• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – LinkedIn Phishing Campaign Spreads Agent Tesla
August 26, 2020
Rewterz Threat Advisory – Mozilla Firefox and ESR Multiple Vulnerabilities
August 26, 2020

Rewterz Threat Alert – DeathStalker APT Targeting Legal and Financial Organizations

August 26, 2020

Severity

High

Analysis Summary

DeathStalker is a unique threat group that appears to target law firms and companies in the financial sector, as well as others at times. This actor isn’t motivated by financial gain. They don’t deploy ransomware, steal payment information to resell it, or engage in any type of activity commonly associated with the cybercrime underworld. Their interest in gathering sensitive business information shows that it’s a group of mercenaries offering hacking-for-hire services, or acting as some sort of information broker in financial circles. Its intrusion vector is spear-phishing emails with attached archives containing a malicious LNK file that leads to cmd.exe. These shortcut files have the following structure: clicking them initiates a convoluted sequence resulting in the execution of arbitrary code on the victim’s machine. A short PowerShell script, passed through cmd.exe’s arguments, bootstraps the following chain:

update-1598424087.png

Communications with the C&C server involve the exchange of JSON-encoded objects. Powersing only has two tasks:

  • Capture periodic screenshots from the victim’s machine, which are immediately sent to the C&C server (two built-in commands allow operators to change screenshot quality and periodicity)
  • Execute arbitrary Powershell scripts provided by the C&C

Impact

  • Command execution
  • Data exfiltration
  • Theft of sensitive business information

Indicators of Compromise

MD5

  • d83f933b2a6c307e17438749eda29f02
  • d330f1945a39ceb78b716c21b6be5d82
  • 3b359a0e279c4e8c5b781e0518320b46
  • e1718289718792651fa401c945c17079
  • 85ed6ab8f60087e80ab3ff87c15b1174
  • 540bc05130424301a8f0543e0240df1d
  • 6f965640bc609f9c5b7fea181a2a83ca

SHA-256

  • 880607cc2da4c3213ea687dabd7707736a879cc5f2f1d4accf79821e4d24d870
  • 5039e8f97dc499fef344b56270ae534a0cea1c93ddacf17ae46c7f922f6139d8
  • 22ede766fba7551ad0b71ef568d0e5022378eadbdff55c4a02b42e63fcb3b17c
  • 4920e6506ca557d486e6785cb5f7e4b0f4505709ffe8c30070909b040d3c3840
  • 7eb4ea6277bd62653cc474cf1125165c9bdc43858811c0d88be25e2ec34bc14d
  • 0c7e8427ee61672568983e51bf03e0bcf6f2e9c01d2524d82677b20264b23a3f
  • f4610b65eba977b3d13eba5da0e38788a9e796a3e9775dd2b8e37b3085c2e1af

SHA1

  • 321d9fd40650b91451742694eb0354f44b6167d9
  • 1c1475d89505d3f7aa91c584a62d41e9f0111fc0
  • a885bc145a3d1cd7e1d226a8dcd5de953c0318dc
  • ab23520a9a627fa9b0fd71cfd4be01b752bb47e1
  • 6907e717352376e84d410a1e7cc265fcd3d33aef
  • d2dc391a9b79caa1239b93817f74a6ded9c5af59
  • c5399596240bc764ff7e053fabe14efd08b8d504

Source IP

  • 91[.]229[.]77[.]120
  • 54[.]38[.]192[.]174
  • 91[.]229[.]77[.]240
  • 105[.]104[.]10[.]115
  • 91[.]229[.]76[.]153
  • 91[.]229[.]79[.]120
  • 91[.]229[.]76[.]17

Remediation

  • Block the threat indicators at their respective controls.
  • Do not download files attached in untrusted emails.
  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.