%\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A3

                File Hashes

                c037253e276f68915f94a880ef6092f6a2a9e2a22dde3752b1a189e7392bb1c2 c9664af8c4a783ba1837929d8fbe97222a9e08ef44849d0bd3fbdd5fd3771056 d79ea7f8669da09b2a8871d5d52c046e5730edd4806228bff088fdcf60dc492f e2dfd666cf32d2825de8a84339c1a2329ccfd986164fad48190a9420b37c32d9 e895fb316f2c6e59edd5b57c98df52ac7a8cff2b08f7e6fbd57623e6608d7c70 ef995680626316921a87d60298208aa1a7337e6b8582e859fa12027909512ea1 f0e508c2ac7a24a070a1478f9cc27e3a78357fa7c3f76ca3592637eafcd5dec8 f12b6897b528bee20e2cb54f5b445d141948ae5361b6ef21b495777ecc92aaf2 f67f73d39c0fade143d1cc30c8a5f1b823ef4cf91dc45314fb51e714d179c3fe f9722379fe4ce4cd008143cb3c4cfeb4b5b4ba695ddaf1fee839a9ab368d1d8d fa4c827d119b5a98f40027dcbbdc9c3bddfdc38511772de7e4ade6bffbd5b2f9 fb4ff852fbee72185cc989143092f2f580c4997b51504da59bd873024254660e fb854a98e62eaab30f6bdb26d2ab655770dbec021e4dc62bc276fa761ff0d165

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WSAThis has coverage

                Screenshots of Detection

                AMP



                ThreatGrid



                Umbrella




                Win.Packed.Zeroaccess-7008376-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
                Value Name: Start
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
                Value Name: DeleteFlag
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
                Value Name: Start
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS
                Value Name: Start
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
                Value Name: Start
                10
                <HKLM>\SYSTEM\CurrentCo
                ntrolSet\Services\SharedAccess\Epoch
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IPHLPSVC
                Value Name: Start
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS
                Value Name: DeleteFlag
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
                Value Name: DeleteFlag
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
                Value Name: DeleteFlag
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\Epoch 10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\BROWSER
                Value Name: Start
                10
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Windows Defender
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
                Value Name: Type
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
                Value Name: ErrorControl
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS
                Value Name: Type
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS
                Value Name: ErrorControl
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IPHLPSVC
                Value Name: Type
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IPHLPSVC
                Value Name: ErrorControl
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\IPHLPSVC
                Value Name: DeleteFlag
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
                Value Name: Type
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
                Value Name: ErrorControl
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
                Value Name: Type
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
                Value Name: ErrorControl
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\BFE
                Value Name: Type
                10
                MutexesOccurrences
                Global\{9a937ad1-c80e-6934-b9b5-3afedfb64be2}10
                {9a937ad1-c80e-6934-b9b5-3afedfb64be2}10
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                204[.]79[.]197[.]20010
                64[.]210[.]151[.]3210
                13[.]107[.]21[.]2005
                83[.]133[.]123[.]205
                208[.]100[.]26[.]2511
                154[.]214[.]250[.]731
                62[.]60[.]251[.]2441
                180[.]215[.]207[.]1101
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                promos[.]fling[.]com10
                12geg23[.]cdn104[.]uploadetchosting[.]com2
                12geg22[.]cdn104[.]uploadetchosting[.]com2
                12geg1q[.]cdn104[.]uploadetchosting[.]com1
                12geg1s[.]cdn104[.]uploadetchosting[.]com1
                12geg1t[.]cdn104[.]uploadetchosting[.]com1
                12geg1w[.]cdn104[.]uploadetchosting[.]com1
                12geg1y[.]cdn104[.]uploadetchosting[.]com1
                12geg21[.]cdn104[.]uploadetchosting[.]com1
                Files and or directories createdOccurrences
                %TEMP%\IXP000.TMP10
                %TEMP%\IXP000.TMP\TMP4351$.TMP10
                @10
                L10
                U10
                %System32%\logfiles\scm\e22a8667-f75b-4ba9-ba46-067ed4429de810
                \systemroot\Installer\{0f210b53-2df0-43a6-b654-d5b43088f74f}10
                \systemroot\system32\services.exe10
                %SystemRoot%\Installer\{0f210b53-2df0-43a6-b654-d5b43088f74f}\@10
                %System32%\services.exe10
                %TEMP%\IXP000.TMP\C32938~1.EXE10
                %TEMP%\IXP000.TMP\reloaded.exe10
                %APPDATA%\msrfa.dll1
                %APPDATA%\pibis.dll1
                %APPDATA%\wisnge.dll1
                %APPDATA%\wsrmg.dll1
                %APPDATA%\nscizr.dll1
                %APPDATA%\wshufx.dll1
                %APPDATA%\bgnsoc.dll1
                %APPDATA%\mcrdr.dll1
                %APPDATA%\zrshu.dll1
                %APPDATA%\mstemf.dll1

                File Hashes

                1a45f21c4e9da8fe25dee15d791d14525ff229c3e0330d17af76477391c9cd5e 37ac22156718afc2837f23f12e032530f464083c7204644aa3ce2fb0676a149d 5ca82ac85c65d79b8069ec7b41b3ab212d22bf014eaccd712ed30294a23cfa6f 6c2df30ebf956363eed646fa1032395186c303e20e859f561d0bda1ebc5de002 8b91726726c5b33f1a4aa3efa0184209bee0fb26c919d748f078e887d3ddd0f8 9127e176fa15d685992b36d6781d79dee5c5994431a021d13f78f3328168cd04 b9aa60607427eedf69bfa2058c0476f8b673955ba7701b710a44ba02edcf9c36 c5f5861f4c4a560396fa5c20394515b5147d97427cba2e37c5d114738d9dcf31 d239e098f814f0350a81ade67000be01f91a8007833823d5f2e6c782a3b5552b f40030bec4290e152e63064e90b4fda8f3314f5b1ac98eb298f2993c85b93f24

