Rewterz Threat Alert – Zeppelin Ransomware – IoCs
July 1, 2020Rewterz threat Alert – Promethium’s StrongPity3 Targeting New Victims
July 1, 2020Rewterz Threat Alert – Zeppelin Ransomware – IoCs
July 1, 2020Rewterz threat Alert – Promethium’s StrongPity3 Targeting New Victims
July 1, 2020Severity
High
Analysis Summary’
TA505 is a prolific cybercriminal group known for its attacks against multiple financial institutions and retail companies using malicious spam campaigns and different malware. In the group’s latest campaign, the group is targeting financial institution employees via phishing email luring them to download malicious attachments. After successfully installing the malware, it connects to command and control (C2) server and download the SDBot Remote Access Trojan (RAT) and harvest financial data. Data exfiltration is the major goal of this campaign and is currently active and targeting users in different organizations. Researchers believe that TA505 seems to stick to their google drive names for the download domain for this campaign as well. Some files were believed to be distributing the Clop ransomware.
Impact
- Data Exfiltration
- Financial loss
- Unauthorized remote access
- Files encryption
Indicators of Compromise
Domain Name
- app[.]boxrcdn[.]com
- shr-0746734[.]direct-share[.]com
- drive[.]google-eu-cdn[.]com
- shr-9466488[.]direct-share[.]com
- drive[.]google-us-cdn[.]com
- direct-upt[.]com
- alpha-telemetry-microsoft[.]com
- usr-telemetry-microsoft[.]com
- music-server11-facebook[.]com
- mira-store[.]com
- music-server17-facebook[.]com
MD5
- f615f7d0a7982f6c7242b4c536c7807e
- 21e6616c87d71f55e7fe1c515d89e9c6
- 1df72c8030212114451baf714d7387d0
- 7f0653f9d8522e91185b01060dafae80
- 92d0ca02e6874926e5b5fe7cf7351d7b
SHA-256
- 0d4f2d354fd2aca85b2719d749eb88c1f444309ae27f3824f0faac8bdbfa4249
- 07ec31270252b02de498c0bf5ff98ce570004c34cd5d439323d2408524e6b019
- cff2bcf79f0950c94285188a0b0b7bb3c4706438de7cefc1d412e48692f44244
- 9da33d14fdbf8c566b10df21a453c604a1d199af9ed4fd99fd5da755f104b1f3
- a1a98e7ad53525c71775b5fc646ede230f74e0d837e7909cb87f702691a1ef2f
- 0fcabd1b282115f5b301618198f15a8a813dfadc781c117346c133e7a0d39948
- f2e3f951cde838860429fe33c461aeb3308b4111eb649b12a000de343c62035b
- 1ec119e53f86134b6552c4852656ba5c8bf048fd1b83f2f80e7cc63af6c4b7c9
- 955dbc7e39627002a5a9ef1199257a980697ceabb14c24ad46a4067c6252439e
- 20b0c08678d478f8c12dae4a1513e6ef60ee69b6e763e9d150402ee5aedd7407
- 85aca36895c66bf671d1d5849a23452bd369164cc2506d6b3509791103ed67ad
SHA1
- a68217d80d88c794faf39d465dd27812862e8e19
- cb46dfe091501e5741bbfa4626303f1221ff1245
- fb56fd2df1a2adbfe8835a644a26dfcd65733ea2
- 7796c5917414630d2f6d46fbf334653bda89d0fd
- 59bf4a34d72028c48ef47af81ce1248119bab784
URL
- https[:]//app[.]boxrcdn[.]com/2l0azne4mepklm7jmepp/
- https[:]//drive[.]google-us-cdn[.]com/file/d/1XfjKEt18odZrtCbpQsllnAoLcwdpDsPS/
Remediation
- Block the threat indicators at their respective controls.
- Do not download untrusted attachments from emails.