Rewterz Threat Alert – Ursnif Banking Trojan – Active IOCs
March 30, 2022Rewterz Threat Alert – Lazarus APT Group – Active IOCs
March 30, 2022Rewterz Threat Alert – Ursnif Banking Trojan – Active IOCs
March 30, 2022Rewterz Threat Alert – Lazarus APT Group – Active IOCs
March 30, 2022Severity
High
Analysis Summary
A new Mirai variant is making the rounds called mirai_pteamirai. The botnet exploits a vulnerability in KGUARD DVR to spread within an environment. The vulnerability exists in the 2016 firmware version and is fixed in any version after the 2017 release. This botnet is active and used to cause DDoS conditions.
Impact
- Server Outage
- Data Loss
- Website Downtime
Indicators of Compromise
MD5
- 5082753493cd6703690062cd395c0667
- 7ac80532ebc6d6e377ac84a493a79bf9
- 36d078a72d4c33da434f1aa9690c0056
- 5b73c23ab2e145ee14b44eb0aa81a4fa
- 37d0f2fd18df8ddbb9305e51c268a8b7
- 5a9d50614434cff51efc6a4cbd0fc0bc
- 835a8750fdbbcf8ff18264543d96de12
SHA-256
- 2c14f21dcd8f76c4275085efe0539f66efb7ca95feb38950fd978fb8549b74c4
- 2d8dfc8762754f9f3c373a93b15010690ee0c672eed66229c8ef0451048dad8d
- 3e5e4975ddc622d9f046724cd2572247d4f3d81ee5f7706ed953f31d0f8dc871
- 294322834f80561a07354478d56f35805098e671f2c26d6f8e24ad0e00261ce2
- bf53ecf97ca7c77b62f2b7f836edc4c58e7202243559513c411b4cc98ddce6fa
- f29ae7803fbc76e578560f33c22a0a19da3319c31e804c87cb9a531ed5c09213
- 7d638ac235af20b2c2682ffebfb65572b2109f9a3199cc897d1e4b6e92d3507e
SHA-1
- e2ffa790b38c41aed4aa4254095a65a2c0e5d771
- db302c65c621d4e3c86f41822d8ca292c61f1d2f
- 95a8320b3f0ff7d07f400dd6642a68a7da2083c0
- 4565afd8313afa5d900cc0428a6e18dc3e0f2353
- 644d854d6f996a43def283c1f8402dfbdf6bcc0d
- 875cef312f3d424aa6690639aa0fa5d4413782de
- ff0d3df72b9b2770fda08a3bc2da61b10ddaa854
Remediation
- Upgrade your operating system.
- Don’t open files and links from unknown sources.
- Install and run anti-virus scans.