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSA N/A

                Screenshots of Detection

                AMP



                ThreatGrid




                Win.Malware.Upatre-7004553-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\75E0ABB6138512271C04F85FDDDE38E4B7242EFE
                Value Name: Blob
                14
                <HKCU>\SOFTWARE\MICROSOFT\Vunadiikify 1
                <HKCU>\Software\Microsoft\Ejluzaduy 1
                <HKCU>\Software\Microsoft\Hofoaldyospa 1
                <HKCU>\Software\Microsoft\Byypjecykuan 1
                <HKCU>\Software\Microsoft\Pekuymgu 1
                <HKCU>\SOFTWARE\MICROSOFT\Uswyloyhujmo 1
                <HKCU>\Software\Microsoft\Weqyireluz 1
                <HKCU>\Software\Microsoft\Ahulbupagupi 1
                <HKCU>\Software\Microsoft\Yvuwdefusuyx 1
                <HKCU>\SOFTWARE\MICROSOFT\YVUWDEFUSUYX
                Value Name: 16864bd5
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Kapya
                1
                <HKCU>\SOFTWARE\MICROSOFT\YVUWDEFUSUYX
                Value Name: 2ai47ccj
                1
                <HKCU>\SOFTWARE\MICROSOFT\YVUWDEFUSUYX
                Value Name: 1b0jgcdj
                1
                <HKCU>\SOFTWARE\MICROSOFT\Ifrytaacpiu 1
                <HKCU>\SOFTWARE\MICROSOFT\IFRYTAACPIU
                Value Name: ebecgbi
                1
                <HKCU>\SOFTWARE\MICROSOFT\IFRYTAACPIU
                Value Name: 9e6eb40
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Syyqx
                1
                <HKCU>\SOFTWARE\MICROSOFT\IFRYTAACPIU
                Value Name: 1eb88i7e
                1
                <HKCU>\SOFTWARE\MICROSOFT\Asohubtafib 1
                <HKCU>\SOFTWARE\MICROSOFT\ASOHUBTAFIB
                Value Name: 292fjjef
                1
                <HKCU>\SOFTWARE\MICROSOFT\ASOHUBTAFIB
                Value Name: 24a073d5
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Hoavt
                1
                <HKCU>\SOFTWARE\MICROSOFT\ASOHUBTAFIB
                Value Name: 3jcbf77
                1
                <HKCU>\Software\Microsoft\Ocidrajiasze 1
                MutexesOccurrences
                Global\{C30C6CF2-932B-408E-55BA-04D54CAC27C8}16
                Global\{566D79B0-8669-D5EF-55BA-04D54CAC27C8}16
                Global\{C8D239CA-C613-4B50-55BA-04D54CAC27C8}16
                Global\{C8D239CB-C612-4B50-55BA-04D54CAC27C8}16
                Local\{73DE6ED9-9100-F05C-55BA-04D54CAC27C8}16
                Local\{A9348FD8-7001-2AB6-55BA-04D54CAC27C8}16
                Local\{A9348FDF-7006-2AB6-55BA-04D54CAC27C8}16
                Global\{73DE6ED9-9100-F05C-55BA-04D54CAC27C8}16
                Global\{A5D858EA-A733-265A-55BA-04D54CAC27C8}16
                Global\{A9348FD8-7001-2AB6-55BA-04D54CAC27C8}16
                Global\{A9348FDF-7006-2AB6-55BA-04D54CAC27C8}16
                Local\{C8D239CA-C613-4B50-55BA-04D54CAC27C8}16
                Local\{C8D239CB-C612-4B50-55BA-04D54CAC27C8}16
                Local\{E9745CFB-A322-6AF6-55BA-04D54CAC27C8}16
                Global\{B665CB4B-3492-35E7-031D-B06E1A0B9373}1
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                184[.]168[.]131[.]24116
                68[.]235[.]37[.]8316
                94[.]64[.]68[.]19716
                190[.]37[.]207[.]19916
                71[.]91[.]43[.]17916
                79[.]187[.]164[.]15516
                63[.]227[.]34[.]2816
                178[.]116[.]48[.]21716
                86[.]135[.]144[.]616
                94[.]189[.]230[.]7816
                206[.]190[.]252[.]616
                86[.]140[.]35[.]5416
                59[.]90[.]26[.]4916
                123[.]203[.]139[.]25216
                86[.]158[.]144[.]2716
                75[.]87[.]87[.]19916
                84[.]234[.]151[.]2316
                222[.]96[.]81[.]5916
                172[.]245[.]217[.]12216
                58[.]252[.]57[.]19316
                103[.]14[.]195[.]2016
                108[.]230[.]237[.]24016
                172[.]217[.]10[.]6810
                172[.]217[.]10[.]364
                18[.]233[.]6[.]114
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                kofinyame[.]com16
                california89[.]com16
                www[.]california89[.]com16
                fquxszdtduirtabaguyqcyxwgu[.]com3
                kbbqhhqsthaoflrodxoftwjn[.]ru3
                vkljvwgzxtaltwdpso[.]ru3
                eivsovswuswxlrecqxytmv[.]biz3
                izfupirthqqhtdmrsgizi[.]org3
                aqyldvcucbivwcuzltqszlwuiv[.]com3
                dqxcpjxrkpvkrscvoibusskxkcx[.]com3
                kfeyrgzheujramjvdebmfih[.]biz3
                llbmbyozculfxljkrdaetkzofv[.]info3
                qxwguplvcyswhiciqoylyhijrcvo[.]biz3
                belzrwyugfulnrtsvwwjfzttk[.]ru3
                ofdyvgdenbrwizswrgrshnvifzemam[.]info3
                tobeugnjhuczhucepcedyfyx[.]net3
                dieqgetxwlvwcxklrjboffi[.]info3
                emfetgfafeeygpxvshmbyxwsof[.]biz3
                xwlvzlnvzlwkplbtodmrtgl[.]com3
                jnaqjrmfjzcepvcxgcyeaxhwcy[.]org3
                mrbyprkqkemlnpzbtjnwkkvts[.]org3
                lfydktrtcydhfuycuxcp[.]com3
                nvzpfuwvmfbadnvvjrhipskem[.]net3
                lixsgurgbcmamxkqkqijfapcmrk[.]info2
                qkhfeydhaixcdvkbgihqqhq[.]com2
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                %HOMEPATH%\NTUSER.DAT16
                %HOMEPATH%\ntuser.dat.LOG116
                %TEMP%\budha.exe16
                %TEMP%\kilf.exe16
                kilf.exe16
                %SystemRoot%\SysWOW64\secur32.dll14
                %SystemRoot%\SysWOW64\api-ms-win-downlevel-advapi32-l2-1-0.dll12
                %SystemRoot%\SysWOW64\winhttp.dll10
                %SystemRoot%\SysWOW64\webio.dll7
                %TEMP%\OVQEBB9.bat1
                %APPDATA%\Awdei\tyun.exe1
                %TEMP%\QXY4CCB.bat1
                %APPDATA%\Ingue\epxiur.exe1
                %TEMP%\RSQ2CE0.bat1
                %APPDATA%\Olvyq\juwe.exe1
                %TEMP%\PJM7E60.bat1
                %APPDATA%\Almenu1
                %APPDATA%\Almenu\anozyb.exe1
                %TEMP%\YYN5BA3.bat1
                %APPDATA%\Jasit\xequ.exe1
                %TEMP%\KMN5AE0.bat1
                %APPDATA%\Azwia\wiziny.exe1
                %TEMP%\JWJ9A47.bat1
                %APPDATA%\Comomi\afve.exe1
                %TEMP%\NYW5A92.bat1
                *See JSON for more IOCs

