

Rewterz Threat Alert – Malicious Payloads – Hiding Beneath the WAV
October 17, 2019
Rewterz Threat Alert – Fake Amazon AWS Suspension Emails for Unpaid Bills
October 17, 2019
Rewterz Threat Alert – Malicious Payloads – Hiding Beneath the WAV
October 17, 2019
Rewterz Threat Alert – Fake Amazon AWS Suspension Emails for Unpaid Bills
October 17, 2019Severity
High
Analysis Summary
TA505 is sending email campaigns that attempt to deliver and install Get2, a new downloader. It later downloads FlawedGrace, FlawedAmmyy, Snatch, and SDBbot (a new RAT) as secondary payloads. TA505 continues to focus on targeting financial institutions. New Microsoft Office macros are used specifically with the Get2 downloader. Tens of thousands of emails attempting to deliver Microsoft Excel attachments with English and Greek lures have been detected in October 2019. These emails targeted financial institutions in Greece, Singapore, United Arab Emirates, Georgia, Sweden, Lithuania, and a few other countries.
The new Get2 loader works in conjunction with a new Microsoft Excel macro. Get2 is embedded into the Microsoft Excel file as an object, which can be found as an image icon by scrolling through the document. The downloader collects basic system information and sends it via an HTTP POST request to a hardcoded command and control (C&C) server. It then downloads SDBbot which is a new remote access Trojan (RAT) written in C++ that has been delivered by the Get2 downloader in recent TA505 campaigns. It also makes use of application shimming for persistence.
Impact
- Information Theft
- Unauthorized Remote Access
Indicators of Compromise
Domain Name
- drm-server13-login-microsoftonline[.]com
- windows-cnd-update[.]com
- windows-se-update[.]com
Email Subject
- “HPE INV-02 – Invoice and documents”,
- “Need to Apply”,
- “Account opening form”,
- “Reçu de paiement”,
- “Admin shared “request[.]xls” with you”
MD5
- db0ae873a7466ba62bb8fb4ac7aeddd1
- 63ab811d50b71ae4c3a50962266d1601
- 562c98c718fd20d9e5373e2a026614b8
- d624eb04fa6e53a7bf34d9cbe82f5905
- 22a1d7a348ddc32ae9aaaebfaf9dcce7
- 889b1519c8fcddde0ae48ba09e87e92e
- 09548c3cba7dd1965f35baa72fba9e91
- 1f72054db015765232f83e9c2e14ece9
- af8078945b09285e0993b83f625b237e
- 64d3cc1e49273d3356af736922c89dfa
- 0c21021ccfe79c45dd327904843f9ed8
- 3e86fa3cf8cd2f242e9822e6d02e5fc8
- 2583a5ed70dcec569898071601682277
- 971571a2883f7b5d339e38f9f2ad7a5c
- 236ade08ae0ec0604632ca6fc9fa3bc8
- 3766034b489ed6bb13cd552a9ed4e948
- 2a467673b6a97108efc8fbcb03622487
SH256
- c5a670d2111c9b89ab2f7b68da455c5889e92a170b879caf87593172be956c43
- cc136c94bdd63d3b4a2251922afa922db7c570186957f743a46ff74c1a57f597
- 47fcafa29d3610f5ec276d7b6cdb3e4a7ae1f8a24762a56acc080be69a8667c1
- a4a8bd82b198b2971b17ca8f63a431b461423c92277dc4f8a285bae10391cd4e
- 9bd1fb9ce2b700c0b8da1a184a072ad966da3a89dbaea1e85f432c34c0f2f615
- ff2f46ca0fb425eaea52a71c3126ef13280be3ab4f81dc165920b46e55948d6c
- ffbc75f41d95d14da3b6c40f9f90109459427a3c29b3a8c1fdefb0fec1578513
- 84f7c3fcf3a53f37ecbb21d0b9368d332901fe8c3f06b3d1a92123479c567c95
- cfce53335bbe61de612353cdd83ce17953b1f230c576ed6de1463626aff9088e
- 99c76d377e1e37f04f749034f2c2a6f33cb785adee76ac44edb4156b5cbbaa9a
- c2f99a2bba225fe3ab49cb952e418b2ab29ba7f2e34db6cf9bc51b0349d0acd8
- f4fed12625e2b983b918f239bf74623746cfc6b874717e6d8dd502a45e073d32
- 0683d9f225d54d48081f53abd7d569b32bc153d98157a5a6b763bc3cf57a6ad6
- e3ec2aa04afecc6f43492bfe2e0d271045ab693abfa332a2c89a5115ffe77653
- 34f3733177bbe3d7a8d793fe3c4fd82759519ddc6545b608613c81af9019a52d
- 4efcc22da094e876346cff9500e7894718c8b6402ff3735ea81a9e057d488849
- f27c5375046c734dfe62d2efe936b92cd519da091d04f22db713514caafece2a
Remediation
- Block the threat actors at their respective controls.
- Do not download files attached in emails coming from unknown sources.
- Do not enable macros for files downloaded from untrusted sources.