• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Advisory – Multiple Cisco IOS XE Software Security Vulnerabilities
June 5, 2020
Rewterz Threat Alert – Trickbot – IOCs
June 8, 2020

Rewterz Threat Alert – Lazarus FastCash – IOCs

June 6, 2020

Severity

High

Analysis Summary

FASTCash schemes remotely compromise payment switch application servers within banks to facilitate fraudulent transactions. Lazarus has been targeting this fastcash schemes previous aly as well for their financial gains and targeting different banking sectors around the world.

In two different incidents, one employee was targeted by the alleged employment recruiter on a leading employment-oriented website. The threat actors might have spoofed an employee profile and lured user for offer of potential employment and eventually downloaded the malicious attachment to it’s machine. While in the second incident, a separate issuer in the AP region was targeted with the same FASTCash attributed malware variant. Unconfirmed that the threat actors have gained access to the targeted machine, it is likely that the threat actors used a social engineering scheme or phishing campaign to distribute the malicious cryptocurrency application, which was then executed by an employee at the targeted institution.

Impact

  • Exposure of sensitive data
  • Financial loss

Indicators of Compromise

Domain Name

cryptoistic[.]co

IP

107[.]173[.]214[.]176

MD5

  • c744a0435bce2fdcc6b05737321f8559
  • 01d397df2a1cf1d4c8e3615b7064856c
  • 85a2b78f394383de5f3eaa79e9591996
  • 438ddcd83f5badb461bbee2214e6b51e

SHA-256

  • 306f5734d7a8eaafbac45a814f3c25c5c93f89afad9794c78f57a84fcd5396d2
  • d928b1c1096e636463afbd19f40a6b325e159196b4497895748c31535ea503dc
  • 29d96e5574323c63a92864938b9cc33358aa8a5bf91d0fd2bd231b1a1cb47e22
  • 3d853fcffe10c86462775a8f0b104525b962591aded2651b23908d776a57f5a5

SHA1

  • b3be35f9f69615ba96692a1017c7b2df12c7dea2
  • 43a7858a0564c500e7f248762353f5b1ec3f3ef8
  • f0264417e4210e699be6d83f1dd9f0a79a6a700b
  • 53aa45c8317e4d115b887477d823f71fb7063fb3

Remediation

  • Block all threat indicators at your respective controls.
  • Search for IOCs in your environment.
  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.