                File Hashes

                014f7b0000b4959505cc055eb5c91283919f7e9596b9d375a15966808f3cac40 03ef7f307a4014590af1936ce69ef7f7e77fd34ecc1b553f4064a2fd4481b799 084cbb7cd8627cdfe63f8519f09a8100aac4710de7d396149d345182ce078d93 14726cda4db95441c35a350011f5ded8d832f2c8a6ab181c3c4a4fb73056ae6e 6a3eff21994abc3ae6c3c7a2d81e2f6c9e710ae4874e25db0a51213de4133c0d 7218bc90b23ce5f58e339e7e4caa68405ee10ad314c0765c92d0885f1ce3fce7 76bf6463c9751e4f8c6df80dff89dd58deeada57edc0dfaa3fcb88c5b676e3d9 7befc280a73717d09d831778e63173b1d48bf65d6d5a0da3055571a6d434bc6a 7c1b33a4ffaca8cd292d24c9b0a275629e931e0378d49305680e759d87b19aa5 8d8215b512830f6285f8248e6408e3f0e61535f32775f8c01b234c52729ce497 a05880b5a7d66ee3c976cba4553e48421da2c87d25540e81db739771217516e5 cc192820453aaf77261330c8caaf91436cbc5912e0307e9940b7265089c14705 cc908625e97f5ee851b27f69d492b90cedd17576612a8005f2a709960010a5da ccf99adebff70749af314d4414ef84fb4577ccb7bbd4816f3623a2013954d4c0 d4bda6c737fb1ea8ba4d486dc9d129c35e24faede3b17f6dd6d5f154a0e269f5 eb75f7cc2bef48e82fe540a53e39a53a78442e41b283917bb83bd050975447b4

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WSAThis has coverage

                Screenshots of Detection

                AMP



                ThreatGrid



                Umbrella




                Win.Dropper.Gh0stRAT-7003946-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: SVCSHOST
                19
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: SVCSHOST
                1
                MutexesOccurrences
                546634635.3322.org3
                kent.wicp.net3
                23.95.28.1813
                58.55.149.2312
                59233086.f3322.org2
                58.55.154.1191
                www.zmr321.com1
                \BaseNamedObjects\122.0.114.491
                122.0.114.1391
                23.245.118.141
                mantou0314.f3322.org1
                yanjianlong.f3322.org1
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                174[.]128[.]255[.]2513
                174[.]128[.]255[.]2533
                23[.]95[.]28[.]1813
                58[.]55[.]149[.]2312
                122[.]114[.]141[.]1072
                58[.]55[.]154[.]1191
                122[.]0[.]114[.]491
                122[.]0[.]114[.]1391
                23[.]245[.]118[.]141
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                546634635[.]3322[.]org3
                kent[.]wicp[.]net3
                59233086[.]f3322[.]org2
                www[.]zmr321[.]com1
                mantou0314[.]f3322[.]org1
                yanjianlong[.]f3322[.]org1

                File Hashes

                065b0891dd2f1f140a304d6083a42920f479e9f78449653dda3e3f4773d65f64 0e3ca15c7fbb7290152a4352eb9f128d371a61748bf574629b1e20e88194f39a 16ae0bbd83dfbf5d842d830eb025a48afeb882d280cd2667178a64c5e4e52aa7 2c3bb3de7dc1618182cc870473e21773ec64a7907a7a8b908ba84aa3dfc1ccb8 3fc973ba80cdb771e03afcede4504b916e2271ee061371132943e69a6851d0a6 72ad952cd9fb882a07fc5076925ef9f54c99c1e2b8d787c6b7da5efe93d2320d 7947b164011507462d16333b66ff489f62d0d07c063886a65fc1119c434595b4 7c23edb038674293f17bcd1f54ce09257155f50167c291b898369b7f67a0543d 7dd7075d773df6b6adbceecb7670aeba729b409c4eab34fa43ee12cec71d961f 8099dfc84e82896b7ffd60989d80dcf3e6d201119fe41c297be02efa198d4c97 8e985850c2689d00fb7a806b008798980036f4d2ec139e1b7ee50aa7adb2a1da 908e09cdf2eacbb1361d94c86d393c0149634d927ba537862db5c26ee1fdd1d5 9a744852496a014e1346262aab597cdc6d7c86cc1254a6b3f1e2f0509e011f49 9d83339f74a26f74ab4b32835f4e56224bf4455f52d78e4e1597a36f63dc34ca 9e2ae029580b63672ebed5d256f22745cda92397969ae98db888275c74c33492 a9c39431622634720eb6af8bed7440508c1b76d955377bb98ff6b4a5f3cd476e bc6a883c9ea0eb02da0590ad56eee63fffff733fb530fb901e449c41fd63dee4 d94e3332f0f9181e0fe3e4dc6da12024a66ac9bd27e3e2e8a2805cd99de34552 e1645442bba1f21d0a3243661dca6d4bae3dd28150e03f5d959f1c8bf61fca64 e880f061dc1f2f08585787d07c55ae03e212408f9e2e6ee8b6d392be694f2663 fb0f9a707cc2ab33dd9370aac07dd7c0f354bc6780de8c0c54c69f7d828e8e1e fd514b2dfc176298d8b6b4885079cdb43a7c374fdd914850c50aad7c8791b455

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSA N/A

                Screenshots of Detection

                AMP



                ThreatGrid




                Win.Malware.Ramnit-7003027-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
                Value Name: AntiVirusOverride
                10
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
                Value Name: AntiVirusDisableNotify
                10
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
                Value Name: FirewallDisableNotify
                10
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
                Value Name: FirewallOverride
                10
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
                Value Name: UpdatesDisableNotify
                10
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
                Value Name: UacDisableNotify
                10
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
                Value Name: EnableLUA
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
                Value Name: EnableFirewall
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
                Value Name: DoNotAllowExceptions
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
                Value Name: DisableNotifications
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
                Value Name: Start
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
                Value Name: Start
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
                Value Name: Start
                10
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION
                Value Name: jfghdug_ooetvtgk
                10
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: JudCsgdy
                10
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\WUAUSERV
                Value Name: Start
                10
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Windows Defender
                10
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
                Value Name: Userinit
                10
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
                Value Name: Userinit
                10
                MutexesOccurrences
                {7930D12C-1D38-EB63-89CF-4C8161B79ED4}10
                \BaseNamedObjects\{137A1518-4964-635A-544B-7A4CB2C11D0D}10
                \BaseNamedObjects\{137A1A2C-4964-635A-544B-7A4CB2C11D0D}10
                \BaseNamedObjects\{137A2419-4964-635A-544B-7A4CB2C11D0D}10
                \BaseNamedObjects\{137A1A2D-4964-635A-544B-7A4CB2C11D0D}10
                \BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB6991D0D}1
                \BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB4951D0D}1
                \BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB8651D0D}1
                \BaseNamedObjects\{137A1956-4964-635A-544B-7A4CB6891D0D}1
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                208[.]100[.]26[.]2519
                172[.]217[.]12[.]1429
                46[.]165[.]254[.]2149
                89[.]185[.]44[.]1004
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                ryfgpvevpka[.]com9
                FXOPHXMRRY[.]COM9
                rijyjgrqrod[.]com9
                wqebvfqhvdwd[.]com9
                xkfkhlwxmy[.]com9
                hpujpcor[.]com9
                msdsspdwrtmjjjrgeew[.]com9
                hwlfiogofk[.]com9
                yogtmphumejfhm[.]com9
                ATIUTTVAQR[.]COM9
                MKYJFUMSG[.]COM9
                okjndyeu3017uhe[.]com9
                JIFGMEOA[.]COM9
                xfqtdsyao[.]com9
                vbtwrlpdfbcvqgrfxa[.]com9
                ifshcrwujqprjwuwt[.]com9
                TTGFETOSRTL[.]COM9
                bujynaslvjlmf[.]com9
                gyjijwyrhwyugui[.]com9
                urjpwtnytfyiaaly[.]com9
                fqxonymdkdmjjfceuf[.]com9
                PLOOWSETHQB[.]COM9
                hkdagrtomfuev[.]com9
                yephjhhcg[.]com9
                OHEFDIGIK[.]COM9
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                \Boot\BCD10
                \Boot\BCD.LOG10
                %LOCALAPPDATA%\Microsoft\Windows\UsrClass.dat10
                %LOCALAPPDATA%\Microsoft\Windows\UsrClass.dat.LOG110
                %HOMEPATH%\NTUSER.DAT10
                %HOMEPATH%\ntuser.dat.LOG110
                %LOCALAPPDATA%\bolpidti10
                %LOCALAPPDATA%\bolpidti\judcsgdy.exe10
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\judcsgdy.exe10
                \Device\HarddiskVolume310
                %SystemRoot%\bootstat.dat10
                %TEMP%\guewwukj.exe10
                %TEMP%\yowhywvr.exe10
                %HOMEPATH%\Local Settings\Application Data\hmqphkgx\pseqpmjy.exe10
                %HOMEPATH%\Local Settings\Application Data\jpnfmrvn.log10
                %HOMEPATH%\Start Menu\Programs\Startup\pseqpmjy.exe10
                %ProgramData%\wtvakgao.log10

