Rewterz Threat Alert – CrySIS aka Dharma Ransomware – Active IOCs
January 24, 2023Rewterz Threat Alert – Wanna Cryptor aka WannaCry Ransomware – Active IOCs
January 24, 2023Rewterz Threat Alert – CrySIS aka Dharma Ransomware – Active IOCs
January 24, 2023Rewterz Threat Alert – Wanna Cryptor aka WannaCry Ransomware – Active IOCs
January 24, 2023Severity
High
Analysis Summary
DarkComet RAT (Remote Administration Tool) is a type of malware that allows an attacker to remotely control and access a victim’s computer. It is typically spread through phishing campaigns or by exploiting vulnerabilities in software. Once installed on a victim’s computer, the attacker can use the RAT to steal sensitive information, install additional malware, or perform other malicious actions. DarkComet RAT was first discovered in 2008, and it has since been used in a number of high-profile cyber attacks. To protect yourself from RATs like DarkComet, it’s important to keep your software up-to-date, use anti-virus software, and be cautious when opening email attachments or clicking on links from unknown sources.
Impact
- Unauthorized Access
- Remote command execution
- Theft of Sensitive Information
Indicators of Compromise
MD5
- a0347497be65b410c04b6df3c3188c33
- f97d1d38544b6661f27ef7c2be46c66a
- 2cb68413b4680b71b4a53ca22a74dd7b
- 17a37a6041035faed19512c830e3047c
SHA-256
- dc42d4df960208b9ba76578143f872e5619becf601020797c7b5171123796f92
- 908404e0ad6185c39c638e99edd820e4406acb1a82dff8e267fc79c0b8cb5ed3
- d195a46d8e4d00898c59dc1ca36b0563952a22308ad8f782b668da1da12385b6
- 91952f9d1163ab2566a0cf0e336e75708d5a76486ffffe5f000d540bb3584b41
SHA-1
- 2cf23cde6999d6740ba3148d24d18d8dc51fbe06
- 228bdee2bbe4df0b30ba811754df089cbdedb480
- 4581fadd73fba105ef3017e000778cfb43cd38eb
- 490a0fc5bb8925ab5e35c4e0a1b04820f594c673
Remediation
- Block all threat indicators at your respective controls.
- Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls
- Enable antivirus and anti-malware software and update signature definitions in a timely manner. Using multi-layered protection is necessary to secure vulnerable assets
- Patch and upgrade any platforms and software timely and make it into a standard security policy.