Quantcast
Channel: Cisco Talos Blog
Viewing all 2026 articles
Browse latest View live

Divergent: "Fileless" NodeJS Malware Burrows Deep Within the Host

$
0
0

Executive summary


Cisco Talos recently discovered a new malware loader being used to deliver and infect systems with a previously undocumented malware payload called "Divergent." We first dove into this malware after we saw compelling data from Cisco Advanced Malware Protection's (AMP) Exploit Prevention.

This threat uses NodeJS— a program that executes JavaScript outside of a web browser — as well as the legitimate open-source utility WinDivert to facilitate some of the functionality in the Divergent malware. The use of NodeJS is not something commonly seen across malware families.

The observed malware campaigns associated with Divergent feature the use of persistence techniques most commonly associated with "fileless" malware, leaving behind few artifacts for researchers to look at. This malware can be leveraged by an attacker to target corporate networks and appears to be primarily designed to conduct click-fraud. It also features several characteristics that have been observed in other click-fraud malware, such as Kovter.

Technical Details


Talos has identified a new moduler malware that is being used to facilitate the installation of a previously undocumented malware family, which we are referring to as Divergent, due to the naming convention used by the malware during variable declaration and the creation of environment variables. While we were unable to determine the delivery mechanism used, we were able to perform analysis of the malware loader as well as the Divergent malware that it is used to install on victim systems. Divergent is a malware family designed to generate revenue for attackers via the use of click-fraud, similar to other click-fraud malware such as Kovter. Technical details associated with both the installation and operation of the Divergent malware are described in the following sections.

Installation


The malware has many similarities with other popular fileless malware families, particularly Kovter. Like Kovter, it relies heavily on the registry for staging and storage of configuration data while avoiding more traditional on-access endpoint scanning of files on disk. It also uses a key in the registry to maintain persistence, and relies on PowerShell to install itself on the infected host.

When first delivered and executed on a victim's machine, the malware is in the portable executable (PE) format. Its first task, however, is to install itself to the system in a less suspicious form, namely as an HTML Application (HTA) that will load the malware from the registry.

Installation begins by creating several registry keys containing the different parts of the loader as well as the data of the malware PE. The malware reads all the information embedded in its data section and creates three new randomly named registry keys, each holding a different stage of the loader code needed to execute the malware PE using reflective injection.

Next, the HTA loader is written to the CSIDL_COMMON_APPDATA folder (typically C:\ProgramData\) and set to execute each time the user logs on by adding an entry to the "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" registry key.

An example of an HTA loader and the accompanying registry entries necessary to execute the malware once installed are:
  • 17T21vYHOb.hta :: e4a49af295d6e61877a458a014fe63b733be942c506496b53070aa3d9ca421d8
  • ZfjrAilGdH.reg :: 5863f35959aa542a27319e098f40166f3ace09d265f4ec6d739318c0b739745e

This registry file contains the following subkeys in the key HKLM\Software\ZfjrAilGdH which are set by the installation process (the key names are randomly generated and will be different for each installation):
  • Lvt4wLGLMZ :: JScript executed by ZfjrAilGdh.hta
  • kCu2DZ9WI0 :: PowerShell used to reflectively inject the malware
  • 4FLJBnefsN :: hex data representing the malware PE

Fileless malware loader

The HTA is heavily obfuscated but when cleaned up, evaluates to an eval of the JScript in the registry key "HKLM\Software\ZfjrAilGdh\Lvt4wLGLMZ" via a "ActiveXObject.WScript.Shell.RegRead" (shown here as pseudo code):
The JScript in the reg key executes the following powershell (shown here deobfuscated):
This code will execute the code found in the registry location HKLM\Software\ZfjrAilGdH\kCu2DZ9WI0 after setting the variable regkeyname to the data found in the registry location HKLM\Software\ZfjrAilGdH\4FLJBnefsN. The registry key 4FLJBnefsN contains the bytes of the malicious portable executable (PE) with a modified DOS header, namely the MZ has been replaced with null bytes.

The code from kCu2DZ9WI0 is a version of PowerShell Empire's reflective PE injection script that will inject the malware:
At this point, the malware executes.

Divergent malware

There are two main parts of this threat: one to receive and execute commands from a C2 server and another to execute external component scripts. The configuration for each part is stored in the registry in JSON format.

The component configuration describes which components should be executed and how. This example configuration will execute three different JScript components:
Each entry is parsed, and each filename and args value is passed along for execution by the malware. Detailed analysis of the call_03 (see Now I See You), all_socks_05 (see Click Fraud), and block_av_01 (see Block AV Component) components can be found below.

The network configuration stores two classes of C2: "accl" is a list of URLs that the malware should attempt to contact for system information delivery and for commands to execute, while "acll" is a list of URLs the malware should attempt to contact for possible updates to either configuration file. The default values from ZfjrAilGdH.reg are:
Notice that "version" is an epoch timestamp, converting to Saturday, March 30, 2019 7:14:29 PM GMT. The earliest reference we found containing several IOCs from this malware sample dates back to February 2019.

Once executed, the malware begins with five anti-analysis checks. If any of these checks fail, a beacon is sent to a static URL containing a direct IP and sleeps indefinitely:
The beacon message indicates which anti-analysis check failed to pass. The malware checks for unwanted processes and loaded modules by hashing process file names and module names respectively, then comparing each hash against two separate pre-computed lists for each. The lists contain hashes for endpoint security software and hypervisor services as running the sample under both scenarios failed these checks. It also checks for a host CPU with at least two cores, the presence of a debugger, and finally compares system uptime intervals to determine if the sample is running within a sandbox or virtual machine.

If the process is running with the appropriate privileges, it uses WMI (Windows Management Instrumentation) to query recognized anti-virus software installed on the host. In particular, it's looking for the antivirus software Windows Defender. If found, it proceeds to disable various components of Windows Defender and Windows Updates.
Once completed, it attempts to bypass UAC using CMSTP, if needed. Additional code is executed to check for any updates to the malware's two configuration files. Empty POST requests are sent to each of the URLs in the first configuration's accl key. These URLs are later contacted with a comprehensive set of sensitive information from the host. Most are non-responsive but still online. Many appear to be, or once were, compromised hosts used for the C2 network.

The set of direct IP URLs found in the first configuration's acll key are contacted until one server responds back with a configuration update. A response containing an RC4 encrypted update to the first of the malware's configurations in the Registry. In this sample, the RC4 key "seiC4aimaish9zah8kah" is static, and decryption results in a lengthier update for the first configuration:
The data is stored in the pre-existing registry subkey to update the value (in this example, HKLM\SOFTWARE\ZfjrAilGdH\194956). As of Sept. 9, 2019, the version timestamp for the latest config pulled was Thursday, Aug. 29, 2019 11:50:19 a.m.

The second configuration is stored in the last remaining value in the ZfjrAilGdH registry subkey (HKLM\SOFTWARE\ZfjrAilGdH\2177774). Default values mentioned near the beginning of this section remained in use during runtime.

The primary flow of the malware code reaches an end but repeats select tasks every 90 minutes. It continues to check for configuration updates, continues to send encrypted sensitive information from the infected host, and continues to process any C2 responses that might contain additional commands to execute. The following commands and parameters are supported by the C2 protocol used by Divergent:
  • killall: Terminate all processes initiated by the malware, delete corresponding files
  • kill: Find process of specified component, terminate process, and delete the file
  • stop: Find process of specified component, terminate process
  • resume: Given pre-existing component, execute file
  • modules: From the same response data, pull additional configuration data from the following keys:
    • name
    • filename
    • args
    • version
    • type
    • download
    • Key
Using this data, the malware sends additional requests to download each specified file. The files are written to disk and executed.

  • update: From the same response data, pull additional configuration data from the following keys:
    • filename
    • download
    • Key
Same as the modules command, the malware sends additional requests to download each specified file. Each file is written to disk and executed. Finally, the task deletes the Registry data stored in its subkey (handles both HKCU and HKLM).

The command update_interval modifies the main thread's sleep counter for the ending loop (the default time is 90 minutes).

Components

Block AV component


The block_av_01 component attempts to block anti-virus software from receiving updates by blocking all outbound TCP connections on port 80 and port 443. With older revisions of this malware package, this functionality was delivered via a JScript file named bav01.js but in newer versions, this has been seen delivered by PowerShell in the fake PNG trpl.png (see Fake PNG PowerShell Delivery).

This installation script starts by creating a new folder (e.g. SystemConfigInfo000) to hold the files necessary for execution. The two files to be installed are WinDivert.dll and either WinDivert32.sys or WinDivert64.sys, depending on the host CPU architecture. These are the legitimate WinDivert binaries and are used by the malware to create its packet filter.

The WinDivert binaries are embedded in bav01.js as comments and written to disk with .b64 extensions. The following is the code to retrieve the embedded resource named arch5 from the script, embedded in a comment block in the format /*[<resource name>[resource data]]*/:
Each WinDivert binary is then decoded from base64 using the Windows Certificate Services utility certutil.exe. For example:
This script is set to execute as a task each time the computer starts. This is accomplished by creating a scheduled task with a random-looking service name that is set to run as the SYSTEM user at the highest run level:
Next, the following PowerShell command is executed (shown here decoded) to execute the base64 encoded PowerShell commands in the environment variable 'nttyuuyt':
The 'nttyuuyt' environment variable was set by bav01.js previously and contains a base64 encoded PE and the PowerShell commands necessary to reflectively inject this executable (truncated for readability):
At this point in the script, installation is complete and the PE-based module to block anti-virus HTTP/HTTPS connections is loaded.

To achieve its anti-virus blocking, the reflectively loaded PE periodically checks the names of all running processes against a predefined list. If any process names appear in the list, the PIDs are added to the filter string passed to WinDivertOpen which will block all traffic to that process on remote ports 80 or 443. An example filter string is:

((processId=620 or processId=736) and (remotePort==80 or remotePort==443))

Example process names that would be blocked include msmpeng.exe (Windows Defender) and svchost.exe.

Click Fraud

The all_socks component is a NodeJS-based Socket.IO client that is commanded to navigate to arbitrary web pages by the attacker ostensibly for monetization and click fraud purposes. With older revisions of this malware package this functionality was delivered via a JScript file named either 04sall.js or 05sall.js, but in newer versions this has been seen delivered by PowerShell in the fake PNG strpk.png (see Fake PNG PowerShell Delivery).

Like the anti-virus blocking component, the click fraud component makes use of the WinDivert library and therefore installs the necessary WinDivert DLL and driver in the same manner as bav01.js, described above. Additionally, the NodeJS executable and a NodeJS Socket.IO client named app.js are part of the installation process for this component. Older versions of this component also installed two executables, divergent.exe and mdivergent.exe, however in later versions, these are executed from memory via reflective PE injection.

The malicious NodeJS application, seen either as app.js or init.js, is a simple Socket.IO client that takes a base64 encoded IP address as its only parameter.

node.exe app.js <base64 encoded IP>

In all samples we have encountered, the IP address has been 176.9.117.194 (encoded as MTc2LjkuMTE3LjE5NA==). Upon execution, the malicious NodeJS app will make a request to the IP passed as a parameter:
The response from this server is the address of the next server which the application will connect to. This new connection uses Socket.IO web sockets to maintain continuous communication between the victim and the server so the server can periodically send commands. The commands sent from this second server contain the host address of an advertisement revenue service and the entire HTTP request that should be made to that server, effectively faking a click on an advertisement link.
To protect themselves from these kinds of fraudulent requests, advertisement monetization services may go to extra lengths to confirm the device making the request is the type of device it claims to be. For example, if the monetization service only expects mobile devices, it may reject requests that have the characteristics of desktop devices. We believe the divergent.exe and mdivergent.exe executables are used by the 04sall.js/05sall.js components to circumvent these kinds of checks (see TCP/IP stack fingerprinting).

The divergent and mdivergent PEs make use of the WinDivert library to intercept and rewrite the first SYN packet of the 3-way TCP handshake for all outgoing connections the infected host attempts to make. The changes made to the SYN packets depend on which executable was used, either divergent.exe or mdivergent.exe; divergent.exe will rewrite the TCP header options to follow the same format as Android devices while mdivergent.exe will rewrite the TCP header options to follow the format as iOS devices. Which version of the divergent executable is used is dependent on the app.js deployment script (either 04sall.js or 05sall.js). These scripts contain code that decides which version should be used depending on a variable named macchance which can be passed to the deployment script as its only parameter. This variable contains the probability that mdivergent.exe will be deployed instead of divergent.exe (the PowerShell parameter, normally base64 encoded, is shown here in its decoded form):
In the code shown above, the variables and and mac correspond to the code necessary to reflectively inject divergent.exe and mdivergent.exe respectively, i.e. and represents Android and mac represents iOS.

For either of these divergent executables to work properly, several changes to the TCP/IP stack on the infected machine must be made; these include setting the TTL to 64, turning on the timestamp TCP header options, and changing the MTU to 1440. Once those changes have been made, the system is forced to reboot with a false message of Critical_Windows_Update:
With these changes made, the divergent executables can perform the necessary modifications to each SYN packet so that they follow the standards of the device the host should be disguised as.

Now I See You


The component named call_03 by the malware's configuration file, which is delivered by the em_02.js and em_03.js scripts, appears to be a means of installing a remote assist tool on the infected machine that would allow the attacker to view and possibly control the victim's computer.

Like the previous components, the PE associated with em_03.js is executed via reflective PE injection, this time with the environment variable fdghjgfdhj.
The PE to be injected is a DLL which, according to its export table, was originally called now_i_see_you.dll. This DLL has a single exported function named VoidFunc which contains all of its functionality. When VoidFunc is executed, it makes an HTTP GET request to the hxxps://uoibppop[.]tk/. It then takes the response from this server and treats it as a new URL to navigate to. Using COM objects, the DLL launches an instance of Internet Explorer, resizes the window to fit the entire screen and navigates to the URL in the response. At the time of analysis, the server was active but did not respond with any data so we were unable to confirm what was being hosted there.

Additionally, the DLL hides the Windows taskbar so the user is more compelled to comply with any instructions on the page that is presented to them. Next, the malware enters a loop looking for a process containing the string gotoassist (older versions also looked for teamviewer), ostensibly for confirming that the user followed the instructions in Internet Explorer by downloading and running the attacker's malware. Once this process is running, the Windows Taskbar is restored to view. A process list is gathered and sent to the URL hxxps://uoibppop[.]tk/clean; no response is expected from the server. The registry key `HKEY_CURRENT_USER\Software\fbsjbdfhsv` is created and the key value `weqr` is set to 1, indicating that execution was successful, then the process exits. Instead of a URL, the attacker has the option to send the word stop to the victim which will cause the DLL to forcefully reboot the infected machine.

While we do not know what URL the victim is intended to navigate to and therefore which program they are to be tricked into running, based on the process names gotoassist and teamviewer and the original DLL name of now_i_see_you.dll, it is likely that the victim is intended to install one of these remote administration software.

Fake PNG PowerShell delivery


Newer versions of the Divergent malware package no longer deliver and execute components as JScript, instead multi-stage PowerShell scripts are used. The first stage will retrieve the second stage from a static URL. The first-stage PowerShell is heavily obfuscated:
Here is our deobfuscated version:
While the requested resource features the extension normally associated with PNG images, it is actually malicious Powershell that has been encrypted using RC4 with the encryption key "raimeey2nu," which was stored in the previous PowerShell (the particular implementation of RC4 used can be found here).

We have encountered following URLs to retrieve the encrypted PowerShell:
  • hxxp://1292172017[.]rsc.cdn77[.]org/images/trpl.png
  • hxxp://1292172017[.]rsc.cdn77[.]org//imtrack/strkp.png
The first URL delivers the PowerShell version of bav01.js and the second delivers the PowerShell version of 05sall.js.

Taking a deeper look at the PowerShell version of 05sall.js, we see Base64 encoded blobs corresponding to binaries associated with WinDivert. Like its JScript counterpart, the Powershell decodes these blobs and saves them to the filesystem location defined by the environment variable %ALLUSERSPROFILE%.
Shellcode stored within the PowerShell is loaded into a new memory region using the Windows API function VirtualAlloc and then executed to continue the infection process:

Conclusion


The malware loader described is currently under active development. Talos has observed multiple versions of the loader being used to install the Divergent malware. Attackers are attempting to monetize these infections through the use of click fraud. The threat landscape is constantly evolving as attackers test new techniques and methodologies to maximize their revenue generation capabilities. Organizations should be aware of these changes and ensure that their security programs are able to remain effective against these changing tactics, techniques, and procedures. This threat is successfully stopped by the Cisco Advanced Malware Protection (AMP) Exploit Prevention engine, and the resulting event data assisted with our analysis of the threat. Talos will continue to monitor the threat landscape to ensure that customers remain protected.

Coverage

Additional ways our customers can detect and block this threat are listed below.


Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors.

Cisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

Email Security can block malicious emails sent by threat actors as part of their campaign.

Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

Indicators of Compromise (IOCs)


The following IOCs have been observed as being associated with these malware campaigns.

HTA Hashes:

47b5dac9152220fbbf122eff89ac93d42e9196f5ab665a2a6d99594246ab8a81
062688aec1bdf1208bd72a77696e1fbcd1076f54bd6e59141ed12b6f8e3ba32c

PE32 Hashes:


c7052f4676102bfe39ab19c227832861caa2959933e296ee1806973619948624
781adc919a705ca3e8a82fe1d1eac68f651c50ba402172aea033eaec7879e932
05fbd38ea0b99621d22ce5f057173fdec40f3dccd63f887e1c301766c6597714
2135acda2d2739773fbb827e8d180ac901c040d2f071127bb597a714591672cd
72b6a8bf9598bd445e26a04ab58be62ed3941fb1fe4cf4a094a6272a77b66009
ba04eacaa80bb5da6b02e1e7fdf3775cf5a44a6179b2c142605e089d78a2f5b6
a82dd93585094aeba4363c5aeedd1a85ef72c60a03738b25d452a5d895313875
2f4a9ef2071ee896674e3da1a870d4efab4bb16e2e26ea3d7543d98b614ceab9
77498f0ef4087175aa85ce1388f9d02d14aaf280e52ce7c70f50d3b8405fea9f
b2d29bb9350a0df93d0918c0208af081f917129ee46544508f2e1cf30aa4f4ce
bf2cdd1dc2e20c42d2451c83b8280490879b3515aa6c15ab297419990e017142
ba04eacaa80bb5da6b02e1e7fdf3775cf5a44a6179b2c142605e089d78a2f5b6
a7656ccba0946d25a4efd96f4f4576494d5f1e23e6ad2acc16d2e684656a2d4f
607b2f3fd1e73788a4d6f5a366c708dbb12d174eba9863ade0af89ca40e1fdba

URLs:

hxxps://1292172017[.]rsc[.]cdn77[.]org/images/trpl.png
hxxps://1292172017[.]rsc[.]cdn77[.]org/imtrack/strkp.png

Mutexes:

Global\Divergent
Global\CreatorsPatch
Global\LocalLow7

IP Addresses:


95[.]70[.]244[.]209
13[.]228[.]224[.]121
54[.]241[.]31[.]99
103[.]31[.]4[.]11
103[.]31[.]4[.]54
198[.]41[.]128[.]74
198[.]41[.]128[.]55
131[.]0[.]72[.]36
131[.]0[.]72[.]59
188[.]114[.]96[.]87
188[.]114[.]96[.]116
43[.]250[.]192[.]98
43[.]250[.]192[.]87
217[.]160[.]231[.]125
208[.]91[.]197[.]25
184[.]168[.]221[.]42
103[.]224[.]248[.]219
31[.]31[.]196[.]120
217[.]160[.]223[.]93
103[.]224[.]248[.]219
184[.]168[.]221[.]45
119[.]28[.]87[.]235
23[.]227[.]38[.]32
50[.]63[.]202[.]39
216[.]239[.]34[.]21
83[.]243[.]58[.]172
5[.]9[.]41[.]178
88[.]198[.]26[.]25
62[.]75[.]189[.]110
109[.]239[.]101[.]62
107[.]186[.]67[.]4
184[.]168[.]221[.]63
45[.]55[.]154[.]177
104[.]28[.]2[.]169
202[.]56[.]240[.]5
89[.]163[.]255[.]171
185[.]243[.]114[.]111


Threat Roundup for September 20 to September 27

$
0
0
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Sept. 20 and Sept. 27. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
The most prevalent threats highlighted in this roundup are:
Threat NameTypeDescription
Doc.Downloader.Emotet-7181535-0 Downloader Emotet is a banking trojan that has remained relevant due to its continual evolution to better avoid detection. It is commonly spread via malicious emails. It recently resurfaced after going quiet over the summer of 2019.
Win.Ransomware.Shade-7178907-1 Ransomware Shade, also known as Troldesh, is a ransomware family typically spread via malicious email attachments.
Win.Dropper.Cerber-7174760-0 Dropper Cerber is ransomware that encrypts documents, photos, databases and other important files. Historically, this malware would replace files with encrypted versions and add the file extension ".cerber," although in more recent campaigns, this is no longer the case.
Win.Dropper.Kovter-7173679-0 Dropper Kovter is known for it's fileless persistence mechanism. This family of malware creates several malicious registry entries which store its malicious code. Kovter is capable of reinfecting a system even if the file system has been cleaned of the infection. Kovter has been used in the past to spread ransomware and click-fraud malware.
Win.Malware.Zusy-7173469-1 Malware Zusy, also known as TinyBanker or Tinba, is a trojan that uses man-in-the-middle attacks to steal banking information. When executed, it injects itself into legitimate Windows processes such as "explorer.exe" and "winver.exe." When the user accesses a banking website, it displays a form to trick the user into submitting personal information.
Win.Packed.Tofsee-7171939-0 Packed Tofsee is multi-purpose malware that features a number of modules used to carry out various activities such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages in an effort to infect additional systems and increase the overall size of the botnet under the operator’s control.

Threat Breakdown

Doc.Downloader.Emotet-7181535-0

Indicators of Compromise

Registry KeysOccurrences
<HKCR>\INTERFACE\{8BD21D12-EC42-11CE-9E0D-00AA006002F3} 31
<HKCR>\WOW6432NODE\INTERFACE\{8BD21D22-EC42-11CE-9E0D-00AA006002F3} 31
<HKCR>\INTERFACE\{8BD21D22-EC42-11CE-9E0D-00AA006002F3} 31
<HKCR>\WOW6432NODE\INTERFACE\{8BD21D32-EC42-11CE-9E0D-00AA006002F3} 31
<HKCR>\INTERFACE\{8BD21D32-EC42-11CE-9E0D-00AA006002F3} 31
<HKCR>\WOW6432NODE\INTERFACE\{8BD21D42-EC42-11CE-9E0D-00AA006002F3} 31
<HKCR>\INTERFACE\{8BD21D42-EC42-11CE-9E0D-00AA006002F3} 31
<HKCR>\WOW6432NODE\INTERFACE\{8BD21D52-EC42-11CE-9E0D-00AA006002F3} 31
<HKCR>\INTERFACE\{8BD21D52-EC42-11CE-9E0D-00AA006002F3} 31
<HKCR>\WOW6432NODE\INTERFACE\{8BD21D62-EC42-11CE-9E0D-00AA006002F3} 31
<HKCR>\INTERFACE\{8BD21D62-EC42-11CE-9E0D-00AA006002F3} 31
<HKCR>\WOW6432NODE\INTERFACE\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F} 31
<HKCR>\INTERFACE\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F} 31
<HKCR>\WOW6432NODE\INTERFACE\{7B020EC7-AF6C-11CE-9F46-00AA00574A4F} 31
<HKCR>\INTERFACE\{7B020EC7-AF6C-11CE-9F46-00AA00574A4F} 31
<HKCR>\WOW6432NODE\INTERFACE\{4C5992A5-6926-101B-9992-00000B65C6F9} 31
<HKCR>\INTERFACE\{4C5992A5-6926-101B-9992-00000B65C6F9} 31
<HKCR>\WOW6432NODE\INTERFACE\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D} 31
<HKCR>\INTERFACE\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D} 31
<HKCR>\WOW6432NODE\INTERFACE\{47FF8FE0-6198-11CF-8CE8-00AA006CB389} 31
<HKCR>\INTERFACE\{47FF8FE0-6198-11CF-8CE8-00AA006CB389} 31
<HKCR>\WOW6432NODE\INTERFACE\{47FF8FE2-6198-11CF-8CE8-00AA006CB389} 31
<HKCR>\INTERFACE\{47FF8FE2-6198-11CF-8CE8-00AA006CB389} 31
<HKCR>\WOW6432NODE\INTERFACE\{47FF8FE3-6198-11CF-8CE8-00AA006CB389} 31
<HKCR>\INTERFACE\{47FF8FE3-6198-11CF-8CE8-00AA006CB389} 31
MutexesOccurrences
Global\I98B68E3C31
Global\M98B68E3C31
5CAC3FAB-87F0-4750-984D-D50144543427-VER152
Local\{F99C425F-9135-43ed-BD7D-396DE488DC53}2
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
74[.]208[.]236[.]14531
190[.]158[.]19[.]14127
139[.]5[.]237[.]2727
5[.]45[.]108[.]1468
86[.]109[.]99[.]70/318
17[.]36[.]205[.]747
173[.]194[.]68[.]108/317
195[.]114[.]1[.]1817
82[.]223[.]190[.]138/317
181[.]123[.]0[.]1257
80[.]94[.]2[.]2337
217[.]116[.]0[.]2376
62[.]149[.]157[.]556
195[.]20[.]225[.]1716
173[.]194[.]175[.]108/315
201[.]214[.]74[.]715
212[.]227[.]15[.]1584
182[.]50[.]144[.]844
193[.]70[.]18[.]1444
193[.]17[.]41[.]994
212[.]227[.]15[.]1424
162[.]210[.]102[.]1994
212[.]227[.]15[.]1354
217[.]116[.]0[.]2284
62[.]149[.]128[.]424
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
otc-manila[.]com31
smtp[.]mail[.]me[.]com7
smtp[.]movistar[.]es7
mail[.]tradeus[.]eu7
mail[.]serviciodecorreo[.]es6
smtp[.]1and1[.]es6
imap[.]1und1[.]de6
smtp[.]serviciodecorreo[.]es6
mail[.]aruba[.]it6
mail[.]ionos[.]es6
mail[.]gwiazdeczka[.]pl6
smtp[.]outlook[.]com5
pop-mail[.]outlook[.]com5
smtpout[.]secureserver[.]net5
smtp[.]1und1[.]de5
imap[.]serviciodecorreo[.]es5
mail[.]zenithexperience[.]es5
mail[.]comcast[.]net4
mail[.]1und1[.]de4
pop[.]asia[.]secureserver[.]net4
smtp[.]orange[.]fr4
ssl0[.]ovh[.]net4
poczta[.]o2[.]pl4
smtp[.]aruba[.]it4
mbox[.]freehostia[.]com4
*See JSON for more IOCs
Files and or directories createdOccurrences
%HOMEPATH%\657.exe31
\REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8BD21D10-EC42-11CE-9E0D-00AA006002F3}1
%SystemRoot%\SysWOW64\gcycF3Sb1.exe1
%SystemRoot%\SysWOW64\qoOwTVXh.exe1
%SystemRoot%\SysWOW64\gMVKv3.exe1
%TEMP%\CVRF2C.tmp1
%TEMP%\CVRB39.tmp1
%TEMP%\CVRDF3.tmp1

File Hashes

075a45f9c68a9f5af201e7863394c91cf5a1f939d2a6b21fbd9c749c0a10696f 291a9820bceb930a4106c341c6bb37f2242b5ca0c653923db92dcac50d9c953f 2926d350ee2037949c36a19aca959b8404626f09d32bf930cf9b218424f7cf27 2991af9ecbba0ae304f43ab19ba172ef2ff18345b5fd8f7abc4bc4e2b0a775b3 2a078275cdeb69e448bd7cea359ce34c05ab028713357df0b70448dcdb9f8f0c 3e390763b85cd1322e1fe528ab15923df480ce1f2dabff373bfc67ed8d0d5aa7 5855ccd73204841b2e32d2cd93598ef8b5e0698abc5a8cea26b7e14b279a7448 5a8c51d22698e05215e2f3fdc50a14342fb3108acf6bde761c87d9ae2106d5d1 5c221d09b195901d9435a897f131cb06b9c88bc24d34f7effe2168a66bf935cc 6a8beeef74251f9d91d1965649cabfd7f9840e4ba63259c91c8ecd9020cdda45 6bf59378b0897e410d4d9faa0a23d22e6e96ebedbe3d543338d1f9f3d9c3f21a 742719dfdde109a1cff437941a1f14d8eb3a844a22da6c010d09b835366bb2dd 777d585b5e7e30bce1d8e8e343a007e9d0b6e4f45afa9f415b3fb8b3296a50f0 77d0c4316554e2f7c78b7554f0d067c210c242cb0150a8a1aa3ab4b0d6ccc9df 7a375d0966ac0053e566827ddd3a6c9d2f8251f2a754f0502a61a89f98a94ea9 83f74cedc1e06f0b2377df8d41e67ed0273948888705fbe391e1d82849c54330 8ce63dc6baa9a80c3913d462bdb19fc1bc1ba635bde1d5a6c26fc5f7cf325ea4 a44828c3d4266e7b6518fb6be06907d6d9de2c48546d7ea2c73c2fed3f3fa75c a88780c026c4094e0580a2ab21118b96dab08e00d1935bd6fae2946fd81bdb03 b1d366a828f6eb91a08dd023aa98f2b8b9737497eff937e2d169e5a6b6377d25 b637cedefc7244a8a84bede6eb7733803744f4ac140ed368da9a64c06e98dc28 ba3f8c880453fc3cd667709325895c93cfe6a1e371456c58336e6bb7455668dc c19c5960f37853a5f2db86cc749593dd98b124ddd21d39b8ca53c921389a0bd6 c4c30e304d232b9b5cf276d9534675dff3a541ee41b271fed54a37b3f1fd9aef cbb3ac37b40296794f6f30dd6efc2a9cb3cc35f2438b8ba89f14b58971e14d26
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella


Malware




Win.Ransomware.Shade-7178907-1

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION
Value Name: xi
155
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Client Server Runtime Subsystem
155
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION
Value Name: xVersion
155
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32 154
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION 154
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION
Value Name: xmode
76
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION
Value Name: xpk
76
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION
Value Name: xstate
76
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION
Value Name: shst
75
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION
Value Name: sh1
75
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION
Value Name: shsnt
73
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER
Value Name: CleanShutdown
36
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APPLETS\SYSTRAY
Value Name: Services
26
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\TELEPHONY
Value Name: DomainName
13
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\TELEPHONY
Value Name: TAPISRVSCPGUID
13
<HKLM>\SOFTWARE\WOW6432NODE\SYSTEM32\CONFIGURATION
Value Name: xmail
9
MutexesOccurrences
GeneratingSchemaGlobalMapping64
cversions.2.m35
Global\47348ae1-defe-11e9-a007-00501e3ae7b51
Global\f1f16ad1-df02-11e9-a007-00501e3ae7b51
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
66[.]171[.]248[.]17875
128[.]31[.]0[.]3957
208[.]83[.]223[.]3456
194[.]109[.]206[.]21253
154[.]35[.]32[.]552
76[.]73[.]17[.]19451
171[.]25[.]193[.]950
193[.]23[.]244[.]24446
86[.]59[.]21[.]3846
131[.]188[.]40[.]188/3146
132[.]148[.]98[.]11619
79[.]98[.]28[.]2813
198[.]187[.]29[.]3511
173[.]236[.]177[.]1008
162[.]216[.]45[.]56
46[.]105[.]57[.]1695
198[.]54[.]120[.]2315
94[.]23[.]64[.]35
13[.]107[.]21[.]2004
204[.]79[.]197[.]2004
5[.]9[.]158[.]754
23[.]6[.]22[.]1894
145[.]239[.]6[.]188/314
47[.]101[.]49[.]134
66[.]33[.]211[.]134
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
ipv4bot[.]whatismyipaddress[.]com75
api[.]w[.]org12
gmpg[.]org7
www[.]breilginestet[.]fr5
getjobportal[.]com5
saschoolsphotography[.]co[.]za5
www[.]loudgraphicsonline[.]com5
login[.]microsoftonline[.]com4
filesextension[.]com4
www[.]solvusoft[.]com4
shell[.]windows[.]com4
fileinfo[.]com4
openfile[.]club4
file[.]org4
www[.]techwalla[.]com4
opentmpfile[.]com4
freeformmanagementco[.]com4
manosapnas[.]lt4
www[.]wuyufeng[.]cn4
jdcontractingomaha[.]com4
www[.]lalogarcia[.]es4
www[.]mobiadnews[.]com4
paulbacinodentistry[.]com4
levente[.]biz[.]pk4
www[.]anniechase[.]com4
*See JSON for more IOCs
Files and or directories createdOccurrences
%ProgramData%\Windows\csrss.exe155
%ProgramData%\Windows154
%TEMP%\6893A5D897154
\README1.txt76
\README10.txt76
\README2.txt76
\README3.txt76
\README4.txt76
\README5.txt76
\README6.txt76
\README7.txt76
\README8.txt76
\README9.txt76
%APPDATA%\Mozilla\Firefox\profiles.ini71

File Hashes

01a47aefed5ad89958df66ceaaece3eb1028f5eb339b5fc405c365bf016652ae 0450d2d5b575c24bf8fc23859a53432ba1ea2bcb44bf9e143e1740c2643074f1 04d08fed39c68ff27751497d6cb543d8a7d082cd2efdda0515853a9fa0f8d70c 053eb4558f17ff9d2e8af9fc171f279b1a43be35a309ca1298f581eb332a8790 07e7472cce0ba35d0f9548372f2b93d56e5fe7597a8de0de337c3a2d96f2c69c 093b4505194249591522a9bed6abfc24d9911d4a64c89a51a46ac75d41a0f3a4 0bdf07fea4e8ae1e9d2e0bb4404770dd32eca713a3d6e1aeac9e61fe99925e46 0cf81c6a0a6181bbce5722c133852889b4dc09752453df36298179ef4d944deb 0ff03d25c9b864f54528b717a00fe970de388859ee81927a396621cf8dbf863b 1130c8c8e7efb0f284f7d6b8b1089668209ff18dba350d3e92fd79ad926043e7 1182d3ff1023ae91fb020eae5e94d8cbba61830118e0056fa3258a4e12759582 12df326da78cbb6da153914c68589ead268cace00a86085ea499c6f7f1562586 146c7a3b418c9b3525b2f5e87be07d252c25be2443600d3f72cddb45b8d3090c 149fa66f4458bb3300e1ff199d2f7f49922dce62980355b011625ed420215687 154c8df75639241776394de1d5c049f7851f0aef4471d4bf52d570707d0f768e 15e2104c27574da42e078a601acf2eb4c0bf70dabfaa9613b490fcb9b44a244f 17c184a6bb5976dcdc89a192409c80e9b4034334baf31017cff23fb2236316ca 180018cdf5693f805c584fa96443960fa18d94f98e17c8d9ebee15e33439a717 19eebbaaebcc15648f5a7c54b4090587cb63ff5ca61a18ea5261a9d5c4e20913 1ab04b2a9761d339b42f963aa0329e53e388b3c685ebb388cb7165cbd0eb7ee4 1b3b09c6ff6a035dba76d90f401127e58cc897895c077a9c5842b7d1890720f8 1d5d51d82b63ac0ad56d91b39f7b4d271a2e4413e90d36fcf38804dddd321018 209d05880be9d0626504cc03ad8c05b5f967186dfbbd6f7f020b377dd692fbed 20d5c1348fcefe4920bb03dd859a1967116a7f09f21fa30ba46c47b94d0bc259 20ec024bae45dadd7f89e4c2ac2d883135593e0d9de294c7d2d0daaaf7c024e9
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Win.Dropper.Cerber-7174760-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER 37
<HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER
Value Name: PendingFileRenameOperations
37
MutexesOccurrences
shell.{381828AA-8B28-3374-1B67-35680555C5EF}37
shell.{<random GUID>}22
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
94[.]22[.]172[.]0/2737
94[.]21[.]172[.]0/2737
94[.]23[.]172[.]0/2537
150[.]109[.]231[.]11628
3[.]225[.]205[.]11219
52[.]86[.]198[.]6318
178[.]128[.]255[.]1799
104[.]24[.]110[.]1359
104[.]24[.]111[.]1358
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
api[.]blockcypher[.]com37
hjhqmbxyinislkkt[.]1j9r76[.]top28
bc-prod-web-lb-430045627[.]us-east-1[.]elb[.]amazonaws[.]com22
chain[.]so9
bitaps[.]com9
btc[.]blockr[.]io9
Files and or directories createdOccurrences
<dir>\_READ_THI$_FILE_<random, matching [A-F0-9]{4,8}>_.hta37
<dir>\_READ_THI$_FILE_<random, matching [A-F0-9]{4,8}>_.txt37
<dir>\<random, matching [A-Z0-9\-]{10}.[A-F0-9]{4}> (copy)22

File Hashes

0290d4b80c48806f165fc69f0ad6f61ae4279a3c4aa85f24a23f6166e2056880 0675dd9ca7d0258f82f849b923c9f73574f7dc18660243964af3ca5ff5f83263 09558b11776fef2c9fe97ce334bcde4ab8bda7e6befc0becf0e06899742a102e 0e64387a13170fd75c61600e8420aaa93249265813cda9555c47b1d09c1f5cb9 115efdb3253671c21f525ef951c3427c210b0d762e81230e1071927a9081aa69 17fba2ecea6df6d1097de2bdedfce13dfc93884cf0725cdc0144bd61c9b3c49b 1e1a3c08ab28baa17331e96a2741f193120d81be3728975a8617322ab59cacea 21261d7e4e8df88ed2b02b84d6089cb5a3967b4d720ae1316f587fdfb0502754 2eb147f2c94c81e3e031a7aaa8f5f46e94d30a27f957b694bb43d9c7700a9a2c 2f94adf1f16c33bc8fd151ff86278a076bc9a817410ba8c4fe70e3a47594f934 398e36ca258b2004f6532081a5f4f7b8487af2f2fc47999469db795186fbfaaf 3c61509268caa1ddfc237409e46456ae862d1b8f058c178073139013ebff5cba 4148780b48335a6080b75d9d881f2c8c4e876ff2d5a0e8787c6fb7fbb5880114 42d25d3a5e18cdd4293b7cc17d3037695a47104ed6f874411fdf1be067e849a0 4580ecc3393d75b0ce69a8458afe9d19f460d2a618d2607e7a04e4bcc0810ad4 4623e856d3a24d187a33c89ca3f4d9a0333cbde4e051fc7c5d612cf01231ec05 52d7d75140381ab82780710ccb60fbde8251b7f31b85e533ecaff7dbec9b4ca8 592c9b4c77c295aa32bb9774b3b968f9dc9d55c17faaadd92b4629d6def1ad61 60c82c336eb368cc3a24c141513b4cf3789a7db7133967adb57ef81287305b3b 63ae7ce0bc9774b278fd6c349aea2af5b83e5779691fed96074b98ec44f059b7 6ee82f9a8090b3a074b19472f4ba79fff42495c261814e85db46582a3824f595 7e727b8dccd44f0cfc6b3771806243ae8d68a643dbdb4bdc9c2b54bccee7284d 8ed9c0eb8ab59f127ddfb578d2ff65030eb22fcf11f129f7ad0e2b551245d79a 99f5973656d5950ded3d862340ff5f25770c82a4b93827075b8d11b76f7aeb4c a32ea31bc647853875b02c2ead84c6ad872ddc100185308d4978db841bd72f21
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


Malware




Win.Dropper.Kovter-7173679-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE
Value Name: DisableOSUpgrade
22
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\OSUPGRADE
Value Name: ReservationsAllowed
22
<HKLM>\SOFTWARE\WOW6432NODE\FC6A75BE78
Value Name: 0521341d
22
<HKCU>\SOFTWARE\FC6A75BE78
Value Name: 0521341d
22
<HKLM>\SOFTWARE\WOW6432NODE\FC6A75BE78
Value Name: b5e001e3
22
<HKCU>\SOFTWARE\FC6A75BE78
Value Name: b5e001e3
22
<HKLM>\SOFTWARE\WOW6432NODE\FC6A75BE78
Value Name: 0905afc0
20
<HKCU>\SOFTWARE\FC6A75BE78
Value Name: 0905afc0
20
<HKLM>\SOFTWARE\WOW6432NODE\QYFTG2
Value Name: 3X3ii1
1
<HKLM>\SOFTWARE\WOW6432NODE\QYFTG2
Value Name: bDH1PvniwF
1
<HKLM>\SOFTWARE\WOW6432NODE\721AB795C7C67F3DC 1
<HKLM>\SOFTWARE\WOW6432NODE\0MI0EBD 1
<HKLM>\SOFTWARE\WOW6432NODE\18F3F1A771B2D052 1
<HKLM>\SOFTWARE\WOW6432NODE\EGDJPDTYRP 1
<HKLM>\SOFTWARE\WOW6432NODE\721AB795C7C67F3DC
Value Name: 95635A6FA6E8366D
1
<HKLM>\SOFTWARE\WOW6432NODE\18F3F1A771B2D052
Value Name: CF87DF8672E1A15F
1
<HKLM>\SOFTWARE\WOW6432NODE\0MI0EBD
Value Name: u0Lsan
1
<HKLM>\SOFTWARE\WOW6432NODE\0MI0EBD
Value Name: DS2VgqHGE
1
<HKLM>\SOFTWARE\WOW6432NODE\EGDJPDTYRP
Value Name: jPILeBsM9v
1
<HKLM>\SOFTWARE\WOW6432NODE\EGDJPDTYRP
Value Name: kGvXXUg
1
<HKLM>\SOFTWARE\WOW6432NODE\EA246A9E9F458BD5954 1
<HKLM>\SOFTWARE\WOW6432NODE\SVN2OQM 1
<HKLM>\SOFTWARE\WOW6432NODE\EA246A9E9F458BD5954
Value Name: 2CA8F0C3E2A3881649D
1
<HKLM>\SOFTWARE\WOW6432NODE\SVN2OQM
Value Name: Ck6a8biOX
1
<HKLM>\SOFTWARE\WOW6432NODE\SVN2OQM
Value Name: m7MJLVAz
1
MutexesOccurrences
C59C87A31F74FB5622
Global\42EDC1955FE17AD422
0D0D9BEBF5D08E7A22
1315B41013857E1922
BAD24FA07A7F6DD915
863D9F083B3F4EDA15
Global\EE662FBC96CBCB1A15
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
176[.]111[.]49[.]432
46[.]4[.]52[.]1092
209[.]214[.]91[.]1221
76[.]229[.]109[.]1101
220[.]85[.]229[.]1691
80[.]88[.]109[.]651
59[.]164[.]225[.]691
15[.]155[.]62[.]371
216[.]150[.]65[.]1961
121[.]230[.]123[.]1101
6[.]213[.]48[.]1131
99[.]248[.]253[.]801
77[.]80[.]6[.]371
19[.]43[.]124[.]2131
118[.]121[.]204[.]1091
36[.]244[.]111[.]171
142[.]100[.]180[.]911
15[.]198[.]236[.]2001
209[.]194[.]106[.]1661
153[.]235[.]117[.]2351
110[.]145[.]21[.]951
7[.]83[.]197[.]1631
223[.]108[.]247[.]601
222[.]180[.]100[.]741
72[.]139[.]210[.]781
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
ottensen[.]de1
www[.]tastingtable[.]com1

File Hashes

2c09d76519ef840e68d07428643a76b32cc15672ea227b1a373ac68d25364446 3d98668f8b44ff601400103fa4aabac3b9066892f0d32d6ad680ebfd6e22dc16 49cda94863ca85a318f0990f2d092a05746ef7d961a595ec268f0c9cc45968a2 6eccd1f893534539a478c8ec9e9eba5c57095dc3ebf53c3b0c74c47a6b306b51 71533197271e536d08e551a226133c4e2efb1262521498b5d021c3b7e5458062 734eab522ba7c0c5c3afeb61a6e8cae6c3b4c5375716aa15541e388fe2d03547 949a7cec76633cc63b11f3748d304b88fa89ef679927e2911b46639c91c0f9ce 9856c913730a44ee3d02ef3b36ed9c6da721a5ec55118c367ba69926753e6a42 9e7bc2705e9c9d0173e6fb49bd400dc8ccaca56e51557c31c17c814c8256f3e2 b00b3dd9bef667e32501e21a13a8af398d8d8a9778e95f1df2c21746a08ee102 b36e6ed7ff386b9f4d5e8c0284fe177d08eca668d46e70aa48340b883d696e27 bb3cd50224232eb7809baa208fd5b14f9e9d1aed691c383092f7245c89005241 beeeed6fc246f493b6be8f65c76cd328995147069d5091f4e2d01e927e631fe7 c245b59592220a1b4cd08432e842cc391845b471fc2eeb494aa0cb57453cf6e8 d3bdca637e70ed87cdc31d97c7e46320f20b73ed7c4af1fa25e11e9efab8e9f7 d4413827ff12f897303b585bf28ddf3edd7d836a92847671a178dfc8dc48cb7c d5b5c2669ae45d436595ca86076208154f354de9a03135c23db20703ad034d08 d848892262acf288673c23c37be7f284b8b8747e8a424ed1ab342bfada5ff6b2 e4cd277d934fc543aea55870dd316bdf8b7437907a14332a441d6730ab4212e7 ede4f19e39c2e6c794c3ae97e5ba66b6eba29503ac8d71e9d84a10b697e8e5bb f6d37485e3e3f9412bd6eeb3767a17949cfb87ccfec649f1a4590d8ac189ab50 fe5e1062716fe717363599ee27f85553a1598dd5e7b9b16f83de57e828a04e03

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid




Win.Malware.Zusy-7173469-1

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: EEFEB657
25
MutexesOccurrences
EEFEB65779
4A60888F13
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
216[.]218[.]185[.]16213
216[.]218[.]206[.]691
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
brureservtestot[.]cc9
Files and or directories createdOccurrences
%HOMEPATH%\AppData\LocalLow\EEFEB65726
%APPDATA%\EEFEB65726
%APPDATA%\EEFEB657\bin.exe25
%APPDATA%\4A60888F\bin.exe13

File Hashes

00afaf857ac8a4185bf3c413a0e4ec739cee9a3add5587042176270e2ba45465 0a97cd074abef0a20d0abacc579a0cb8de4eacda90bff198c69c58635085000d 12688cb61170c54096bce727b51225e5ac0d7614389634dab3ffeb41c207eab9 12c1420737fc88fe942c45cfa08c071d1e71cc085d108a8822566ccb7b832384 13548f2c1a514d85d5b47f719dda62ddf24cb1c71283b048aa8171a218a03b26 17999d48dc7614dc4f5c9fb078575df2396a0ba5e255685185ed5d2e2eaf8c85 1ed34a43106c50971c74b903f431e6564356ca6d67aec1233e83a1294375331c 1eeb3abd65800306e131d3de28807d183b9b430d9383a210b783c17f2048c1ca 203bbe399a62a7c8d30cf540647495d8fa7de90d8cbb0d666a901444942e9d1d 24ec9675730ebbd18fb3ce3f206a9e655bb83cced94e9aa9413944d34d159be3 261eeef081001542bbb3a528323e03a2f451930e304283e12e6668a764a1cac2 275943755b7ac0ce098df1d040396388b28de93bd8afde32f09b70b85800de79 29a4810fe9a54f55f4ece5797c593c474f62abc0a6b5d3dc3b3a0b21199993e8 2f6fff7aedc91ca250f42ee261df91fd5dde94741c54e6bcec4177a83bd665d1 39c130462d81e7488499d5f82adbe21f6a6e4926c52302a3f8d5151712869e54 45c2a30595130a32670a68527863cda01572870ab58c49ea12fc26dfd7e1f835 4979596ca617c43eedb54615f3443252c34a94793c3b94d35c44fed705843626 4aa3743336f0260b0734175365b6d409170009e5c1f223cb18bcc53fd3ad9b46 5153276508219d637a03570d1a228dbb60846849cf5659fc189c4d23a6555aa3 5c2529c1e5e740724ff97ef607c65cd2eaa39a096c52947946815187bf406376 5f35edd69fac10f629c53ee3d067ee0cb811fa3bc089b3f6c3d5ea98240675f7 62a73bcebe68715f7c79346d5d43c1017efb469d906cb62cd95949f4fea00b09 684d0bba591a3d78b3720573fa348ce327ac3d9be0ae3e6c337a77dfb294861e 6a8b78f181b0391908613fc6bb362ef1a3d0500c2ee80204e8a8c9099ec56ab7 6b324fe79b3118bf435ff17c4192e606928deb54613c2601ec0c763955e64a1b
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Win.Packed.Tofsee-7171939-0

Indicators of Compromise

Registry KeysOccurrences
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config3
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'> 10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Type
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Start
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ErrorControl
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: DisplayName
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: WOW64
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ObjectName
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: Description
10
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config0
10
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config1
10
<HKU>\.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config2
10
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\<random, matching '[A-Z0-9]{8}'>
Value Name: ImagePath
6
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\nguazhnc
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\tmagfnti
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\slzfemsh
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\qjxdckqf
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\gzntsagv
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\exlrqyet
1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
239[.]255[.]255[.]25010
69[.]55[.]5[.]25010
46[.]4[.]52[.]10910
176[.]111[.]49[.]4310
85[.]25[.]119[.]2510
144[.]76[.]199[.]210
144[.]76[.]199[.]4310
43[.]231[.]4[.]710
192[.]0[.]47[.]5910
173[.]194[.]207[.]26/3110
85[.]114[.]134[.]8810
172[.]217[.]197[.]26/319
98[.]136[.]96[.]92/319
172[.]217[.]5[.]2288
67[.]195[.]228[.]848
67[.]195[.]204[.]72/308
213[.]209[.]1[.]1297
216[.]146[.]35[.]357
211[.]231[.]108[.]467
104[.]47[.]53[.]367
213[.]205[.]33[.]62/317
188[.]125[.]72[.]737
104[.]47[.]6[.]336
23[.]160[.]0[.]1086
216[.]163[.]188[.]546
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
250[.]5[.]55[.]69[.]in-addr[.]arpa10
250[.]5[.]55[.]69[.]zen[.]spamhaus[.]org10
250[.]5[.]55[.]69[.]cbl[.]abuseat[.]org10
250[.]5[.]55[.]69[.]dnsbl[.]sorbs[.]net10
whois[.]iana[.]org10
250[.]5[.]55[.]69[.]bl[.]spamcop[.]net10
whois[.]arin[.]net10
mx-aol[.]mail[.]gm0[.]yahoodns[.]net10
eur[.]olc[.]protection[.]outlook[.]com10
250[.]5[.]55[.]69[.]sbl-xbl[.]spamhaus[.]org10
aol[.]com10
hotmail-com[.]olc[.]protection[.]outlook[.]com10
microsoft-com[.]mail[.]protection[.]outlook[.]com10
honeypus[.]rusladies[.]cn10
marina99[.]ruladies[.]cn10
sexual-pattern3[.]com10
coolsex-finders5[.]com10
mta5[.]am0[.]yahoodns[.]net9
mx-eu[.]mail[.]am0[.]yahoodns[.]net9
etb-1[.]mail[.]tiscali[.]it8
tiscalinet[.]it8
smtp-in[.]libero[.]it7
libero[.]it7
tiscali[.]it7
hanmail[.]net7
*See JSON for more IOCs
Files and or directories createdOccurrences
%SystemRoot%\SysWOW64\config\systemprofile10
%SystemRoot%\SysWOW64\<random, matching '[a-z]{8}'>10
%TEMP%\<random, matching '[a-z]{8}'>.exe10
%System32%\<random, matching '[a-z]{8}\[a-z]{6,8}'>.exe (copy)8
%TEMP%\hjekdqa.exe2

File Hashes

08d08aedaab20d189db5d91b829e46d6485c9a80b0de1865ae66a6636a8f10a4 1060301d58657b07ab260d50e92c44112125ca9b225b049dafd428e47ff8c864 4518935de0954262f693d572260e01c37c5b3805358b4d8034f58a47208c15c3 7939dc52cea024666043b03e3dd324c3d0f24adb4cc9f05c75d45443eca6ffe7 8d1595bd4b6e37b043fbceffce01667b5a711cad028499a69285ced37db4a909 924242b90be9bca981b3ed8b7a7dcac8d6e192077d6ab0ce70d64390af8263a4 a97806cc79281fd6a5eb1f45b50787e5677f7a49c5e009629c260e2d33bc4dbb b34fc64ebd852b6e63c7926dff44f6bfee7d5b99201ace20f20c478162437410 c515f1bc8e5a44616976ea05ba3061b81670f5b5a2763b7abb2e9d0abcb62642 e6b5db7be9886ce7547bc05f42d87003215824316ac7126f3722518e7a1f6cd1

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid




Exploit Prevention

Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
CVE-2019-0708 detected - (9723)
An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP request). Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
Excessively long PowerShell command detected - (6212)
A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
Kovter injection detected - (1773)
A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
Madshi injection detected - (1501)
Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
Process hollowing detected - (755)
Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
Trickbot malware detected - (636)
Trickbot is a banking Trojan which appeared in late 2016. Due to the similarities between Trickbot and Dyre, it is suspected some of the individuals responsible for Dyre are now responsible for Trickbot. Trickbot has been rapidly evolving over the months since it has appeared. However, Trickbot is still missing some of the capabilities Dyre possessed. Its current modules include DLL injection, system information gathering, and email searching.
Gamarue malware detected - (190)
Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
Special Search Offer adware - (110)
Special Search Offer adware displays unwanted advertising in the form of popups or by injecting into browsers and altering advertisements on webpages. Adware has also been known to download and install malware.
Installcore adware detected - (95)
Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
Dealply adware detected - (84)
DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.

Vulnerability Spotlight: Foxit PDF Reader JavaScript Array.includes remote code execution vulnerability

$
0
0

Aleksandar Nikolic of Cisco Talos discovered this vulnerability.

Foxit PDF Reader contains a remote code execution vulnerability in its JavaScript engine. Foxit aims to be one of the most feature-rich PDF readers on the market, and contains many similar functions to that of Adobe Acrobat Reader. The software uses JavaScript at several different points when opening a PDF. A bug exists in the JavaScript reading function that results in a large amount of memory to be allocated, which quickly uses up all available memory. An attacker could exploit this vulnerability to then gain the ability to remotely execute code.

In accordance with our coordinated disclosure policy, Cisco Talos worked with Foxit to ensure that these issues are resolved and that an update is available for affected customers.

Vulnerability details

Foxit PDF Reader JavaScript Array.includes remote code execution vulnerability (TALOS-2019-0793/CVE-2019-5031)

An exploitable memory corruption vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader, version 9.4.1.16828. A specially crafted PDF document can trigger an out-of-memory condition which isn't handled properly, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.

Read the complete vulnerability advisory here for additional information.

Versions tested

Talos tested and confirmed that Foxit PDF Reader, version 9.4.1.16828 is affected by this vulnerability.

Coverage

The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

Snort Rules: 49648, 49649

Open Document format creates twist in maldoc landscape

$
0
0
By Warren Mercer and Paul Rascagneres.

Introduction


Cisco Talos recently observed attackers changing the file formats they use in an attempt to thwart common antivirus engines. This can happen across other file formats, but today, we are showing a change of approach for an actor who has deemed antivirus engines perhaps "too good" at detecting macro-based infection vectors. We've noticed that the OpenDocument (ODT) file format for some Office applications can be used to bypass these detections. ODT is a ZIP archive with XML-based files used by Microsoft Office, as well as the comparable Apache OpenOffice and LibreOffice software.

There have recently been multiple malware campaigns using this file type that are able to avoid antivirus detection, due to the fact that these engines view ODT files as standard archives and don't apply the same rules it normally would for an Office document. We also identified several sandboxes that fail to analyze ODT documents, as it is considered an archive, and the sandbox won't open the document as a Microsoft Office file. Because of this, an attacker can use ODT files to deliver malware that would normally get blocked by traditional antivirus software.

We only found a few samples where this file format was used. The majority of these campaigns using malicious documents still rely on the Microsoft Office file format, but these cases show that the ODT file format could be used in the future at a more successful rate. In this blog post, we'll walk through three cases of OpenDocument usage. The two first cases targets Microsoft Office, while the third one targets only OpenOffice and LibreOffice users. We do not know at this time if these samples were used simply for testing or a more malicious context.




Case study No. 1: ODT with OLE object and HTA script


The first campaign we'll look at used malicious ODT documents with an embedded OLE object. A user must click on a prompt to execute the embedded object. We saw attackers use this methodology to target both Arabic and English-speaking users.




In both campaigns, the OLE Object deployed an HTA file and executed it:



The two HTA scripts downloaded a file on top4top[.]net. This website is a popular Arabic file-hosting platform:



The two campaigns downloaded a remote administrative tool (RAT). In the Arabic campaign, the payload is the longstanding NJRAT malware. The C2 server in this case is amibas8722[.]ddns[.]net, which pointed to an Algerian ISP:



RevengeRAT was the payload in the English campaign, with its C2 server hidden behind the portmap platform (wh-32248[.]portmap[.]io). The PE is stored in registry and executed with a scheduled task and PowerShell script:



The operating mode is similar to the one we previously published here. In both cases, the same RAT with the same patches, the payload is stored in the registry, a PowerShell script decodes and executes it and, finally, the Portmap platform hides the final IP of the attacker infrastructure. Based on these elements, we assess with medium confidence that these two cases are linked by the same actor or framework.

Case study No. 2: ODT with OLE object and embedded malware


In the second case, the ODT file also contains an OLE object:

$ unzip -l 80c62c646cce264c08deb02753f619da82b27d9c727e854904b9b7d88e45bf9e
Archive: 80c62c646cce264c08deb02753f619da82b27d9c727e854904b9b7d88e45bf9e

Length Date Time Name
--------- ---------- ----- ----

39 1980-01-01 00:00 mimetype
1540 1980-01-01 00:00 settings.xml
805 1980-01-01 00:00 META-INF/manifest.xml
1026 1980-01-01 00:00 meta.xml
491520 1980-01-01 00:00 Object 1
17784 1980-01-01 00:00 ObjectReplacements/Object 1
3354 1980-01-01 00:00 content.xml
6170 1980-01-01 00:00 styles.xml

--------- -------
522238 8 files
Again, this document requires user interaction. The OLE execution writes "Spotify.exe" to the victim machine, which is clearly not the legitimate Spotify platform executable. This .NET binary deflates a new binary stored as a resource. The new PE is a new binary packed with a multitude of different packers such as Goliath, babelfor.NET and 9rays.