                File Hashes

                00848dceedd7c2271a182e97c8e5ad7c947af0350f4dc2ace6f600d1f1eaf9c8 07f659c6e3ac188112a9cbec06ed454711f8450b4cef0b59c95a8db0acfe8137 1a82f19a88827586a4dd959c3ed10c2c23f62a1bb3980157d9ba4cd3c0f85821 2a4d1cdf8ceb39bcdd782e2fca4c01390218ad32862d0df40eac079875dfdf89 2e6bebb485ed1ac9bf88e8fa2bb54fe0493e792771d33876b229008b13d4a85f 3fdedad406e3f100e8a216ae7477366a47998f14893adf97f647777c692e4151 5943564ab3d38d4a9a0df32352dd5d2b04ccb76294e68a5efcbad5745d397de3 8ab75a0bc7167646928afd8eea3c3450f2c9529e7d58ed2a87f4f32885017f30 f18fba4d2779d4407f522bf5a9287e9b9117c92aa92bcaa843f69cf842e1d7d5 ff66f9cf0c4ffa299fff1b03a92daa2070087301ea89cba2c03d58a9480fa843

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WSAThis has coverage

                Screenshots of Detection

                AMP



                ThreatGrid



                Umbrella




                Win.Dropper.TrickBot-7003081-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\Policies\Microsoft\Windows Defender 9
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Users\Administrator\AppData\Roaming\services\
                9
                <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                Value Name: C:\Users\Administrator\AppData\Roaming\services\
                9
                <HKLM>\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions 9
                <HKLM>\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths 9
                <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
                Value Name: Blob
                2
                MutexesOccurrences
                316D1C7871E009
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                116[.]203[.]16[.]953
                194[.]87[.]94[.]2253
                104[.]20[.]16[.]2422
                82[.]146[.]48[.]2412
                194[.]87[.]93[.]842
                216[.]239[.]34[.]211
                216[.]239[.]36[.]211
                198[.]27[.]74[.]1461
                52[.]202[.]139[.]1311
                82[.]146[.]48[.]441
                82[.]202[.]226[.]1891
                78[.]155[.]199[.]1241
                195[.]133[.]147[.]1401
                209[.]205[.]188[.]2381
                73[.]252[.]252[.]621
                185[.]21[.]149[.]411
                67[.]209[.]219[.]921
                80[.]87[.]198[.]2041
                195[.]88[.]209[.]1281
                82[.]202[.]236[.]841
                179[.]43[.]160[.]451
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                ip[.]anysrc[.]net3
                icanhazip[.]com2
                myexternalip[.]com1
                ipecho[.]net1
                checkip[.]amazonaws[.]com1
                wtfismyip[.]com1
                Files and or directories createdOccurrences
                %TEMP%\4rQ7ipw10
                Modules9
                client_id9
                group_tag9
                %System32%\Tasks\services update9
                %APPDATA%\services\client_id9
                %APPDATA%\services\group_tag9
                %SystemRoot%\TEMP\4rQ7ipw9
                %APPDATA%\services9
                %TEMP%\nsb246C.tmp\System.dll1
                %TEMP%\nsgFCA0.tmp1
                %SystemRoot%\TEMP\nshF273.tmp1
                %TEMP%\nsg6A03.tmp\System.dll1
                %SystemRoot%\TEMP\nswC349.tmp1
                %SystemRoot%\TEMP\nswC349.tmp\System.dll1
                %SystemRoot%\TEMP\nsn69F3.tmp1
                %SystemRoot%\TEMP\nsn6A42.tmp1
                %SystemRoot%\TEMP\nsn6A42.tmp\System.dll1
                %SystemRoot%\TEMP\nsc1020.tmp1
                %SystemRoot%\TEMP\nss107F.tmp1
                %SystemRoot%\TEMP\nssDD4E.tmp1
                %SystemRoot%\TEMP\nss107F.tmp\System.dll1
                %SystemRoot%\TEMP\nssDD9D.tmp1
                %APPDATA%\services\67ff09786g26g98gef29fgb5035370fb293gb44g2d766fb0gff228fge797gbb6.exe1
                %SystemRoot%\TEMP\nssDD9D.tmp\System.dll1
                *See JSON for more IOCs

                File Hashes

                357b2a34ad3496df379c3ad774fa3be01969472363a53defb2642119ac1a8f51 57ee09685f15f98fde19efb4024260eb192fb33f1c755eb0fee118efd797fbb5 65ea62aa3ed8bb08e2519bb0cc54f39dde625e11517ef43f1ce9acf306df412f 664c4f020f49f18b5d4cb6952184a9f2472bfbc41d4922e8c43d8c8db3411930 a690c57af967f33edfd3e34448af5a3d0aeb6885262d1dec9150debb404241d0 a7e40660025a2f92bf5b27a429c2a65038932203d7d6c33168f01c47b34868fa bd60a69a384090fbdf9c03ae483e5e3eddcfdbfb7d8d5ebee7d106a2e21d86e4 c2e6cb0575738459478d51904bf70fe81fc44c88b560e45b06a74571dcfbf83f dde71d9ec99bef73f61f841af134463fc1e494522c35fa8534a668337082f107 e5a25723b4386688017c8a808488f7827c526b4848a05b23a85a65ed398fd035 fafa057ebb741166e290c0864d2392e34700a1fb2147e7d4817295db9adaaddb

