Rewterz Threat Alert – Cobalt Strike Malware – Active IOCs
September 7, 2021Rewterz Threat Alert – Cerberus Banking Trojan – Active IOCs
September 7, 2021Rewterz Threat Alert – Cobalt Strike Malware – Active IOCs
September 7, 2021Rewterz Threat Alert – Cerberus Banking Trojan – Active IOCs
September 7, 2021Severity
High
Analysis Summary
A new ransomware family packs multiple unique features, including improving performance and give its operators the option to only target networked SMB shares. Dubbed Conti, the malware improves performance through the use of “up to 32 simultaneous encryption efforts,” and is likely directly controlled by its operators, which means that it can target network-based resources and skip local files, similarly with what the Sodinokibi ransomware can do. the new ransomware abuses the Windows Restart Manager to close applications that lock certain files, thus making sure it can encrypt all the data it wants. The notable effect of this capability is that it can cause targeted damage in an environment in a method that could frustrate incident response activities. A successful attack may have destruction that’s limited to the shares of a server that has no Internet capability, but where there is no evidence of similar destruction elsewhere in the environment.
Impact
- Files Encryption
Indicators of Compromise
IP
- 135[.]181[.]10[.]218
MD5
- 6349d5381beae42063ede8cb76143267
SHA-256
- 63625702e63e333f235b5025078cea1545f29b1ad42b1e46031911321779b6be
SHA-1
- b82bb1e2778a0c9ff7683435c21fbb92c8f87d10
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in the environment.