Archive for category Threats

Rewterz Threat Alert – Bank of America Phishing Campaign

Severity

Medium

Analysis Summary

A recent phishing campaign targeting Bank of America has been active and luring users to giveaway their credentials. It came in a very critical time when tensions are on the high between the US and Iran. It can be a move to destabilize the financial sector to gain advantage over the enemy and give a major setback to the economic front.

Impact

Credential theft

Indicators of Compromise

URL

  • http[:]//logind-bankofamarca[.]com/
  • http[:]//loginds-bankofamarca[.]com/
  • http[:]//logined-bankofamarca[.]com/

Remediation

  • Block all threat indicators at your respective controls.
  • Always be suspicious about emails sent by sent unknown senders.
  • Never click on the links/attachments sent by unknown senders.

Rewterz Threat Alert – LiquorBot Botnet

Severity

Medium

Analysis Summary

A Mirai-like botnet named “LiquorBot” was analyzed by Bitdefender researchers. Their blog post discusses the distribution method and goals of this botnet variant. In most cases the initial infection vector is via SSH brute-forcing, although it is also capable of exploiting several command injection and remote execution vulnerabilities. Installation of the malware begins with a dropper shell script that downloads a series of binaries from a remote server. These binaries are all LiquorBot samples but compiled for a variety of CPU architectures. Upon installation, the bot relaunches itself under the guise of the sshd daemon and subsequently clears its tracks. There are 3 servers involved in the botnet’s communication: a C2 server from which it receives commands, a mining server, and the server hosting the aforementioned binaries. The available commands include those to download and execute files or shutdown the server. Additionally, this botnet malware incorporates Monero cryptocurrency mining into its functionality.

Impact

Mine for cryptocurrency

Indicators of Compromise

SHA1

  • 14592719e2a354633131bc238f07aa0cb9cce698
  • 1611a8445085d1687c72b7e5a7c5602cbe580c8b
  • 1f15195ddc1e4174674fbf5d1fc95ed0a7726f7b
  • 2784a122089c20d5c02665da1241fe02f9ac90cc
  • 2901d4ee7f289bf0b1a863bec716d751f66a4324
  • 2d1d294aac29fab2041949d4cb5c58d3169a31d3
  • 31176239ab5187af5d89666f37038340b95a5a4e
  • 31d9ca734c5f4c1787131d3a1b6b91ca60e57794
  • 331ec23c250b86d912fa34e0e700bfcac1a7c388
  • 3453a96414e63a813b82c6d98fa3b76c1824abd8
  • 36382165bb53a7ed9387a02e5b9baee36fe23f64
  • 48c863e4ad23fb946386320f3a85391b54ba50ad
  • 49602256c8d65d0620d5abe8011a78425c7ae177
  • 54bdfa936c9eb4ea329ca35b95e471d51daef1d5
  • 5821ff8eb9b23035a520e1fb836e43b1ec87ffaf
  • 61abc90c20930c7615880ac9931778b48b9e6ebd
  • 63b556a0afcf643337310254cc7f57c729188f36
  • 65cd6a0371bdfffd7383907ba9a816e8e2e95da5
  • 6c7a92d5d68b68ddba10af7ca6350cfb24b2595f
  • 6d24c472b06e6f9ac3204ca768319d2b035a210a
  • 8364c272e0c95ed214c71dbcb48f89c468544bc8
  • 8df16857cb914f5eded0249cfde07f1c01697db1
  • a69f9f5f2ac15aec393ab68277ec268c0624fe91
  • b40f4f13b2b144946b165a2e4284c96fbc0d4682
  • b9dd4d230d103b3db458d752d4917466ec1cb9b0
  • ba55d92e3d7dba70205597433f1a98b35e4911b8
  • bb07341ab6b203687845ae38cd8c17dfc947e79f
  • c59dd90f7cefadaa80d9c0113f8af39e4ed0c1a1
  • c5adabbdbf641f3e53e3268af60ac1b26088aa6b
  • c6d850e264d7d8d6978cd85d69c22b29378e34e4
  • c7ed7241e2d21fa471b6bfd6b97b24b514b3c5f2
  • d216f33695421dfb17e69ed05aec46cf84b544b7
  • d59175ffacd8895362253a3bcb18637ced765fcd
  • d62cdd8f16a8f6b6cde5e8da633c224eab4765f2
  • e91f2d5df4ef43cb4c69b15de9a68c7ff2d4951d
  • fd65e6c5ae07c50c7d7639e2712c45324d4cf8de

Remediation

  • Block all threat indicators at your respective controls.
  • Always be suspicious about emails sent by unknown senders.
  • Never click on the links/attachments sent by unknown senders.

Rewterz Threat Alert – ZeroCleare Malware Debuts in Middle East Targeting Energy Sector

Severity

High

Analysis Summary

An overlapping attack activity carried by ITG013 (also known as “APT34” or “Oilrig”) and an unknown, probably Iranian cyber group targeting the energy sector in the Middle East. Further, it is assessed that access to at least one targeted environment was used to conduct a destructive attack using newly identified disk wiper malware, ZeroCleare. The attack timeline may have begun as early as Autumn of 2018 with reconnaissance scanning from various low cost/free VPN providers and gaining access to one of the accounts that was later involved in the attack. Then, in the Summer of 2019, the attackers used a password spray from a system on the local network to gain access to additional accounts, install ASPX webshells, and gain domain administration privileges. Finally, unknown actors spread a destructive wiper ZeroCleare across the target network and executed it. The ZeroCleare disk wiper malware had both x86 and x64 versions to execute across 32-bit and 64-bit operating systems. Interestingly, this malware incorporated the Eldos RawDisk driver, which was previously used in each of the Shamoon attacks, reportedly perpetrated by Iranian-linked threat actors.

Impact

Wipe out data from the infected host

Indicators of Compromise

IP

193[.]111[.]152[.]13

MD5

  • 33f98b613b331b49e272512274669844
  • 69b0cec55e4df899e649fa00c2979661
  • 1a69a02b0cd10b1764521fec4b7376c9
  • 993e9cb95301126debdea7dd66b9e121
  • 1ef610b1f9646063f96ad880aad9569d
  • eaea9ccb40c82af8f3867cd0f4dd5e9d

Remediation

  • Block all threat indicators at your respective controls.
  • Always be suspicious about emails sent by unknown senders.
  • Never click on the links/attachments sent by unknown senders.

Rewterz Threat Alert – The Dustman Malware Hits Bahrain’s national oil company

Severity

High

Analysis Summary

Iranian state-sponsored hackers have deployed a new strain of data-wiping malware on the network of Bahrain’s national oil company. The security incident came to light amid rising political tensions between the US and Iran after the US military killed a top Iranian military general in a drone strike last week. 

THE DUSTMAN MALWARE

Dustman is a so-called data wiper — malware designed to delete data on infected computers, once launched into execution. The main shared component between all three strains is EldoS RawDisk, a legitimate software toolkit for interacting with files, disks, and partitions. The three malware strains use different exploits and techniques to elevate initial access to admin-level, from where they unpack and launch the EldoS RawDisk utility to wipe data on infected hosts. 

Since Dustman is considered an evolved version of ZeroCleare, most of the code is the same, but Saudi CNA officials who analyzed the malware said Dustman comes with two important differences:

  • Dustman’s destructive capability and all needed drivers and loaders are delivered in one executable file as opposed to two files, as was the case with ZeroCleare.
  • Dustman overwrites the volume, while ZeroCleare wipes a volume by overwriting it with garbage data (0x55).
Bapco attack MO

Successful attacks resulted in all wiped systems showing a Blue Screen of Death (BSOD) message.

dustman-bsod.png

Impact

Data Destruction

Indicators of Compromise

SHA-256

  • 18c92f23b646eb85d67a890296000212091f930b1fe9e92033f123be3581a90f
  • f07b0c79a8c88a5760847226af277cf34ab5508394a58820db4db5a8d0340fc7
  • 2fc39463b6db44873c9c07724ac28b63cdd72f5863a4a7064883e3afdd141f8d

Remediation

  • Block all threat indicators at your respective controls.
  • Always be suspicious about emails sent by unknown senders.
  • Never click on the links/attachments sent by unknown senders.

Rewterz Threat Alert – Predator the Thief – IOC’s

Severity

Medium

Analysis Summary

A new release of the malware known as Predator the Thief, labeled as version 3.3.4. There have been small development differences between each minor version, making this latest version very different from previous versions. It is active from as early as December 2019. The recent campaign uses phishing documents designed to look like invoices, all pushing the same payload of Predator the Thief. 

Figure 1: Infection chain of recent Predator the Thief campaign

Infection chain of Predator the Thief

Figure 2: Example phishing document

nce the document is opened the malware performs the following operations:

1. AutoOpen macro runs the malware VBA script.

2. It downloads three files through PowerShell.

  • VjUea.dat: Legitimate AutoIt3.exe
  • SevSS.dat: Base64-encoded AutoIt script with certificate header.
  • apTz.dat: RC4-encrypted Predator the Thief
Figure 3: PowerShell for downloading files, compiling loader, and running loader to load Predator the Thief

3. It then uses a legitimate AutoIt3.exe to run decoded AutoIt script.

“SevSS.data” is decoded by certutil.exe, a legitimate command line program that is part of the Certificate Service in Windows. The script is then run to decrypt apTz.dat into the payload of Predator the Thief.

Figure 4: Certificate header and base64-encoded AutoIt script(.au3)

Impact

Data exfiltration

Indicators of Compromise

SHA-256

  • 670c3bb2d41335cee28f4fe90cf9a76a9b68a965e241df648a0198e0be6a9df1
  • 46710b47763f27a6ffb39055082fa22e3e5a2bd9ae602ea651aefe01079e0c8d
  • bcf6f482a8a7e81d3e96c54840d2d341d12923a3277688eddd2534d614dab70b
  • 67093ad07a8342c42b01dd1645dbd18ea82cc13081b5ba84fa87617675cc7054
  • 76a4e5baa3650dff80df493fa4aaf04d37bb5d20d7a569ec3bc550bdfb3c1991
  • 50f7c8b3c825930b242dceef47bec9e7039bff40362f960c84cd9ff9edafc94b
  • 759dc4b2ab45e6faf7a9f1325f75956c1954f3695400e66670f6950c06db44c2
  • 4792c8a417b7accd3092788504332881154785a9ee2db2e93e63306813497c7c
  • 35820393614d39e600b4afc3332de4547f25f4b5d076b43ea1af98020ec5a8f0
  • 91722acec748c76de9d98e1797186a03dc9ab2efbd065a0f04e7c04654644dba
  • 14b25649cf6f10670fc8e1afb923895ae0300a8feb78e5033488879d5206267b
  • b53dd972d466e2d2ded3ce8cc7af28eda77f2939de0d9c1fbd3663fd057ea87d
  • cb76b3ee29944a7d8b839025c1e9eae32b188443a7bf5cbfbf7eabe682424d92
  • 68875254237c6f887d0f9771b8f356381f8a0384841ae422ef2d49faf30932e9
  • 248ad207c6891d84765ea81d0aa3ca04bee69e0467dff8d693fa4eb76a491c16
  • 4cac9af0198fe82f5ae87ac19e964471f6e87461743a21054c2f063be9c2c514
  • 3118a980caf696fc5c84cb9ee88015f3a0cf205f021270b1f4f313bbae6b6464
  • caeb9b2518d47f3df6f2ec515ce314dca6993370b9e124479bff959075379a90
  • e5420cf530192596f2c388eeecfd8d6754af06939461629c94d509b991b967f4
  • c392229b34617ee5bc9e48bacde3fc8e9046eea51e6101624d312719e970dc00
  • 6215d8637357be64510af9daf778ce12bf8401cdd16216a24da257d42217c65b
  • c97d6c8075bd9c55fbdcadda6c69c21432d59e872acdc860228b2709edbb6e6c
  • 36fe75ca8ca8bcef475737dae530e50eb262484ba0cd4dac0081d8508412d0ad
  • dce3bb2609c710339569404f8dce4e0786521bb0de46ad9358fc27d5b687f043