Once all the layers are unpacked, the final payload is AZORult. We can see the infamous strings of this stealer in the final binary:



Case study No. 3: ODT with StarOffice Basic


We also discovered a third campaign that targeted OpenOffice and LibreOffice, but not Microsoft Office. In this case, the attackers used the equivalent of macros in Microsoft Office documents in the StarOffice Basic open-source software. StarOffice Basic's code is located in the Basic/Standard/ repository inside the ODT archive:
$ unzip -l 525ca043a22901923bac28bb0d74dd57
Archive: 525ca043a22901923bac28bb0d74dd57

Length Date Time Name
--------- ---------- ----- ----
0 2019-08-19 12:53 Thumbnails/
728 2019-08-19 12:52 Thumbnails/thumbnail.png
10843 2019-08-19 12:52 styles.xml
0 2019-08-19 12:53 Basic/
0 2019-08-19 13:22 Basic/Standard/
1317 2019-08-19 13:00 Basic/Standard/Module1.xml
348 2019-08-19 12:52 Basic/Standard/script-lb.xml
338 2019-08-19 12:52 Basic/script-lc.xml
8539 2019-08-19 12:52 settings.xml
0 2019-08-19 12:53 Configurations2/
0 2019-08-19 12:53 Configurations2/accelerator/
0 2019-08-19 12:52 Configurations2/accelerator/current.xml
0 2019-08-19 12:53 META-INF/
1390 2019-08-19 12:52 META-INF/manifest.xml
899 2019-08-19 12:52 manifest.rdf
1050 2019-08-19 12:52 meta.xml
39 2019-08-19 12:52 mimetype
3297 2019-08-19 12:52 content.xml
--------- -------
28788 18 files
Here is an example:



The code downloads and executes a binary called "plink." The software creates SSH communications. The IP is a local network IP and not an IP available on the internet, which is interesting because the other documents we identified download an executable from the local network. We do not know if it is a test, a pentest framework, or if it was used in a specific context. There is the possibility that an actor could use this to carry out additional lateral movement within an already compromised environment.

We identified attempts to download Metasploit payloads:



And finally, some more obfuscated versions using WMI in order to execute the downloaded payload:



These samples only targets users using OpenOffice and StarOffice. We still do not know the final payload or the context under which this document was deployed.

Conclusion


Microsoft Office is a commonly attacked platform and is considered the most popular productivity suite on the market. This, similarly to the Microsoft Windows operating system, makes it a prime target for threat actors.

By attacking known platforms, attackers increase their chances of gaining access to machines. And the use of the ODT file format shows that actors are happy to try out different mechanisms of infection, perhaps in an attempt to see if they are these documents have a higher rate of infection or are better at avoiding detection. As we point out some AV engines and sandboxes do not handle these file formats with the appropriate method so they become "missed" in some instances. Whilst less people may avail of these pieces of software the actor may have a higher success rate due to low detections. The potential for specifically targeted attacks can also increase with the use of lesser used file formats. This can be coupled with OSINT from an attacker to understand who has potentially began to use LibreOffice formats by referring to the LibreOffice public migration page here, whilst this is a nice feature to show the uptake in their software it also leaves a valuable piece of information pertaining to what infrastructures are running their software.

Coverage


Intrusion prevention systems such as SNORT® provide an effective tool to detect this activity due to specific signatures present at the end of each command. In addition to intrusion prevention systems, it is advisable to employ endpoint detection and response tools (EDR) such as Cisco AMP for Endpoints, which gives users the ability to track process invocation and inspect processes. Try AMP for free here.

Additional ways our customers can detect and block these threats are listed below.



Cisco Cloud Web Security (CWS) orWeb Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

Email Security can block malicious emails sent by threat actors as part of their campaign.

Network Security appliances such asNext-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

Open Source SNORTⓇ Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

IOCs


Case #1


ODT Documents:

de8e85328b1911084455e7dc78b18fd1c6f84366a23eaa273be7fbe4488613dd
f24c6a56273163595197c68abeab7f18e4e2bedd6213892d83cdb7a191ff9900

PE:

02000ddf92ceb363760acc1d06b7cd1f05be7a1ca6df68586e77cf65f4c6963e
19027327329e2314b506d9f44b6871f2613b8bb72aa831004e6be873bdb1175d

C2 servers:

wh-32248[.]portmap[.]io
amibas8722[.]ddns[.]net

Payload storage:

top4top[.]net

Case #2


ODT document: 80c62c646cce264c08deb02753f619da82b27d9c727e854904b9b7d88e45bf9e

PE: 20919e87d52b1609bc35d939695405212b8ca540e50ce8bece01a9fccfa70169

Case #3


2f4aa28974486152092669c85d75232098d32446adefeeef3a94ad4c58af0fc8
d099eac776eabf48f55a75eb863ad539a546202da02720aa83d88308be3ce4ca
84cb192cc6416b20293dfb8c621267e1584815a188b67757fa0d1af29a7cfdcd
b2b51864fa2f80f8edbdaf6721a6780e15a30291a748c2dfc52d574de0d8c3ed
f9138756639104e2c392b085cc5a98b1db77f0ed6e3b79eacac9899001ed7116
efb81fb8095319f5ee6fd4d6741b80386a824b9df05460d16d22cad1d6bbb35d
f5194cc197d98ed9078cceca223e294c5ec873b86cbeff92eb9eaca17fc90584
429d270195bed378495349cf066aee649fd1c8c450530d896844b1692ddddc77

Threat Roundup for September 27 to October 4

$
0
0
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Sept. 27 and Oct. 4. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
The most prevalent threats highlighted in this roundup are:
Threat NameTypeDescription
Win.Malware.Zusy-7191579-1 Malware Zusy, also known as TinyBanker or Tinba, is a trojan that uses man-in-the-middle attacks to steal banking information. When executed, it injects itself into legitimate Windows processes such as "explorer.exe" and "winver.exe." When the user accesses a banking website, it displays a form to trick the user into submitting personal information.
Win.Malware.Osiris-7191711-1 Malware Osiris is a banking trojan derived from the Kronos banking trojan and is known to include features such as the ability to communicate with its command and control (C2) servers via Tor and the ability to intercept credentials typed into web forms.
Win.Dropper.Cerber-7192026-0 Dropper Cerber is ransomware that encrypts documents, photos, databases and other important files. Historically, this malware would replace files with encrypted versions and add the file extension ".cerber," although in more recent campaigns, this is no longer the case.
Win.Virus.Expiro-7192043-0 Virus Expiro is a known file infector and information stealer that hinders analysis with anti-debugging and anti-analysis tricks.
Win.Malware.Neurevt-7192122-0 Malware Neurevt, also known as BetaBot, is a remote access trojan that employs multiple anti-debug and anti-analysis techniques to attempt to avoid detection.
Doc.Dropper.Emotet-7181950-0 Dropper Emotet is a banking trojan that has remained relevant due to its continual evolution to better avoid detection. It is commonly spread via malicious emails. It recently resurfaced after going quiet over the summer of 2019.

Threat Breakdown

Win.Malware.Zusy-7191579-1

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: EEFEB657
82
MutexesOccurrences
EEFEB65787
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
216[.]218[.]185[.]16254
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
brureservtestot[.]cc57
Files and or directories createdOccurrences
%HOMEPATH%\AppData\LocalLow\EEFEB65784
%APPDATA%\EEFEB65782
%APPDATA%\EEFEB657\bin.exe82

File Hashes

027ecc7f1e2d38d420486e9e0fe9d50bdceb8b50512258a922e69f55e0c18ec7 0a72c56814a288218c9346115935828be03e870fa858a721f738af4dab311205 0a9fd449b13193c771c2d401dd6538cab6dbb2c37e0573b05cc72802b90687cf 0b1fa36c3ae5bdb7c52c40e08566cceac37965265e5b2552fdf121add431ce45 0ce401aa748f86238016408aa5c7b082a83499a2cbf2d5a1370b3bef8b983be1 1266c2bccc5fa61af8b611d3c7f210b11fed7d22dbb24305bf6003b1891399fe 12ef657ff31b48b90fbb20b212643f7aa62b66dae80cd19feed7356089f18451 149e17e85475bf4f6b4be6c0f1924e8554ec982f949fcb833c8c6bc3a7673669 1a0d6dda8e405f9342fadc87a1a6b395250bfcf910f5e2e4cfba806de2b58eee 1b3ddf7b2a71290a0a86e974a323dde16999e7eaa2be2b8cd63c066a7ba6a052 1fa747673986b53ed65fa0a6b39a024ef02191966184a6fd8844e742fdbc3d58 22b172ead1618e0c49a6d94c4da6c7ba1d401549276bc3a7f3d78c18909e6793 2b9b82e7ee0d8661b2268f83a010e8379e28930cc7f9f224d06fcd37b48f566d 2ba984bf6a2e039225b78faf309d087db56a6a2eac5efc73f5f20ff941c58442 2c33aa852da4527f49dae1e6bb1940b4c7cd2c814da0a90ab8a2a5de5fee6726 2c594bcf891b90e24c8bd445d5ddbe9cb50f5d101d559d564ab8246535d2af53 306774877254b8ca51a2bf446834cc34126ac56ebaf9d935442c25e533485fc1 38efe6d2c2e264e83d54cebc4bb14766c344741e39b510b027882d1ef2bbb798 43aee0e0761a3e90aa35d3401634397be8d1691d88ed2bdaaf2f60c915de53e2 467e66e8fc95c740cc3beee432d6a5e85bc533aa6dd609865376dacf0a0ef6e7 47bc6db08ad7826b5a68644d6f013405e4e6842525b8a4d05a2abdabfd735fc4 484f52c4598eddc67147f8558c9bf9701d1c4d2f5bcc1b619a43422863d1e8ce 48624a37bd7f3faacc3d56c106a40189c413dc4ec4407c00a1034578cfb6a9b3 4a3a67a893cf7e49a5aef587d840867589841e93ae7f418019d6f94daba58c47 4bd1deaa13a4a9cef75f84dba895645a24ac7f4b4bd69d22ea5800a3c682cc54
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Win.Malware.Osiris-7191711-1

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
Value Name: Hidden
11
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
Value Name: HideFileExt
11
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION
Value Name: d41d8cd9
11
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION
Value Name: d41d8cd9
11
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: d41d8cd9
11
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: d41d8cd9
11
MutexesOccurrences
Global\d41d8cd98f00b204e9800998ecf8427e11
Global\{B1F6EFF9-6297-200E-B1F6-F9EF29AA7A00}11
Global\{BF6093C4-5FBA-D878-BF60-C4933C20A000}9
Global\dd4b21e9ef71e1291183a46b913ae6f29
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
updateserver4[.]top11
updateserver7[.]top11
updateserver5[.]top11
updateserver9[.]top11
updateserver2[.]top11
updateserver8[.]top11
updateserver10[.]top11
updateserver6[.]top11
updateserver3[.]top11
Files and or directories createdOccurrences
%APPDATA%\Mozilla\Firefox\Profiles\<profile ID>.default\user.js11
%System32%\CatRoot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb9
%APPDATA%\Microsoft\{56984C2C-8905-4BFA-8553-0BE17726FCD5}4
%APPDATA%\Microsoft\{56984C2C-8905-4BFA-8553-0BE17726FCD5}\d41d8cd9.exe4
%APPDATA%\Microsoft\{56984C2C-8905-4BE2-8553-13E17726E4D5}2
%APPDATA%\Microsoft\{56984C2C-8905-4BE2-8553-13E17726E4D5}\d41d8cd9.exe2
%APPDATA%\Microsoft\{9A96A2D0-FE36-485E-B81C-0132628C474C}\dd4b21e9.exe1
%APPDATA%\Microsoft\{03FFB58D-7238-49DA-9378-5224CBD1F546}\dd4b21e9.exe1
%APPDATA%\Microsoft\{575A5E0A-FD63-4DF1-BF50-033349A4ADA1}\dd4b21e9.exe1
%APPDATA%\Microsoft\{33C67668-6248-47D0-8FDF-197713CA89A1}\dd4b21e9.exe1
%APPDATA%\Microsoft\{FA144B4E-77DF-4C1F-A472-60E20FF489C2}\dd4b21e9.exe1
%APPDATA%\Microsoft\{507C47B0-1E13-4926-92BC-C40E8A4CB040}\dd4b21e9.exe1
%APPDATA%\Microsoft\{F807BD90-CAC5-40B0-828A-CA06ED52C5F4}\dd4b21e9.exe1
%APPDATA%\Microsoft\{780EBCFD-EADA-4438-9DC3-324538311844}\dd4b21e9.exe1

File Hashes

05ba5705db7ff502d4422ea7d4ef32422d9b2c0966a42b6b3d76c126d51e846d 0aae22c6557c43cf199421eb6b367d23469909b5f860468c1e42b0e5730808d5 2c5fdc198324cc33dc93d20dc58195608661ed5c83cf10619efdbc1fddeb51e5 4c6f284b0be38d51af26ee87e687cbba32184e0b21203758419953e1f476e841 4f645f4ae3dcf8bfebf4dde1b6d20497ce25fbbc1f6f691d40a95d7bff7a2d6c 5ba866dbb2ace005cfa32382404ac0927695f52bedce0804564549e633be8318 6478b2ce18a6a7671a39aa254ba0c4aaf123a0f5b27e9c86e323b663332f18f8 6f2add6401f59d813de66bc1152240f2e7622e293a0b10c5a804790b7068195b 6f9d45cf7571949de6db54d2e4c642ae63e30ba0eaf4f3075b8cd36749171377 919d3b68ee264053ae4f0f3d9caf93c055c421dabdc419d5d52d09d089142498 f7ce779ae0308c0c0da8280d3182506eda97778e91969eb4ea86dc3bfddb12df

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Win.Dropper.Cerber-7192026-0

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER
Value Name: Run
25
<HKCU>\SOFTWARE\MICROSOFT\COMMAND PROCESSOR
Value Name: AutoRun
25
<HKCU>\CONTROL PANEL\DESKTOP
Value Name: SCRNSAVE.EXE
25
<HKCU>\PRINTERS\DEFAULTS\{21A3D5EE-E123-244A-98A1-8E36C26EFF6D} 25
<HKCU>\PRINTERS\DEFAULTS 25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Magnify
2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: Magnify
2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: wusa
2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: wusa
2
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: LocationNotifications
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: FlashPlayerApp
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: FlashPlayerApp
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: DWWIN
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: DWWIN
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: mshta
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: mshta
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: autoconv
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: autoconv
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: RMActivate_isv
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: RMActivate_isv
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: eventcreate
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: eventcreate
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: w32tm
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUNONCE
Value Name: w32tm
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: netbtugc
1
MutexesOccurrences
shell.{381828AA-8B28-3374-1B67-35680555C5EF}25
shell.{785F99DE-E95E-3921-EE78-D7777849AA01}1
shell.{967822DD-7042-E624-BEA7-C7EF520E90F5}1
shell.{A92873EC-3840-982A-DA5D-DDDC12AA8495}1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
31[.]184[.]234[.]0/2525
216[.]239[.]34[.]218
216[.]239[.]32[.]217
216[.]239[.]36[.]215
216[.]239[.]38[.]215
54[.]88[.]175[.]1493
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
ipinfo[.]io25
Files and or directories createdOccurrences
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}25
%TEMP%\# DECRYPT MY FILES #.html3
%TEMP%\# DECRYPT MY FILES #.txt3
%TEMP%\# DECRYPT MY FILES #.url3
%TEMP%\# DECRYPT MY FILES #.vbs3
%HOMEPATH%\# DECRYPT MY FILES #.html2
%HOMEPATH%\# DECRYPT MY FILES #.txt2
%HOMEPATH%\# DECRYPT MY FILES #.url2
%HOMEPATH%\# DECRYPT MY FILES #.vbs2
%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\Magnify.lnk2
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\Magnify.exe2
%System32%\Tasks\Magnify2
%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\wusa.lnk2
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\wusa.exe2
%System32%\Tasks\wusa2
%System32%\Tasks\mtstocom1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\odbcconf.lnk1
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\odbcconf.exe1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\netbtugc.lnk1
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\netbtugc.exe1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\expand.lnk1
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\expand.exe1
%APPDATA%\Microsoft\Windows\Start Menu\Programs\StartUp\AdapterTroubleshooter.lnk1
%APPDATA%\{6F885251-E36F-0FE6-9629-63208157D7A2}\AdapterTroubleshooter.exe1
%System32%\Tasks\autoconv1
*See JSON for more IOCs

File Hashes

151143935c4283f66a837eca1761400ab0573929e04217a5be0286b28eeb9d15 1736c692db984e5ceb7e15a127f2478400a78c30785fd3c195ae4d9468b80259 185f85a2fbc3e27f87b099ff50a1f03f89e724e7927ec9edac4c4416dc87c109 1da732e9670f73e980723ea167abb29c5b553603c3804ec4bb9a03a4d506e8a4 3a6ca5a46ac5ac3ef7972b22e2fa5cdc4af2e137150691ed1b7a15b1ce9030a4 3c7e1a50d31138b53165e98d7bc2ba570304359bb4f7baab7ded17cc3fb3bc4c 4574e5aeda39aadfadb399654d2a6db00884be85b0882fb0acc4dbf14153ca0e 4e242ff308fc31ada637861fed73373c30eb2d5ecfda92760498fcbe30a9bb07 503baff89f763142c5b49a527972c7119be3f95fcc8cc2a1cde8bb71fd76cd02 561caadf62f59ee8dfd6d9c97e5692875458c55b3e2d53ba43e9496c40ee0824 5dbfa76bd1edb0ae7a516a08c760e2234506d64ae7c905f8e0e8830d74ef8613 65afc018d8cdcc9ec4756e98000265e3ecc3e394b7e5d493dfd6d106cc15118a 6971a5b1aa7e57abad2939f4be1a92651ea7ac12251b804ae17f2ecb1e1bf200 70b5c51e692dcd2f432c05170f7f823fdfd5b6857267117a92fe9d358a7026ed 84a45eec021015ee2eeb5acb7251f3c50c626b41bf47b8fce7c822253e175c64 999a1e5659ac864771ad420c7cad50de5b5118adb5abb80ffe18ad28c932f5a0 a51de392aae3ade74991dd86b1d205c2cc5ecb0752cac2a02c95d61ff14a558c a80ace30082b76edb75d6c9a4f9165af721a8f8b13ac0862bc438589e0af01bd a8fe11512ba3e48b178ad9ef994f48ec581394e69cbdb808f15c1432a762c636 b1e46c28ddff91c0d586933b500ce29bcf83fc094864c4227b6e70fa1981f064 b7cf83e8596736ced202a1de5e67fbaa5bdf9074697d548fdd83800802732ec4 b8c85a34ed5ccfe058c8ba65606add1efdcfe694d0f32e6b91e4b977da1392a8 bd68985801dd6b820c3a0c21883aa4ace809b2a62cbba278ac3a4d53166bcf85 cc1efac0bf7786ea4bbd4963d78aee4498e034dd778adce6977eca3d78666483 d3080983742d3deacdbc53a43b1482cfe1573ec8d957fba0f456a676dca3bd90

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
Umbrella N/A
Wsa N/A

Screenshots of Detection

AMP


ThreatGrid




Win.Virus.Expiro-7192043-0

Indicators of Compromise

Registry KeysOccurrences
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V2.0.50727_32
Value Name: Type
8
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V2.0.50727_32
Value Name: Start
8
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: AntiVirusOverride
5
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: AntiVirusDisableNotify
5
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: FirewallDisableNotify
5
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: FirewallOverride
5
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: UpdatesDisableNotify
5
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: UacDisableNotify
5
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
Value Name: EnableLUA
5
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: EnableFirewall
5
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: DoNotAllowExceptions
5
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: DisableNotifications
5
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: Start
5
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: Start
5
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
Value Name: Start
5
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION
Value Name: jfghdug_ooetvtgk
5
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: JudCsgdy
5
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WUAUSERV
Value Name: Start
5
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Windows Defender
5
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: Userinit
5
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: Userinit
5
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V2.0.50727_64
Value Name: Type
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V2.0.50727_64
Value Name: Start
3
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V4.0.30319_32
Value Name: Type
1
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V4.0.30319_32
Value Name: Start
1
MutexesOccurrences
SetupLauncher12
Global\<random guid>11
gazavat-svc8
kkq-vx_mtx<number, matching [0-9]{1,2}>8
{7930D12C-1D38-EB63-89CF-4C8161B79ED4}5
{79345B6A-421F-2958-EA08-07396ADB9E27}5
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
172[.]217[.]10[.]1105
87[.]106[.]190[.]1534
18[.]213[.]250[.]1172
91[.]195[.]240[.]1262
208[.]100[.]26[.]2511
18[.]215[.]128[.]1431
46[.]165[.]220[.]1451
46[.]165[.]254[.]1981
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
atw82ye63ymdp[.]com3
xxsmtenwak[.]com3
grbjgfprk[.]com3
ydchosmhwljjrq[.]com3
ygqqaluei[.]com3
wwyreaohjbdyrajxif[.]com3
bekvfkxfh[.]com3
caosusubld[.]com3
warylmiwgo[.]com3
xomeommdilsq[.]com3
mdofetubarhorbvauf[.]com3
gfaronvw[.]com1
wstujheiancyv[.]com1
kbivgyaakcntdet[.]com1
dvwtcefqgfnixlrdb[.]com1
yrkbpnnlxrxrbpett[.]com1
oawvuycoy[.]com1
citnngljfbhbqtlqlrn[.]com1
bungetragecomedy9238[.]com1
oeuwldhkrnvxg[.]com1
kbodfwsbgfmoneuoj[.]com1
wdgqvaya[.]com1
ypwosgnjytynbqin[.]com1
jlaabpmergjoflssyg[.]com1
ausprcogpngdpkaf[.]com1
*See JSON for more IOCs
Files and or directories createdOccurrences
%SystemRoot%\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe8
%System32%\alg.exe8
%SystemRoot%\Microsoft.NET\Framework\v2.0.50727\ngen_service.log8
%SystemRoot%\SysWOW64\svchost.exe8
%System32%\<random, matching '[a-z]{8}'>.tmp8
%SystemRoot%\microsoft.net\framework\v2.0.50727\<random, matching '[a-z]{8}'>.tmp8
%LOCALAPPDATA%\bolpidti\judcsgdy.exe5
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\judcsgdy.exe5
%SystemRoot%\Microsoft.NET\Framework\v2.0.50727\ngen_service.lock5
%SystemRoot%\Microsoft.NET\Framework\v2.0.50727\ngenservicelock.dat5
%LOCALAPPDATA%\bolpidti4
%SystemRoot%\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe3
%SystemRoot%\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log3
\TEMP\ShMnr233
%SystemRoot%\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1
%SystemRoot%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1
%SystemRoot%\SysWOW64\cjnnhbik.tmp1
%SystemRoot%\SysWOW64\hmdklpnd.tmp1
%SystemRoot%\SysWOW64\ghnjiafh.tmp1
%SystemRoot%\SysWOW64\nojnfemc.tmp1
\TEMP\emf1
\TEMP\J3OHIb31
%SystemRoot%\SysWOW64\ggaiaabg.tmp1
%SystemRoot%\SysWOW64\elmmpkjb.tmp1
%SystemRoot%\microsoft.net\framework64\v2.0.50727\jjicllfe.tmp1
*See JSON for more IOCs

File Hashes

08c199483a9569dbe74565c65ab0dfe038338ffe0c37061316a3a45116a9adb0 0b75593bf5cec1a4e6beecce8927ba895307c03d22387611fb6ced7805c2fa7b 293263135eb196a8027f6aea0f74038d60b848103f09db6d39e55b763d6bf26a 29ec1dfc85cfed46ccf8a53ca2e9f207cb126f6cec92a3b829ae61590bea1b1c 32ed07783188242c60837a208a6ebab9e37fa69fb69da9b28629c3e3971ccfa6 36e5bd8e4a5c7758dd28acda1ad479bfbfb268ca1c5339b4e9953daea48392ac 63530b594d1605211d405951823a3f5ac249660aa0ca542cb00247652dc3b544 664bd013762c59a6f0b0c8fbd7dbed06f971d2dfbc2921e10faf8b5e8aba2e8a c075f037fea0578197e56a520708152779a9332195b96a52bac64ff10a914d82 d28f2744b436cb2816ee6a63a44e2cfd4f952483b65c026ea8b4f384cc6b7e5e ea5a419cb19fc22c11d3751f0560f049631571b99c33d37482ddbca1ee4e3d6f f2fffb85b3e49c138128ef141b69a49fd09e3c7362ed8beed43dc6c46deadbcb f5fec4cf85c3e2c936455b0f0ec8a6cbbb138dfa5e31db4920037f9baf46ab65

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella




Win.Malware.Neurevt-7192122-0

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\WIN7ZIP
Value Name: Uuid
26
<HKCU>\SOFTWARE\WIN7ZIP 26
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.101
Value Name: CheckSetting
26
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.103
Value Name: CheckSetting
26
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.100
Value Name: CheckSetting
26
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.102
Value Name: CheckSetting
26
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.104
Value Name: CheckSetting
26
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: EnableFirewall
9
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\PUBLICPROFILE
Value Name: EnableFirewall
9
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SSDPSRV
Value Name: Start
9
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RSTRUI.EXE 9
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\RSTRUI.EXE
Value Name: Debugger
9
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: random
2
<HKCR>\CLSID\{7C59DF73-6FE7-724E-963F-58E2D8DE89F2}\10DF0332\CG1
Value Name: GLA
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\OMYLCQKSW.EXE
Value Name: Debugger
1
<HKCR>\CLSID\{7C59DF73-6FE7-724E-963F-58E2D8DE89F2}\6EDA084A\CS1 1
<HKCR>\CLSID\{7C59DF73-6FE7-724E-963F-58E2D8DE89F2}\6EDA084A\CW1 1
<HKCR>\CLSID\{7C59DF73-6FE7-724E-963F-58E2D8DE89F2}\6EDA084A\CW1
Value Name: 1916
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Javaupdate
1
<HKCR>\CLSID\{7C59DF73-6FE7-724E-963F-58E2D8DE89F2}\6EDA084A\CG1
Value Name: GLA
1
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\BZSBKOTIU.EXE
Value Name: Debugger
1
<HKCR>\CLSID\{7C59DF73-6FE7-724E-963F-58E2D8DE89F2}\5BDD0726 1
<HKCR>\CLSID\{7C59DF73-6FE7-724E-963F-58E2D8DE89F2}\5BDD0726\CS1 1
<HKCR>\CLSID\{7C59DF73-6FE7-724E-963F-58E2D8DE89F2}\5BDD0726\CW1 1
<HKCR>\CLSID\{7C59DF73-6FE7-724E-963F-58E2D8DE89F2}\5BDD0726\CG1 1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
239[.]255[.]255[.]2509
52[.]185[.]71[.]285
208[.]100[.]26[.]2511
40[.]76[.]4[.]151
20[.]41[.]46[.]1451
40[.]67[.]189[.]141
94[.]130[.]148[.]391
176[.]56[.]236[.]1801
143[.]215[.]215[.]2051
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
update-silo[.]com1
frizzcams[.]com1
fapncam[.]com1
theafam[.]info1
pl1[.]co[.]vu1
kasn5[.]name1
up-windows[.]in1
myssfii[.]eu1
emicrosoft[.]eu1
allegro[.]ga1
frky7[.]name1
marklou1[.]eu1
s1allegro[.]net1
b[.]dqwjnewkwefewaaaaa3[.]com1
fe298c697c247af42926ae65f504cbab[.]380d71f68b776c687229362c8017cfd4[.]sink1[.]doombringer[.]pw1
b[.]2uandmearevideos2k2[.]com1
e4afed3b6057875d3cab2c8acadf19b0[.]9079efdb6bd50d249cecbf60d0cf8a59[.]sink1[.]doombringer[.]pw1
b[.]12thegamejuststarted10k12[.]com1
9f1338aaa955b14adce82b28456563dd[.]8e38e1a12b675dd8ad0879ac9df9dd43[.]sink1[.]doombringer[.]pw1
0a3871225132117b6a5a3ca80e3637e7[.]bd822b74f0f09fe15387a4e573dfd4b8[.]sink1[.]doombringer[.]pw1
5fa5dd9e6db7852950c1d75652840205[.]d30bfb82739133ccfd1a869f816afd1e[.]sink1[.]doombringer[.]pw1
a289b7027c3a8ccd97e35492ec62c4a7[.]79c70407c7e6ecfca660191065cb2e91[.]sink1[.]doombringer[.]pw1
82ffe6077d09c53372a2f4177b3a00fd[.]2418805ba4dbdf2b323c3ee2d28fd899[.]sink1[.]doombringer[.]pw1
b[.]6worldwipemek6[.]com1
ce5ccbd7434dc4f3e00d5d615c8f1cfe[.]f919bc55f255fc49078e2b0e54e60b5e[.]sink1[.]doombringer[.]pw1
*See JSON for more IOCs
Files and or directories createdOccurrences
%HOMEPATH%\My Documents\My Videos\Desktop.ini18
%System32%\Tasks\Windows Update Check - 0x0000000017
%ProgramData%\riaiccape3
%ProgramData%\riaiccape\desktop.ini3
%ProgramData%\ubvhynpxh2
%ProgramData%\ubvhynpxh\desktop.ini2
%ProgramData%\hemxccape2
%ProgramData%\hemxccape\desktop.ini2
%ProgramData%\randomfolder\desktop.ini2
%ProgramData%\rpeulaaql\desktop.ini1
%ProgramData%\odoaztybt\desktop.ini1
%ProgramData%\mwvaztybt\desktop.ini1
%ProgramData%\safpdndnn\desktop.ini1
%ProgramData%\Javaupdate\desktop.ini1
%System32%\Tasks\Windows Update Check - 0x6EDA084A1
%ProgramData%\dtdasndku\desktop.ini1
%ProgramData%\Winrar_Update\desktop.ini1
%System32%\Tasks\Windows Update Check - 0x6E3308B11
%ProgramData%\omylcqksw\desktop.ini1
%System32%\Tasks\Windows Update Check - 0x5FF907D61
%ProgramData%\svchost\desktop.ini1
%System32%\Tasks\Windows Update Check - 0x19CF045A1
%System32%\Tasks\Windows Update Check - 0x0E7302EC1
%ProgramData%\skskjbpjx\desktop.ini1

