

Rewterz Threat Advisory -CVE-2019-7304 – Linux Local Privilege Escalation vulnerability via Snapd Socket
February 14, 2019
Rewterz Threat Advisory – Siemens CP1604 and CP1616 Multiple vulnerabilities
February 14, 2019
Rewterz Threat Advisory -CVE-2019-7304 – Linux Local Privilege Escalation vulnerability via Snapd Socket
February 14, 2019
Rewterz Threat Advisory – Siemens CP1604 and CP1616 Multiple vulnerabilities
February 14, 2019Severity: High
Analysis Summary
A set of highly evasive malware with advanced capabilities has been retrieved in attacks launched against financial organizations. The attack mechanism closely resembles that of the North Korean APT group called Lazarus or Hidden Cobra. The attacks are specifically aimed at targeting banks, ATM switching networks and schemes, using variants of the earlier malware associated with this group. The campaign starts with a social-engineering attack impersonating reputable personalities from financial institutions. The victim is first approached over social media networks like LinkedIn and is invited to personal Gmail and Skype for the interview, subsequently sharing the fake job app that works as a malware dropper.
‘ApplicationPDF.exe’ is a malware dropper which is typically shared by the attacker on Skype or email with the victim. This malicious file performs the following set of activities: • Downloads a PowerShell script REG_TIME.ps1 after making a connection with a C2 domain ecombox.store • The script is stored at C:\users\public\REG_TIME.ps1 • Executes the following malicious scripts and deletes after 5 seconds REG_TIME.ps1 (Stage 1): • Contains PowerRatankba DES-encrypted payload • Decodes and decrypts the encrypted payload and executes it REG_TIME.ps1 (Stage 2): • Stage two Heavily utilizes WMI to gather information about the targets machine and AD domain • Gathers the following information from the victim’s machine: Victims IP and MAC address Details of operating system Logged in user Running processes State of TCP ports 139, 445 and 3389 It then allows the attacker to upload tools and run commands on the compromised machine to pivot to other machines on the network.
Impact
Malware Infection
Information Disclosure
Network-wide infection
Indicators of Compromise
IP(s) / Hostname(s)
- ecombox[.]store
- autoif[.]online
- kair[.]xyz vanxuangroup[.]edu[.]vn
- 45[.]32[.]114[.]96
- 104[.]227[.]146[.]249
- 2[.]21[.]242[.]227
- gpcantgua[.]com
- 162[.]255[.]119[.]211
- Extension
- .exe
- .ps1
- .dll
- Malware Hash (MD5/SHA1/SH256)
- 2025d91c1cdd33db576b2c90ef4067c7
- ec80c302c91c6caf5343cfd3fabf43b0bbd067a5
- bed916831e8c9babfb6d08644058a61e3547d621f847c081309f616aed06c2fe
- 5ad8143d954ebd5de6be0a40e0f65732
- e8f0df6c44414644d37ba03a7d022e3c30181628
- 974ccadc8a128b6fcfa50c6496cf3fed0bc58ed5151623d946330975be36f0b4
- cb29db3900204071323a940c2a9434b8
- 607ae893fad74cc39fafbbcb2ba65cec88acfaac
- e1bd6bae9d014a995c7cafd09c43f4480b907e70093cbf1c9029384bd7e14100