URL

  • hxxp[:]//stranskl[.]site/
  • hxxp[:]//stranskl[.]site/apTz[.]dat
  • hxxp[:]//stranskl[.]site/VjUea[.]dat
  • hxxp[:]//stranskl[.]site/SevSS[.]dat
  • hxxp[:]//stranskl[.]site/api/check[.]get
  • hxxp[:]//stranskl[.]site/api/gate[.]get
  • hxxp[:]//corp2[.]site/
  • hxxp[:]//corp2[.]site/api/check[.]get
  • hxxp[:]//corp2[.]site/api/gate[.]get
  • hxxp[:]//tretthing[.]site/
  • hxxp[:]//tretthing[.]site/api/check[.]get
  • hxxp[:]//tretthing[.]site/api/gate[.]get

Remediation

  • Block all threat indicators at your respective controls.
  • Always be suspicious about emails sent by unknown senders.
  • Never click on the links/attachments sent by unknown senders.

Rewterz Threat Alert – Cryptocurrency Business Continued to be Targeted by Lazarus

Severity

High

Analysis Summary

Lazarus continues to attack the cryptocurrency business with enhanced capabilities.To attack macOS users, the Lazarus group has developed homemade macOS malware, and added an authentication mechanism to deliver the next stage payload very carefully, as well as loading the next-stage payload without touching the disk. In addition, to attack Windows users, they have elaborated a multi-stage infection procedure, and significantly changed the final payload.

operation-applejeus-sequel-1.png

Impact

Exposure of sensitive information

Indicators of Compromise

MD5

  • 6588d262529dc372c400bef8478c2eec
  • bb66ab2db0bad88ac6b829085164cbbb
  • e1953fa319cc11c2f003ad0542bca822
  • b63e8d4277b190e2e3f5236f07f89eee
  • da17802bc8d3eca26b7752e93f33034b
  • 39cdf04be2ed479e0b4489ff37f95bbe
  • 629b9de3e4b84b4a0aa605a3e9471b31
  • cb56955b70c87767dee81e23503086c3
  • f221349437f2f6707ecb2a75c3f39145
  • f051a18f79736799ac66f4ef7b28594b
  • e35b15b2c8bb9eda8bc4021accf7038d
  • bb04d77bda3ae9c9c3b6347f7aef19ac
  • 24b3614d5c5e53e40b42b4e057001770
  • 55ec67fa6572e65eae822c0b90dc8216
  • c2ffbf7f2f98c73b98198b4937119a18
  • a9e960948fdac81579d3b752e49aceda
  • 3efeccfc6daf0bf99dcb36f247364052
  • 8b4c532f10603a8e199aa4281384764e
  • be37637d8f6c1fbe7f3ffc702afdfe1d
  • 267a64ed23336b4a3315550c74803611
  • 055829e7600dbdae9f381f83f8e4ff36
  • 6058368894f25b7bc8dd53d3a82d9146

URL

  • https[:]//www[.]wb-botorg/certpkg[.]php
  • http[:]//95[.]213[.]232170/ProbActive/index[.]do
  • http[:]//beastgoccom/grepmonux[.]php
  • https[:]//unioncryptovip/update

Remediation

  • Block all threat indicators at your respective controls.
  • Always be suspicious about emails sent by unknown senders.
  • Never click on the links/attachments sent by unknown senders.

Copyright © Rewterz. All rights reserved.