Rewterz Threat Alert – Red Line Malware – Active IOCs
September 14, 2021Rewterz Threat Alert –GandCrab Ransomware – Active IOCs
September 14, 2021Rewterz Threat Alert – Red Line Malware – Active IOCs
September 14, 2021Rewterz Threat Alert –GandCrab Ransomware – Active IOCs
September 14, 2021Severity
High
Analysis Summary
Following samples of Lazarus group aka Guardians of Peace, a state-sponsored North Korean threat actor group targeting financial organizations for their gains have been active again and actively targeting different organizations via phishing emails dropping malicious word documents which enables macro when downloaded and executed. The malicious file suspected of being used as an attachment has the name Profit and Loss Statement. zip and Profit and Loss Statement.xlsx.lnk. Previously these campaigns were specifically crafted to target Russian organizations but now they’ve shifted their tilt towards Asia pacific region
Impact
- Exposure of Sensitive Data
- Credential Theft
- Information Theft and Espionage
Indicators of Compromise
Filename
- Profit and Loss Statement[.] zip
- Profit and Loss Statement[.]xlsx[.]lnk
MD5
- 09e96678aca863723bab36d7b582aeaf
- 1b025ec7e56c329c94a05c819a9dfaf
SHA-256
- b02768d994ca5e06d4430b9fd36414d16c41e3f89a461ee1a2b700dfde577393
- 825c84154c85b2f8213aaa7902f015c4478ddcd3172c48542688be2675d6e305
SHA1
- 5dfe429e58645d316c3d6abc913df14ee68a8a7f
- 2f8be17a093fc6831a13afb1e14f067de8e1b68f
URL
- hxxps[:]//share[.]bloomcloud[.]org/Yt3f4GLL1WXn/cldQqmNYKwflyCJavhZIvktwMcZyHo=
- hxxps[:]//share[.]bloomcloud[.]org/1
- hxxps[:]//share[.]bloomcloud[.]org/2
Remediation
- Always be suspicious about emails sent by unknown senders.
- Never click on links/attachments sent by unknown senders.
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment.