Rewterz Threat Alert – CStealer Password Stealer Sends Stolen Data to a MongoDB Database
December 2, 2019Rewterz Threat Alert – H-Worm Samples Targeting Middle East
December 3, 2019Rewterz Threat Alert – CStealer Password Stealer Sends Stolen Data to a MongoDB Database
December 2, 2019Rewterz Threat Alert – H-Worm Samples Targeting Middle East
December 3, 2019Severity
High
Analysis Summary
Nanobot Backdoor updates their folder names and include the files to exfiltrate inside the folder: “F**theworld” to avoid detection. The first stage contacts a Russian domain to find out the public IP and geolocation. The second stage exfiltrates collected data. Earlier samples used to go through HTTP, but since the release of PTSecurity rules, they moved to HTTPS and to a different domain.
Impact
Exposure of sensitive information
Indicators of Compromise
Domain Name
hokage.ru
MD5
eed75304df013248b41bbea0cb2688c8
SHA-256
068ebfd30d5bb614f2922b093742e672b959c9480849fa3fb5cf720cb619bd26
SHA1
ee893d2e6ec91dd51428d7bb17047547816b3a68
URL
http[:]//hokage[.]ru/antivirus[.]php
Remediation
- Block all threat indicators at your respective controls.
- Always be suspicious about emails sent by unknown senders.
- Never click on the links/attachments sent by unknown senders.