Rewterz Threat Alert – Lazarus APT Group – Active IOCs
September 14, 2021Rewterz Threat Alert –Raccoon Infostealer – Active IOCs
September 14, 2021Rewterz Threat Alert – Lazarus APT Group – Active IOCs
September 14, 2021Rewterz Threat Alert –Raccoon Infostealer – Active IOCs
September 14, 2021Severity
High
Analysis Summary
Fresh IoCs have been retrieved from a campaign distributing the GandCrab ransomware. GandCrab campaigns typically involve emails designed to deceive a potential victim into downloading attached malicious files. The infection process begins once a victim opens the attachment. It is important to note that the malware, in order to be successfully installed, requires the victim to enable macros. As is customary with other ransomware, it aims to lock a victim’s files, and demand that a ransom amount be paid. GandCrab usually targets consumers and businesses with PCs running Microsoft Windows. GandCrab has been involved in some of the biggest ransomware attacks, causing massive monetary loss to victims. GandCrab operators usually attempt to impersonate legitimate services in order to successfully victimize the target. For instance, in January 2020, GandCrab was distributed packed in a word document “Flu pandemic warning.doc” supposedly coming from the Center for Disease Control.
Impact
- Files Encryption
Indicators of Compromise
MD5
- d6c4500fe2b69a29e69f29951d0030d4
SHA-256
- 42b542b4fe9c7b6e239e2fad45b34e2cbfb5afdd90998e79d4b6aeb16bdbceef
SHA-1
- 8dbf95ea2c491cf966c02d80b9882c3fd5300d65
Remediation
- Block the threat indicators at their respective controls.
- Search for IOCs in your environment.