Rewterz Threat Alert – Trickbot IOCs
July 28, 2020Rewterz Threat Alert – NetWalker Ransomware Infiltrates Networks – IoCs
July 29, 2020Rewterz Threat Alert – Trickbot IOCs
July 28, 2020Rewterz Threat Alert – NetWalker Ransomware Infiltrates Networks – IoCs
July 29, 2020Severity
High
Analysis Summary
A new ransomware, VHD, was seen being delivered by the Lazarus group’s multiplatform malware platform, MATA. The VHD ransomware is not a commercial off-the-shelf product. A spreading utility contained a list of administrative credentials and IP addresses specific to the victim, and leveraged them to brute-force the SMB service on every discovered machine. Whenever a successful connection was made, a network share was mounted, and the VHD ransomware was copied and executed through WMI calls. This stood out as an uncharacteristic technique for cybercrime groups. Criminals usually leverage widespread botnet infections (for instance, the infamous Emotet and Trickbot malware families) to spread into the network of promising victims, and license ransomware ‘products’ from third-party developers. When the attackers have a good understanding of the target’s finances and IT processes, they deploy the ransomware on all the company’s assets and enter the negotiation phase.
Impact
- Files encryption
- Data theft
- Financial loss
Indicators of Compromise
MD5
- d0806c9d8bcea0bd47d80fa004744d7d
- ccc6026acf7eadada9adaccab70ca4d6
- 6d12547772b57a6da2b25d2188451983
- dd00a8610bb84b54e99ae8099db1fc20
- efd4a87e7c5dcbb64b7313a13b4b1012
SHA-256
- 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306
- 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6
- 097ca829e051a4877bca093cee340180ff5f13a9c266ad4141b0be82aae1a39b
- 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473
- 73a10be31832c9f1cbbd798590411009da0881592a90feb472e80025dfb0ea79
SHA1
- 800c8a12ac05459197256940e32234b9bc2db08b
- 53af601afa0b69c771255a61559365cb34f72b8b
- 3d31b2f6a6c59194cad3347d08197bd79f020274
- 6ac4a1fc00d2a2bb4ccef333f5350f2a96aa9069
- 6a7296f56410d3ee007587020ad6864d5781b4bc
Source IP
- 172[.]93[.]184[.]62
- 104[.]232[.]71[.]7
- 23[.]227[.]199[.]69
Remediation
- Block the threat indicators at their respective controls.
- Do not download files attached in untrusted emails.
- Keep all systems and software updated to latest patched versions.