logo_SVG-01
✕
  • Platform
    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    • Managed Security Services
    • Managed Penetration Testing
  • Services
    • Assess
      • Compromise Assessment
      • Advanced Persistent Threats Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      • SOC Maturity Assessment
      • SOC Model Evaluation
      • SOC Gap Analysis
      • SIEM Gap Analysis
      • SIEM Optimization
      • SOC Content Pack
    • Train
      • Simulated Cyber Attack Exercise
      • Tabletop Exercise
      • Security Awareness and Training
    • Respond
      • Incident Analysis
      • Incident Response
  • Solutions
  • Resources
    • Blogs
    • Press Releases
    • Threat Insights
      • Threat Intelligence Reports
      • Threat Advisories
      • Monthly Threat Insights
  • Why Rewterz?
    • About Us
    • Careers
    • Contact
logo_SVG-01
  • Platform
    xdrLogo
    center_new
    Read More about XDR

    Platform

    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    Rewterz Threat Alert – Active C2 Detected Hosting Ransomware, POS Malware and Others

    Managed Security Services

    • Managed Security Monitoring
    • Remote SOC
    • Onsite SOC
    • Hybrid SOC

    Managed Penetration Testing

    Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.

  • Services

    Assess

    • Compromise Assessment
    • APT Assessment
    • Penetration Testing
    • Architecture Design & Review
    • Red Team Assessment
    • Purple Team Assessment
    • Social Engineering
    • Source Code Review

    Transform

    • SOC Consultancy
    • SOC Maturity Assessment
    • SOC Model Evaluation
    • SOC Gap Analysis
    • SIEM Gap Analysis
    • SIEM Optimization
    • SOC Content Pack

    Train

    • Simulated Cyber Attack Exercise
    • Tabletop Exercise
    • Security Awareness and Training

    Respond

    • Incident Analysis
    • Incident Response
  • Solutions
  • Resources

    Resources

    • Blog
    • Press Releases
    March 15, 2023
    March 15, 2023
    Rewterz Threat Alert -New Golang-Based Botnet GoBruteforcer Breaches Web Servers – Active IOCs
    Severity High Analysis Summary According to researchers, a Golang-based botnet named GoBruteforcer has been discovered, which is specifically targeting web servers running FTP, MySQL, phpMyAdmin, and […]
    March 15, 2023
    March 15, 2023
    Rewterz Threat Alert – DarkComet RAT (Remote Access Trojan) – Active IOCs
    Severity High Analysis Summary DarkComet RAT (Remote Administration Tool) is a type of malware that is designed to allow attackers to gain remote access to a […]
    March 15, 2023
    March 15, 2023
    Rewterz Threat Advisory -Multiple Microsoft Windows Products Vulnerabilties
    Severity High Analysis Summary CVE-2023-23410 CVSS:7.8 Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by a flaw in […]

    Threat Insights

    16
    pdf-file (1)
    Annual Threat Intelligence Report 2022
    • Threat Advisories
    • Monthly Threat Insights
    • Threat Intelligence Reports
  • Why Rewterz?

    About Us

    Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.

    Read More

    play_btn_Smallplay_btn_hover_Small
    leadership

    Our Leadership

    Our leadership team brings together years of knowledge and experience in cybersecurity to drive our company's mission and vision. Our team is passionate about delivering high-quality products and services, leading by example and assisting our clients in securing their organization’s environment.
    help

    CSR

    At Rewterz, we believe that businesses have a responsibility to impact positively and contribute to the well-being of our communities as well as the planet. That's why we are committed to operating in a socially responsible and sustainable way.

    Connect with Us

    • Contact
    • Careers
Get in Touch
logo_SVG-01
  • Platform
    xdrLogo
    center_new
    Read More about XDR

    Platform

    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    Rewterz Threat Alert – Active C2 Detected Hosting Ransomware, POS Malware and Others

    Managed Security Services

    • Managed Security Monitoring
    • Remote SOC
    • Onsite SOC
    • Hybrid SOC

    Managed Penetration Testing

    Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.

  • Services

    Assess

    • Compromise Assessment
    • APT Assessment
    • Penetration Testing
    • Architecture Design & Review
    • Red Team Assessment
    • Purple Team Assessment
    • Social Engineering
    • Source Code Review

    Transform

    • SOC Consultancy
    • SOC Maturity Assessment
    • SOC Model Evaluation
    • SOC Gap Analysis
    • SIEM Gap Analysis
    • SIEM Optimization
    • SOC Content Pack

    Train

    • Simulated Cyber Attack Exercise
    • Tabletop Exercise
    • Security Awareness and Training

    Respond

    • Incident Analysis
    • Incident Response
  • Solutions
  • Resources

    Resources

    • Blog
    • Press Releases
    March 15, 2023
    March 15, 2023
    Rewterz Threat Alert -New Golang-Based Botnet GoBruteforcer Breaches Web Servers – Active IOCs
    Severity High Analysis Summary According to researchers, a Golang-based botnet named GoBruteforcer has been discovered, which is specifically targeting web servers running FTP, MySQL, phpMyAdmin, and […]
    March 15, 2023
    March 15, 2023
    Rewterz Threat Alert – DarkComet RAT (Remote Access Trojan) – Active IOCs
    Severity High Analysis Summary DarkComet RAT (Remote Administration Tool) is a type of malware that is designed to allow attackers to gain remote access to a […]
    March 15, 2023
    March 15, 2023
    Rewterz Threat Advisory -Multiple Microsoft Windows Products Vulnerabilties
    Severity High Analysis Summary CVE-2023-23410 CVSS:7.8 Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by a flaw in […]

    Threat Insights

    16
    pdf-file (1)
    Annual Threat Intelligence Report 2022
    • Threat Advisories
    • Monthly Threat Insights
    • Threat Intelligence Reports
  • Why Rewterz?

    About Us

    Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.

    Read More

    play_btn_Smallplay_btn_hover_Small
    leadership

    Our Leadership

    Our leadership team brings together years of knowledge and experience in cybersecurity to drive our company's mission and vision. Our team is passionate about delivering high-quality products and services, leading by example and assisting our clients in securing their organization’s environment.
    help

    CSR

    At Rewterz, we believe that businesses have a responsibility to impact positively and contribute to the well-being of our communities as well as the planet. That's why we are committed to operating in a socially responsible and sustainable way.

    Connect with Us

    • Contact
    • Careers
Get in Touch
Rewterz
Rewterz Threat Advisory – Vulnerability in Microsoft Office for Mac Could Allow for Remote Code Execution
November 5, 2019
Rewterz
Rewterz Threat Alert – Cerberus banking Trojan Targets Android Devices
November 5, 2019

Rewterz Threat Alert – Active C2 Detected Hosting Ransomware, POS Malware and Others

November 5, 2019

Severity

High

Analysis Summary

An active threat actor is found targeting and compromising different companies. The attacker operates a new server hosting a large stockpile of malicious files. The adversary can deploy ransomware as well as steal credit card information via a point-of-sale malware and remotely managed compromised infrastructure. These files shows that these attackers were able to obtain a deep level of access to victims’ infrastructure using ransomware like the DopplePaymer, credit card capture malware like the TinyPOS, as well as some loaders that execute code delivered directly from the command and control (C2).

The adversary is resourceful and has a widespread infrastructure. A WinRAR self-extracting archive (SFX) is used to extract the ransomware and execute the following command:
Path=C:\Users–redacted–\DesktopSetup=C:\Users–redacted–\Desktop\p1q135no.exe QWD5MRg95gUEfGVSvUGBY84h

On the same server a TinyPOS sample was also found. This malware is installed using a batch file.The batch file creates a scheduled task that will be executed every 6 hours.
The data going out is obfuscated using XOR operations with a hardcoded key of 0xcaef3d8a. The malware exfiltrates the hostname and the local IP of the infected system. It searches and parses targeted processes memory to retrieve credit card information, which is usually stored in tracks 1 and 2 of the magnetic strip of the credit card.
Other malicious tools hosted on the server include Mimikatz, a tool to retrieve Windows credentials from the memory, PsExec: A tool to remotely connect on Windows system (The attacker probably used it to pivot inside the infrastructure by using the credential previously retrieved.), Procdump: A tool to dump process. The attacker probably used it to dump the LSASS.exe process to then use with Mimikatz. The attacker likely was planning to carry out fake tech support scam to attempt to compromise infrastructure. This would likely be carried out by asking employees to execute specific commands or attempting to download the malware provided by the attacker.