- c89116edebbee98f09a8d962c2c45a64
- 06441863a53212498ac9d9b43dc90a975f6accc8
- 43a61479d9d27ba7d11f4fe128a80a7b19f0f9151eaadd654e1318c6c6007a5c
- c9ed87e9f99c631cda368f6f329ee27e
- 943feef623db1143f4b9c957fee4c94753cfb6a5
- 802efe9c41909354921009bd54be7dcf1ee14fcfaf62dacbcdaafbe051a711e3
- 636f8bd214d092ae3feb547599b4935e
- 1611b6156871e3e9be52ea79916ade46879b7d32
- 0f56ebca33efe0a2755d3b380167e1f5eab4e6180518c03b28d5cffd5b675d26
- 7e369b464a483fa3bb8ef08ac58e0d59
- f631e1f49b71804ec3909558ff831e98fdcb383f
- bf4437e1447ad1c1ea57a5d97bd6197969f2f56c44dc97323a4520ce33d4496c
- 8a41520c89dce75a345ab20ee352fef0
- 3ad86e1776018eb3743be06996d7a63963673a57
- 8a0e6c50a6483f2f01a458cd0cb4e485605778c42c9708b07b820968132efb76
- 586bb8024f8337459a1d1f40ff9e5c39
- 6b082f085a0e5416cc8c84779a94b375b3d98776
- b9662abb28b9ae8b98e568a9b805f6ee90df6dd84416fffa4af8f7465b35f02a
- 77b7549747f940d67330f408e648dc33
- d71445d0fe05fe03eb4e36057a69687ea9f76bb6
- 254560408ece689c1f2cd57bfada422371b7520495ef60599e3ae959d1a98f70
- c47df47414d300b2fcdc36cb5ca75570
- a427815c5e48f23d08a72d5001da3bcaaaea9ca6
- dfc145064d3d9b066a84a2aac0823e8db47ce2335d10dd105281088eaeb1b77c
- b145210f4b204e482c23113f6cac57a9
- fca6d22c5ba55baf769ab07ab91db1832ff6e551
- fae3fddb17b0baa4bba7446e41229a0543957b22a9265cb5a0cdf9385ce5afbc
- 123a86353ebf69219fd80fca9d90dbf2
- d83eee57105ba111fccd11da8dc39b6f48980ff0
- 034ba72b544091684795dc1b60fb566f4081bf9c29b725f31287a94d0436e39c
- 5cc28f3f32e7274f13378a724a5ec33a
- 32292b4e125287a6567e3879d53d0d8d82bcdf01
- 18f0ad8c58558d6eb8129f32cbc2905d0b63822185506b7c3bca49d423d837c7
- 13bbb68bcd19bf1aea0f95986d254b7b
- 3aa4bc4bbb35cf068eec65460d46aec4a17097be
- 63e87877eb6a2b2bbba2fc6b1d13550f7d982b0c3b9ee8e2d902fc6e0774f744
- df934e2d23507a7f413580eae11bb7dc
- 5ce51e3882c40961caf2317a3209831ed77c9c40
- 5d25465ec4d51c6b61947990fb148d0b1ee8a344069d5ac956ef4ea6a61af879
- 34404a3fb9804977c6ab86cb991fb130
- b345e6fae155bfaf79c67b38cf488bb17d5be56d
- c6930e298bba86c01d0fe2c8262c46b4fce97c6c5037a193904cfc634246fbec
- 52ec074d8cb8243976963674dd40ffe7
- a0ebe36c61d4de405fe531ecf013720a3d56d5a1
- d48b211533f37e082a907d4ee3b0364e5a363f1da14f74a81b187e1ce19945a8
- 4c26b2d0e5cd3bfe0a3d07c4b85909a4
- 157cfb98caa48c2adb3475305c88986e777d9aa3
- 0e3552c8232e007f421f241ea4188ea941f4d34eab311a5c2341488749d892c7
- 3d918eb7e05000a08cffb3a6cbb9918b29c98804
- f34b72471a205c4eee5221ab9a349c55
- e8b58b9db83b4902a607559301f6985763d2647a
- a1f06d69bd6379e310b10a364d689f21499953fa1118ec699a25072779de5d9b
- bda82f0d9e2cb7996d2eefdd1e5b41c4
- 9ff715209d99d2e74e64f9db894c114a8d13229a
- f3ca8f15ca582dd486bd78fd57c2f4d7b958163542561606bebd250c827022de
- b484b0dff093f358897486b58266d069
- a20ef335481c2b3a942df1879fca7762f2c69704
- f12db45c32bda3108adb8ae7363c342fdd5f10342945b115d830701f95c54fa9
Remediation
Block the Threat Indicators at their respective controls.
Spread awareness about such scams and how to handle them