Rewterz Threat Alert – Quasar RAT – Active IOCs
September 6, 2021Rewterz Threat Alert – ServHelper Backdoor – Active IOCs
September 6, 2021Rewterz Threat Alert – Quasar RAT – Active IOCs
September 6, 2021Rewterz Threat Alert – ServHelper Backdoor – Active IOCs
September 6, 2021Severity
High
Analysis Summary
Fresh IoCs have been retrieved from a campaign distributing the GandCrab ransomware. GandCrab campaigns typically involve emails designed to deceive a potential victim into downloading attached malicious files. The infection process begins once a victim opens the attachment. It is important to note that the malware, in order to be successfully installed, requires the victim to enable macros. As is customary with other ransomware, it aims to lock a victim’s files, and demand that a ransom amount be paid. GandCrab usually targets consumers and businesses with PCs running Microsoft Windows. GandCrab has been involved in some of the biggest ransomware attacks, causing massive monetary loss to victims. GandCrab operators usually attempt to impersonate legitimate services in order to successfully victimize the target. For instance, in January 2020, GandCrab was distributed packed in a word document “Flu pandemic warning.doc” supposedly coming from the Center for Disease Control.
Impact
- Files Encryption
Indicators of Compromise
MD5
- 8b3b7381f404d870ae8b30e5928f339d
- 055e4890c02c18716eb046f225652a9c
SHA-256
- e3b1c8375c2825c336b28035037ff954655fb00f4292f8dee94397a009c40df0
- e07359871f81accbc4aeafc08b3cbea0f47a6d8cfbebade270b32b22adda51f6
SHA-1
- afdbfb3c4f9474abd2e57602e13efe497003a5bb
- 2790f5f29352e1f1250b2baa2505c1f8aab3b9d6
Remediation
- Block the threat indicators at their respective controls.
- Search for IOCs in your environment.