File Hashes

00922eea9dc5d3b1d91cf0e5b244d86957e0a5dab9f22b37db91983d154849f5 00e830529982d3b12b63616473f8e77b1e9f59d26d7464a916ab4ccb7d252338 0f9b382f50574eb1da03ab59cc0138d0cdddbcccdbf4fb04377235377e2bce60 19a17d03eaa9d66aee48704b368513cb4ce2ea571004561046897e5fe194fcb5 1d5a814d7034b2ffc16acb036e10021410d1592b491fd4e3c6737ffa48c19f55 205a780668f504064a7a326217529d3dd585fefe2c91b9ee141aa0c0411c88d6 2252337eb1ee8bfcdc05cdd90533c4f9c73326c3c38438730feffb47a67dde13 228cdf170c3b7f8c4b08f89def8b979c147aada601d7e1d0708916a3101732fc 23b79c36c6c5b9b35e11159486bf8f1e0a2366af780c9508bfee93de63fdeb86 2b55f40e873b564258185612ea6518761ab9393f271d1acd3908d65dda91c3f2 2d6b0b02396b515544d508ace60ef5de186961843c6fda12c311716c63b631b4 47fce8ed6989d5946ef8b4a10898d103ded7ffe6d5046d1583aefa21218cbe49 48b4df7d8192fb653ca5d4ef80903794b6cf7baa25bca70624acbcafd1c5f4e1 514e41ef73aa0e6b581168304fc5e4c11a81706d4a00e8dadd8c5e604493e85f 5822b7304c297b694c9826e07c653d1a5071af711f24abf374213dbf73df99d8 69808dfac8e39bb71644ca5b9a354c8407d713e723c49a2bb54ba6a6f54e52d3 699b83596749933b26e4a8cd79df7e961859dce598a28b0a09a7d1a6ef051ba5 714042e00adf37f5772ade261d283e66bfd787ba4622ff188ec9befc05817bcb 82fd5b23902d7114095c356c9820e65b89d7c4dd5da1312e262373608e536e4e 8f0ab0d5a8d06ffb54e69dec00c3d2e920794be65cb3b9f316a04af9c3d3ed35 96e0342a3295906bf604f8fcffb8845e3d4a72ceb8ca34443f54216616467ddc 97f3a82738d8dc6703828c406ecafd16acbc019bf8c810516912302ec1d2b553 a925cb47ff812a85faee0d1a39c2f16ac6b99dff405d01741fc253ec76cf29aa ac2c823fe5be07bc030e77510922ec076642c5ef5966b0ec56b6dfefcba06e34 aee901442f82ad32986e1c36969d48d76d4cc88bb8b084d0a2749220a86a26b5
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network Security N/A
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid




Doc.Dropper.Emotet-7181950-0

Indicators of Compromise

Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\FILEEXTS\.JS\OPENWITHPROGIDS
Value Name: JSFile
38
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\FILEEXTS\.JS 38
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\FILEEXTS\.JS\OPENWITHPROGIDS 38
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\FILEEXTS\.JS\OPENWITHLIST 38
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\OFFICE\14.0\WORD\TEXT CONVERTERS\IMPORT\RECOVER
Value Name: Name
37
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\OFFICE\14.0\WORD\TEXT CONVERTERS\IMPORT\RECOVER
Value Name: Path
37
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\OFFICE\14.0\WORD\TEXT CONVERTERS\IMPORT\RECOVER
Value Name: Extensions
37
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\OFFICE\14.0\WORD\TEXT CONVERTERS\IMPORT\WRDPRFCTDOS
Value Name: Name
37
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\OFFICE\14.0\WORD\TEXT CONVERTERS\IMPORT\WRDPRFCTDOS
Value Name: Path
37
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\OFFICE\14.0\WORD\TEXT CONVERTERS\IMPORT\WRDPRFCTDOS
Value Name: Extensions
37
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\OFFICE\14.0\WORD\TEXT CONVERTERS\IMPORT\WORDPERFECT6X
Value Name: Name
37
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\OFFICE\14.0\WORD\TEXT CONVERTERS\IMPORT\WORDPERFECT6X
Value Name: Path
37
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\OFFICE\14.0\WORD\TEXT CONVERTERS\IMPORT\WORDPERFECT6X
Value Name: Extensions
37
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\YELLOWREPORTS
Value Name: Type
37
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\YELLOWREPORTS
Value Name: Start
37
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\YELLOWREPORTS
Value Name: ErrorControl
37
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\YELLOWREPORTS
Value Name: ImagePath
37
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\YELLOWREPORTS
Value Name: DisplayName
37
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\YELLOWREPORTS
Value Name: WOW64
37
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\YELLOWREPORTS
Value Name: ObjectName
37
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\OFFICE\14.0\WORD\TEXT CONVERTERS 37
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\OFFICE\14.0\WORD\TEXT CONVERTERS\IMPORT 37
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\OFFICE\14.0\WORD\TEXT CONVERTERS\IMPORT\RECOVER 37
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\OFFICE\14.0\WORD\TEXT CONVERTERS\IMPORT\WRDPRFCTDOS 37
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\OFFICE\14.0\WORD\TEXT CONVERTERS\IMPORT\WORDPERFECT6X 37
MutexesOccurrences
Global\I98B68E3C37
Global\M98B68E3C37
Global\M3C28B0E419
Global\I3C28B0E419
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
181[.]123[.]0[.]12515
18[.]217[.]99[.]16415
119[.]159[.]150[.]17613
80[.]240[.]141[.]14113
184[.]69[.]214[.]9413
186[.]75[.]241[.]23011
124[.]240[.]198[.]6611
209[.]182[.]195[.]229
173[.]194[.]68[.]108/318
69[.]43[.]168[.]2328
104[.]31[.]71[.]1828
110[.]36[.]234[.]1468
197[.]211[.]244[.]68
125[.]99[.]61[.]1628
115[.]88[.]70[.]2268
207[.]204[.]50[.]447
217[.]116[.]0[.]2287
162[.]251[.]80[.]266
104[.]31[.]70[.]1826
72[.]167[.]238[.]295
74[.]208[.]5[.]155
196[.]25[.]211[.]1505
17[.]36[.]205[.]745
217[.]116[.]0[.]2375
148[.]72[.]198[.]2475
*See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
themodifiedzone[.]com15
www[.]pics4game[.]com14
www[.]creativespad[.]com9
smtpout[.]secureserver[.]net8
smtp[.]secureserver[.]net7
mail[.]secureserver[.]net6
mail[.]apnabazar[.]co[.]in6
smtp[.]1and1[.]es5
smtp[.]mail[.]com5
pop[.]secureserver[.]net5
secure[.]emailsrvr[.]com5
mail[.]heraldsopenaccess[.]com5
mail[.]heraldsopenaccess[.]us5
smtp[.]mail[.]me[.]com4
pop3[.]telkomsa[.]net4
smtp[.]telkomsa[.]net4
outlook[.]office365[.]com4
smtp[.]orange[.]fr4
remote[.]jubileelife[.]com4
mail[.]keycargroup[.]es4
server[.]isnstores[.]com4
mail[.]r10networks[.]com4
smtp-mail[.]outlook[.]com3
smtp[.]comcast[.]net3
mail[.]rediffmailpro[.]com3
*See JSON for more IOCs
Files and or directories createdOccurrences
%LOCALAPPDATA%\Microsoft\Schemas\MS Word_restart.xml38
%TEMP%\0.7055475.js38
%TEMP%\<random, matching '[a-z]{3}[A-F0-9]{3,4}'>.tmp38
%System32%\adjustmove.exe (copy)19
%SystemRoot%\SysWOW64\yellowreportsb.exe5
%SystemRoot%\SysWOW64\<random, matching '[a-zA-Z0-9]{4,19}'>.exe4
%TEMP%\inq6vpuc4.exe1
%TEMP%\llh1np4ba.exe1
%TEMP%\x5ra7abr9.exe1
%TEMP%\tlcebiev2.exe1
%TEMP%\qy2w0i9c1.exe1
%TEMP%\jrtj6nk6o.exe1
%TEMP%\fe2zt4mrb.exe1
%TEMP%\zmmkb0j7x.exe1
%TEMP%\ns8q8axim.exe1
%TEMP%\s1ucq6p8d.exe1
%TEMP%\fxmnkq4qt.exe1
%TEMP%\4l4u8k8s6.exe1
%TEMP%\lvn7pj1tq.exe1
%TEMP%\qz03ja0fx.exe1
%TEMP%\o2a6n5yed.exe1
%TEMP%\h04mv88ph.exe1
%TEMP%\9m0sfw639.exe1
%TEMP%\waymo412t.exe1
%TEMP%\9611f6amr.exe1
*See JSON for more IOCs

File Hashes

04506f92dbebbdad34850d0344014c9acf170a1f532660d18512975d62756fbd 16a9929e17b9fcc99f8d2eb5ec86b365239b0f957b187594f77319540ce5e5f1 1b5fd4653bdbb88ef0615c3a4b38e642630fddfd738ceafb893b6c860beb117a 1be7caaba5194edf4387892d03521e968be5fa4b784a833b0c6321285694a660 1cfe976389fe9d737b7419de0fac59fa4dce4e78c73714124b1689011e3ce732 1f8d4a7a30a8f819c87095b98c10328764b56a877915105815442f4192804571 26706d48f23fdb7c40aca350271921e8050870ce4f6d957d94ad308dd3f409a2 298762d4a2ff39b2de5427c13ff95e75a4f4ac07b5f64c46d82ee1043fc52ed8 2b05fd27faf1cc06b2db7e25b67e19ce5ff5c7852e61bf122eaae92345b54a77 2e8ec9034066e25159978c9c8429e0b2762a2e193a48a0d14fe5a45518c5b5a8 3643f64d1633ebca53e1f94f6aba030cc495b68942b532afae9c74f8016d631f 4331d5382007c68ac994c5a45e86985d8fcde1fb478aa69b394a19058d807f67 471ebd4880bf8cfee1920152ea36f170cf9331f37e45bf52f5b9bcfcbd326ffb 4781987ed5962518144b03612044b8dea7e5a29107a2ad2f7a2c0738313586ee 4e2f28c6260342e1d56264f6cb861d81987fff70905700660034a240c59d75d9 4ebd8502f68223342be072867f79338fb13dfe6b68b209bfdb27f5effef40d05 5fae5b96569a4759bd5cc6494b24edef1639bcc28ed105bc3eb8f9fa09bca4c9 7362434686fb62fe3ce77a4ea84886f0f82768112b6f9832cc86bbdfc83bdef9 7c067959175e72df745b86f91dd1fa402f4b3b3c0ad17ca70b77a1f6185a285c 7d06e0759eafca0709823dadb15c5d37c7a3cada38bad9bcb4ca678d3895bfb0 807cfe5cb5d6075af492a911fd096b0a3705f9fe7cd0a7263d94e4efa21a50f4 857f05b3df88059eeeaecea4da6901ad6e45e5cbb9be21d1ae7d17b946cba355 86c47685c49f4d0cec1c54b0b6cc8247ebd8c17b01a63da2ac19c0b02d426ebd 89763a9eefa6606d925392aa2718facb16958916ee2564025edcd1d74712536b a0703d7150ce06752f04e53ea2ad6f102551e1bdb8588fdc2e6bf90668e1de7e
*See JSON for more IOCs

Coverage

ProductProtection
AmpThis has coverage
Cloudlock N/A
CwsThis has coverage
Email SecurityThis has coverage
Network SecurityThis has coverage
Stealthwatch N/A
Stealthwatch Cloud N/A
Threat GridThis has coverage
UmbrellaThis has coverage
WsaThis has coverage

Screenshots of Detection

AMP


ThreatGrid


Umbrella


Malware




Exploit Prevention

Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
CVE-2019-0708 detected - (12639)
An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP request). Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
Excessively long PowerShell command detected - (5242)
A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
Madshi injection detected - (2444)
Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
Kovter injection detected - (933)
A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
Process hollowing detected - (443)
Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
Atom Bombing code injection technique detected - (389)
A process created a suspicious Atom, which is indicative of a known process injection technique called Atom Bombing. Atoms are Windows identifiers that associate a string with a 16-bit integer. These Atoms are accessible across processes when placed in the global Atom table. Malware exploits this by placing shell code as a global Atom, then accessing it through an Asynchronous Process Call (APC). A target process runs the APC function, which loads and runs the shellcode. The malware family Dridex is known to use Atom Bombing, but other threats may leverage it as well.
Gamarue malware detected - (195)
Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
Dealply adware detected - (186)
DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
Trickbot malware detected - (174)
Trickbot is a banking Trojan which appeared in late 2016. Due to the similarities between Trickbot and Dyre, it is suspected some of the individuals responsible for Dyre are now responsible for Trickbot. Trickbot has been rapidly evolving over the months since it has appeared. However, Trickbot is still missing some of the capabilities Dyre possessed. Its current modules include DLL injection, system information gathering, and email searching.
Installcore adware detected - (116)
Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.

Microsoft Patch Tuesday — Oct. 2019: Vulnerability disclosures and Snort coverage

$
0
0











By Jon Munshaw.

Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday discloses 60 vulnerabilities, nine of which are considered "critical," with the rest being deemed "important."

This month’s security update covers security issues in a variety of Microsoft services and software, the Chakra Scripting Engine, the Windows operating system and the SharePoint software.

Talos also released a new set of SNORTⓇ rules that provide coverage for some of these vulnerabilities. For more, check out the Snort blog post here.

Critical vulnerabilities

Microsoft disclosed nine critical vulnerabilities this month, eight of which we will highlight below.

CVE-2019-1333 is a client-side remote execution vulnerability in Remote Desktop Services (RDP) that occurs when a user visits a malicious server. An attacker could exploit this vulnerability by having control of a malicious server, and then convincing the user to connect to it — likely via social engineering or a man-in-the-middle attack. An attacker could also compromise a legitimate server and then host malicious code on it, waiting for a user to connect. If successful, the attacker could gain the ability to remotely execute code on the victim machine that connected to the server.

CVE-2019-1238 and CVE-2019-1239 are remote code execution vulnerabilities that exist in the way VBScript handles objects in memory. These bugs all could lead to memory corruption in a way that would allow an attacker to execute arbitrary code on the victim machine. An attacker could exploit these vulnerabilities by tricking a user into visiting a specially crafted, malicious website through Internet Explorer. They could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that utilizes the Internet Explorer rendering engine.

CVE-2019-1307, CVE-2019-1308, CVE-2019-1335 and CVE-2019-1366 are all memory corruption vulnerabilities in the Chakra Scripting Engine inside of the Microsoft Edge web browser. An attacker could use these bugs to corrupt memory on the victim machine in a way that would allow them to remotely execute arbitrary code. A user could trigger these vulnerabilities by visiting a specially crafted, malicious website in Edge.

CVE-2019-1372 is an elevation of privilege vulnerability on Azure Stack when the Azure App Service fails to properly check the length of a buffer prior to copying memory to it. An attacker could exploit this vulnerability to copy any function run by the user, thereby executing code in the context of NT AUTHORITY/system, which could allow the attacker to escape a sandbox.

There is also CVE-2019-1060, a remote code execution vulnerability in  Microsoft XML Core Services.

                Important vulnerabilities

                This release also contains 51 important vulnerabilities.

                Coverage 

                In response to these vulnerability disclosures, Talos is releasing a new SNORTⓇ rule set that detects attempts to exploit some of them. Please note that additional rules may be released at a future date and current rules are subject to change pending additional information. Firepower customers should use the latest update to their ruleset by updating their SRU. Open Source Snort Subscriber Rule Set customers can stay up-to-date by downloading the latest rule pack available for purchase on Snort.org.

                These rules are: 51733 - 51736, 51739 - 51742, 51781 - 51794

                Vulnerability spotlight: Multiple vulnerabilities in Schneider Electric Modicon M580

                $
                0
                0

                Jared Rittle and Patrick DeSantis of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw.

                There are several vulnerabilities in the Schneider Electric Modicon M580 that could lead to a variety of conditions, the majority of which can cause a denial of service. The Modicon M580 is the latest in Schneider Electric's Modicon line of programmable automation controllers. The majority of the bugs we will discuss exist in the Modicon's use of FTP.

                In accordance with our coordinated disclosure policy, Cisco Talos worked with Schneider Electric to ensure that these issues are resolved and that an update is available for affected customers. Talos previously disclosed a separate round of vulnerabilities in this product in June.

                Vulnerability details

                Schneider Electric Modicon M580 FTP cleartext authentication vulnerability (TALOS-2019-0827/CVE-2019-6846)

                An exploitable information disclosure vulnerability exists in the FTP functionality of the Schneider Electric Modicon M580 Programmable Automation Controller, firmware version SV2.80. An attacker can sniff network traffic to exploit this vulnerability.

                For more information on this vulnerability, read the complete advisory here.

                Schneider Electric Modicon M580 mismatched firmware image FTP upgrade denial-of-service vulnerability (TALOS-2019-0825/CVE-2019-6844)

                An exploitable denial of service vulnerability exists in the FTP firmware update functionality of the Schneider Electric Modicon M580 Programmable Automation Controller firmware version SV2.80. A specially crafted firmware image can cause the device to enter a recoverable fault state, resulting in a stoppage of normal device execution. An attacker can use default credentials to send commands that trigger this vulnerability.

                For more information on this vulnerability, read the complete advisory here.

                Schneider Electric Modicon M580 malformed firmware image FTP upgrade denial-of-service vulnerability (TALOS-2019-0824/CVE-2019-6843)

                An exploitable denial-of-service vulnerability exists in the FTP firmware update function of the Schneider Electric Modicon M580 Programmable Automation Controller, firmware version SV2.80. A specially crafted firmware image can cause the device to enter a recoverable fault state, resulting in a stoppage of normal device execution. An attacker can use default credentials to send commands that trigger this vulnerability.

                For more information on this vulnerability, read the complete advisory here.

                Schneider Electric Modicon M580 FTP incomplete firmware update denial-of-service vulnerability (TALOS-2019-0823/CVE-2019-6842)

                An exploitable denial-of-service vulnerability exists in the FTP firmware update function of the Schneider Electric Modicon M580 Programmable Automation Controller, firmware version SV2.80. A specially crafted set of FTP commands can cause the device to enter a recoverable fault state, resulting in a stoppage of normal device execution. An attacker can use default credentials to send commands that trigger this vulnerability.

                For more information on this vulnerability, read the complete advisory here.

                Schneider Electric Modicon M580 FTP firmware update loader service denial-of-service vulnerability (TALOS-2019-0822/CVE-2019-6841)

                An exploitable denial-of-service vulnerability exists in the FTP firmware update service function of the Schneider Electric Modicon M580 Programmable Automation Controller, firmware version SV2.80. A specially ordered set of FTP commands can cause the FTP loader service to enter a waiting state, resulting in an inability to update device firmware via FTP. An attacker can use default credentials to send commands that trigger this vulnerability.

                For more information on this vulnerability, read the complete advisory here.

                Schneider Electric Modicon M580 UMAS cleartext data transmission vulnerability (TALOS-2019-0826/CVE-2019-6845)

                An exploitable information disclosure vulnerability exists in the UMAS functionality of the Schneider Electric Modicon M580 Programmable Automation Controller, firmware version SV2.80. An attacker can sniff network traffic to exploit this vulnerability.

                For more information on this vulnerability, read the complete advisory here.

                Schneider Electric Modicon M580 outdated firmware image FTP upgrade denial-of-service vulnerability (TALOS-2019-0847/CVE-2019-6847)

                An exploitable denial-of-service vulnerability exists in the FTP firmware update functionality of the Schneider Electric Modicon M580 Programmable Automation Controller, firmware version SV2.80. An outdated firmware image can cause the device to enter a non-recoverable fault state, resulting in a complete stoppage of remote communications with the device. An attacker can use default credentials to send commands that trigger this vulnerability. There is no explicit patch available for this vulnerability, but Schneider has released a mitigation.

                For more information on this vulnerability, read the complete advisory here.


                Schneider Electric Modicon M580 TFTP server information disclosure vulnerability (TALOS-2019-0851/CVE-2019-6851)

                An exploitable information disclosure vulnerability exists in the TFTP server functionality of the Schneider Electric Modicon M580 Programmable Automation Controller. A specially crafted TFTP get request can cause a file download, resulting in disclosure of sensitive information. An attacker can send unauthenticated commands to trigger this vulnerability. 

                For more information on this vulnerability, read the complete advisory here.

                Versions affected

                Talos tested and confirmed that the Schneider Electric Modicon M580, BMEP582040 SV2.80, is affected by these vulnerabilities. TALOS-2019-0847 affects the same version if it's downgraded to SV2.10.

                Coverage

                The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                Snort Rules: 49982, 49983

                Vulnerability Spotlight: Multiple remote code execution bugs in NitroPDF

                $
                0
                0

                Cory Duplantis and Aleksandar Nikolic of Cisco Talos discovered these vulnerabilities.

                Cisco Talos recently discovered multiple remote code execution vulnerabilities in NitroPDF. Nitro PDF allows users to save, read, sign and edit PDF files on their machines. There are two versions of the product: a free and a paid version called “Pro.” The paid version offers several features the free one does not, including the ability to combine multiple PDFs into one file and to redact sensitive information in the file. These bugs all exist in the Pro version of the software.

                In accordance with Cisco's vulnerability disclosure policy, we are disclosing these vulnerabilities without a patch from NitroPDF due to the expiration of our 90-day deadline.

                Vulnerability details

                NitroPDF jpeg2000 ssizDepth remote code execution vulnerability (TALOS-2019-0814/CVE-2019-5045)

                A specifically crafted jpeg2000 file embedded in a PDF file can lead to a heap corruption when opening a PDF document in NitroPDF 12.12.1.522. With careful memory manipulation, this can lead to arbitrary code execution. In order to trigger this vulnerability, the victim would need to open the malicious file.

                Read the complete vulnerability advisory here for additional information.

                NitroPDF Page Kids remote code execution vulnerability (TALOS-2019-0819/CVE-2019-5050)

                A specifically crafted PDF file can lead to a heap corruption vulnerability when opened in NitroPDF, version 12.12.1.522. With careful memory manipulation, this can lead to arbitrary code execution. In order to trigger this vulnerability, the victim would need to open the malicious file.

                Read the complete vulnerability advisory here for additional information.

                NitroPDF ICCBased color space remote code execution vulnerability (TALOS-2019-0817/CVE-2019-5048)

                A specifically crafted PDF file can lead to a heap corruption when opened in NitroPDF 12.12.1.522. With careful memory manipulation, this can lead to arbitrary code execution. In order to trigger this vulnerability, the victim would need to open the malicious file.

                Read the complete vulnerability advisory here for additional information.

                NitroPDF CharProcs remote code execution vulnerability (TALOS-2019-0816/CVE-2019-5047)

                An exploitable use-after-free vulnerability exists in the CharProcs-parsing function of NitroPDF. A specially crafted PDF can cause a type confusion, resulting in a use after free. An attacker can craft a malicious PDF to trigger this vulnerability.

                Read the complete vulnerability advisory here for additional information.

                NitroPDF jpeg2000 yTsiz remote code execution vulnerability (TALOS-2019-0815/CVE-2019-5046)

                A specifically crafted jpeg2000 file embedded in a PDF file can lead to a heap corruption when opening a PDF document in NitroPDF 12.12.1.522. With careful memory manipulation, this can lead to arbitrary code execution. In order to trigger this vulnerability, the victim would need to open the malicious file.

                Read the complete vulnerability advisory here for additional information.

                NitroPDF stream length memory corruption vulnerability (TALOS-2019-0830/CVE-2019-5053)

                An exploitable use-after-free vulnerability exists in the Length parsing function of NitroPDF. A specially crafted PDF can cause a type confusion, resulting in a use-after-free condition. An attacker can craft a malicious PDF to trigger this vulnerability.

                Read the complete vulnerability advisory here for additional information.

                Versions tested

                Talos tested and confirmed that version NitroPDF, version 12.12.1.522 is affected by these vulnerabilities.

                Coverage

                The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                Snort Rules: 49906 - 49911, 49948 - 49950


                Talos takes home top research honors at Virus Bulletin conference

                $
                0
                0

                By Jon Munshaw

                Researchers from Cisco Talos brought up the top award at this year’s Virus Bulletin conference.

                Talos received the Péter Ször Award— named for the prolific security researcher who was a longtime contributor to Virus Bulletin and passed away in 2013 — for our research into several DNS-related attacks over the past year.


                The award “aims to recognize the best piece of technical security research published each year,” according to Virus Bulletin, and was awarded at the annual Virus Bulletin conference last week. It is widely considered the most prestigious award in the field of threat research. Szor was one of the pioneers of malware research, publishing several original findings on threat hunting and spending time working at Symantec, McAfee and Pasteur AntiVirus. Talos researchers Paul Rascagneres and Warren Mercer were in attendance to receive the award, and also presented their research at the conference.



                Virus Bulletin specifically honored Talos for the article “DNS hijacking abuses trust in core internet service,” which covered the campaign we called “Sea Turtle.” In the post, we outlined the work of a state-sponsored attacker that manipulated DNS to unknowingly send users to malicious websites.

                “This research not only details the specific activities of the Sea Turtle actor, it also highlights the weak spot DNS is in the global internet infrastructure,” Martijn Grooten, the editor of Virus Bulletin, said. “Though the award is given for this specific research, one should also note that these authors are very prolific contributors to the threat intelligence conversation.”

                DNS is a major foundation of the internet, and any attacks on it or manipulation of that system have the potential to undermine the trust users have in the internet. Based off this attack, we emphasized that nation-states should avoid targeting DNS as part of any cyber attacks, and called on world governments and the security industry to agree on the standard that DNS and the organizations that control it are off-limits, and to push back against any attackers that target the system.

                Sea Turtle targeted public and private entities primarily located in the Middle East and North Africa, even going after national security organizations. Talos believes these attacks could have begun as early as January 2017. At least 40 different organizations across 13 countries were compromised during this campaign.

                The actors behind Sea Turtle used DNS hijacking to trick users into visiting malicious websites. In these kinds of campaigns, the attackers illicitly modify DNS name records to point users to an actor-controlled server. The Department of Homeland Security even issued an alert on these kinds of attacks on Jan. 24, warning that an attacker could redirect user traffic and obtain users’ encryption certificates to then re-use inside the user’s organization’s domain names.

                This wouldn’t be Talos’ only foray into the world of DNS. In July, we discovered Sea Turtle was still active, utilizing a likely new DNS hijacking technique to go after additional victims. This time, Sea Turtle compromised a country’s code top-level domain (ccTLD) registry, which manages the DNS records for every domain that uses that country’s code. They then used that access to compromise additional government entities.

                DNS attacks are not going to go away any time soon, and if actors continue down this path, it could be very dangerous for the internet at large. We appreciate Virus Bulletin highlighting the importance of this research and the hard work of all our researchers who assisted with it.

                New IDA Pro plugin provides TileGX support

                $
                0
                0
                By Jonas Zaddach

                Overview

                Cisco Talos has a new plugin available for IDA Pro that provides a new disassembler for TileGX binaries. This tool should assist researchers in reverse-engineering threats in IDA Pro that target TileGX.

                We started developing this tool after the VPNFilter campaign last year, where attackers targeted hundreds of wireless routers across the globe. During our research of this attack, Talos researchers came across several sophisticated malware samples targeting Tilera's TileGX processor architecture. Processors based on TileGX are used in many small and home office routers (SOHO), which were the primary targets in VPNFilter. The analysis toolset for this architecture is quite limited: objdump is capable of disassembling the ELF binaries but more sophisticated and easier-to-use tools such as IDA Pro and Ghidra are not.

                This prompted us to look into developing an IDA Pro processor module. As libopcode —, the library powering objdump — already has support for the TileGX architecture, it seemed obvious to build the module on this library, instead of trying to write our own instruction decoder. Due to speed considerations, that also meant developing a processor module in C++, as opposed to most online available open-source processor modules written in Python. Luckily, the IDA Pro SDK has good source code examples of processor modules, which were a great help.

                The resulting processor module provides a working disassembler for TileGX programs. It is not the fastest at the moment, and due to the binutils dependency, it currently only compiles on Linux, but it should help any reverse engineer who has to look into threats targeting the TileGX architecture.

                Building and installing

                You can either download the pre-compiled plugin provided by us and copy it to your IDA Pro installation's plugin/ folder or compile the plugin yourself. As mentioned before, both are available only for Linux, as building on Windows or MacOS is not supported yet.