Impact

  • Files Encryption
  • Theft of Credit Card Information
  • Credential Theft
  • Code Execution

Indicators of Compromise

Domain Name

  • Jduuyerm[.]website
  • techsupport[.]org[.]ru
  • www.techsupport[.]org[.]ru
  • techsupportlap[.]icu
  • techsupportnet[.]icu
  • aefawexxr54xrtrt[.]softether[.]net

MD5

  • 8663a9dfa3b5c5b623d4364f320c64ef
  • 81c30c38e33abf112b54697e8751954a
  • 69061465ae5067710402c832412e2dae
  • 8c54bbe3f191a8627bfeeb4cb02634a9
  • 38e6484610d84de6a488c5d048e84e8c
  • f6cb9538add106196db23b162ba82125
  • 8663a9dfa3b5c5b623d4364f320c64ef
  • 444581f3d716abeb88d9367392a0a9aa
  • 967d62e4204430fc0d36887a46f5a781
  • eb23f879a78736a27b5ce13a4bddaee2

SH256

  • 0273d96cef6683e3fb205b8e841579b44bae16ff1e3ab57647b1a9d2947db5c7
  • bc919680471fd1b631e80c37e83aeb6877f13f4ed47ae22100cf4d60e27a93a4
  • b9a8710e55bb2d55bbeed9cebb83ac2f18f78818f0c05f18c96f766c8c47e2d9
  • f658ddcf8e87de957a81bb92d44ce02913b427e8bccbe663669ee2613d355555
  • dcb76dc106e586c6f8bfa82832a66f525a9addb5450912004e92dd578ff2a60a
  • 04d0824f70be3666d79b2a49b85cf6b60b566d7b8cc9efd31195644514fb0cb1
  • 0273d96cef6683e3fb205b8e841579b44bae16ff1e3ab57647b1a9d2947db5c7
  • 619f0c489beac9a792b9b42fa6529b3faf4329692fb52d17123ef69733868845
  • 98a4f69eff1f91f63fb74420ee4c16be508aa203d04f66e98b1dcb554def61ee
  • b1e883222f3205db59ff812c6f6097291df12b1784c9e64eef674ab3a173c07a

SHA1

  • 7cab077546328948ea4f801b175079bfbc6f63bd
  • fceb70eafee76d2161e11248ce9849dee366e5b9
  • 963f6c4e2f7c202fd1676eee27c160de2ad2f774
  • 2fc2ecbed153344557386e80a2fbd097bf795559
  • 8afd15b8273df0ebc10e6a8b78ce062f86cbf32e
  • 4478f32dcce2de8f1959fb6cf50a9d4cc6c0ae06
  • 7cab077546328948ea4f801b175079bfbc6f63bd
  • d6704c8cf07fcfa1c35f9c65939d92a1301845f7
  • 08558ce4fc178d3858c8579fcadfea0e131d7d8b
  • 483ac8d56bb882162b871558e589655c7326a396

Source IP

  • 185.254.188[.]11
  • 185.212.128[.]189

Remediation

  • Block the threat indicators at their respective controls.
  • Do not acquire tech support services from unknown service providers.
  • Do not download files attached in untrusted emails.

Platform

  • Rewterz XDR
  • Rewterz Defense
  • Rewterz Threat Intelligence

Managed Security Services

  • Managed Security Monitoring
  • Remote SOC
  • Onsite SOC
  • Hybrid SOC

Assess

  • Compromise Assessment
  • APT Assessment
  • Penetration Testing
  • Architecture Design & Review
  • Red Team Assessment
  • Purple Team Assessment
  • Social Engineering
  • Source Code Review

Transform

  • SOC Consultancy
  • SOC Maturity Assessment
  • SOC Model Evaluation
  • SOC Gap Analysis
  • SIEM Gap Analysis
  • SIEM Optimization
  • SOC Content Pack

Train

  • Simulated Cyber Attack Exercise
  • Tabletop Exercise
  • Security Awareness and Training

Respond

  • Incident Analysis
  • Incident Response

Threat Insights

  • Threat Advisories
  • Monthly Threat Insights
  • Threat Intelligence Reports

Resources

  • Blog
  • Press Releases

Connect With Us

  • Contact
  • Careers
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.
Get a Demo