Rewterz Threat Alert –GandCrab Ransomware – Active IOCs
September 7, 2021Rewterz Threat Alert – Android Malware Targets Taxpayers in India
September 7, 2021Rewterz Threat Alert –GandCrab Ransomware – Active IOCs
September 7, 2021Rewterz Threat Alert – Android Malware Targets Taxpayers in India
September 7, 2021Severity
High
Analysis Summary
Ferocious Kitten is an APT group that has been active since at least 2015 and has been targeting Persian-speaking individuals who appear to be based in Iran. Although it has been active for a long time, the group has mostly operated under the radar and has not been covered by security researchers. The malware dropped by the APT group is dubbed ‘MarkiRAT’ and used to record keystrokes, clipboard content, provide file download and upload capabilities as well as the ability to execute arbitrary commands on the victim machine. Some of the TTP used by this threat actor are reminiscent of other groups that are active against a similar set of targets, such as Domestic Kitten and Rampant Kitten.
After opening the document, no content is displayed, inducing the victim to enable the macro to view the information. Once the victim enables the macro, the malicious executable file will be released for execution, and the macro code will set the body font color to black to display the information and confuse the victim, Display of the bait information.
Impact
- Information Theft Espionage
- Credential Theft
- Data loss
Indicators of Compromise
Domain Name
- microsoft[.]microcaft[.]xyz
MD5
- 3e38999a11cda8c9290dbe02b0e4634a
SHA-256
- b0d85647a0715e84a569fc79f6df3b9b82bac11e388948b767b4dbc7c721af47
SHA1
- 28dd15a35e28ad5efb8e695113cc5bd092788a12
URL
- http[:]//microsoft[.]microcaft[.]xyz/
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment