• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – AgentTesla Information Stealer – Fresh IoCs
December 15, 2020
Rewterz Threat Alert – APT-C-23 Distributes Information Stealer PyMICROPSIA
December 15, 2020

Rewterz Threat Alert – Dark Caracal Targets Multiple Sectors with Bandook Malware

December 15, 2020

Severity

High

Analysis Summary

The Dark Caracal threat group is found active again. It’s believed to be a state-sponsored group, supporting Kazakhstan and Lebanon government interests in particular. Although they were inactive for a period of time, they re-emerged in November of 2019 with new, signed versions of the Bandook malware targeting multiple sectors. Now, a much broader list of target industries and countries has been identified. The Bandook malware used by the group is a commercially available, full-featured RAT that has been around since 2007. 
This time, new samples of the Bandook malware are found with legitimate signing certificates for Windows (issued by the “Certum” certificate authority,) which would allow them to be run without a warning to the user on any Windows computer. Three new variants of Bandook are found, some expanded (120 commands), some slimmed down (11 commands), and all signed with Certum certificates. In previous campaigns, this actor has displayed impressively lax operational security, enabling researchers to download terabytes of data from their command and control servers. The latest campaign exhibits a somewhat higher level of opsec. Targets include Government, financial, energy, food industry, healthcare, education, IT and legal institutions in multiple countries including Singapore, Cyprus, Chile, Italy, USA, Turkey, Switzerland, Indonesia and Germany. 
The Dark Caracal threat actors still seem to primarily use phishing and Office-based macros as their primary method of infection. Because of this, the best step one can take to protect against Dark Caracal is to disable Office macros on your personal devices or that of your entire organization. The final payload in this infection chain is a variant of Bandook. Bandook’s execution flow starts with a loader, written in Delphi, that uses the Process Hollowing technique to create a new instance of an Internet Explorer process and inject a malicious payload into it. The payload contacts the C&C server, sends basic information about the infected machine, and waits for additional commands from the server. 

Impact

  • Unauthorized Remote Access
  • Code Execution
  • Information Theft
  • Data Exfiltration

Indicators of Compromise

Domain Name

  • opwalls[.]com
  • megadeb[.]com
  • wbtogm[.]com

MD5

  • e2bcd26465f9715da2789febce3bedf7
  • 6f4f9d9b13426b3e6b705ae65c22ba87
  • 078282eecb219bafd4f995990469848b
  • a337fc0c2bbbb47a19c41c667bd77c08
  • 0fd1b688c44f27f18144de1f3127f9a9
  • a9427349fea3c1aa47adf83e2e1e1c1d
  • 057e97ae4547f8dbb058e87ba737e210
  • 70fb69b85bae8c89e62e267b7852a760

SHA-256

  • fabce973a9edff2c62ccb6fdd5b14c422bc215284f952f6b31cc2c7d98856d57
  • 2f9ba191689e69e9a4f79b96d66c0fee9626fbd0ea11e89c0129e5d13afe6d76
  • d50696eec5288f29994aa68b8f38c920f388a934f23855fb516fa94223c29ecc
  • 4f2ebe6f4fc345041643d5d7045886956fe121272fa70af08498a27135a72d97
  • f3b54507a82a17f4056baaa3cb24972a2dfa439fa9b04493db100edb191a239f
  • f08cbc1c5bca190bc34f7da3ad022d915758f5eb2c0902b13c44d50129763cf1
  • 2b54f945f5e3d226d3a09cdfcc41e311b039ceadf277310697672c8c706aa912
  • fe18568eb574d8fa6c7d9bd7d8afa60d39aae0e582aff17c5986f9bab326ec8a

SHA1

  • b3bd4d0c84d0751d88eb0343b8e194e499894a98
  • c3291d4d099abfdd10b6c5ca6dea9a696fc124e6
  • ce27ac8d4f5290882f8118458e1e24aba2e873b9
  • b0b15e439c031caba8f787537225bdaff67ccf7a
  • 5af8bf12ca712f306b59858c7b2babf7ecbc1640
  • 88cbb2cba1fe9b96bba512c2d169d24d48faae64
  • 17f5dd35a7a30fb2236383f313448267a7fb3187
  • 5f7b82afef3713d93398b564a7407f1fc97e23d5

URL

  • http[:]//wbtogm[.]com
  • http[:]//www[.]opwalls[.]com/tunnel2015/add[.]php
  • https[:]//pronews[.]icu/aqecva/
  • https[:]//pronews[.]icu/raxpafsd/images
  • https[:]//pronews[.]icu/aqecva/add[.]php
  • https[:]//pronews[.]icu/cgi-bin
  • https[:]//pronews[.]icu/phpmyadmin
  • http[:]//blombic[.]com/uioncby281229hcbc2728hsha11kjddhwqqqqc/add[.]php
  • https[:]//blancomed[.]com/newnjususus3/post[.]php
  • https[:]//blancomed[.]com/newnjususus3/post[.]php
  • http[:]//blombic[.]com/OSPSPSPS2222292929nnnxnxnxnxnx/add[.]php
  • http[:]//blancomed[.]com/newnjususus1/post[.]php
  • http[:]//blancomed[.]com/newnjususus2/post[.]php

Remediation

  • Block the threat indicators at their respective controls.
  • Do not download files attached in untrusted emails.
  • Keep all systems, software and browsers updated to latest patched versions.
  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.