                The build process has been tested with IDA Pro 7.3 on Linux (Ubuntu 18.04). We recommend to use the same environment. After downloading the source code from github. Create the file idacfg.mk in the source code directory with the following content:

                idabin=<PATH TO YOUR IDA INSTALLATION>

                idasdk=<PATH TO YOUR IDA SDK DIRECTORY>

                Then run:

                make -f Makefile.linux install

                to build and install the plugin.

                Usage

                Start ida64. Select "Tilera Tile-GX" as processor in the dialog when opening the malware file. Accept to change the processor type. Enjoy the the TileGX disassembly.



                Talos is releasing this alpha version knowing that it may contain a few bugs and can be improved upon in the future, but we still wanted to share with the community in the early stages. Please see the source code for where to send issues, bug reports and feature requests. Feel free to contact the author if you run into issues. We would also like to thank Igor Skochinsky from Hex-Rays who helped Talos hunt down a bug during the build process.


                Threat Source newsletter (Oct. 10, 2019)

                $
                0
                0

                Newsletter compiled by Jon Munshaw.

                Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

                It’s that time again to update all your Microsoft products. The company released its monthly update Tuesday, disclosing more than 60 vulnerabilities in a variety of its products. This month’s security update covers security issues in a variety of Microsoft services and software, the Chakra Scripting Engine, the Windows operating system and the SharePoint software. We’ve got a rundown of the most important bugs here, and all our Snort coverage here.

                We also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week.

                P.S., we have to give ourselves a pat on the back for the researchers who took home the top honors at the Virus Bulletin conference, winning the Péter Ször Award.

                Upcoming public engagements with Talos

                Event: “It’s Never DNS…. It Was DNS: How Adversaries Are Abusing Network Blind Spots”  at SecureWV/Hack3rCon X
                Location: Charleston Coliseum & Convention Center, Charleston, WV
                Date: Nov. 15 - 17
                Speakers: Edmund Brumaghin and Earl Carter
                Synopsis: While DNS is one of the most commonly used network protocols in most corporate networks, many organizations don’t give it the same level of scrutiny as other network protocols present in their environments. DNS has become increasingly attractive to both red teams and malicious attackers alike to easily subvert otherwise solid security architectures. This presentation will provide several technical breakdowns of real-world attacks that have been seen leveraging DNS for a variety of purposes such as DNSMessenger, DNSpionage, and more.

                Event: Talos at BSides Belfast 
                Location: Titanic Belfast, Belfast, Northern Ireland
                Date: Oct. 31
                Synopsis: Several researchers from Talos will be on hand at BSides Belfast to deliver four different talks. Martin Lee will provide a general overview of the benefits of threat hunting, Nick Biasini and Edmund Brumaghin will walk through a recent wave of supply chain attacks, then, Brumahin and Earl Carter will deliver their “It’s Never DNS....It Was DNS” talk, and, finally, Paul Rascagneres walks through his recent research into attacks on iOS.

                Cyber Security Week in Review

                • Apple released the new Catalina operating system this week, and it comes with several new security features. However, researchers have already discovered a series of vulnerabilities, including memory corruption and buffer overflow. 
                • The U.S. government is increasingly using the exploitation of minors as an argument for anti-encryption measures. But security experts are concerned this could mislead the general public about the benefits of encryption. 
                • An Iranian hacker group believed to be behind an attack on a U.S. presidential candidate is now turning their attention toward the researchers who outed them. The group known as “Charming Kitten” set up a web-mail page designed to compromise security experts. 
                • Twitter says it’s used emails and phone numbers attached to two-factor authentication to deliver targeted ads. The social media site says it does not know how many users were affected. 
                • Apple removed an app from its store that protestors in Hong Kong used to track Chinese police presence. This was just the latest move from the Chinese government to put pressure one U.S. businesses in relation to the ongoing unrest in Hong Kong. 
                • The FBI misused its own data to vet their own employees and other American citizens. A recently unsealed court document revealed several instances where the agency improperly used information to run queries on certain individuals, all eventually discovered by the United States Foreign Intelligence Surveillance Court. 
                • The GitHub code repository is currently facing backlash from its employees over its partnership with the U.S. Immigration and Customs Enforcement (ICE). GitHub is reportedly preparing to renew a contract for ICE to license its GitHub Enterprise Server. 
                • Security researchers found another swath of apps on the Google Play store that deployed malware onto users’ devices. The apps, which disguised themselves as video games and photo editing services, were actually trojans, adware, spyware and data stealers. 
                • A new report from the U.S. Senate’s Intelligence Committee states that Russia’s disinformation campaign to influence U.S. elections is nowhere near over. The study also points out that many of these campaigns specifically target the African American community. 

                Notable recent security issues

                Title:Microsoft discloses 60 vulnerabilities as part of monthly security update
                Description: Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday discloses 60 vulnerabilities, nine of which are considered "critical," with the rest being deemed "important."
                This month’s security update covers security issues in a variety of Microsoft services and software, the Chakra Scripting Engine, the Windows operating system and the SharePoint software.
                Snort SIDs: 51733 - 51736, 51739 - 51742, 51781 - 51794

                Title: Multiple vulnerabilities in Schneider Electric Modicon M580 
                Description: There are several vulnerabilities in the Schneider Electric Modicon M580 that could lead to a variety of conditions, the majority of which can cause a denial of service. The Modicon M580 is the latest in Schneider Electric's Modicon line of programmable automation controllers. The majority of the bugs exist in the Modicon's use of FTP. Schneider Electric Modicon M580, BMEP582040 SV2.80, is affected by these vulnerabilities.
                Snort SIDs: 49982, 49983

                Most prevalent malware files this week

                SHA 256: 3f6e3d8741da950451668c8333a4958330e96245be1d592fcaa485f4ee4eadb3 
                MD5: 47b97de62ae8b2b927542aa5d7f3c858
                Typical Filename: qmreportupload.exe
                Claimed Product: qmreportupload
                Detection Name: Win.Trojan.Generic::in10.talos

                SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510 
                MD5: 4a50780ddb3db16ebab57b0ca42da0fb
                Typical Filename: xme64-2141.exe
                Claimed Product: N/A
                Detection Name: W32.7ACF71AFA8-95.SBX.TG

                SHA 256: ce8cb7c8dc29b9e4feab463fdf53b569b69e6a5c4ab0e50513b264563d74a6ac
                MD5: 0e02555ede71bc6c724f9f924320e020
                Typical Filename: dllhostex.exe
                Claimed Product: Microsoft® Windows® Operating System
                Detection Name: W32.CoinMiner:CryptoMinerY.22k3.1201

                SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f 
                MD5: e2ea315d9a83e7577053f52c974f6a5a
                Typical Filename: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f.bin 
                Claimed Product: N/A
                Detection Name: W32.AgentWDCR:Gen.21gn.1201 

                SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b 
                MD5: 799b30f47060ca05d80ece53866e01cc
                Typical Filename: mf2016341595.exe
                Claimed Product: N/A
                Detection Name: W32.Generic:Gen.22fz.1201 

                Beers with Talos Ep. #63: The third law of thermodynamics

                $
                0
                0


                Beers with Talos (BWT) Podcast episode No. 63 is now available. Download this episode and subscribe to Beers with Talos:

                If iTunes and Google Play aren't your thing, click here.

                Recorded Sept. 27, 2019 

                We are missing Matt and Joel this time, so Mitch, Craig and Nigel are taking you through this episode. We cover some recent posts from Talos with Divergent and Tortoiseshell. Turns out, people get a bit excited when you target U.S. veterans with malware — even other malware authors thinks that’s scummy. That takes us into a chat about social engineering in general, and we end up talking about some interesting stuff with unpatchable vulnerabilities and why deleting /var on install could be described as "a bad idea" for a Google Chrome update.

                The timeline:

                • 01:00 — Roundtable: Hammering off your thumb...guess who did that one?
                • 09:30 — Divergent LO(BYOL)Bins: Bringing NodeJS with you does not a LOLbin make
                • 19:45 — Tortoiseshell: Social engineering vets looking for jobs makes you a special kind of scumbag
                • 34:00 — Social engineering and Newton’s third law
                • 38:30 — Selecting VPN providers that don’t make you the product
                • 45:00 — Unpatchable BootROM zero-day in iPhones, and let's delete /var!
                • 52:30 — Closing shots and parting thoughts

                Some other links:

                ==========

                Featuring: Craig Williams (@Security_Craig) and Nigel Houghton (@EnglishLFC).
                Hosted by Mitch Neff (@MitchNeff)

                Subscribe via iTunes (and leave a review!)


                Subscribe to the Threat Source newsletter


                Give us your feedback and suggestions for topics: beerswithtalos@cisco.com

                Threat Roundup for October 4 to October 11

                $
                0
                0
                Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Oct. 4 and Oct. 11. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

                As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

                For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
                The most prevalent threats highlighted in this roundup are:
                Threat NameTypeDescription
                Win.Dropper.TrickBot-7288419-0 Dropper Trickbot is a banking trojan targeting sensitive information for select financial institutions. This malware is frequently distributed through malicious spam campaigns. Many of these campaigns rely on downloaders for distribution, such as VB scripts.
                Win.Dropper.Qakbot-7287972-0 Dropper Qakbot, aka Qbot, has been around since at least 2008. Qbot primarily targets sensitive information like banking credentials but can also steal FTP credentials and spread across a network using SMB.
                Win.Trojan.Emotet-7287811-0 Trojan Emotet is one of the most widely distributed and active malware families today. It is a highly modular threat that can deliver a wide variety of payloads. Emotet is commonly delivered via Microsoft Office documents with macros, sent as attachments on malicious emails.
                Win.Worm.Vobfus-7198158-0 Worm Vobfus is a worm that copies itself to external drives and attempts to gain automatic code execution via autorun.inf files. It also modifies the registry so that it will run when the system is booted. Once installed, it attempts to download follow-on malware from its command and control (C2) servers.
                Win.Dropper.Upatre-7196259-0 Dropper Upatre is a trojan that is often delivered through spam emails with malicious attachments or links. It is known to be a downloader and installer for other malware.

                Threat Breakdown

                Win.Dropper.TrickBot-7288419-0

                Indicators of Compromise

                MutexesOccurrences
                Global\316D1C7871E1064
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                190[.]152[.]4[.]21017
                37[.]228[.]117[.]1469
                31[.]184[.]253[.]379
                181[.]113[.]20[.]1866
                185[.]222[.]202[.]2226
                51[.]68[.]247[.]625
                194[.]5[.]250[.]825
                51[.]254[.]69[.]2445
                91[.]132[.]139[.]1705
                116[.]203[.]16[.]954
                189[.]80[.]134[.]1224
                203[.]23[.]128[.]1684
                46[.]30[.]41[.]2294
                37[.]44[.]212[.]2164
                216[.]239[.]38[.]213
                185[.]248[.]87[.]883
                138[.]59[.]233[.]53
                190[.]154[.]203[.]2183
                187[.]58[.]56[.]263
                177[.]103[.]240[.]1493
                200[.]21[.]51[.]383
                5[.]230[.]22[.]403
                200[.]153[.]15[.]1783
                198[.]27[.]74[.]1462
                146[.]196[.]122[.]1672
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                250[.]5[.]55[.]69[.]zen[.]spamhaus[.]org12
                ip[.]anysrc[.]net4
                api[.]ip[.]sb3
                ipinfo[.]io3
                checkip[.]amazonaws[.]com2
                wtfismyip[.]com2
                api[.]ipify[.]org2
                www[.]myexternalip[.]com1
                ident[.]me1
                Files and or directories createdOccurrences
                %APPDATA%\netcloud64
                %System32%\Tasks\netcloud free disk64
                %APPDATA%\netcloud\settings.ini64
                %APPDATA%\netcloud\data\systeminfo644
                %APPDATA%\netcloud\data\pwgrab642
                %APPDATA%\netcloud\data\pwgrab64_configs\dpost2

                File Hashes

                01665c3044d0c07559850f4c63b0e83a75d377d47cbb024109af959ab07a84ab 029d508d8b0b8d85d4e9409b4fce7d1e77278e9c287ea413bfc6ef74b04f3f62 02b56e22b5b87c10e1aaa55a64d023c146705bec60a05f663383c58ad2d46ec9 04915554da413b0eec1c972c40dd73f01494e0babbb952511bc471831f09d66a 07037779cf0fd1203023ab1c5d0ca29103ec20b86ef4a1352e0eae887522aaf5 0b0812b19376da99480f2eaa6ef5c50b0ddef28e861d58f72ea2f321d8d5f4a7 11b52fd22db6a8407a7b185bbff4731813f3e5ade255545b0c5aa75e71001d40 139682b035166c0554038c7a3d41d21c1224ca4d8a1f3dc2fdc78b5d162980a3 1452da4d87422fbce37fa81c0357b9093120f39849a39a6b49529d2e88c24601 15e767c8416fff66195618b591a2a2869b42075a81962d760e644504ecbccd7d 1bcc2e0e40cb671020249c818d9580345498198e06e83242ec54c5666c13eeac 1f64de67c63364947a52b85977c30e101cb27151c9d21759db0a7ea2d20d1c76 1fd9de5a0da8baf970b071eec8072dbe8e166c52a520252a7bad4c6cccdb6f5a 2211518528d8df3b3a37b83807f27b3c48e8dc68e427be3d693775dd9281d3dc 2329e7a18e95750266b5865d2cebb2b0ab2db296e99735b1fcf174eabd0364bc 25ed6d3f3dcaa2fb50d9b98b4b18ce5552b8e7f7edb34036dbe223a0e594c61e 28d5358cee665b777f608ab2994f09baeea9f98a53f7631dc18412b58e279e79 2c5e9d6e2caf1b7d0b3d34eefe3f6cba433c5f4d9cb1056788efba86d64070c7 2cb27358ab67c8b99b3ef38653c6e529daf2782415ee4025977853dbecba4135 2fcd6ec5753d814c537cf1d8c0bd40fd71da35fc0daa3464c71061feabccc003 3899c0d52fb831b58971b8cc3676b819623c3cdf394404441e9e3fc5149f2924 39812d745606743e797291736409505e7c8fee6708f1b9cdfd81db696b045f0b 3c0fdeaf8672109d78f05a5409aa4d1a64970e0317d00dce93c2f850ed315444 3ce742d661cf7896361b4419bffe4b457db5996bb437e386ac8725a32ea3775c 3cfd3b1da2d19d3d79479a35570aa2f8c53c5a865307ae39c45dbab34ecd1eb3
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Dropper.Qakbot-7287972-0

                Indicators of Compromise

                MutexesOccurrences
                <random, matching [a-zA-Z0-9]{5,9}>9
                <random, matching [a-fA-F0-9]{10}>6
                NO_HIDE2
                Global\eqfik1
                Global\epieuxzk1
                Global\ulnahjoi1
                Global\utjvfi1
                Global\siexlcvo1
                Global\3e356201-e784-11e9-a007-00501e3ae7b51
                9a1e0bdf466b43e51e62125b6de07886Ð÷# Administra1
                Global\zmzqw1
                Global\hzquyt1
                Global\orprmhqn1
                llvmspnzmgf1
                Global\emiudb1
                siexlcvo/W1
                Global\okqxsvm1
                hnqgbtxnpbgb1
                Global\awfury1
                Global\mesgra1
                Global\esute1
                Global\caypop1
                azvfitrmerda1
                Global\yweieuzg1
                Global\lajpa1
                *See JSON for more IOCs
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                69[.]241[.]80[.]1628
                69[.]241[.]74[.]1708
                69[.]241[.]108[.]588
                69[.]241[.]106[.]1028
                209[.]126[.]124[.]1737
                66[.]96[.]134[.]316
                66[.]7[.]210[.]1906
                65[.]182[.]187[.]526
                181[.]224[.]138[.]2405
                69[.]64[.]56[.]2445
                162[.]144[.]12[.]2415
                208[.]100[.]26[.]2343
                64[.]34[.]169[.]2443
                108[.]61[.]103[.]1753
                193[.]28[.]179[.]1053
                12[.]167[.]151[.]78/313
                216[.]58[.]217[.]1422
                195[.]22[.]28[.]2222
                173[.]227[.]247[.]502
                12[.]167[.]151[.]892
                12[.]167[.]151[.]812
                195[.]22[.]28[.]1991
                173[.]227[.]247[.]491
                173[.]227[.]247[.]341
                173[.]227[.]247[.]591
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                jacksonville-a[.]speedtest[.]comcast[.]net8
                stc-sjos-01[.]sys[.]comcast[.]net8
                stc-fxbo-01[.]sys[.]comcast[.]net8
                www[.]ip-adress[.]com8
                stc-hstn-03[.]sys[.]comcast[.]net8
                boston[.]speedtest[.]comcast[.]net8
                houston[.]speedtest[.]comcast[.]net8
                sanjose[.]speedtest[.]comcast[.]net8
                jacksonville[.]speedtest[.]comcast[.]net8
                wpaoyqevfvmqquvpfwo[.]com3
                ageanrzekiycakzrswcq[.]com3
                utglavlafksmzfcniumfwwbm[.]biz3
                wyrlmssiybtkxemblgkturpw[.]net3
                qguuivkqppwohlzzvjv[.]org3
                ohfckvgylddiulbtgcrdijtpl[.]org3
                zhkclrrbgufzsgljzohs[.]com3
                evvedpvqyno[.]net3
                cyiynudufvqmswxgtdkgyal[.]org3
                fmncuwynktocekwqmthsr[.]net3
                hrmmnxigwodcsbqhcezedv[.]net3
                ohnzjsjoyxmkfpafaouujked[.]biz3
                rpagfveavil[.]com3
                ocqfamsdr[.]org3
                sso[.]anbtr[.]com2
                tnqnpjthcwhhit[.]biz2
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                %APPDATA%\Microsoft\Siexlcvoi\siexlcv.dll1
                %APPDATA%\Microsoft\Siexlcvoi\siexlcvo.exe1
                %APPDATA%\Microsoft\Eqfikq1
                %APPDATA%\Microsoft\Eqfikq\eqfi.dll1
                %APPDATA%\Microsoft\Eqfikq\eqfik.exe1
                %HOMEPATH%\APPLIC~1\AuthHost_86.exe1
                %APPDATA%\Microsoft\Emiudbm\cemiudb32.dll1
                %APPDATA%\Microsoft\Emiudbm\emiud.dll1
                %APPDATA%\Microsoft\Emiudbm\emiudb.exe1
                %APPDATA%\Microsoft\Emiudbm\emiudb32.dll1
                %APPDATA%\Microsoft\Emiudbm\qaodxae.exe1
                %APPDATA%\Microsoft\Siexlcvoi\csiexlcvo32.dll1
                %APPDATA%\Microsoft\Siexlcvoi\siexlcvo32.dll1
                %APPDATA%\Microsoft\Siexlcvoi\u\siexlcvo.exe1
                %APPDATA%\Microsoft\Caypopa\caypo.dll1
                %APPDATA%\Microsoft\Caypopa\caypop.exe1
                %APPDATA%\Microsoft\Caypopa\caypop32.dll1
                %APPDATA%\Microsoft\Caypopa\ccaypop32.dll1
                %APPDATA%\Microsoft\Nkswhk\cnkswh32.dll1
                %APPDATA%\Microsoft\Nkswhk\nksw.dll1
                %APPDATA%\Microsoft\Nkswhk\nkswh.exe1
                %APPDATA%\Microsoft\Nkswhk\nkswh32.dll1
                %APPDATA%\Microsoft\Teubkce\cteubkc32.dll1
                %APPDATA%\Microsoft\Teubkce\ojpgopoc.exe1
                %APPDATA%\Microsoft\Teubkce\teubk.dll1
                *See JSON for more IOCs

                File Hashes

                00ff1db58b6f1e59ab2c2bf8e56160505a45d4a81f6fe1eaa929e64fb1721579 064778a5c62de64d9209efd2a1d07d51e5bba27dec7304adb16cb0f477990da7 10498726da41ce76941828ba2645cd142d14345730ed27ef477ef3360776b70e 1550ddeb6bedfa869544e6acff1b99deef5ed36c5d3e53bb8c54a7dfc1ee7979 16e32d59b24b270c97fc9003ce99d52bbd5d2f8f71066a7ae89489b70230b6ea 2a4d5212548373f2036751006f472fd59796cb1f3ea0a5e3b00ff257dda42d90 2a98486961a037fc69ad76a352cdbd94b9e9b20e935ea2223632616af9cf9164 2f8eaa9d09eea245e077d855496d325833f431c565b0caf376694a20786a360d 33e8352baa3fd5c8657f950f6853c852ab5bc7a8738ef0100393e8840170f689 3c671a2c98bad1d21523542d92d3e7e64f10dc11b71ad877a12d3c716f79d6c5 3ed342a425980d09017f40042c3bc38c995f80b25ebc0ce54f57aa247a399972 433da825e9d75917a8e935ce67e352de3300c2276b8e1e4088ad353f1dc563cd 4567101b5264de0d437095f3dad638f1f663eca77eb737f1c8188133786c42a3 49a262416b8af5718487c966f6d328f12b7dd39c4e48c1d12ec99eb6f67b5bf7 5008602076bc658f669bcbdcdcdae8ac0db03df3d67d59cc8a594916c7e0eab7 546fe2283bec932d0e579545928b7c61aa4865891ae2ae270311cb43d37f24fc 5694eba592c8d2dc736d820dfe10f1cb70fc613595349358e67651b04f8d5f9c 5873b0a3726c51faf9e15170f2cc2cf907da40bd6535886c2f4cc5eb4d1b677f 5a779b62299bf87288404f408ffd1ca26ffb365a1a80a3f0be02634dbb6b0acd 61e897720193eb60766425f7952795081b220bd3fcb84693d127ae08cdc7fd77 64a7ea2afabd89b89154b3e9165e4821194657eaa2df6f3c05513ac57f4269a1 67d275ebe2e3e3653d1a9dfc9e68abe38adaca68e30d4335e974fe9393ed1166 7103e2d1e6b0cb025ba011e3b71b959beb9dba33e919d22ce710703b0cecc9d3 7173180702f16103ff9e12dc30a4d35ffe8e59fed07a9b85b1a8051cccc3443c 75294d7224051e0fc6f7a583941ed6be64270f2296f01a2f907c475bcc604296
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid


                Umbrella




                Win.Trojan.Emotet-7287811-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: Type
                13
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: Start
                13
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: ErrorControl
                13
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: ImagePath
                13
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: DisplayName
                13
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: WOW64
                13
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: ObjectName
                13
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: Description
                13
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL 13
                MutexesOccurrences
                Global\I98B68E3C13
                Global\M98B68E3C13
                Global\M3C28B0E413
                Global\I3C28B0E413
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                80[.]11[.]163[.]13911
                85[.]54[.]169[.]14110
                185[.]14[.]187[.]2014
                45[.]79[.]188[.]674
                63[.]142[.]253[.]1224
                67[.]225[.]229[.]553
                193[.]70[.]18[.]1442
                193[.]252[.]22[.]862
                17[.]36[.]205[.]742
                212[.]227[.]15[.]1422
                213[.]180[.]147[.]1452
                52[.]96[.]40[.]2422
                62[.]149[.]157[.]552
                217[.]116[.]0[.]2282
                62[.]149[.]128[.]1792
                173[.]194[.]68[.]108/312
                82[.]223[.]190[.]138/312
                62[.]28[.]40[.]1551
                82[.]223[.]191[.]2281
                84[.]232[.]4[.]631
                5[.]56[.]56[.]1461
                37[.]187[.]56[.]1661
                134[.]0[.]12[.]481
                213[.]0[.]77[.]511
                208[.]91[.]198[.]1071
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                smtp[.]office365[.]com2
                smtp[.]outlook[.]com2
                smtp[.]1and1[.]es2
                mail[.]comcast[.]net2
                mail[.]1und1[.]de2
                outlook[.]office365[.]com2
                smtp[.]one[.]com2
                smtp[.]orange[.]fr2
                smtp[.]serviciodecorreo[.]es2
                mail[.]gmx[.]net2
                smtp[.]poczta[.]onet[.]pl2
                mail[.]aruba[.]it2
                pop3s[.]aruba[.]it2
                smtp[.]pec[.]aruba[.]it2
                smtp[.]myfbmc[.]com1
                mail[.]amazon[.]com1
                smtp[.]amazon[.]com1
                mail[.]bellnet[.]ca1
                mail[.]hotmail[.]es1
                smtp[.]ogicom[.]pl1
                smtp[.]my[.]tnt[.]com1
                mail[.]pec[.]it1
                mail[.]kovalam[.]es1
                smtp[.]myslide[.]cn1
                smtp[.]tepore[.]com1
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                %SystemRoot%\SysWOW64\<random, matching '[a-zA-Z0-9]{4,19}'>.exe12
                \TEMP\yc3qjv_812.exe1
                \TEMP\njrfqcj58z_23190.exe1
                \TEMP\b2_13022603.exe1
                \TEMP\5tnlmwuu_6728847347.exe1
                \TEMP\feqxn9l_08751690.exe1
                \TEMP\u1p1rr_2846411837.exe1
                \TEMP\93cumzh_740237.exe1
                %SystemRoot%\TEMP\DFFB.tmp1

                File Hashes

                0d2fcaa55a4fa60ddb207a884d8708616afe216172606cb34428696d94d02b55 1d79c23865675ea988e8da616d87729fc029e3da8655a452ec8603c2645ed29c 1eda8a1b220b335de0e0dcc4b1c370f063d3bb8179e78e1aa5aa07d97182e50e 2f2fde0c36731205d5c8139450b3e65c99c4b101632f9e5b359d241bd39bc854 4f525a377c92170b4e0fdb377d84e7046be3fabf13020542889dabfceb3f3290 6e0ff7d8aabe7604957239a4217e8acd18261216c6fd4447c3e3ea061062bad5 7999aecb854548554573e807e3099b3285ffa31244668bda61a60ca02763de48 c2b0637eaa88c02f22d551ece7de3220d4888a7882676fd7b51c6c577140ce51 ce8949e5a1b41b1b1ff2d6d432aef7af6db3c4308b4e58839b9e6958846cd24e d5128c8528eaf67f71aa26c53db2b9035ee95849f03ab991ae9805bf4c07f496 e142a57f84461cad1faea965d00decb6ed53eb65fc884acd52ffede5454d1a4e e28a38d8fdd96021b0391fc8a2f0e88da19143a6084ab6a64ff93fdb1d2c9ee2 fe84dbdcefa7c810abd780e0ca47c5bdfaa8c27146b810e2d784d1b00a077aa0

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid



                Win.Worm.Vobfus-7198158-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\ADVANCED
                Value Name: ShowSuperHidden
                23
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: xaawee
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: juemauy
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: zltip
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: wkxid
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: leohuow
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: kuoova
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: vjdoq
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: beyuk
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: baeuqo
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: lieagu
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: juohoah
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: taeele
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: baaqaic
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: wmquoz
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: qeodux
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: ziiluet
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: mrlot
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: coawi
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: ceqav
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: gejay
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: baule
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: xeezua
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: mouzui
                1
                MutexesOccurrences
                A23
                Global\d11cb3c1-e7ca-11e9-a007-00501e3ae7b51
                Global\02adca01-e7cb-11e9-a007-00501e3ae7b51
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                ns1[.]videoall[.]net23
                ns1[.]videoall[.]org23
                ns1[.]player1532[.]com23
                Files and or directories createdOccurrences
                \autorun.inf23
                \$RECYCLE.BIN.lnk23
                \System Volume Information.lnk23
                \Documents.lnk23
                \Music.lnk23
                \New Folder.lnk23
                \Passwords.lnk23
                \Pictures.lnk23
                \Video.lnk23
                \<random, matching '[a-z]{4,7}'>.exe23
                %HOMEPATH%\<random, matching '[a-z]{5,7}'>.exe23
                E:\$RECYCLE.BIN.lnk22
                E:\autorun.inf22
                E:\x.mpeg22
                E:\System Volume Information.lnk22
                E:\Music.lnk22
                E:\Passwords.lnk22
                E:\Pictures.lnk22
                E:\Documents.lnk22
                E:\New Folder.lnk22
                E:\Video.lnk22
                E:\<random, matching '[a-z]{4,7}'>.exe22
                E:\RFJ.ico1
                \RFJ.ico1
                E:\baaqaicx.exe1
                *See JSON for more IOCs

                File Hashes

                09be96cf7eaf5a8b9e6231dc9f5760df58907a9c8dfb996e406361c3c72e5aa7 0c114b0894e482f57f0909cbd8b8dced3a8d6b20ec50139ccafdc81c1f21d6f2 107add01286993501566a44c448e321e27d3dadef2e2b62162b158cee42f4b80 210c1a435f47d5bca6300a4a323aa416e8edd2855946a9b5dc13f525e2061122 261ba2deae2f40205c12ecaa69ac285e3db2669ace697f4f52006aaca3046137 2642ae8489bf119064a09e9919cf06f92bc5b5882613c673745ffe89b34c2f43 30e340533c70f200d86348c10c78164a165e17a88f62b344e2b76f035386beae 323f9bcc53cdf71e937974d6523174ebb74151af8928d1148d0476c13b3e1622 37d2c4a0c7b4640261d4eae7bfe234eb4029a5686589e96fa78d9da20bf2add8 408680beb42a3d4123ca4136cb02431efdb2efd112d546a378dfea96dd042f5d 423ddc412baf3a6aa9637d6258b7309f08ed1e1bc9c2dddc30cc25732998e42c 46a8888ab48c79a9bdef4cf4ff58f5f58feb8ad6e3926a6ee98f7ea1dc2b383a 4e8f5a3497e7263ad12bdb242fdcbbd9c2d1ff85e862b263ce4b4d138f00002c 5642cb5f8c9d9115143cf67b67b50327dc6ac07c78e87334f52d3a89ef7e855c 575c4e03f446b9ae91769cc7be8b7cc8aa451d607615a69ac0797190240f0bff 5c3a99fa29ab5917f2facf4383dd6284c2fd4c93c0aa9a16cf5a8b605ce3521c 605712812595a21fae8b728974d328ecc2811792cec2f0808653d2ea8ee556c2 610519390720b741a8b2de2686575141bf8839473abdc06ffa9ecfd7efb88a3c 640f88b445819b50d801f63bba996635c07883cf245ddca2f39b592ce07d0a30 777a8c8f5ffa5c992ea0991e99b6be9f6ed560768154f6273f42c2547e6454ab 7f285a63779f27c9793b5fdcdcc9f8e8d48207298cb4c3cd18e27889c2dd052a 8232b50475cf369b325dc6866d6b88c27245faf7e572a3629b5c0ad3a88cbd72 84b677c976458077b79120064fe7aa275ad33d19d7651425f3faf6cd717fc520 8536b9a9da4f0b6930ed148166800147062e93f6c31ad70f61eb7ed174383c80 89f1ede2d77a45043f2ce760265d21a512f5e5b011cde43f76c3b968214530e5
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid


                Umbrella


                Win.Dropper.Upatre-7196259-0

                Indicators of Compromise

                Files and or directories createdOccurrences
                %TEMP%\szgfw.exe43

                File Hashes

                0209860624b9650a80e8e7ccd913c68bbd5e4be9e503c2a1b554c6b3b94861a1 0755dff6699aebb40a37368f78ed9a7b66d3e24d039af8cdd2ad13b8ef969273 0e2cb655432353bc5f362692d75f76b1deb6d4c339db1eacb671731c5f23a733 1191f1f7a73c262102b8ec25f2aecefc26eef287e55934e608ba510b45bff3db 11aa23a13c9a53dae82684af6adf9835fe027550d5b9bfd21604ab1261c97224 25f1eb50680c50626387a6e2c28a9278172dadbb61113f984a9c0074db4a3514 35588e1d2203194ae0524d551d9a5d45bccbfbd9ef226a25e223c4e626db8e7e 37715e5cfc32e42ccd741a8ca0b17276c76b9d28c2ab4ab4edc4ba712cfe98a4 47b69664dd70b8ed9e0f369640f4dfd27a5a33b8bd3d83d572b667551d6465cd 47cbf5466f14bacd5dae7a217a85673048245844e39d081ce4009aa8bbdf0743 48b14ad94dbfe648d7ef4cbce8debeec6b009d9972cb026f7f4ecfea72ae380d 4c6c1e0eb3b508e3bd525b4ce71a1309d231b218f7172bfb5da57a93a050ab5c 4d30d13f5454bc30c92643657d4113a4008e09cd06491e1f73801a14b5415cf5 50bf198fb00ff18f6b08b9aff48c8b5ffcc85cc0dcda23a0359f413113fd6207 51cd17e592d2ebadfd3f15ca6b542f78b2adb4f26b7eaf8c254e849ee141bcc4 52f3ac52e9e2e9ebaba6da86ea629ad07b2017a44a5be6f66a576853341cc1ca 5cdc406d0cfc60b4a6b5cce5411932f250bcf7c60863e71111f461130c2d942f 607473f50e64388087985abb0bb05caa8688a1a17c25607508bb2a3a8a62fc13 607ac8ad70dc43765ea3954c09b2dbe320f7dbe4fe9fee9b07fab9e855aef37b 6516b8c920ae407765804372470187aa6749d1f598e87b7dbe8bf47291039568 658f7d3524bc9db586321be2fb22b1d832cd6f80328dcdbecdfc2734ff45487a 6812985cee6342855219205500bd1bb53300d552f17b88dbeeab1cdad32e55bf 6be61289884c2bd01ddade32649d23fac7bc0ba4591f3eed911101eb44c5181b 6f8ed68f17904767ecd16b1cb1943caa8f474912bffc930082e64512fa48f96f 75c817a4d49bc40781537143aabad6f0496129120503b7276854e9db15b4a965
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                Wsa N/A

                Screenshots of Detection

                AMP


                ThreatGrid




                Exploit Prevention

                Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
                CVE-2019-0708 detected - (17383)
                An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP request). Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
                Excessively long PowerShell command detected - (3263)
                A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
                Madshi injection detected - (2949)
                Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
                Kovter injection detected - (1750)
                A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
                Atom Bombing code injection technique detected - (577)
                A process created a suspicious Atom, which is indicative of a known process injection technique called Atom Bombing. Atoms are Windows identifiers that associate a string with a 16-bit integer. These Atoms are accessible across processes when placed in the global Atom table. Malware exploits this by placing shell code as a global Atom, then accessing it through an Asynchronous Process Call (APC). A target process runs the APC function, which loads and runs the shellcode. The malware family Dridex is known to use Atom Bombing, but other threats may leverage it as well.
                Process hollowing detected - (512)
                Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
                Gamarue malware detected - (158)
                Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
                Dealply adware detected - (149)
                DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
                Installcore adware detected - (79)
                Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
                Aggah malware dropper detected - (61)
                Aggah dropper technique has been detected. The Aggah campaign has been observed dropping Azorult, LokiBot and other malware families. Aggah employs phishing and process hollowing to infect victim machines.

                Checkrain fake iOS jailbreak leads to click fraud

                $
                0
                0
                By Warren Mercer and Paul Rascagneres.

                Introduction


                Attackers are capitalizing on the recent discovery of a new vulnerability that exists across legacy iOS hardware. Cisco Talos recently discovered a malicious actor using a fake website that claims to give iPhone users the ability to jailbreak their phones. However, this site just prompts users to download a malicious profile which allows the attacker to conduct click-fraud.

                Checkm8 is a vulnerability in the bootrom of some legacy iOS devices that allows users to control the boot process. The vulnerability impacts all legacy models of the iPhone from the 4S through the X. The campaign we'll cover in this post tries to capitalize off of checkra1n, a project that uses the checkm8 vulnerability to modify the bootrom and load a jailbroken image onto the iPhone. Checkm8 can be exploited with an open-source tool called "ipwndfu" developed by Axi0mX.

                The attackers we're tracking run a malicious website called checkrain[.]com that aims to draw in users who are looking for checkra1n.

                This discovery made headlines and caught the attention of many security researchers. Jailbreaking a mobile device can be attractive to researchers, average users and malicious actors. A researcher or user may want to jailbreak phones to bypass standard restrictions put in place by the manufacturer to download additional software onto the device or look deeper into the inner workings of the phone. However, an attacker could jailbreak a device for malicious purposes, eventually obtaining full control of the device.

                This new malicious actor Talos discovered claims to provide the checkra1n jailbreak. The site even claims to be working with popular jailbreaking researchers such as “CoolStar” and Google Project Zero’s Ian Beer. The page attempts to look legitimate, prompting users to seemingly download an application to jailbreak their phone. However, there is no application, this is an attempt to install malicious profile onto the end-user device

                Jailbreaking iOS devices has been around since the launch of the first iPhone in 2007. These are a rare commodity in the iOS world, with Apple moving to patch most software defects swiftly. This can mean a user remains on older versions of iOS at the cost of security to keep their jailbreak — a dangerous proposition. Some users want to jailbreak their devices because it allows them to perform a lot of additional actions on their devices that Apple has locked down. This can be simple tasks like SSHing (remotely accessing) the iOS device, changing icons and themes on the iOS device, and also for illegitimate use such as pirated software and games.



                Checkrain fake website and iOS profile


                When a user visits the fake website, they are first presented with a download button.



                The checkm8 exploit (and, by consequence, the checkra1n jailbreak) only impacts iOS devices running on the A5 to A11 chipsets. The fact that the website mentions the A13 device is the first indicator that this website is not legitimate. Additionally, the website proposes the user can install the checkra1n jailbreak without a PC, when in reality, the checkm8 exploit requires the iOS device to be in DFU mode and is exploitable via the Apple USB cable.

                With this fake Checkrain[.]com iOS jailbreak, the user is asked to install a "mobileconfig" profile on their iOS device obtained from hxxps://checkrain[.]com/checkra1n.mobileconfig note the SSL certificate used is LetsEncrypt generated certificate and also the name "checkra1n" is the real name of the available jailbreak. The real checkra1n website does not use an SSL certificate. This is another step the actor has most likely employed in an attempt to draw the user in.

                Once the app is downloaded and installed, a checkrain icon appears on the user's iOS springboard. The icon is in fact a kind of bookmark to connect on a URL. This icon may look like an app from the user's perspective, but it actually doesn't work like one at all on the system level. Here is the installed profile:



                This is to allow the user to "click" the jailbreak app and thus prepare the iOS jailbreak. This is just a fake jailbreak being used via the profile the user just installed. When we look into the profile, we can identify the malicious activity:



                This is making use of the Apple developer function "Apple Web Clip," which causes a web page to load in full screen with no search bar, no address/URL bar and no bookmarks. This merely displays the hxxps://checkrain[.]com/jb webpage which provides a fake jailbreak experience.



                Fake jailbreak experience


                Take a look at the video below to see the full actions of this webpage.

                This webpage is also configured to fingerprint users to ensure they are accessing it from an iOS device. If you visit the website using a desktop browser, it delivers the following error message:



                The video shows the whole process, and in the end, you will notice multiple redirects occurring on the user's iOS device. This ultimately occurs in click-fraud, resulting in multiple verification chains and then finishing on an iOS game install, with in-app purchases available.

                The chain used in this processes through several ad-tracking, verification, geolocation and, finally, campaign delivery. In this case, it downloads from the Apple store an iOS app called "POP! Slots," a slot machine game.

                The fake jailbreak process tells the user to have fun for seven days to ensure their unlock completes.



                This is obviously nonsense — the user will merely provide more interactive sessions through the gameplay, which may result in additional revenue for this attacker.

                Domain information


                We identified several countries that could have fallen for this fake website using Cisco Umbrella. The main concentration was in the U.S., but with many other countries throughout the world being potentially targeted.



                The U.S., U.K., France, Nigeria, Iraq, Vietnam, Venezuela, Egypt, Georgia, Australia, Canada, Turkey, Netherlands and Italy were all targeted nations for this campaign.

                The domains were all registered within 24 hours of the checkra1n[.]com official website. The attacker even clearly followed information on popular sites like Reddit, ensuring they remained vigilant and updated their website.



                Conclusion


                This malicious website simply leads to click fraud. But the same technique could be used for more malicious and critical actions. Instead of a "web clip" profile, the attackers could implant their own MDM enrolment. We previously discovered iOS malicious MDM campaigns here, here and here. We strongly recommend to never install an unknown profile from the internet.

                Talos recommend the following methods to check if your phone has additional profiles or is enrolled in an MDM platform:

                1. Users can view restrictions set by MDM profiles in Settings > General > Profiles & Device Management > [MDM configuration] > Restrictions

                2. Users can also check which applications have an MDM profile installed on their device in Settings > General > Profiles & Device Management > [MDM configuration] > Apps.

                Note: If you do not have any PROFILE & DEVICE MANAGEMENT menu option available, this means the phone is currently not enrolled in an MDM, nor are there any additional profiles trusted on the phone.

                Vulnerability Spotlight: Another fix for Adobe Acrobat Reader DC text field value remote code execution

                $
                0
                0


                Aleksandar Nikolic of Cisco Talos discovered this vulnerability.

                Cisco Talos once again would like to bring attention to a remote code execution vulnerability in Adobe Acrobat Reader. Acrobat, which is one of the most popular PDF readers on the market, contains a bug when the software incorrectly counts array elements. The same code present in the previously disclosed TALOS-2018-0704 and TALOS-2019-0774 could trigger this vulnerability, allowing the attacker to potentially execute remote code. Adobe previously patched those two vulnerabilities, but the fixes did not cover all possible cases.

                In accordance with our coordinated disclosure policy, Cisco Talos worked with Adobe to ensure that these issues are resolved and that an update is available for affected customers.

                Vulnerability details

                Adobe Acrobat Reader DC text field value remote code execution vulnerability redux (TALOS-2019-0860/CVE-2019-8183)

                A specific JavaScript code embedded in a PDF file can lead to a heap corruption when opening a PDF document in Adobe Acrobat Reader DC, version 2019.012.20035. With careful memory manipulation, this can lead to arbitrary code execution. In order to trigger this vulnerability, the victim would need to open the malicious file or access a malicious web page. The vulnerability in this advisory is the same as TALOS-2018-0704 and TALOS-2019-0774, as it wasn't properly patched to cover all cases.

                Read the complete vulnerability advisory here for additional information.

                Versions tested

                Talos tested and confirmed that Adobe Acrobat Reader DC, version 2019.012.20035, is affected by this vulnerability.

                Coverage

                The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                Snort Rules: 48293, 48294


                Threat Source newsletter (Oct. 17, 2019)

                $
                0
                0

                Newsletter compiled by Jon Munshaw.

                Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.

                It’s rare that iOS jailbreaks make it onto the scene. Apple is usually able to patch them out quickly. But a recent exploit is actually unpatchable, and researchers are racing to release tools that can allow users to jailbreak their phone. But malicious attackers are also trying to capitalize on this opportunity. We recently discovered a malicious site that promises to offer a jailbreaking tool, but it actually just conducts click fraud and installs a malicious profile onto the user’s device.

                This week, Adobe released its third patch for a vulnerability we discovered earlier this year in Acrobat Reader. An attacker could exploit this bug to gain the ability to execute arbitrary code on the victim machine.

                We also have our weekly Threat Roundup, which you can find on the blog every Friday afternoon. There, we go over the most prominent threats we’ve seen (and blocked) over the past week.

                Upcoming public engagements with Talos

                Event: Talos at BSides Belfast 
                Location: Titanic Belfast, Belfast, Northern Ireland
                Date: Oct. 31
                Synopsis: Several researchers from Talos will be on hand at BSides Belfast to deliver four different talks. Martin Lee will provide a general overview of the benefits of threat hunting, Nick Biasini and Edmund Brumaghin will walk through a recent wave of supply chain attacks, then, Brumaghin and Earl Carter will deliver their “It’s Never DNS....It Was DNS” talk, and, finally, Paul Rascagneres walks through his recent research into attacks on iOS.

                Event: “It’s Never DNS…. It Was DNS: How Adversaries Are Abusing Network Blind Spots”  at SecureWV/Hack3rCon X
                Location: Charleston Coliseum & Convention Center, Charleston, WV
                Date: Nov. 15 - 17
                Speakers: Edmund Brumaghin and Earl Carter
                Synopsis: While DNS is one of the most commonly used network protocols in most corporate networks, many organizations don’t give it the same level of scrutiny as other network protocols present in their environments. DNS has become increasingly attractive to both red teams and malicious attackers alike to easily subvert otherwise solid security architectures. This presentation will provide several technical breakdowns of real-world attacks that have been seen leveraging DNS for a variety of purposes such as DNSMessenger, DNSpionage, and more.

                Cyber Security Week in Review

                • Postage service provider Pitney Bowes was hit with the Ryuk ransomware, briefly taking some of their systems offline. The attack also impacted some U.S. Postal Service services. 
                • Baltimore plans to buy a $20 million cyber insurance policy in the wake of a ransomware attack earlier this year. The policy includes incident response coverage, business interruption loss and ransom payments.  
                • The U.S. reportedly carried out a cyber attack against Iran on Sept. 14 in response to an attack on a Saudi Arabian oil facility. Military officials say the attack was meant to reduce Iran’s ability to spread what they called “propaganda.” 
                • Two Moroccan activists were targeted by the Pegasus spyware. The human rights defenders received numerous SMS messages containing links to malicious websites, relying on zero-days in iOS to exploit their devices. 
                • Google’s new line of Pixel phones will allow its AI to automatically transcribe voice notes— even if the device is offline. The company said all translation happens directly on the device. 
                • An ATM malware that forces the machines to spit out all the cash they contain is spreading across the globe. A new report suggests that these so-called “jackpotting” attacks are on the rise this year, though they are not widely reported on. 
                • Mozilla says it is beefing up Firefox’s security to protect users from code injection attacks. The web browser will no longer utilize inline scripts, improving the “about” protocol. 
                • The Chinese government is promoting a mobile app that may allow them to spy on more than 100 million citizens. The app is even mandatory among government workers and communist party officials. 
                • An underground, online marketplace selling stolen credit card numbers was hacked. Roughly 26 million credit card numbers were rescued from “BriansClub,” 8 million of which were uploaded this year. 

                Notable recent security issues

                Title: Apple WebKit opens users up to malicious advertising 
                Description: Multiple vulnerabilities in Apple's WebKit are allowing attackers to serve users' malicious advertisements. This campaign affected the Google Chrome and Safari web browsers on iOS and MacOS, but the vulnerabilities were all patched out in Apple's latest series of security updates. All the ads centered around the user's specific mobile carrier, hoping to entice them to visit malicious websites. The vulnerabilities would allow the ads to break out of any sandboxes in place.
                Snort SIDs: 51821 - 51824, 51831, 58132 (By John Levy)

                Title: Remote code execution bug in vBulletin 
                Description: A now-patched vulnerability in the popular service vBulletin is allowing attackers to completely take over sites that use the software. vBulletin powers the commenting functions for many popular sites. An attacker could exploit this vulnerability to gain the ability to remotely execute malicious code on any vBulletin server running versions 5.0.0 through 5.5.4. This bug was initially dropped as a zero-day by an anonymous user, but has since been patched by the company. The Snort rules below prevent any attempt to inject code into the server using this bug. Marcos Rodriguez wrote these rules.
                Snort SIDs: 51834 – 51837 (By Marcos Rodriguez)

                Most prevalent malware files this week

                SHA 256: 85b936960fbe5100c170b777e1647ce9f0f01e3ab9742dfc23f37cb0825b30b5 
                MD5: 8c80dd97c37525927c1e549cb59bcbf3
                Typical Filename: Eternalblue-2.2.0.exe
                Claimed Product: N/A
                Detection Name: W32.WNCryLdrA:Trojan.22k2.1201

                SHA 256: 7acf71afa895df5358b0ede2d71128634bfbbc0e2d9deccff5c5eaa25e6f5510
                MD5: 4a50780ddb3db16ebab57b0ca42da0fb
                Typical Filename: xme64-2141.exe
                Claimed Product: N/A
                Detection Name: W32.7ACF71AFA8-95.SBX.TG

                SHA 256: 15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b
                MD5: 799b30f47060ca05d80ece53866e01cc
                Typical Filename: mf2016341595.exe
                Claimed Product: N/A 
                Detection Name: W32.Generic:Gen.22fz.1201

                SHA 256: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f 
                MD5: e2ea315d9a83e7577053f52c974f6a5a
                Typical Filename: c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f.bin
                Claimed Product: N/A
                Detection Name: W32.AgentWDCR:Gen.21gn.1201

                SHA 256: 46b241e3d33811f7364294ea99170b35462b4b5b85f71ac69d75daa487f7cf08
                MD5: db69eaaea4d49703f161c81e6fdd036f
                Typical Filename: xme32-2141-gcc.exe
                Claimed Product: N/A
                Detection Name: W32.46B241E3D3-95.SBX.TG 

                Vulnerability Spotlight: Multiple vulnerabilities in YouPHPTube

                $
                0
                0


                Yuri Kramarz of Security Advisory EMEAR discovered these vulnerabilities. Post by Jon Munshaw.

                YouPHPTube contains multiple vulnerabilities that could allow an attacker to carry out a variety of malicious activities. Specially crafted, attacker-created web requests can allow an attacker to inject SQL code into the application in some of these cases. YouPHPTube is an open-source program that can allow users to create their own, custom video sites. The software is meant to mimic popular websites such as YouTube, Netflix and Vimeo, according to its website. If successful, an attacker could use these vulnerabilities to gain the ability to exfiltrate files in the database, steal user credentials and, in some configurations, access the underlying operating system.

                In accordance with our coordinated disclosure policy, Cisco Talos worked with YouPHPTube to ensure that these issues are resolved and that an update is available for affected customers.

                Vulnerability details


                YouPHPTubeEncoder base64Url multiple command injections (TALOS-2019-0917/CVE-2019-5127, CVE-2019-5129)

                Exploitable unauthenticated command injections exist in YouPHPTube Encoder 2.3, a plugin for providing encoder functionality in YouPHPTube . Specially crafted web requests can cause commands to be executed on the server. An attacker can send a web request with parameters containing specific parameters to trigger these vulnerabilities, potentially allowing exfiltration of the database, user credentials and compromise the underlying operating system. Unlike the other vulnerabilities outlined in this blog, an attacker does not need credentials to log in to exploit this bug.

                Read the complete vulnerability advisory here for additional information.

                YouPHPTube /objects/pluginSwitch.json.php multiple SQL injection vulnerabilities (TALOS-2019-0911/CVE-2019-5121, CVE-2019-5123)

                Exploitable SQL injection vulnerabilities exist in the authenticated part of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and, in certain configuration, access the underlying operating system.

                Read the complete vulnerability advisory here for additional information.

                YouPHPTube/plugin/AD_Server/view/campaignsVideos.json.php id SQL injection vulnerability (TALOS-2019-0910/CVE-2019-5120)

                An exploitable SQL injection vulnerability exists in the authenticated part of YouPHPTube 7.6 Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and in certain configurations, access the underlying operating system.

                Read the complete vulnerability advisory here for additional information.

                YouPHPTube /objects/subscribeNotify.json.php user_id SQL injection vulnerability (TALOS-2019-0909/CVE-2019-5119)

                An exploitable SQL injection vulnerability exist in the authenticated part of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and,in certain configuration, access the underlying operating system.

                Read the complete vulnerability advisory here for additional information.

                YouPHPTube /objects/subscribe.json.php SQL injection vulnerability (TALOS-2019-0908/CVE-2019-5117)

                Exploitable SQL injection vulnerabilities exist in the authenticated portion of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and, in certain configuration, access the underlying operating system.

                Read the complete vulnerability advisory here for additional information.

                YouPHPTube /objects/videoAddNew.json.php SQL injection vulnerability (TALOS-2019-0907/CVE-2019-5116)

                An exploitable SQL injection vulnerability exists in the authenticated part of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and, in certain configuration, access the underlying operating system.

                Read the complete vulnerability advisory here for additional information.

                YouPHPTube /objects/commentAddNew.json.php comments_id SQL injection vulnerability (TALOS-2019-0906/CVE-2019-5114)

                Exploitable SQL injection vulnerabilities exist in the authenticated portion of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and, in certain configuration, access the underlying operating system. 

                Read the complete vulnerability advisory here for additional information.

                Versions tested

                Researchers tested and confirmed that versions 6.2, 7.6 are affected by TALOS-2019-0908, TALOS-2019-0907 and TALOS-2019-0906, TALOS-2019-0909, TALOS-2019-0910 and TALOS-2019-0911. Version 7.6 is affected by TALOS-2019-0917.

                Coverage

                The following SNORTⓇ rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org.

                Snort Rules: 51587 - 51592, 51597 - 51599, 51600 - 51602, 51608 - 51610, 51924 - 51928

                Threat Roundup for October 11 to October 18

                $
                0
                0
                Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Oct. 11 and Oct. 18. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

                As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

                For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found herethat includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.
                The most prevalent threats highlighted in this roundup are:
                Threat NameTypeDescription
                Win.Malware.Zusy-7288173-1 Malware Zusy, also known as TinyBanker or Tinba, is a trojan that uses man-in-the-middle attacks to steal banking information. When executed, it injects itself into legitimate Windows processes such as "explorer.exe" and "winver.exe." When the user accesses a banking website, it displays a form to trick the user into submitting personal information.
                Win.Trojan.Lokibot-7288215-1 Trojan Lokibot is an information-stealing malware designed to siphon off sensitive information stored on an infected device. It is modular in nature, supporting the ability to steal sensitive information from a number of popular applications. It is commonly pushed via malicious documents delivered via spam emails.
                Win.Worm.Esfury-7292180-1 Worm Esfury is a type of worm that commonly spreads via removable drives or platforms with user interaction (e.g. emails, instant messages, web pages). When executed, Esfury modifies multiple registry keys in order to execute when certain Windows applications are opened, including security products, registry editor and task manager. Esfury may also contact a remote server to download and execute arbitrary files.
                Win.Malware.Emotet-7292844-0 Malware Emotet is one of the most widely distributed and active malware families today. It is a modular threat that can deliver a variety of payloads. Emotet is commonly delivered via Microsoft Office documents with macros, sent as attachments on malicious emails.
                Win.Packed.Gozi-7329531-0 Packed Gozi refers to a family of banking trojans dating back to 2006 with many well-known descendants and variants, including as Ursnif, Dreambot, Vawtrak, and GozNym. Its primary purpose is to steal login credentials for financial institution websites.
                Win.Virus.Neshta-7330232-0 Virus Neshta is file-infecting malware that also collects sensitive information from an infected machine and sends it to a C2 server.
                Win.Malware.Gootkit-7333291-0 Malware Gootkit is a banking trojan particularly interesting due to the anti-analysis techniques that it employs. It has received several updates that implement new procedures for evading automated analysis and hindering reverse engineering efforts.
                Win.Dropper.Remcos-7334963-0 Dropper Remcos is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes, interact with a webcam, and capture screenshots. Remcos is commonly delivered through Microsoft Office documents with macros, sent as attachments on malicious emails.
                Win.Dropper.Trickbot-7340237-0 Dropper Trickbot is a banking trojan targeting sensitive information for select financial institutions. This malware is frequently distributed through malicious spam campaigns. Many of these campaigns rely on downloaders for distribution, such as VB Scripts.
                Win.Malware.Bublik-7340719-1 Malware Bublik is a downloader that targets Windows hosts. Although it's primarily used as malware to distribute various banking trojans, it's also capable of extracting and exfiltrating sensitive information from the host.