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WSA N/A

                Screenshots of Detection

                AMP



                ThreatGrid




                Win.Malware.RevengeRAT-7004697-0

                Indicators of Compromise

                MutexesOccurrences
                RV_MUTEX-BtNHuiGGjjtn37
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                79[.]134[.]225[.]835
                105[.]112[.]96[.]5127
                91[.]221[.]66[.]63
                185[.]244[.]29[.]152
                197[.]210[.]44[.]1571
                105[.]112[.]96[.]1091
                197[.]210[.]55[.]2101
                197[.]210[.]44[.]681
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                mallorca[.]myftp[.]org37
                mbvd[.]hopto[.]org37
                Files and or directories createdOccurrences
                %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\pcwrun.url37
                %APPDATA%\cdosys37
                %APPDATA%\cdosys\aadtb.exe37
                %APPDATA%\cdosys\pcwrun.vbs37
                %HOMEPATH%\Start Menu\Programs\Startup\pcwrun.url25

                File Hashes

                043e6e31d0efe8f818b408a4f38ed07d33ff6c9e3ff5efe33440f426da6c65e9 08255fa9a6461fe91cc3c7cabb4d7cf1d0e34442916989f121c25c007d0e4f4e 14ff9bca2e40edf80f24f64944a187691436d26dec1c57e71c83e2f8d3cf8d83 172c143486841e0e24c436f8cc4548c46afb9db7f6bf52d857795f62b18124fb 1bfb8266eb0284cbda01b9405977691de3abd817d4575285aaef4f5065391ba8 232238e349a632c148ff162e31159a6ba7b19d89f9cdb43027c98c69d03756a9 2ee4332fa127a46c6bff99587d8ec99778a6eaa764d80d1abb874495f27605b5 33faa6cad2fe7aaf15771977673baed989f973cc3b6be562c5caa2de71c7d532 3c0ea80441e2824c506dc57154ccc1123e7c293856ba89c078269177f0bdc940 3f09b3040a82ce439e8147eeb19e109505866982e3a1150a79ea011e53920745 4209a07df4409b81df9fd0bdab4bfd0f45f15ee0acb57be1b28dc7409e7f8417 4e91a567c5de2bc40e9be1fd72065a17f98454f93bceb3c3f6bc01c95880ea8e 5683d55fcbaec725b59770d31bf272cf1aa99b8c1c4955eba6cf23204ebcca79 6db50a7f6a77e354d56b65175024df2baa70e7c161a05b2c876d65c09448f30b 6fb1ef865a16257408e954ca2d917eb50126767b9be5505d5772238b60eed25e 723617156eb76841485e598c6958b4b29261dc78f1187629a5c001f037a92920 75d8713483f5a769d1140c4eef300f27dcd39f3799f1106c3c6600a8dd44cccd 7ef273b2c04c40e249f250a5c12513587ac84125df78c870df5ca17c8833d3c9 82541fd5caae2acdff85558a535874361c3f5d6e2e6c27a821cc3bc4b9b50b35 951b10c3a12ebe5a4923c7ddac5d9b534e717cd86fa29dabd5c67d66dc73418d a41d6ab21b948ce314ec0805d96ea7480da8a3a8de7691501c46cacf7bb2921c a84a57b96eb296cf90c881bb18a19df7930aa114e97c12171ad1b238e45b3d31 a9230c56cec40f3238f21c7a5c5e1b79c63160275eacc814d12d637370e39333 ad9ecaf4f946fe463f98b468049de4563eb4d7666d12338cc7f6d555f4633c2d ba048c20a4e0fb9ae726d05b10cf3097e245a14d2260e43a9f34c4adef004b7b
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AMPThis has coverage
                Cloudlock N/A
                CWSThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WSAThis has coverage

                Screenshots of Detection

                AMP



                ThreatGrid



                Umbrella




                Exploit Prevention

                Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
                Trickbot malware detected - (3094)
                Trickbot is a banking Trojan which appeared in late 2016. Due to the similarities between Trickbot and Dyre, it is suspected some of the individuals responsible for Dyre are now responsible for Trickbot. Trickbot has been rapidly evolving over the months since it has appeared. However, Trickbot is still missing some of the capabilities Dyre possessed. Its current modules include DLL injection, system information gathering, and email searching.
                Atom Bombing code injection technique detected - (2529)
                A process created a suspicious Atom, which is indicative of a known process injection technique called Atom Bombing. Atoms are Windows identifiers that associate a string with a 16-bit integer. These Atoms are accessible across processes when placed in the global Atom table. Malware exploits this by placing shell code as a global Atom, then accessing it through an Asynchronous Process Call (APC). A target process runs the APC function, which loads and runs the shellcode. The malware family Dridex is known to use Atom Bombing, but other threats may leverage it as well.
                Madshi injection detected - (947)
                Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
                Excessively long PowerShell command detected - (904)
                A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
                Kovter injection detected - (583)
                A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
                Dealply adware detected - (545)
                DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
                Process hollowing detected - (528)
                Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
                Gamarue malware detected - (166)
                Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
                PowerShell file-less infection detected - (63)
                A PowerShell command was stored in an environment variable and run. The environment variable is commonly set by a previously run script and is used as a means of evasion. This behavior is a known tactic of the Kovter and Poweliks malware families.
                Installcore adware detected - (40)
                Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.

                Sea Turtle keeps on swimming, finds new victims, DNS hijacking techniques

                $
                0
                0


                By Danny Adamitis with contributions from Paul Rascagneres.

                Executive summary

                After several months of activity, the actors behind the "Sea Turtle" DNS hijacking campaign are not slowing down. Cisco Talos recently discovered new details that suggest they regrouped after we published our initial findings and coverage and are redoubling their efforts with new infrastructure. While many actors will slow down once they are discovered, this group appears to be unusually brazen, and will be unlikely to be deterred going forward.

                Additionally, we discovered a new DNS hijacking technique that we assess with moderate confidence is connected to the actors behind Sea Turtle. This new technique is similar in that the threat actors compromise the name server records and respond to DNS requests with falsified A records. This new technique has only been observed in a few highly targeted operations. We also identified a new wave of victims, including a country code top-level domain (ccTLD) registry, which manages the DNS records for every domain uses that particular country code, that access was used to then compromise additional government entities. Unfortunately, unless there are significant changes made to better secure DNS, these sorts of attacks are going to remain prevalent.


                New DNS hijacking technique

                Talos now has moderate confidence that the threat actors behind Sea Turtle have been using another DNS hijacking technique. This new technique has been used very sparingly, and thus far have only identified two entities that were targeted in 2018, though we believe there are likely more.

                This new technique once again involved modifying the target domain's name server records to point legitimate users to the actor-controlled server. In this case, the actor-controlled name server and the hijacked hostnames would both resolve to the same IP address for a short period of time, typically less than 24 hours. In both observed cases, one of the hijacked hostnames would reference an email service and the threat actors would presumably harvest user credentials. One aspect of this technique that makes it extremely difficult to track is that the actor-controlled name servers were not used across multiple targets — meaning that every entity hijacked with this technique had its own dedicated name server hostname and its own dedicated IP address. Whereas previously reported name server domains such as ns1[.]intersecdns[.]com were used to target multiple organizations.

                In one case, a private organization primarily used a third-party service as their authoritative name server. Then, for a three-hour window in January 2018, their name server records were changed to a name server hostname that mimicked a slightly different version of the organization's name. During that three-hour window, the actor-controlled IP address hosted three hostnames, the two actor-controlled name servers and the webmail hostname. This would allow the threat actors to perform a man-in-the-middle (MitM) attack, as outlined in our previous post, and harvest credentials. This technique was also observed against a government organizations in the Middle East and North African region.

                Continued activity against ccTLD

                The Institute of Computer Science of the Foundation for Research and Technology - Hellas (ICS-Forth), the ccTLD for Greece, acknowledged on its public website that its network had been compromised on April 19, 2019. Based on Cisco telemetry, we determined that the actors behind the Sea Turtle campaign had access to the ICS-Forth network.

                Cisco telemetry confirmed that the actors behind Sea Turtle maintained access to the ICS-Forth network from an operational command and control (C2) node. Our telemetry indicates that the actors maintained access in the ICS-Forth network through at least April 24, five days after the statement was publicly released. Upon analysis of this operational C2 node, we determined that it was also used to access an organization in Syria that was previously redirected using the actor-controlled name server ns1[.]intersecdns[.]com. This indicates that the same threat actors were behind both operations.

                We also saw evidence that the threat actors researched the open-source tool PHP-Proxy. Notably, this particular C2 node searched for both blog.talosintelligence.com and ncsc.gov.uk, presumably to view Talos' previous reports on DNS hijacking and this DNS hijacking advisory from the United Kingdom's National Cyber Security Centre.

                New actor-controlled nameserver

                We recently discovered a new actor-controlled nameserver, rootdnservers[.]com, that exhibited similar behavior patterns as name servers previously utilized as part of the Sea Turtle campaign. The domain rootdnservers[.]com was registered on April 5, 2019 through the registrar NameCheap. The new actor-controlled name server rootdnservers[.]com was utilized to perform DNS hijacking against three government entities that all used .gr, the Greek ccTLD. It's likely that these hijackings were performed through the access the threat actors obtained in the ICS-Forth network. Below is a table showing the three most recent actor-controlled name servers that we have associated with this activity and their current operational status.

                Hostnames
                IP addresses
                Operational Status
                ns1[.]rootdnservers[.]com.
                45[.]32[.]100[.]62
                Active
                ns2[.]rootdnservers[.]com.
                45[.]32[.]100[.]62
                Active
                ns1[.]intersecdns[.]com
                95[.]179[.]150[.]101
                Inactive
                ns2[.]intersecdns[.]com
                95[.]179[.]150[.]101
                Inactive

                New IP addresses associated with man-in-the-middle activity

                By identifying the targeted domains, we were able to identify the hijacked hostnames and the corresponding actor-controlled MitM nodes. The threat actors, again employing previously documented tradecraft, by performing a "certificate impersonation" technique. This is where the threat actors procure an SSL certificate for the targeted hostname from a different SSL provider. Below is a table showing the dates and associated IP addresses.

                Date
                IP address
                April 13, 2019
                95[.]179[.]131[.]225
                April 16, 2019
                95[.]179[.]131[.]225
                April 11, 2019
                95[.]179[.]131[.]225
                April 11, 2019
                140[.]82[.]58[.]253
                April 10, 2019
                95[.]179[.]156[.]61


                Updated victimology


                Since our initial report, Sea Turtle has continued to compromise a number of different entities to fulfill their requirements. We have identified some of the new primary targets as:
                • Government organizations
                • Energy companies
                • Think tanks
                • International non-governmental organizations
                • At least one airport
                In terms of secondary targets, we have seen very similar targets as those previously reported, such as telecommunications providers, internet service providers and one registry.

