Rewterz Threat Advisory – Phishing Attack faking an Office 365 Non-Delivery Email
December 18, 2018Rewterz Threat Advisory – Malware Controlled Through Command-containing memes on Twitter
December 19, 2018Rewterz Threat Advisory – Phishing Attack faking an Office 365 Non-Delivery Email
December 18, 2018Rewterz Threat Advisory – Malware Controlled Through Command-containing memes on Twitter
December 19, 2018SEVERITY: High
CATEGORY: Emerging Threat
PUBLISH DATE: 19 December, 2018
ANALYSIS SUMMARY
A second variant of destructive Shamoon V3 wiper has re-emerged after the absence of two years with a more destructive wiping malware (Trojan.Filerase) which will delete and overwrite files on the infected computer, meanwhile the Shamoon itself will erase the master boot record of the computer, making it unusable eventually. The addition of Filerase wiper have made this a more vibrant threat because if the files are erased by the Filerase malware first, they would not be recovered forensically as well.
Filerase is spread across the victim’s network from one initial computer using a list of remote computers. This list is in the form of a text file and is unique to each victim, which indicates that the attackers have likely gathered the information from the earlier reconnaissance phase of the attack. This list is first copied by a component called OCLC.exe and passed on to another tool called Spreader.exe. The Spreader component will then copy Filerase to all the computers listed. It will then simultaneously trigger the Filerase malware on all infected machines.
When the Trojan is executed, it enumerates all the fixed drives on the compromised computer and then deletes all the files and folders on the fixed drives.
For files whose path contains %SystemDrive%\Users or whose path does not contain %SystemDrive% , and whose size is less than 100,000,000 bytes, the Trojan:
Fills the file with random data
Renames the file to a random name
Deletes the file
IMPACT
Erasing Boot record and making the infected computer unusable
AFFECTED PRODUCTS
Microsoft Windows
THREAT INDICATORS
Malware Hash (MD5/SHA1/SH256)
- 7f608f9783809d0165125a685e9b5537b9343f44b6d117b26be76b48b5c8f6d3
- c3ab58b3154e5f5101ba74fccfd27a9ab445e41262cdf47e8cc3be7416a5904f
- 0975eb436fb4adb9077c8e99ea6d34746807bc83a228b17d321d14dfbbe80b03
- 0694bdf9f08e4f4a09d13b7b5a68c0148ceb3fcc79442f4db2aa19dd23681afe
- 391e7b90bf3f0bfeb2c2602cc65aa6be4dd1c01374b89c4a48425f2d22fe231c
- 6985ef5809d0789eeff623cd2436534b818fd2843f09fa2de2b4a6e2c0e1a879
- ccb1209122085bed5bded3f923835a65d3cc1071f7e4ad52bc5cf42057dd2150
- dab3308ab60d0d8acb3611bf364e81b63cfb6b4c1783864ebc515297e2297589
- bc4513e1ea20e11d00cfc6ce899836e4f18e4b5f5beee52e0ea9942adb78fc70
- fa06a08c36bbd19c80c3831736020823
- dfb069d22be70888784a81948328ca1da6a7d38f
- 7f608f9783809d0165125a685e9b5537b9343f44b6d117b26be76b48b5c8f6d3
REMEDIATION
- Ensure password policy. Complex passwords make it difficult to crack password files.
- Use a firewall to block all incoming connections from the Internet to services that should not be publicly available.
- Apply up-to-date patches.
- Disable Autoplay to prevent the automatic execution of executable files and removable drives.
- Train employees to avoid and not to open attachments unless they’re expecting one.