Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
SEVERITY: Medium
CATEGORY: Cyber Crime
ANALYSIS SUMMARY
A compromised email account belonging to an employee of the financial sector was used to target another financial organization in Russia. The email contained a malicious Word document, which executed Javascript to drop a Meterpreter payload. The tactical methodology of this email campaign resembles with another campaign called MoneyTaker that emerged in October 2018. Both campaigns target Russian financial organizations and use similar techniques, thereby hinting at a common origin. The email account and the email template used in this campaign belongs to Alfa Capital of Russia.
The word document contained in the email was an Office Open XML document, containing an OLE object and JavaScript containing binary data. The JavaScript is hidden behind a PDF icon in the document. As the target clicks the PDF, they receive a prompt to run the file.
The Meterpreter payload is downloaded using a HTTP POST request to 185[.]117[.]75[.]73. The SSL certificate for https://185[.]117[.]75[.]73 was issued for the domain cbrrf[.]tech which happens to be the domain for the C&C server used in the October campaign.
Peculiar as it is, the SSL certificate presented by 185[.]117[.]75[.]73 was changed in later December to a certificate for files[.]migcredit[.]host, generated via Let’s Encrypt. The domain migcredit[.]host was earlier used in the October campaign and a fresh SSL certificate suggests that it is likely to resurface in upcoming campaigns. The indicators of compromise were retrieved in the concluding week of 2018.
Indicators of Compromise
IP(s) / Hostname(s)
185[.]117[.]75[.]73
URLs
Malware Hash
Remediation
It is suggested to block the Indicators of Compromise at their respective controls. As more and more sophisticated email spam campaigns are emerging, employee training must be ensured so that they don’t fall victim to such phishing attacks.