Rewterz Threat Alert – Remcos RAT – Active IOCs
April 7, 2023Rewterz Threat Alert – Quasar RAT aka CinaRAT – Active IOCs
April 10, 2023Rewterz Threat Alert – Remcos RAT – Active IOCs
April 7, 2023Rewterz Threat Alert – Quasar RAT aka CinaRAT – Active IOCs
April 10, 2023Severity
High
Analysis Summary
Phobos Ransomware is based on the Dharma (aka CrySIS) malware that first appeared at the beginning of 2019. It spreads into several systems via compromised Remote Desktop Protocol (RDP) connections. This malware does not use any UAC bypass methods. Unlike other cybercrime gangs that go after big hunts, Phobos creators go after smaller firms that don’t have sufficient funding to pay massive ransoms. This ransomware usually targets healthcare providers, with victims in the United States, Seychelles, Portugal, Brazil, Indonesia, Germany, Romania, and Japan. Its perpetrators demand a little ransom payment, which appeals to victims and enhances the chances of payment. The average Phobos ransom payment in July 2022 was $36,932
Phobos encrypts data & files and keeps them locked until a ransom is paid. All encrypted files are renamed with the “.phobos” extension, as well as the victim’s unique ID and email address.
ransom note
Impact
- File Encryption
- Data Exfiltration
Indicators of Compromise
MD5
- a6092621b7db8dc1f2c1f93a9a7ced9f
- 4ab785bba778bd582b33baeac2cc9c22
- 003bcff6e2fc2dd692631b7461cc516c
SHA-256
- 5a96b929383817aa298eec8cca019bcd984fcd71dd8ee353541392c1082756a4
- 55c30024aed833336eb4720a1a4a40c78496efb27b3c4d5c3f1d1b5935c12715
- 33d32078ebe0c9429e405fdeb347dfb1ba5543e61d1179d13edffc7943b57640
SHA-1
- d4fd035605baa14375c9a59a93849b959df36bc4
- 23db0ae4d5b7b4fe8698583e25e50e1b89cf9411
- da15cf4fafe2760dc29c01e8f0ba0e803a6e3b83
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment.
- Maintain cyber hygiene by updating your anti-virus software and implementing patch management lifecycle.
- Maintain Offline Backups – In a ransomware attack, the adversary will often delete or encrypt backups if they have access to them. That’s why it’s important to keep offline (preferably off-site), encrypted backups of data and test them regularly.