                Coverage and mitigations

                In order to best protect against this type of attack, we compiled a list of potential actions. We have included additional security recommendations, that were highlighted by Bill Woodcock during his presentations on DNS/IMAP attacks.
                • We recommend implementing multi-factor authentication, such as DUO, to secure the management of your organization's DNS records at your registrar, and to connect remotely to your corporate network via a Virtual Private Network (VPN).
                • Talos suggests a registry lock service on your domain names, which will require the registrar to provide an out-of-band confirmation before the registry will process any changes to an organization's DNS record.
                • DNSSEC sign your domains, either in-house, or using a DNS service provider which performs DNSSEC key-management services.
                • DNSSEC validate all DNS lookups in your recursive resolver, either using in-house nameservers, or a service like Cisco Umbrella / OpenDNS.
                • Make Internet Message Access Protocol (IMAP) email servers accessible only from your corporate LAN and to users who have already authenticated over a VPN.
                • If you suspect you were targeted by this type of activity, we recommend instituting a network-wide password reset, preferably from a computer on a trusted network.
                • Lastly, network administrators can monitor passive DNS record on their domains, to check for abnormalities.

                Indicators of compromise


                IP address
                Characterization
                Date Range
                185[.]64[.]105[.]100
                Operational Node
                March - April 2019
                178[.]17[.]167[.]51
                Operational Node
                June 2019
                95[.]179[.]131[.]225
                Mitm Node
                April 2019
                140[.]82[.]58[.]253
                Mitm Node
                April 2019
                95[.]179[.]156[.]61
                Mitm Node
                April 2019
                196[.]29[.]187[.]100
                Mitm Node
                December 2018
                188[.]226[.]192[.]35
                Mitm Node
                January 2018
                ns1[.]rootdnservers[.]com
                Actor-controlled nameserver
                April 2019
                ns2[.]rootdnservers[.]com
                Actor-controlled nameserver
                April 2019
                45[.]32[.]100[.]62
                Hosted malicious nameserver
                April 2019
                ns1[.]intersecdns[.]com
                Actor-controlled nameserver
                February - April 2019
                ns2[.]intersecdns[.]com
                Actor-controlled nameserver
                February - April 2019
                95[.]179[.]150[.]101
                Hosted malicious nameserver
                February - July 2019


                Microsoft Patch Tuesday — July 2019: Vulnerability disclosures and Snort coverage

                $
                0
                0

                Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday covers 77 vulnerabilities, 16 of which are rated “critical," 60 that are considered "important" and one "moderate."

                This month’s security update covers security issues in a variety of Microsoft’s products, including the Chakra scripting engine, Internet Explorer and the Windows Server DHCP service. For more on our coverage of these bugs, check out the SNORT® blog post here, covering all of the new rules we have for this release.

                Critical vulnerabilities

                Microsoft disclosed 16 critical vulnerabilities this month, nine of which we will highlight below.

                CVE-2019-0785 is a memory corruption vulnerability in the Windows Server DHCP service. The bug arises when specially crafted packets are sent to a DHCP failover server. A malicious user could exploit this vulnerability by sending a specially crafted packet to a DHCP over failover mode. This could allow them to gain the ability to run arbitrary code on the DHCP failover server or cause the DHCP server to become unresponsive.

                CVE-2019-1001 and CVE-2019-1004 are both memory corruption vulnerabilities that exist in the way the scripting engine handles objects in memory in Microsoft browsers. These bugs could corrupt memory on machines in such a way that attackers could gain the ability to execute arbitrary code in the context of the current user. An attacker could exploit these bugs by tricking a user into visiting a specially crafted, malicious web page through Internet Explorer. They could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that uses the Internet Explorer-rendering engine.

                CVE-2019-1062, CVE-2019-1092, CVE-2019-1103, CVE-2019-1106 and CVE-2019-1107 are all memory corruption vulnerabilities in the Chakra Scripting Engine that could allow an attacker to gain the ability to execute arbitrary code on the victim's machine. An attacker could exploit these bugs by tricking a user into visiting a specially crafted, malicious web page on Microsoft Edge, or by visiting a site with attacker-created content.

                CVE-2019-1113 is a remote code execution vulnerability in the .NET Framework. The vulnerability exists in the way the software checks the source markup of a file. An attacker could exploit this vulnerability by supplying the user with a specially crafted file, and then tricking them into opening it using an affected version of the .NET Framework. An attacker could then gain the ability to execute arbitrary code in the context of the current user.

                The other critical vulnerabilities are:

                              Important vulnerabilities

                              This release also contains 60 important vulnerabilities, one of which we will highlight below.

                              CVE-2018-15664 is an elevation of privilege vulnerability in Docker that affects Microsoft Azure internet-of-things edge devices and Azure Kubernetes Service. The bug allows a malicious or compromised container to acquire full read/write access on the host operating system where the container is running. While a fix is still ongoing in Docker, Microsoft recommends customers do not use the Docker copy command on their AKS clusters and the Azure IoT devices.

                              The other important vulnerabilities are:

                              Moderate vulnerability

                              There is one moderate vulnerability, CVE-2019-1075, which is an information disclosure vulnerability in Windows Event Manager.

                              Coverage 

                              In response to these vulnerability disclosures, Talos is releasing the following SNORTⓇ rules that detect attempts to exploit them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Firepower customers should use the latest update to their ruleset by updating their SRU. Open Source Snort Subscriber Rule Set customers can stay up-to-date by downloading the latest rule pack available for purchase on Snort.org.

                              Snort rules: 45142, 45143, 46548, 46549, 49380, 49381, 50198, 50199, 50662 - 50683
                              Viewing all 2039 articles
                              Browse latest View live


                              <script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>