Rewterz Threat Alert – WSHRAT aka Houdini – Active IOCs
April 5, 2023Rewterz Threat Alert – South Asian Espionage Group Bitter Targeting The Chinese Nuclear Energy Industry – Active IOCs
April 5, 2023Rewterz Threat Alert – WSHRAT aka Houdini – Active IOCs
April 5, 2023Rewterz Threat Alert – South Asian Espionage Group Bitter Targeting The Chinese Nuclear Energy Industry – Active IOCs
April 5, 2023Severity
Medium
Analysis Summary
Smoke Loader – a malicious bot application – can be used to load additional malware. Smoke Loader has been spotted in the wild since 2011, carrying a variety of payloads. This malware is mostly used to load additional malicious software, which is often obtained from a third-party source. Smoke Loader can load its modules allowing it to do several activities without the use of additional components. To date, the supplier of Smokeloader, who goes by the alias SmokeLdr, is still active in delivering this malware as a service. It is well-known for using deception and self-defense. This malware can be spread in several ways and is widely linked to criminal activity. To hide its C2 activity, this malware sends queries to popular websites like microsoft.com, bing.com, adobe.com, and others.
Impact
- Information theft
- Unauthorized Access
Indicators of Compromise
MD5
- 8021460702777318a468e62cb10be252
- 3ef4b957cbd8922f5bba0cfc031a6c94
- 908a00fa64599d1f3e40e5926bb77548
SHA-256
- c32e08dd9502c6f42d7c553f1115984d1958c859f428381cff4cc17fbf5b2498
- ff6ef98e1aa7b4db979b96058a05ba107a7938546f66ce5012921a0cf5592259
- 0c480c5b85acca820cc14ca9d9fd55ea5ba106228a44f5ec1123bc796d63a786
SHA-1
- fc90f57d99a60a507d1ac9b40a851c7c9c744f3e
- 50a7f4258f6eb1795c59b3799c70ff240022626a
- 0a9295ab7a2db702c7188e2b7e2574d8db9927b8
Remediation
Severity
High
Analysis Summary
Redline Stealer is a type of malware that is used to steal sensitive information from infected systems. The malware was first discovered in 2018 and has been known to target a variety of industries, including finance, retail, healthcare, and technology. The malware is typically spread through phishing emails, fake software downloads, or other forms of social engineering. Once installed on a victim’s computer, Redline Stealer can collect a wide range of information, including login credentials, credit card numbers, and other sensitive data.
This stealer is designed to be difficult to detect by traditional antivirus software, and it often uses advanced techniques to evade detection. It can also be used to launch further attacks, such as distributing additional malware or stealing further data.
The malware has been known to target a variety of applications and software, including web browsers, email clients, and messaging applications. It can also capture screenshots and record keystrokes to collect additional information. Redline Stealer has been used in several high-profile cyber attacks and is considered a significant threat to computer security. To protect against Redline Stealer and other types of malware, it is important to practice good cybersecurity hygiene, including regularly updating software and operating systems, using strong passwords, and being cautious when clicking on links or downloading files from unknown sources. It is also recommended to use reputable antivirus and anti-malware software to help detect and remove any infections
Impact
- Data Exfiltration
- Credential Theft
- Information Theft
- Financial Loss
Indicators of Compromise
MD5
- dce62039df2bafb63e0e146ee03f3b33
- b2855c9de9b9405e53cbcf8517e65503
- 2f5769f336565444ad1b4725b55d6dc9
- b41cf811781bd63b0361c405fc375a15
- 0eb47635d997f848f52b57738cbc02fc
SHA-256
- 7a3b25296bc9573f15df36192ba3e34cf39bd9beeb236a77d74abe0871db7f5c
- 1f970ce9d1e07cce33f536fa388c06fa55f2bf42fb55a5d1d2992d04caec9cba
- 81ae9161203cc5f2412234090fd8f173881af882b7318f2110759941c67b8b9c
- 000ad9cb09358b645f4d749e5f0a2e156e6a788e23878e92ededeb0a7a23e8b8
- b3363dfa7a54e375c98d4934c85bf995738822c8c3899280c3076876fca74db3
SHA-1
- e978615b4e4b246c8cbd20dcf8f763704d73db59
- 6c42304ee75c86b29c8578964a270330142b89dc
- 95b890b1b5dd5d958f7cacf619ef370a3eae3cdc
- 33529ac24fb0389ef9c3c21599625902a9aaf9b7
- 7161c1a7f3ed3f72074b4a4a533cd8dfff1d1116
Remediation
- Block all threat indicators at your respective controls.
- Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls
- Emails from unknown senders should always be treated with caution.
- Never trust or open ” links and attachments received from unknown sources/senders
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions in a timely manner. Using multi-layered protection is necessary to secure vulnerable assets.