Rewterz Threat Alert – FormBook Malware – Active IOCs
October 4, 2021Rewterz Informative Update – Facebook, Instagram, and WhatsApp down for Hours, Panic ensues
October 5, 2021Rewterz Threat Alert – FormBook Malware – Active IOCs
October 4, 2021Rewterz Informative Update – Facebook, Instagram, and WhatsApp down for Hours, Panic ensues
October 5, 2021Severity
Medium
Analysis Summary
Cobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named ‘Beacon’ on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, keylogging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning, and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.
Impact
- Data Exfiltration
- Information Theft
Indicators of Compromise
Domain Name
- compassfinancial[.]ca
- acronisupdater[.]com
- rapidmomentum[.]net
- rdkreligiousnews[.]com
- karasmanar[.]com
- naratygam[.]com
- zaebkaor[.]com
- baidanaran[.]com
IP
- 185[.]150[.]117[.]83
- 161[.]35[.]133[.]152
- 162[.]33[.]179[.]161
- 162[.]33[.]178[.]236
- 91[.]132[.]3[.]210
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment.