

Rewterz Threat Advisory – Oracle PeopleSoft Enterprise Learning Management Multiple Vulnerabilities
April 18, 2019
Rewterz Threat Advisory – IBM Security QRadar SIEM Multiple Vulnerabilities
April 19, 2019
Rewterz Threat Advisory – Oracle PeopleSoft Enterprise Learning Management Multiple Vulnerabilities
April 18, 2019
Rewterz Threat Advisory – IBM Security QRadar SIEM Multiple Vulnerabilities
April 19, 2019Severity
Medium
Analysis Summary
A banking botnet was rcently observed targeting Australian financial institutions. The researchers believe that this Android-based campaign is related to the recent “ChristinaMorrow” spam campaign. The infection vector is via SMS text, targeting between four and five potential victims at a time. If a victim clicks the URL contained in the text message, it will attempt to resolve to a command and control server and try to install the malware on the victim’s device. The malware being utilized includes the following functionalities: the ability to steal a victim’s credentials, contacts, phone numbers/names, files, and photos from an infected device. Gathering of such information suggests that more complex social engineering attacks are to follow.
Impact
- Credential Theft
- Information Disclosure
Indicators of Compromise
IP(s) / Hostname(s)
- 78[.]46[.]201[.]36
- 88[.]99[.]170[.]84
- 88[.]99[.]227[.]26
- 94[.]130[.]106[.]117
- 88[.]99[.]174[.]200
- 88[.]99[.]189[.]31
URLs
- homevideo2-12l[.]ml
- facebook-photos-au[.]su
- videohosting1-5j[.]gq
- http[:]//88[.]99[.]227[.]26/html2/2018/GrafKey/new-inj-135-3-dark[.]html
- http[:]//88[.]99[.]227[.]26/html2/arc92/au483x[.]zip
- http[:]//94[.]130[.]106[.]117[:]8080/api/v1/report/records[.]php
- http[:]//88[.]99[.]227[.]26/html2/new-inj-135-3-white[.]html
- http[:]//facebook-photos-au[.]su/ChristinaMorrow
- http[:]//homevideo2-12l[.]ml/mms3/download_3[.]php
Malware Hash (MD5/SHA1/SH256)
- 369fcf48c1eb982088c22f86672add10cae967af82613bee6fb8a3669603dc48
- b2d4fcf03c7a8bf135fbd3073bea450e2e6661ad8ef2ab2058a3c04f81fc3f3e
- 8f5d5d8419a4832d175a6028c9e7d445f1e99fdc12170db257df79831c69ae4e
- a5ebcdaf5fd10ec9de85d62e48cc97a4e08c699a7ebdeab0351b86ab1370557d
- 84578b9b2c3cc1c7bbfcf4038a6c76ae91dfc82eef5e4c6815627eaf6b4ae6f6
- 89eecd91dff4bf42bebbf3aa85aa512ddf661d3e9de4c91196c98f4fc325a018
- 9edee3f3d539e3ade61ac2956a6900d93ba3b535b6a76b3a9ee81e2251e25c61
- 0e48e5dbc3a60910c1460b382d28e087a580f38f57d3f82d4564309346069bd1
- c113cdd2a5e164dcba157fc4e6026495a1cfbcb0b1a8bf3e38e7eddbb316e01f
- 1819d2546d9c9580193827c0d2f5aad7e7f2856f7d5e6d40fd739b6cecdb1e9e
- b213c1de737b72f8dd7185186a246277951b651c64812692da0b9fdf1be5bf15
- 453e7827e943cdda9121948f3f4a68d6289d09777538f92389ca56f6e6de03f0
- 88034e0eddfdb6297670d28ed810aef87679e9492e9b3e782cc14d9d1a55db84
- e08f08f4fa75609731c6dd597dc55c8f95dbdd5725a6a90a9f80134832a07f2e
- 01c5b637f283697350ca361f241416303ab6123da4c6726a6555ac36cb654b5c
- 1fb06666befd581019af509951320c7e8535e5b38ad058069f4979e9a21c7e1c
- 6bdfb79f813448b7f1b4f4dbe6a45d1938f3039c93ecf80318cedd1090f7e341
- 0246dd4acd9f64ff1508131c57a7b29e995e102c74477d5624e1271700ecb0e2
Remediation
- Block all threat indicators at their respective controls.
- Search for existing signs of the indicated IOCs in your environment.
- Ensure anti-virus software and associated files are up to date.