                Threat Breakdown

                Win.Malware.Zusy-7288173-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: F9E7DE7B
                43
                MutexesOccurrences
                F9E7DE7B43
                5D79E0A319
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                216[.]218[.]185[.]16223
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                spaines[.]pw8
                Files and or directories createdOccurrences
                %HOMEPATH%\AppData\LocalLow\F9E7DE7B43
                %APPDATA%\F9E7DE7B43
                %APPDATA%\F9E7DE7B\bin.exe43
                %APPDATA%\5D79E0A3\bin.exe23

                File Hashes

                035bcabbe75aa88cbb8dc016119ad2c1901ea759fb90b69eee45b3809e98f381 066b0fc2b1d64ddd9ff30b8046686a6cc8f43656e54f8301ddd7d3a1baf9170c 0a8cc8f4dc0dc5c04431546304d67187403caa684d60ff0787084fdde5d40abe 0c04864961c1edea6dd4231766af85f4031d3eae0756eec731bba81a98b46505 0f00ea06e5b2bc5801a0d4370facc65c0a51e00d810d9f6b16723629a1b7536b 0f91c67b52b53430a9bd2e1a9df5b151056cfee5f026c1da0b5e2342cf9c936e 107dff905969dbbe792ab5d170f2d47538afe49fa6c07f20b26f4de1edd88688 125e0437a1098570183dca847d7533461318214e4a5a746c5ed7933a1cc8d17d 130c0eeebc22bcc4fd4edf40239b66fc5d12d497c7a39851a580e82aa4433e9a 1746421b4db63c1a41a395541947fb44e9f889fd0ea62b9de6759b42c3f5e096 181be8f9157f806aea3f70181b143e12a8c95e85842f10dc31120db4dfb0e1a5 19af7d81cf89adf71bb0af50d6bfe4171b7454daaece6e2883aa08fa06629274 203bfb6936585624eaeefadb5ef6f0679663b09df0b46d9a9945936a787ab20b 2143c563658e9288b205d78775d73ab849ef5de550a398d6976e44c93988da98 217b3f26c0b5033615a26161c5f34b42ac6dc3c12385b9efcc5a6baab1ca0369 225ebaaeafb848823607654663516210377b0901e5e354c8603b9c8c2d85a650 28e5c75b145351bc1cc78829e43328a25d14028aff806947884e60940c8572f8 29ab42409df20428f7e03bce732c534698c260338e410985d112ce4410738579 2a94932f389d8c44cea94a8ac8099869312cd3337d81a423e58bcf041819f803 2b8c4770f8239882117c9e990e9a96aeb134d23be3f3cd147800594d4aad9992 2e668b329248a40c1f1dd54864023731d6862dce26efe70690d7e6ad9f2082f5 310a36c24661d877f07b3c6745efe7cf3d2480f7d43f1361cfe71ac3a6196068 43039465047c23211ef9831701d46fcb73effcf40ca7485c95a6d9c786ca6c5f 4b105589e8a96f695998816c224f250bcc02973f92bcbace3205487c75a4877f 4eb88671b506f84d1f3bd63c7e857e1082820f2d90aba7091a93bf70d9f6d290
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid


                Umbrella




                Win.Trojan.Lokibot-7288215-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: D282E1
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: ousehehehheheheh
                1
                <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: ngngngnngngngn
                1
                MutexesOccurrences
                3749282D282E1E80C56CAE5A16
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                185[.]55[.]227[.]1472
                5[.]160[.]218[.]882
                8[.]208[.]76[.]801
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                suksez-ab[.]com6
                versuvius[.]ru2
                novinsazvar[.]com2
                majidfathalibeygi[.]com2
                lapphuongshoe[.]com1
                pliykies8[.]net1
                orientsdelivery[.]xyz1
                arkhesol[.]info1
                Files and or directories createdOccurrences
                %APPDATA%\D282E116
                %APPDATA%\D282E1\1E80C5.lck16
                %HOMEPATH%\ousehehehheheheh\ousehehehheheheh.exe1
                %HOMEPATH%\ousehehehheheheh1
                %HOMEPATH%\ousehehehheheheh\ousehehehheheheh.vbs1
                %HOMEPATH%\ngngngnngngngn\ngngngnngngngn.exe1
                %HOMEPATH%\ngngngnngngngn1
                %HOMEPATH%\ngngngnngngngn\ngngngnngngngn.vbs1

                File Hashes

                11ce93263d26a1d77158f01d3964e36753a90e26487560b52e26658dd935d2f8 4e0b291e2ce71731179d297d11186265907fe73ae9feb6734d9520784dd643ab 6333008e4ed2f8af449faa9c222bf412733928a4dd0fb8011ef50d07f23bb926 6c5b6bd100bdbb0680c9bcefc4fddeec307400fcbef04bc8adaf466b99a3bd69 7a8ace6f25d06c3b91e5aeb33304576fda2ec9664caee9f1489bfd39392d927b 7ad49cca3a6db9a75954dc7d137ed702cf3b5102588e22234a53861d47df1371 842f8e3e24829467b0c4becd601cf310569cfc40320fef7242dd05d292c02bea 906215654e5e6e6cee920b8d245c0eb7dedcc35e923e0e50f1cb8091339ef420 930dea8f876d9f5f8f0d49886477b7d22fb72a73c5d22f01f0f0fb8fe674b076 9627bcfd08a534505001cb8e2e3166cba4e60dc20af10dfa50a00c24425447b3 9986a87b66047bca053c918b33d18c4779c25afa0badfdec5e15742c98cb214e 9e4101e8a41db4810e032fcf0c13eb3dc1213b0d864ab4a0b76183ee17ec6fa9 a84d17a5eb16dfc8202648bb9580a3381d71b567069efb68339607c2c3594e23 c3e63e52d9810263c08ae33457a8995f822d6159b61904e77c1d338fa4dd0513 f3c3be739e71786ca3a56d7570a109593ebedeec931be2eaca8b241a6d008dae f93b944b29282aa07065b9f34298db2b351cdbbe60c340984d6bb4bb822d9763

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid


                Umbrella




                Win.Worm.Esfury-7292180-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\GPEDIT.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\PRCKILLER.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\PORTMON.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\PROCEXP.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\PROCMON.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\FILEMON.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\FIREFOX.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CRASHREPORTER.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\UPDATER.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\HELPER.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CHROME.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\OPERA.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SAFARI.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\NETSCAPE.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVCENTER.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVCONFIG.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVGNT.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVGUARD.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVNOTIFY.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVSCANAVSHADOW.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVUPGSVC.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVWEBLOADER.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\AVWSC.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\FACT.EXE
                Value Name: Debugger
                19
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\GUARDGUI.EXE
                Value Name: Debugger
                19
                MutexesOccurrences
                @0MPfV5@mqt«sL+EVQ@XPbGP9@19
                @0MPfV5@mqt sL+EVQ@XPbGP9@17
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                50[.]23[.]131[.]23513
                104[.]28[.]24[.]17911
                67[.]202[.]94[.]937
                67[.]202[.]94[.]947
                104[.]28[.]25[.]1795
                67[.]202[.]94[.]864
                173[.]192[.]200[.]703
                35[.]231[.]151[.]72
                208[.]100[.]26[.]2511
                5[.]79[.]71[.]2051
                5[.]79[.]71[.]2251
                206[.]189[.]61[.]1261
                35[.]229[.]93[.]461
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                widgets[.]amung[.]us19
                whos[.]amung[.]us19
                dns[.]msftncsi[.]com19
                www[.]whatismyip[.]org19
                z-9-4-0-l-n-x-5-6-g-6-4-y-1-u-6-f-8-e-1-2-m-h-z-k-l-5-q-3-j-7-[.]xz5-af-fj-o4-it-ok-n-9j-zjg-pz9x-1z-zekv-y4f-acg-cq3v-j[.]info3
                7-0-3-h-m-a-v-l-c-b-3-z-q-d-7-p-k-7-r-7-a-9-b-t-n-2-v-y-o-y-9-[.]5-68-wk-5g-z2-pu6-e5x-4h-yij-yx-duv-wpx-2r8-7vc-ox-4q-u[.]info3
                l-r-j-5-m-2-x-1-n-9-4-3-y-1-5-1-2-2-r-o-s-i-6-d-x-6-6-k-p-n-y-[.]rb-e-e3-j-fi-1-il-h-il-3e-z-u-r-u-lk-h-wm-3-6-g-0o-s-dx[.]info3
                www[.]kryptoslogic[.]com2
                n-0-2-q-l-1-3-3-y-7-4-9-p-q-r-9-9-h-f-u-9-7-4-y-8-g-2-9-v-z-u-[.]81r-x7-tr2p-7c-5lk-huxs-0wq-bma-0wvi-2y-a8s-elw-hv-o0-6[.]info2
                8-5-q-5-9-a-2-t-5-z-7-8-v-m-r-9-0-3-4-6-0-5-h-m-a-8-6-b-z-4-5-[.]z-hk-yl8-k-7o-8z-l-v-uhb-u-td-8i-oe-0gp-e2g-we6-ws-2vpd[.]info2
                y-n-f-3-8-5-3-5-1-7-9-k-i-7-z-8-8-h-k-x-l-9-7-9-j-5-w-x-8-0-2-[.]z-hk-yl8-k-7o-8z-l-v-uhb-u-td-8i-oe-0gp-e2g-we6-ws-2vpd[.]info2
                2-l-q-l-o-0-5-x-8-5-3-6-3-c-3-u-6-1-6-9-7-t-7-i-8-k-g-4-8-2-l-[.]mw9g-ns-k-q0-e3r-6s-23-m2wf-7xy1z0-c0u-5wc-g0rb-2-1-5-l[.]info2
                l-6-0-2-c-d-a-5-9-w-4-7-5-6-t-g-6-6-9-i-9-w-l-0-a-3-1-0-p-v-9-[.]z-hk-yl8-k-7o-8z-l-v-uhb-u-td-8i-oe-0gp-e2g-we6-ws-2vpd[.]info2
                4-7-3-9-r-h-h-j-5-n-2-i-l-6-l-9-0-4-l-9-t-3-g-0-7-4-n-8-r-d-4-[.]rb-e-e3-j-fi-1-il-h-il-3e-z-u-r-u-lk-h-wm-3-6-g-0o-s-dx[.]info2
                c-0-r-5-0-5-c-7-i-z-v-4-2-j-5-n-s-1-6-d-y-z-8-r-8-s-5-j-y-t-2-[.]i-9t3-sy-7i-5j3-sf7-8z5-54-n8v7r-0-ih7-36992m-o3-0q-g-3[.]info2
                1-j-7-k-x-2-7-7-4-i-6-2-5-e-2-2-4-5-y-0-7-u-6-9-m-6-m-o-8-x-0-[.]h6y-aj-r6-ut0-jwl-9-th9-i4k-nt1s-sz4-mk4-ahr-hf8-yi-c-6[.]info2
                4-s-1-c-f-p-0-f-8-n-x-7-o-i-8-6-4-7-m-w-5-z-0-g-8-9-6-u-7-3-u-[.]2e-01j-y1a-zu-s-no-bq-q1p8-qjr-j1hr-nh8-22-af3q-7q-gu-7[.]info2
                k-1-e-b-0-x-j-0-i-8-p-o-5-r-8-m-0-3-3-f-2-k-c-8-6-6-q-s-3-7-d-[.]0-0-0-0-0-0-0-0-0-0-0-0-0-37-0-0-0-0-0-0-0-0-0-0-0-0-0[.]info2
                1-5-4-t-6-y-m-k-1-3-9-r-u-8-5-3-x-s-2-t-8-2-2-3-7-k-u-u-7-0-4-[.]p9b-8-na-5w-2z3-djmu-7pk-qy-0-bok-re9-ym-v9h-av-njx-2es[.]info2
                t-3-r-2-p-0-h-n-g-m-z-8-u-r-m-i-x-r-l-x-4-2-4-9-m-p-9-1-0-5-k-[.]81r-x7-tr2p-7c-5lk-huxs-0wq-bma-0wvi-2y-a8s-elw-hv-o0-6[.]info2
                2-g-6-2-s-x-7-7-x-7-c-s-a-a-q-5-d-9-3-a-7-4-3-4-0-8-u-u-e-9-w-[.]0-0-0-0-0-0-0-0-0-0-0-0-0-9-0-0-0-0-0-0-0-0-0-0-0-0-0[.]info2
                l-v-4-r-s-5-o-4-5-m-6-6-l-8-s-6-5-g-v-n-0-4-u-8-i-h-9-m-q-1-9-[.]h6y-aj-r6-ut0-jwl-9-th9-i4k-nt1s-sz4-mk4-ahr-hf8-yi-c-6[.]info2
                4-0-6-4-p-2-j-2-6-3-1-e-c-7-i-x-s-d-l-7-e-o-0-h-w-9-7-6-b-d-4-[.]v32c-to-5-8w-0yc-tzl8-h2a-7f-ezc-oxt1-7-8y-0elh-be-3k-d[.]info2
                4-i-0-0-q-y-s-3-3-y-6-9-9-9-3-s-p-9-b-e-z-p-b-9-4-8-3-t-g-0-u-[.]p9b-8-na-5w-2z3-djmu-7pk-qy-0-bok-re9-ym-v9h-av-njx-2es[.]info2
                k-h-4-2-o-5-8-0-z-g-3-j-3-2-3-0-n-h-o-v-1-d-u-j-i-s-2-o-i-r-h-[.]i-9t3-sy-7i-5j3-sf7-8z5-54-n8v7r-0-ih7-36992m-o3-0q-g-3[.]info2
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                \autorun.inf19
                \$RECYCLE.BIN .LNK19
                %System32%\drivers\etc\hosts19
                \h3ojKiH9lvFefkO0mG6HlXplgLV3LYYJVfdZRr3dtLhEN80DnzEPQXQY2sziakx2axTnS4SA0447SPkbMnv4Qm\S-4-7-01-4639107501-4494491267-104133574-7046\Desktop.ini19
                \h3ojKiH9lvFefkO0mG6HlXplgLV3LYYJVfdZRr3dtLhEN80DnzEPQXQY2sziakx2axTnS4SA0447SPkbMnv4Qm\S-4-7-01-4639107501-4494491267-104133574-7046\o3mrVQz9rDByh9hfKJ9v01t5z3m0s5hP01.exe19
                \h3ojKiH9lvFefkO0mG6HlXplgLV3LYYJVfdZRr3dtLhEN80DnzEPQXQY2sziakx2axTnS4SA0447SPkbMnv4Qm\o3mrVQz9rDByh9hfKJ9v01t5z3m0s5hP01.exe19
                %HOMEPATH%\Administrator119
                %HOMEPATH%\Administrator1\winlogon.exe19
                E:\autorun.inf18
                E:\h3ojKiH9lvFefkO0mG6HlXplgLV3LYYJVfdZRr3dtLhEN80DnzEPQXQY2sziakx2axTnS4SA0447SPkbMnv4Qm18
                E:\h3ojKiH9lvFefkO0mG6HlXplgLV3LYYJVfdZRr3dtLhEN80DnzEPQXQY2sziakx2axTnS4SA0447SPkbMnv4Qm\S-4-7-01-4639107501-4494491267-104133574-704618
                E:\h3ojKiH9lvFefkO0mG6HlXplgLV3LYYJVfdZRr3dtLhEN80DnzEPQXQY2sziakx2axTnS4SA0447SPkbMnv4Qm\S-4-7-01-4639107501-4494491267-104133574-7046\Desktop.ini18
                E:\h3ojKiH9lvFefkO0mG6HlXplgLV3LYYJVfdZRr3dtLhEN80DnzEPQXQY2sziakx2axTnS4SA0447SPkbMnv4Qm\S-4-7-01-4639107501-4494491267-104133574-7046\o3mrVQz9rDByh9hfKJ9v01t5z3m0s5hP01.exe18
                E:\h3ojKiH9lvFefkO0mG6HlXplgLV3LYYJVfdZRr3dtLhEN80DnzEPQXQY2sziakx2axTnS4SA0447SPkbMnv4Qm\o3mrVQz9rDByh9hfKJ9v01t5z3m0s5hP01.exe18
                E:\$RECYCLE.BIN .LNK18
                %HOMEPATH%\Administrator1\VERSION.TXT2

                File Hashes

                094d75233bfdfc837e0b461eb47ef442277b022f102b8f6adc80e20ec0909e2b 0f32b4ed36c393942ae9177eb4b2acd977bb2283de1b3278256a24049c2e7b8f 14e3b621de29654add1fe1fe1a1770279330dfb1920cdd0bc92cdd0f8ca489f6 17ce758c92d7c785b153845c53809f7b04a77d6f0352dff7944057cb6ace4c8f 1a6aab3064593291c0696c1efd2ac2dcd5df96bf923ae7670562cfeac3ee5478 47f286283bb6d0451650d993e656cfe32c33fc547838b8fe7cfbf1f648694d1a 5a5c0a62f7d53b6b1ee826a5baf8ff0c39d35ce6817fbee78a6398355747042f 78d3586250c6c996c1412daf885e59ca954a77384ad4eda4028f2a81024dcf1c 7de79a67d497d9bb88af291e625b233a9972f2aae9cff137c6416689e50aed98 920e28b817c5d1376715b7654ee6c5476b6b80adff54bafe2f7c5f1d952f1bc9 a3ea1ebdf50099d17c429042c5c6faeb7a60d6f42d9256ce3e89a217fed81198 b4c81dcc370ebb3bb2361000a64e87d15939c1dc10beb740b577de29cd8dde93 b75e84103d3e74ab2ab1b3a0bab01e0272fd361ec808942a598a0165e169edb0 b7e13fae589f5403964e0169c1269c91ddd6a7e06f06404207ca4f61922fa30b ba4accd438dedd49930217bcd04cda2230e3a9d32d1f457ab98c50dec9dffa9e d3867c8d29d5f430de171e9269a1766ed9b0a565dd38bb01438f50fd7902c6ea d70d846815613e61511492bafcc00470c9af8579b1491fa9996a1f5267e47ce2 eae56ea32d876fa7b1559e6e005c9572f3ef8a84665ff660c3e21180f646d220 f4bbf7ec8be46bc611663482937506b1288b5f2d0b479df2d4aa24a5207435ba

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Malware.Emotet-7292844-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
                Value Name: ProxyEnable
                24
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
                Value Name: ProxyServer
                24
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
                Value Name: ProxyOverride
                24
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
                Value Name: AutoConfigURL
                24
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
                Value Name: AutoDetect
                24
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A}
                Value Name: WpadDecisionReason
                24
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A}
                Value Name: WpadDecision
                24
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A}
                Value Name: WpadNetworkName
                24
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A}
                Value Name: WpadDetectedUrl
                24
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\CONTENT
                Value Name: CachePrefix
                24
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\COOKIES
                Value Name: CachePrefix
                24
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\HISTORY
                Value Name: CachePrefix
                24
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: Type
                24
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: Start
                24
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: ErrorControl
                24
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: ImagePath
                24
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: DisplayName
                24
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: WOW64
                24
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL
                Value Name: ObjectName
                24
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MINIMUMPIXEL 24
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\{E54C0DDD-6FAB-4796-8BBE-EE37AF7CD25A}
                Value Name: WpadDecisionTime
                24
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\88-22-E5-B6-57-EE
                Value Name: WpadDecision
                1
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\88-22-E5-B6-57-EE
                Value Name: WpadDetectedUrl
                1
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\4A-80-98-B4-22-0C
                Value Name: WpadDecisionReason
                1
                <HKU>\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\WPAD\4A-80-98-B4-22-0C
                Value Name: WpadDecision
                1
                MutexesOccurrences
                Global\I98B68E3C24
                Global\M98B68E3C24
                Global\M3C28B0E424
                Global\I3C28B0E424
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                74[.]125[.]192[.]108/3115
                82[.]223[.]190[.]138/3113
                17[.]36[.]205[.]7412
                193[.]252[.]22[.]8610
                62[.]149[.]128[.]17910
                213[.]209[.]1[.]144/3110
                62[.]149[.]128[.]200/319
                212[.]227[.]15[.]1588
                193[.]70[.]18[.]1448
                195[.]110[.]124[.]1328
                81[.]88[.]48[.]668
                62[.]149[.]157[.]558
                74[.]208[.]5[.]14/318
                86[.]109[.]99[.]70/318
                91[.]83[.]93[.]1058
                80[.]67[.]29[.]47
                107[.]14[.]73[.]687
                74[.]202[.]142[.]717
                212[.]227[.]15[.]1517
                62[.]149[.]152[.]1517
                86[.]96[.]229[.]28/317
                62[.]149[.]128[.]210/317
                37[.]187[.]5[.]827
                185[.]102[.]40[.]52/317
                70[.]32[.]94[.]587
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                smtpout[.]secureserver[.]net12
                smtp[.]1and1[.]es10
                secure[.]emailsrvr[.]com10
                smtp[.]orange[.]fr10
                smtps[.]aruba[.]it10
                pop3s[.]aruba[.]it10
                smtps[.]pec[.]aruba[.]it10
                smtp[.]serviciodecorreo[.]es9
                smtp[.]office365[.]com8
                smtp[.]secureserver[.]net8
                smtp[.]mail[.]me[.]com8
                pop[.]secureserver[.]net8
                smtp[.]1und1[.]de8
                smtp[.]libero[.]it8
                mail[.]aruba[.]it8
                pop3s[.]pec[.]aruba[.]it8
                mail[.]serviciodecorreo[.]es7
                smtp[.]outlook[.]com7
                mail[.]outlook[.]com7
                smtp[.]mail[.]com7
                mail[.]secureserver[.]net7
                pop[.]serviciodecorreo[.]es7
                smtp-mail[.]outlook[.]com7
                outlook[.]office365[.]com7
                smtp[.]aruba[.]it7
                *See JSON for more IOCs
                Files and or directories createdOccurrences
                %SystemRoot%\SysWOW64\minimumpixelb.exe1
                \TEMP\5wgj1pj85exl95u.exe1
                \TEMP\zk_4987.exe1
                \TEMP\60hmsbnu_02.exe1
                \TEMP\5jg_9376.exe1
                \TEMP\cven8_6.exe1
                \TEMP\ifm_6.exe1
                \TEMP\uv1m953217in7u.exe1
                \TEMP\d6xka8_28.exe1
                \TEMP\z_0.exe1
                \TEMP\9_8776851.exe1
                \TEMP\5kn4h7rfngma.exe1
                %SystemRoot%\TEMP\8435.tmp1
                \TEMP\q_8103149.exe1
                \TEMP\m4tpybzlh_327464286.exe1
                \TEMP\15pk0i_09552197.exe1
                \TEMP\izp8se3tl3b.exe1
                \TEMP\2qcsdiacpc_27712037.exe1
                \TEMP\18k5b_0082228.exe1
                \TEMP\w_752582225.exe1
                \TEMP\43vcrfe61.exe1
                \TEMP\n0n_4621.exe1
                \TEMP\su1ygco.exe1
                \TEMP\ujtcb6ddd.exe1
                \TEMP\su4gvrcyup.exe1
                *See JSON for more IOCs

                File Hashes

                066d31cc0e6f45e89297334aad69cca12d60e9b4fe6aad341d08bcf6bce37c45 0fe2c7cfab6e55d92fcfe60d66e236bef5d44450c6ae7b759bf694f6097d935d 14bc54ea2759508a18c4e79734d328510897db0a2c71bd4ac2dffb34f99df2b2 1e4cdfb7252c74369fc5007e70c6746994f9e7a2e9f2f11b3012718b415d77a1 289c04314df3679f04bf1817fbf1589fb19dbd481f8c20daac8861068a7c5a32 2bc8c8cf127365a2a94bf47dc26ae14d11e62c38fd0df564bfc7867e025d94c1 3251a00155619dd1ba363b7fe477dab326fe791d2135129d3133c0cb716dd58b 4a98c1b48e25ed7a590d7fc89d65e07e40896e90c7977658c3bfcd8da7392181 52dae4128bb378dc4a877aab9287fc1ceb7576e1cc8506351a5679c6e9dd2e95 5e121e16757f3a3bafbc9b3e696de9473b4f1af5a314194cdfca68ab40332e9c 5ef1a5f4d7f7e3fd74392e514680e3439de5af3c1c818d560d82a62c77eb0a91 63cb6cd04a691f5af02e6a045cdf357e93ee8be5002100b90088b5dd65b24b70 640086c532c00aade40f11146f735fd3e969fe1565e5890800fe4b7551100523 68cb95f7e0d2a77e5a4832fb75243520a5ccc109849bbc933062379df4e7d164 9af3c4f8514d9c318ac90df6fc0e3a0278b41247ecd568b30a8266d0370f3eb0 ac8e332e3a99f1020e0cfeddfb672501d9da72d025d35c5edbcd0f347d5fb6a1 b5617d46830e9a3a362c97b9c6140c15c04b1dd64136ac1abf1dea3e65d83ccf b6c5d6655ef066545f8b9b8094c7347bf283e771b8f9b46b8e8f6e08144dcf13 b77f540a0cf278192870bab7fa677c0e858269ce1321814573934a6d095d89e4 cdbe742cd698ed504e7636811a13b8328c0a9905f4158fb25cde01dca66230fc d8614f65c65df8ca408d493fa9ef65894a84d9a49ddcb08be7b0798b670d367d db9ab62920e6a46ca2ed59de12132eb16c5c6205f3328a4d5a26cb52ae298ebb e6630adfc5882be333236fd4da6b8fb8c86866b4768b7914fa9102a3de3bc3b0 ee35b43c9bf1a9c24ab983a470e1cf5eb9508c741df45f5829c8d918a771b584

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid


                Umbrella



                Win.Packed.Gozi-7329531-0

                Indicators of Compromise

                MutexesOccurrences
                Local\55C37268-60E9-964A-3299-E2046F3CC61372
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                193[.]183[.]98[.]6672
                51[.]15[.]98[.]9772
                192[.]71[.]245[.]20872
                172[.]104[.]136[.]24372
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                api[.]frame303[.]at72

                File Hashes

                0003b0a5bfd7488160015e4e0e81e2d2a61ea5f5db53cabd9b4a404be8412250 0551e4b2c94f0796f7bd0108a1415ddbbb1126b9ff489fc5467e7dc3ab602f9b 064409558cbc89bbff58cbd3baaad0227a15109d4771635deb4b4f5a7f226ff3 0c527506d50c4f105f4e85180c3f2e2db58d969303883e7fdda26673d7a9e460 0ef66832ac9e94ce9f81840d4a40fa5e65bab3d930ad93503fbd77de4b74559a 10b22994ffe103af6f1d690ba1abf3e13cec9712a913ff024d9d1c656b92dbc0 12e98f72b4b5e225a1d465a7b121f56360bc9fd6ad538d56ee774874e4159e97 135653620d85d3016638d83a2f863eb480bc5e5f113f45e357037aedc7dd045a 1bd260a766aef952a2bb52dc926af5042f7d0361a5d869a167465400ab4af823 1fbeca47536689cd3ab5b692171a6bd8c93cd21a2d327d107631ce98e85429bd 23e78be8e4244831011a7bd02e497d15cf8ab29b8fd647881418e664ff0ab4be 2be8b60b9bf8fc8f81e8c1ec54af862351e6428922f285d4c816d64aab86189a 2de56515f487b70c3ad879e784838da3efb0d3f44539c1eddd9ea218398a3335 3214ab12ebd572aff4147227140915d21f0c5ca0f3efb949cf6796356f6d4d11 33a74f4ec4ae12674a0079c6af7c22c059ca950690a82e1fd11e4bb1f3f21305 3509cf8e68799db2677703e49caea882b6d2c5971379ac0e8619aeb30876a2a8 384373f044464197697af0c96e2028a6d76875524d6bf6650ff68a5e5e92eabf 3bf729f719580998bd65e13d02129e96efdd74448f84c504829f418ed87607e3 3ce58e9e556c87216307495378b2b1d0eb61517771b9bb10426a2ab7d14aeefe 3da63842c752a0c705180cea273b0b397ebb3cd9b8e6087401db14fe254a44ff 3e41a7ae208fa0e8cf28a8610533dd2ef965062f38577af2c35dd8f8950669bf 42ce932aae9b15b7deaf92694fb5a4db12f0bf9936da2f1d06c7a20714af3ca0 47109959af2b7fee21af66b6eeaf948ad4bb28c7428f59c9bb90ac7ea3753f24 48f89fac46dcc1f813d87d4cbedbae83d90f660558718e52bdcad554d71ecd35 49cf6e4d3589018819869dc3cd1733a1b3c42326b52cc0e48edafe113593019c
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                Wsa N/A

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Virus.Neshta-7330232-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\CLASSES\EXEFILE\SHELL\OPEN\COMMAND 25
                MutexesOccurrences
                MutexPolesskayaGlush*.*svchost.comexefile\shell\open\command‹À "%1" %*œ‘@25
                Files and or directories createdOccurrences
                %TEMP%\tmp5023.tmp25
                %SystemRoot%\svchost.com25
                \MSOCache\ALLUSE~1\{90140~1\DW20.EXE25
                \MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe25
                \MSOCache\ALLUSE~1\{91140~1\ose.exe25
                \MSOCache\ALLUSE~1\{91140~1\setup.exe25
                %ProgramFiles(x86)%\Microsoft\Office14\1033\ONELEV.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\1033\SETUP.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\ACCICONS.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\BCSSync.exe25
                %ProgramFiles(x86)%\Microsoft\Office14\CLVIEW.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\CNFNOT32.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\GRAPH.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\GROOVEMN.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\IECONT~1.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\INFOPATH.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\MSOHTMED.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\MSOSYNC.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\MSOUC.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\MSQRY32.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\MSTORDB.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\MSTORE.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\NAMECO~1.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\OIS.EXE25
                %ProgramFiles(x86)%\Microsoft\Office14\ONENOTE.EXE25
                *See JSON for more IOCs

                File Hashes

                010a8e1d056b6a79142ec8abc46ae9bcd54c914f62d453370e4b74e75076b1e0 017ebabf7dc178eea75e6a5c9fe393a2f04bee2739e1d8d8085ceb4f6cf536c8 01e63cc8ed89f76c54a66baf631072f275ca0b4d90f316b3582325637260c206 1077dd3eae47e67505ddbfca24db29cc86a8272f4cd292dc134f8b3abfac2350 1d62a3dc5a827604e330ff1ee26dd32786b2b371adec06bc136c4d02dc31d3a1 1e5802bd82d8f5944e573720a81ba56de336600e576c8b6b095d1130b61c5e16 22b47cc60096f63ec4e90f65a710013688d51f6e1350df7165fe78eabc289973 24cd7a38f026dd924b59253c62616dec2bc20498ee7226be8a00bcfa1631e164 2d3c192dd31356f05dd53a8b0d489a48bbb28e0dfc02be3337e572d5b6e78ad5 2df99a6334f489425dbe0e0cb2b84e2fc708ead88e4bfcf8773bd614f16ab97b 321019b6ce05ad99ae59065d7c18f8ea6467809973eaf57b01e7482c6701e1ad 34bc860348e7b7600d41043ff0b613b93c91e3d079a066f7cd7e3a25998fb0e5 34d03297d8dfaaad8b61b26b2b45287da4a3b252a47bc9fd64bcd4cb1478f2c7 364f32c03907258b42fdd69dc0015a130e1604398d86ae4302d912bfdcf7e129 376fa4f35782601e163d4d8f8aca8589ab4b44d44b89bf13c50c639809976b87 400e12d8203bbafff024427b8287ccbc580060b4c2518127364e559b6c1dbc5b 411d9aad484f849527e3c0ea7c3f08cf5ceae2d62766c5de08fdd16e33154516 425de37d3bb1fcbac8b837fb625b5fc76c9ca2403a298faef8587aef28b0c4a9 4305e15188cc8a790513b9dd280706b13a4c3ecd53e79d7ad2c51177b3685676 496fb4b66415e7269cc6f20be797434401d94876757f6a5e0e1e0732fb27dc41 4ddb68f739d10596394f5ddc102ae1cd688630d98f58317ee50aba958d4cc6be 54a789da6eb9b456025487c386077e168b96e99682b2ede1f3d2a5609b1410e9 5845d3c49fd007012f5ee92b271757221d53eb948ecb6acacb924e5c2a8845c3 5a675fced512cadb2971f8d23d8d66aecae3c62e54cdbf110aae55facf609aee 5b3da2505153ca4146151f8d7de873868ce3041487c343cf5a43a30fd223cbe4
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                Wsa N/A

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Malware.Gootkit-7333291-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\MICROSOFT\IEAK 26
                <HKCU>\SOFTWARE\MICROSOFT\IEAK\GROUPPOLICY\PENDINGGPOS
                Value Name: Count
                26
                <HKCU>\SOFTWARE\MICROSOFT\IEAK\GROUPPOLICY\PENDINGGPOS
                Value Name: Section1
                26
                <HKCU>\SOFTWARE\MICROSOFT\IEAK\GROUPPOLICY 26
                <HKCU>\SOFTWARE\MICROSOFT\IEAK\GROUPPOLICY\PENDINGGPOS 26
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_14
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_15
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_16
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_17
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_18
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_19
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_20
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_21
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_22
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_23
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_24
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_25
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_26
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_27
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_28
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_29
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_30
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_31
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_32
                2
                <HKCU>\SOFTWARE\APPDATALOW
                Value Name: DpiSsys_33
                2
                MutexesOccurrences
                ServiceEntryPointThread26
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                109[.]230[.]199[.]134
                208[.]91[.]197[.]913
                31[.]214[.]157[.]1623
                185[.]189[.]149[.]1742
                176[.]10[.]125[.]872
                192[.]35[.]177[.]641
                185[.]212[.]44[.]2091
                185[.]158[.]249[.]461
                185[.]212[.]47[.]971
                109[.]230[.]199[.]2481
                31[.]214[.]157[.]141
                109[.]230[.]199[.]1801
                185[.]158[.]248[.]1331
                194[.]76[.]224[.]1231
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                me[.]karysmarie[.]me2
                adp[.]mjmentertainment[.]com2
                kkillihhy[.]top2
                picturecrafting[.]site2
                otnhmdmwnz[.]top1
                tics[.]cibariefoodconsulting[.]com1
                roma[.]simplebutmatters[.]com1
                me[.]woodlandsareareview[.]com1
                top[.]hymnsontap[.]com1
                adp[.]reevesandcompany[.]com1
                bud[.]ttbuilders[.]com1
                pic[.]picturecrafting[.]com1
                me[.]kaleighrose[.]me1
                it[.]its1ofakind[.]net1
                me[.]jmitchelldayton[.]com1
                me[.]thebellamyfamily[.]me1
                Files and or directories createdOccurrences
                %TEMP%\tmp<random, matching [A-F0-9]{1,4}>.tmp1
                %ProgramData%\{d781e3a1-e512-422f-aa6c-27428437cbc4}.lock1
                %TEMP%\TMP2834788.tmp1
                %TEMP%\markwde316.tmp1
                %TEMP%\TMPwde316.tmp1
                \uv\04F28BB8-14801
                \uv\04F8C430-14801
                \uv\051EE940-8521
                \uv\051EEAC0-8521
                \409494144.inf1
                \409494162.inf1
                \409494248.inf1
                \409494334.inf1
                \409494418.inf1
                \409494444.inf1
                \409494588.inf1
                \409494628.inf1
                \409494124.inf1
                \409494190.inf1
                \409494298.inf1
                \409494658.inf1
                \409494820.inf1
                \409494840.inf1
                \409494920.inf1
                \409494996.inf1
                *See JSON for more IOCs

                File Hashes

                02b5fd5e99d5df445989bdf6fc390c6a91868627931a215ffe4b7c0c6575d3d2 087e3e740b260ad83ba5881be43822ecccf5bcefc3c3246a62d8f5cb11065891 0a75195584a2ff98ff416153d7ae3c5f470201bacae816a9040e1545ad1ed71c 0a98f18e5602852de2a00e1d4e4b87a9aa73bada595e14b7d05844aa85a0cb3a 0e6f4226f190a84de26df937557d624fb130e4a0b0e692a494a937d144506433 0ed33f996aa50dc73876f30aec07446dcaa0384c2c8268478a7857724c118759 195932578c922415b99e2e292acbaf32133de4727384f5860c9c5d59436ce671 20d12b744bd651c35171626f1ce6d85bd9a3362acfee4f91934da6f7d4414cce 26f188069d3f42e5a0e5f217e807703347d46c84953ccd4d39e897dd0d4ac45e 279306903e6702c79e229db28bb3d119de8641c8ad4bb24bd0e9da7559440b36 29e776ef6349ee6f4d37aa5b099b7b6abb433d950e8ec04f25069813178a2f72 3e8167eb0553a7be23864cd48db852623c95b884682df95c13c196bec9122bc7 417d2f400fb2c53c28407632edf46189f4cb4482cf5b323b55b3d75312c954dd 4957073bcc69c602b3fd1e4c98f4cc8937ebfce5f61756db4d1021a9039a5be5 5c077e0950fdd99df11e389d2b830f241b35efdfb9dc6522b457c66fd64b79a0 60a751e56901c1b593e3a58c1e0770b9fbefb83c8e75433fdbc16e55c21cebc8 73541008d1f6fbbfb7321f39ff083398d4f5ee86bde9eca2574e67a952c7a37f 76ea09817ea2aba02f6b6701ebd786adfd0a02b42ac53a51b1f334245f21004d 7a2ae75210913c882e0f6d848bfc06d729b7d0c6faf1c42ea9dec67da18c41e4 7eb13e84eac78a616ef498adb7fad002e912fbdd699891a8b0da63f224a7c277 877b0ef2e019d8f102373c6a09975c84053eb5705b8e8d4508e0b4b9418b458f 9da94873a87609b0c6471981b57fc4e6a8abe1b649e571a0eaffbaa80f4b4961 c96b2b221a2071b92cc21f75edfb0fea967271b8d15bedfece0ab686ad6431a7 d3c1a8df4b8112ebf3c3edc53ebe8adb3680accebc243040b3d438a4e5489f2a d6fbd9d2e70a77a6bfa308ef2ce0d8ad13266a4a41ed59089a52c2ee7e550bfc
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid



                Umbrella




                Win.Dropper.Remcos-7334963-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKCU>\SOFTWARE\REMCOS-8N5JSJ 25
                <HKCU>\SOFTWARE\REMCOS-8N5JSJ
                Value Name: licence
                25
                <HKCU>\SOFTWARE\REMCOS-8N5JSJ
                Value Name: exepath
                25
                MutexesOccurrences
                Remcos_Mutex_Inj25
                Remcos-8N5JSJ25
                TreeSee25
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                208[.]91[.]197[.]9125
                185[.]158[.]249[.]8825
                108[.]168[.]157[.]7025
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                pearlsolutions[.]com25
                finnanlinks[.]com25

                File Hashes

                0164052cd74b2d406c5503faf58f1794d6ba14092b7a9fa9509bc8a85eae01cd 24175b88c78d6089ee1dac7875b71c6194c5292d826911050bde8ebc55b4491f 24d2b912a0ffbde3afbef7e4460693ae84976b689ae7a150b914fb09a7551b13 2ccb899ef52566bceb4d8e09163dd21291624a73b5ad554fd58f920434af9076 2f260e1c62dd6ce1d6c042bd488881d4b562ee1990d20cc383866fd6f805abdc 47232b513efbd2c6fcd3dd1778aa00ca018710c8afd597d238ab1c94433747c4 47a9af0fcc8f26b71865398d4cf372b2d8005f5b93cf75233f44439da9378beb 4cf3770d9c9b2ea152ccf677f4f03e46fd6ee497362fa1a9fbd4d6994ec48244 556c8f046af879ab852ab13e2cde6ebf653fa436840bde821c4b7b26cc626f73 5a5b57e664e35d5528b3c9c32b7123861125e5b6789a7699e076821e0eaece10 65573233fca2347e6aa28de9caec5f49d3ff0f5b844aa1d672d822970228d8f0 6eebb872f1c301f54c77849a128e5500a7e3cfaafee2513004fabaf880bb75f9 7d2b477f6a2ae69257c9626cd87ca89b741b0397e2b4743194b1e95d802637d4 7e559c9077c5b416db0fcd99cfee7e9fa80212ed53b0bef7c37c00373c7e2cc2 81685e6e788710a878b16cb2febbc7cff3f8bf5905811fc392e840da73f79b50 8e4638e4d6cc97ebc401533a5bd4cd22ccaca17a584f24610040aff5e8ffa64e 9996145757ae9e7ca9fc01709e3b597be530d189f50fe2955db438dde9f07c77 9f01d27ac72c5194859d657ee8b024786469661cc65b29cf795b66d10fb35770 b03eece2320b96ba1c1057f3adead7c347626f6f45e867af798f03a78d030fe9 b0894a209477e906130c6a493a8d34cde4ae16442753c2513053f4e33a39ca80 b29bd09e5a11bb8b46ca1363f3455d66057c8bd24f3ea6a643851d288ee0239c b6c098d02c8eceaf072fdf7b91c832a0c86e529a7c276fbc28ed2c242053a35a c5ff8271d4820962d7ad72526ae7aca7b7df84e2cab249dcff099f4bfa740bc1 c9e5d6fbd34df45539a162af73ce141406c182cb072e92a7a815762ff90dcd4f caffbaf16f0fa50066efc7435b21330c05b2b3ca602253558e4bf30cb0ddad67
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                Wsa N/A

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Dropper.Trickbot-7340237-0

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\AUTHROOT\CERTIFICATES\DAC9024F54D8F6DF94935FB1732638CA6AD77C13
                Value Name: Blob
                9
                <HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\PROFILELIST\S-1-5-21-2580483871-590521980-3826313501-500
                Value Name: RefCount
                5
                MutexesOccurrences
                Global\316D1C7871E1042
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                185[.]79[.]243[.]3711
                185[.]222[.]202[.]222/317
                172[.]217[.]3[.]1156
                200[.]116[.]199[.]105
                194[.]5[.]250[.]82/315
                45[.]142[.]213[.]585
                66[.]55[.]71[.]115
                46[.]30[.]41[.]2294
                31[.]184[.]253[.]374
                185[.]244[.]150[.]1424
                45[.]66[.]11[.]1164
                176[.]58[.]123[.]253
                104[.]20[.]16[.]2423
                190[.]154[.]203[.]2183
                187[.]58[.]56[.]263
                36[.]89[.]85[.]1033
                181[.]113[.]20[.]1863
                94[.]156[.]144[.]33
                109[.]234[.]34[.]1353
                45[.]80[.]148[.]303
                177[.]103[.]240[.]1492
                185[.]65[.]202[.]1272
                200[.]21[.]51[.]382
                186[.]42[.]185[.]102
                107[.]22[.]193[.]1672
                *See JSON for more IOCs
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                250[.]5[.]55[.]69[.]zen[.]spamhaus[.]org11
                www[.]myexternalip[.]com6
                ident[.]me3
                icanhazip[.]com3
                api[.]ipify[.]org3
                api[.]ip[.]sb1
                wtfismyip[.]com1
                46igeuohbyzeokpe[.]onion1
                Files and or directories createdOccurrences
                %APPDATA%\HomeLan42
                %APPDATA%\HomeLan\settings.ini42
                %System32%\Tasks\Home lan application42
                None41
                %TEMP%\<random, matching '[a-f0-9]{3,5}'>_appcompat.txt20
                %TEMP%\<random, matching '[A-F0-9]{4,5}'>.dmp20
                %APPDATA%\HomeLan\data\pwgrab645
                %APPDATA%\HomeLan\data\pwgrab64_configs\dpost5
                %APPDATA%\HomeLan\data\systeminfo645
                %APPDATA%\HomeLan\data\psfin641
                %APPDATA%\HomeLan\data\psfin64_configs\dpost1

                File Hashes

                01639c6060f371a5c4d063bcc5827577b2fc0f4c7576e018493f0f2fbaa0971c 051c1d65aa3f07c6f0c12177e66db74593cf19187a5d5279a1060215d1fd693f 0a62e631b10f9a4c3b2e18b2e1cd891de5617ed77d3486a895d5b0e300f9c03a 0b0958d9893a048f798947d43f40a8e73c39a58314ca54efcfd9b44c2fbf70c2 0dedc6c5d7f16e280b91f0fcc39776e5a81a9256679039ccf766ad47c3280107 123624171e54c4fb17187cee3bba2a42beceb6e14a533d3f678b4b79322e5ecc 176555c1164babd31c1b5cf572f04e4ae9272f749c34da82450f34496f2e38ae 19040036454f1ed997841efb79601c14ad4ddbfe8716d792645f02ad639cc4c5 19067755e33f789405fff9be3a0083fe46a9f723cbd478d8b4fc7eee02e1747b 1ab1b32131737818d95fd57c3878ad2c5ed5319915fa570742d3f72ba77a3618 1b8aa6a3db661ceba43b3e564536502e8babe78050236f35261865ab5227369c 2258ed23ff9b9999e542fd9adec574a2ea7aaa25cb72dbcd03853f74d64f10ae 24e6854a3138b45709bf7144f1e4abb69f86722a828cfd563a8b27e1dab95a9f 277a447321a678f7bc82683fab3e4b52b2a7288be76b87c014a0c33e3a187cff 2c4dda46da1f5943ee7caee3ce42454e53364371763e2bb84d4831c87636ee40 3302b6b60869d67af98b83e9a795afa6fe3ac3cfd492ff89ed284eb04dcd8a31 33111cf63f3781a3be253cfd560fef13904a80d95e0484d8be3e2515a050cf78 33528d4f9144d9f5882ad5a29602e0068d2f88926908d7fb464ec4faa502b261 351385b5ba3932321d3f830fa7accb71317832be3362636dc4e53b4ad8dc7c8c 36d985f970096d5ac23193d3d564f51402b0d815ebf3490c46b90daca05c5796 3e2e719d3c8a79ad31df38e3d8071268325cc9de90cb1d9374da205196085640 410702470b3719dba334d8e86e53560c307f9220ef0598829690d6e2f09eb8ca 414c44aedca4bf53ea9594795e50512895bb5bc84df5718111de6dc3b935baad 4d8b363440ac876738d71a5822cc49b54d6466afb05a91e69f1bfc2e20a6f5a1 4e26ef3e451e37ce362fd98f6d4ab8f6d6ee581c58094a963a594e322a0aa3be
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network SecurityThis has coverage
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                Umbrella N/A
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid




                Win.Malware.Bublik-7340719-1

                Indicators of Compromise

                Registry KeysOccurrences
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST 14
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\APPCOMPATFLAGS\LAYERS 14
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\DOMAINPROFILE\AUTHORIZEDAPPLICATIONS\LIST 14
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
                Value Name: C:\Windows\SysWOW64\igfxcn86.exe
                11
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\DOMAINPROFILE\AUTHORIZEDAPPLICATIONS\LIST
                Value Name: C:\Windows\SysWOW64\igfxcn86.exe
                11
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Intel Network Service
                11
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\APPCOMPATFLAGS\LAYERS
                Value Name: C:\Windows\SysWOW64\igfxcn86.exe
                11
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\APPCOMPATFLAGS\LAYERS
                Value Name: C:\Windows\SysWOW64\wmpnd86.exe
                3
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST
                Value Name: C:\Windows\SysWOW64\wmpnd86.exe
                3
                <HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\DOMAINPROFILE\AUTHORIZEDAPPLICATIONS\LIST
                Value Name: C:\Windows\SysWOW64\wmpnd86.exe
                3
                <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
                Value Name: Windows Media Networking Device
                3
                MutexesOccurrences
                V8x14
                muipcdraotse14
                S3xY!14
                Global\<random guid>6
                IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
                195[.]137[.]213[.]6714
                Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
                vps573[.]intelbackupsvc[.]su7
                vps531[.]intelbackupsrv[.]su7
                j13[.]bull-quantum-media[.]su3
                j35[.]evil-quantum-servers[.]su2
                j65[.]coax-quantum-media[.]su2
                j16[.]fast-quantum-servers[.]su2
                j67[.]fast-quantum-servers[.]su2
                j30[.]bull-quantum-media[.]su1
                j71[.]evil-quantum-servers[.]su1
                j52[.]coax-quantum-media[.]su1
                Files and or directories createdOccurrences
                \Autorun.inf14
                E:\Autorun.inf14
                E:\TmpMount004.{645FF040-5081-101B-9F08-00AA002F954E}14
                E:\TmpMount004.{645FF040-5081-101B-9F08-00AA002F954E}\tmpmount-t285019593.bin14
                \TmpMount004.{645FF040-5081-101B-9F08-00AA002F954E}\tmpmount-t285019593.bin14
                %SystemRoot%\SysWOW64\igfxcn86.exe11
                %SystemRoot%\SysWOW64\wmpnd86.exe3

                File Hashes

                0d105c7c5ac13e3840a816cd229b19305655df295c9bafaefe23bff7e337feeb 16d64ea86143cbf62c020f313c87210c12775011368bc5add13a4a7f059d5beb 1ee966faa45a71c137856951731912e1523e8ae5bce27d40bacf53c3650398f2 2315e6edf1fcbd389e9eaae91af5e2a259a57a7b72392444da732ad896fe8fa0 24f246aafdbe4e6b1e8a209e1b1a8370e27a8c1966e5abe924a67fb9ba56d3ca 38b11c4bb0aa58d0d1ecab7aea4c4154c0202cea808c829176a43bd96ab98c12 3b6ce3103a80773196a7b5a98fb22a348a6b26feaca7180fc162e3a7aa18e14b 44615537516d7b38ce0f36a25f0a1ddc79b624a8132288cf24efacb193ef9fbe 497edec65e55215f67734aeb317f2e426238de6fe587050c5b0aa7589749ba1f 568ac42883664e6e3626b5cb47920fa29f76daa8ffc707a321092a2b5aeda070 710a0f2bf3915c8bcd56e7e019c945094356d513022a7973a024a2469041cd43 7c387616f2b369799db06728f44c01c24187545e2c0fb7850889dd63f181dfc6 817ec74768baf0c4772a072188e0c6016991208266d165bf409ca3aec8efd5d0 9557cbe21cb18643397a2a40ab7cd245536c396b83857c19ba630936b6def5fd 9f658c498057ac8c372f1eaf28c49d821ffd1ef409858127d387c6a2e2696c90 a74379225d10237dc3175bbec1dcfb8b3b01c0d44b4e2149bc5139306a9188d1 aedf45d7c403502528b581d16253b2e113ed90032fdb304a3fef3350503c90be b8796b91c089d9487a2969ff3675cfed0565820bfe1fd20e529c2c474e0b550d bd96928db2ce25f1c86d64b355fc551c4a31fd72af567cc05d402d06bd12c3b8 c3d16015a4791380211dd51c0a90b3042d5820d2afd9dfe935fd94160c0e7dac c51fd0b0190e9a1b9356b5870dceb055edb9788e5706b7da1d1ed5d737e6980d d335b629182955cfbef363b4cad3462342e573e205a8c2defea842b6f004755c e396ba55fd116b35179f392cc24edc5f348cdf28d2bbbd1704ea0df8e77ea535 e46c7b72ff1458e2a0937c445029063a88e2af9833e034f5ff539a3efc26e44b edf4eb3860904170a2b5ce8cac27db7dcc7f676f5dd9d767f63ce2cabcee3d99
                *See JSON for more IOCs

                Coverage

                ProductProtection
                AmpThis has coverage
                Cloudlock N/A
                CwsThis has coverage
                Email SecurityThis has coverage
                Network Security N/A
                Stealthwatch N/A
                Stealthwatch Cloud N/A
                Threat GridThis has coverage
                UmbrellaThis has coverage
                WsaThis has coverage

                Screenshots of Detection

                AMP


                ThreatGrid



                Umbrella




                Exploit Prevention

                Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
                CVE-2019-0708 detected - (26364)
                An attempt to exploit CVE-2019-0708 has been detected. The vulnerability, dubbed BlueKeep, is a heap memory corruption which can be triggered by sending a specially crafted Remote Desktop Protocol (RDP request). Since this vulnerability can be triggered without authentication and allows remote code execution, it can be used by worms to spread automatically without human interaction.
                Madshi injection detected - (3206)
                Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
                Process hollowing detected - (1973)
                Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
                Excessively long PowerShell command detected - (1169)
                A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
                Gamarue malware detected - (190)
                Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
                Kovter injection detected - (100)
                A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
                Atom Bombing code injection technique detected - (83)
                A process created a suspicious Atom, which is indicative of a known process injection technique called Atom Bombing. Atoms are Windows identifiers that associate a string with a 16-bit integer. These Atoms are accessible across processes when placed in the global Atom table. Malware exploits this by placing shell code as a global Atom, then accessing it through an Asynchronous Process Call (APC). A target process runs the APC function, which loads and runs the shellcode. The malware family Dridex is known to use Atom Bombing, but other threats may leverage it as well.
                Installcore adware detected - (70)
                Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
                Special Search Offer adware - (46)
                Special Search Offer adware displays unwanted advertising in the form of popups or by injecting into browsers and altering advertisements on webpages. Adware has also been known to download and install malware.
                IcedID malware detected - (34)
                IcedID is a banking Trojan. It uses both web browser injection and browser redirection to steal banking and/or other financial credentials and data. The features and sophistication of IcedID demonstrate the malware author's knowledge and technical skill for this kind of fraud, and suggest the authors have previous experience creating banking Trojans. IcedID has been observed being installed by Emotet or Ursnif. Systems infected with IcedID should also be scanned for additional malware infections.

                Gustuff return, new features for victims

                $
                0
                0
                By Vitor Ventura with contributions from Chris Neal.

                Executive summary


                The Gustuff banking trojan is back with new features, months after initially appearing targeting financial institutions in Australia. Cisco Talos first reported on Gustuff in April. Soon after, the actors behind Gustuff started by changing the distribution hosts and later disabled its command and control (C2) infrastructure. The actor retained control of their malware since there is a secondary admin channel based on SMS.

                The latest version of Gustuff no longer contains hardcoded package names, which dramatically lowers the static footprint when compared to previous versions. On the capability side, the addition of a "poor man scripting engine" based on JavaScript provides the operator with the ability to execute scripts while using its own internal commands backed by the power of JavaScript language. This is something that is very innovative in the Android malware space.

                The first version of Gustuff that we analyzed was clearly based on Marcher, another banking trojan that's been active for several years. Now, Gustuff has lost some similarities from Marcher, displaying changes in its methodology after infection..

                Today, Gustuff still relies primarily on malicious SMS messages to infect users, mainly targeting users in Australia. Although Gustuff has evolved, the best defense remains token-based two-factor authentication, such as Cisco Duo, combined with security awareness and the use of only official app stores.

                Campaigns


                After Talos' initial report, the Gustuff operators changed their deployment redirections. When those were blacklisted, the actors eventually disabled the C2, but they never totally stopped operations. Several samples were still around, but the hardcoded C2 was not available. A new campaign was detected around June 2019, there were no significant changes the malware. The campaign was using Instagram, rather than Facebook, to lure users into downloading and installing malware.

                Domain hits in June

                The Instagram-related domains are used for the initial infection, using the exact same method of operation as before.

                But a new campaign spun up at the beginning of this month, this time with an updated version of the malware. Just like in the previous version, any target that would be of no use as a potential target is still used to send propagation SMS messages. Each target is requested to send SMSs at a rate of 300 per hour. Even though the rate will be limited to the mobile plan of each target, this is an aggressive ask.

                Domain hits in October

                This method of propagation has a low footprint, since it uses SMS alone, but it doesn't seem to be particularly effective, given the low number of hits we've seen on the malware-hosting domains.

                Targeted applications

                Just as before, this campaign mainly targets Australian banks and digital currency wallets. This new version seems to target hiring sites' mobile apps.

                One of Gustuff's capabilities is the dynamic loading of webviews. It can receive a command to create a webview targeting specific domains, while fetching the necessary injections from a remote server.
                Request                                                                      Result
                During our investigation, we received a command from the C2 to target the Australian Government Portal that hosts several public services, such as taxes and social security. The command was issued before the local injections were loaded (using the changearchive command). The injections were loaded from one of the C2 infrastructure servers. This command is not part of the standard activation cycle and was not part of the injections loaded by the version we analyzed in April.

                This represents a change for the actor, who now appears to be targeting credentials used on the official Australian government's web portal.

                Technical analysis


                This new version of Gustuff seems to be another step in its planned evolution. This malware is still deployed using the same packer, but

                there are several changes in the activity cycle, which take advantage of functionalities which either where already there or where being prepared. One of the changes in the behaviour is the state persistency across installations.

                ID file

                During the activation process, the malware attempts to create a file called "uu.dd" in the external storage. If the file exists, it will read the UUID value stored inside it that will be used as an ID for the C2. When this happens, the malware won't go through all the activation process. Instead, it will receive commands from the C2 immediately. This file already existed in previous versions. However, the behaviour described above was never observed.

                The main API follows the same philosophy. Gustuff pings the C2 at a predetermined interval, which will either reply with an "ok" or it will issue the command to be executed.

                The targeted applications are no longer hardcoded in the sample. They are now provided to the malware during the activation cycle using the command "checkApps." This command already existed on the previous version, but its usage during the activation cycle was not mandatory.
                checkApps Command

                The list of anti-virus/anti-malware software that Gustuff blocks as a self-defense mechanism is now also loaded during the activation cycle.

                Example of applications is blocks (not full list)

                These changes in the Gustuff activation cycle indicate that the actor decided to lower the malware static analysis footprint by removing the hard-coded lists. Both commands already existed in the communication protocol and could have been used in runtime.

                Command                                                                                   Result

                During the activation cycle, the malware now asks the user to update their credit card information. The difference is that it does not immediately show a panel for the user to provide the information. Instead, it will wait for the user to do it and — leveraging the Android Accessibility API — will harvest it. This method of luring the victim to give up their credit card information is less obvious, increasing the chances of success, even if it takes longer.

                The communication protocol now has a secondary command execution control. Each command is issued with a unique ID, which is then used by Gustuff to report on the command execution state.
                Command execution control
                This allows the malicious actor to know exactly in which state the execution is, while before, it would only know if the command was received and its result. This new control mechanism also generated the asynchronous command capability. The malware operator can now issue asynchronous commands that will receive feedback on its execution while performing other tasks — "uploadAllPhotos" and "uploadFile" commands are two of such commands.

                With these changes, the malicious actor is obtaining better control over the malware while reducing its footprint.

                This version of Gustuff has substantial changes in the way it interacts with the device. The commands related to the socks server/proxy have been removed, as have all code related to its operation. This functionality allowed the malicious operator to access the device and perform actions on the device's UI. We believe this is how the malicious actor would perform its malicious activities. We believe that after collecting the credentials, using the webviews, the actor would use this connection to interactively perform actions on the banking applications.

                This functionality is now performed using the command "interactive," which will use the accessibility API to interact with the UI of the banking applications. This method is less "noisy" on the network, since it takes advantage of the C2 connection, rather than creating new connections.

                The command "script" is also new. This is a very simple command with huge potential. Gustuff starts a WebChromeClient with JavaScript enabled. Afterward, it adds a JavaScript interface to the webview, which will allow the execution of methods defined in the malware code.
                JavaScript scripting

                By default, the WebView object already has access to the filesystem, which is not an additional security risk in this context, allows the operator perform all kinds of scripts to automate its tasks, especially when the script also has access to commands from the application.

                Conclusion


                This is an evolving threat, and the actor behind it seems to want to press on, no matter the level of coverage this campaign gets. Instead, they changed the malware code to have a lower detection footprint on static analysis, especially after being unpacked. Although there are no changes in the way it conducts the campaign, Gustuff still changed the way it uses the malware to perform its fraudulent activities. The main target continues to be banking and cryptocurrency wallets. However, based on the apps list and code changes, it is safe to assume that the actor behind it is looking for other uses of the malware.

                Coverage

                Snort

                SID: 51908-51922

                Additional ways our customers can detect and block this threat are listed below.

                Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors. Exploit Prevention present within AMP is designed to protect customers from unknown attacks such as this automatically.

                Cisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

                Email Security can block malicious emails sent by threat actors as part of their campaign.

                Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

                AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

                Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

                Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

                IOCs

                IP

                88.99.174[.]142
                88.99.175[.]152
                88.99.170[.]43
                88.99.170[.]141
                78.46.201[.]36
                88.99.174[.]140

                Domains

                instagram-shared[.]pw
                instagram-shared[.]store
                instagram-shared[.]info
                instagram-share[.]com
                intagram-share[.]com
                instagram-shared[.]net
                instagram-shared[.]com
                video-hd33[.]site
                video-hd30[.]site
                video-hd29[.]site
                video-hd24[.]site
                video-hd20[.]site
                video-hd18[.]site
                video-hd17[.]site
                hd-video5[.]site
                hd-video4[.]site
                video-hosting[.]site
                video-hd1[.]site
                video-hd[.]site
                hd-video1[.]site
                homevideo641a[.]cf
                homevideo651a[.]cf
                homevideo5-23b[.]ml
                homevideo631a[.]cf
                homevideo611a[.]cf
                homevideo4-23b[.]ml
                homevideo641a[.]ga
                homevideo3-23b[.]ml
                homevideo54-1a[.]ml
                videohosting32-e[.]cf
                videohosting23c[.]cf
                videohosting62-b[.]tk

                Hashes

                5981f8ec5b35f3891022f1f1cdbf092c56a9b0ac8acbcd20810cc22e7efb5e0b - SexyJassica.apk
                03d1a55ce6879d79239db32c2c8e83c4a3e10cb9123d513ce7fd04defb971886 - gscptzorx.jar
                3027fbd59b8dd25dcabd21800d8e8ab3222a1ae3e2d268857def4311bb01ea2e - gscptzorx.dex
                b13e6d70b07d6127d803d2374ebfb1e66a3b4cfd865cc2eb0e45455401be527e - flash
                65a7d4f9b3549198b008a089d0c8feb30c5409efc52e8a496f503fa262a6e922 - flash2

                CISO Advisory: Governance & Risk Management

                $
                0
                0
                Businesses are built on risk. No matter how prepared they are, there is no guarantee that any decision will result in the expected outcome. But through good management, the likelihood of success can be improved.

                In the first in a series of CISO Advisories this paper address Governance & Risk Management as a fundamental part of any cyber security strategy.

                Download the paper here.

                Access the series introduction and index here.
                Viewing all 2026 articles
                Browse latest View live


                <script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>