Rewterz Threat Alert – Lokibot Malware – Active IOCs
June 21, 2021Rewterz Threat Advisory – CVE-2021- 21552 – Dell Wyse Windows Embedded System Security Update for an Improper Authorization Vulnerability
June 21, 2021Rewterz Threat Alert – Lokibot Malware – Active IOCs
June 21, 2021Rewterz Threat Advisory – CVE-2021- 21552 – Dell Wyse Windows Embedded System Security Update for an Improper Authorization Vulnerability
June 21, 2021Severity
High
Analysis Summary
Ferocious Kitten is an APT group that has been active since at least 2015 and has been targeting Persian-speaking individuals who appear to be based in Iran. Although it has been active for a long time, the group has mostly operated under the radar and has not been covered by security researchers. The malware dropped by the APT group is dubbed ‘MarkiRAT’ and used to record keystrokes, clipboard content, provide file download and upload capabilities as well as the ability to execute arbitrary commands on the victim machine. Some of the TTP used by this threat actor are reminiscent of other groups that are active against a similar set of targets, such as Domestic Kitten and Rampant Kitten.
After opening the document, no content is displayed, inducing the victim to enable the macro to view the information. Once the victim enables the macro, the malicious executable file will be released for execution, and the macro code will set the body font color to black to display the information and confuse the victim, Display of the bait information is as shown in the figure below:
The macros in the documents convert an embedded executable from hexadecimal and write it to the “Public” folder as “update.exe”. Afterwards, the payload gets copied to the “Startup” directory under the name “svehost.exe” to ensure it automatically runs when the system is started:
Impact
- Information Theft
- Espionage
- Credential Theft
- Data loss
Indicators of Compromise
MD5
- 5B4B42A8A730FAE1B786326F27613DA4
- 91EBDE892ED57F19C0CBAB98D04648CE
- 7C83EC6D8459AC989669899071F41AE1
- B2FE8C3BA2B9639F34C1727D50C4918D
- 4F1C9411739F7D3E5E418D4CD264E9A3
- 698201F289110A6DCFF75407AB02E917
- 61DA1A5FA3D0D4E69A9EA6AF53A91E45
- 254A065A2C9CF8FF6BDD98EC120B3222
- 6747E3953775FB226DA0723A94490FDB
- D22D9CE61E6AEA72AA9A8A233530DB43
- F9509755C5781F87788FFDF9EFAD075D
- CE5A7612892F27299362AE0569507E04
- B0632B202EB5D204DF112E1B5BAC3F21
- 3D6D731F03A0FCF4DB9506FF9BDB7231
- 1FE34D84A058156296E86888DDD5CAC9
- C888F680B9BC3AABF0EC1CDD312436B5
- 8187B9A9AF3EB78EE3B1190BB1DB967E
- E43E11B074FA7B071DEC9BC294E0F95C
SHA-256
- E7986CD2D31EDD7CCB872DC1F0F745BE6A483676CE0291F3C88B94B0E2306EA0
- 2E8288C4603A04281127055B749E246ABFD7F6B0F261BFF96A47959DCAE4EE39
- BA300A293CC4BC39DD9D40A3C53ECE51AC80AF053175361D83D6ECB8735C45AF
- 7699C50E8FED564B83FB0996E700FE51900E4F67CEC4E669ED431E6A6F120865
- EC7196E98B7990B69ED58F49E5A87D1FDA8BF81EB5CD7EEB9176F6E96A754403
- FA9C0E0CB88B34D51DEB257639314CF54CB11F9867A27579521681A2E17DA4C4
- 489B895AD66F13C2A4FFEB218E735CACE2B23D36FA55CD07B7EDB4FBC03048CB
- AB3E9F65C60C1760AFC99629CAEE7FAB8DBA117A16A7F9F843EC43617E824B0D
- 54BD9FE21289FAC0D48CC388AA35ECDC854D8C81865564DCB21FC1D73D22B86B
- 3A4EF9B7BD7F61C75501262E8B9E31F9E9BC3A841D5DE33DCDEB8AAA65E95F76
- 274BEB57AE19CBC5C2027E08CB2B718DEA7ED1ACB21BD329D5ABA33231FB699D
- B71C87AD8A0D179FC317656B339A57F2775B773C0FC54EA2B0B8D171B7AF7A8A
- A7C25D943F8B8689B4A55771349DD7B746FEC094E5CC3F693C90801560A1808C
- 405DEB3A129DF7B56357966B723A14C0AA9BC3615E2A20FCCD7D2B5A8CEAB30D
- 636FEE51245685DE8F85D2D8AF1DD1351267DBB9F9E571685A76D3894ED931DA
- 1E21645147AA4EAC33495AA1713FFA30DEF0758F810CA944580A14BE2828643D
- D723B7C150427A83D8A08DC613F68675690FA0F5B10287B078F7E8D50D1A363F
- 3C94EBA2E2B73B2D2230A62E4513F457933D4668221992C71C847B79BA12F352
SHA-1
- 736331C23D1813278C458B5EA8334AB14511AFA6
- 9BCF60F1C806947DBBB0729F2E07496ABE1B47B7
- A7F6963929A5709A841DE71D99EFB1F91CF31F8E
- 1B9908CEC557879382B63F071EC710BE5B68EE79
- A1DD1AEE6BB3EE3F8C3CEE08955F3285C4E95439
- B59910F3AD87010140100EA63B9A474136BB5A97
- 397C359064C5282276B7717731A6FDB998C31A0F
- 93AE9778E55764F05E7D637E10A0D77EC3F6F6F7
- F37003A6B6896D233A019E0E672FD9E92D261FC0
- 9923473C594FF12904E37A2405F619A7DC98D905
- 3E30D4DA7AA25CA8D44851848B05EFF758CEEB46
- 609D4099CA91A494B22738E2050DD8CF12C61917
- 4C33552788239DCF044CDDEE51D2000F04509FC1
- 83E00F2E844795606B90C314495E91932B14F863
- B7B6345D9107CF7997646F3B04ED423C1271D070
- B831C659335F669F7C2B48ABE281F066BE75D7AF
- C2E9EAE6F870737DD4B6A6057BAC35FF7CC5E244
- FFB76C958C1B53AF09913C268C8E90F873D53F1A
Remediation
- Block all threat indicators at your respective controls
- Search for IOCs in your environment