Rewterz Threat Alert – Trickbot – IOCs
June 8, 2020Rewterz Threat Alert – Covid-19 – Malicious URLs
June 8, 2020Rewterz Threat Alert – Trickbot – IOCs
June 8, 2020Rewterz Threat Alert – Covid-19 – Malicious URLs
June 8, 2020Severity
High
Analysis Summary
Tycoon, a multi-platform Java-based ransomware which targets Windows and Linux has been seen in the wild since December of 2019. Tycoon ransomware attempts to infiltrate small to medium sized companies and institutions in education and software industries. As with other ransomware software and threat actors, encrypting data in order to extort payment for the return of the stolen data to a victim is the primary mission. Initial infection of Tycoon involves the attack of Internet-facing RDP jump-servers. Persistence is gained through a technique called Image File Execution Options (IFEO) injection which are stored in the Windows registry. Usage of a backdoor as well as the Microsoft Windows On-Screen Keyboard allowed for quick access to infected systems. Attackers also disable any anti-malware solutions using the ProcessHacker utility as well as changing the passwords of Active Directory servers thus blocking the victim from accessing to their own servers.
The last step in the infection process involves the execution of the Java ransomware module which encrypts all file servers including backup systems connected to the networks. Finally, analysts have suggested, that due to the overlap of email addresses and naming conventions of encrypted files, there could be a connection between Tycoon and Dharma/CrySIS ransomware.
Impact
File encryption
Indicators of Compromise
SHA-256
- 853fa18adc3f9263a0f98a9a257dd70d7e1aee0545ab47a114f44506482bd188
- bd3fdf1b50911d537a97cb93db13f2b4026f109ed23a393f262621faed81dae1
- 868cb8251a245c416cd92fcbd3e30aa7b7ca7c271760fa120d2435fd3bf2fde9
- 44b5d24e5e8fd8e8ee7141f970f76a13c89dd26c44b336dc9d6b61fda3abf335
- ce399a2d07c0851164bd8cc9e940b84b88c43ef564846ca654df4abf36c278e6
- 8587037c15463d10a17094ef8fa9f608cc20c99fa0206ce496b412f8c7f4a1b8
- ac0882d87027ac22fc79cfe2d55d9a9d097d0f8eb425cf182de1b872080930ec
- 346fdff8d24cbb7ebd56f60933beca37a4437b5e1eb6e64f7ab21d48c862b5b7
SHA1
- bf38aca2c659f9eb2b2fa2fad82ccf55b496b0cb
- 77676865f875eff23699189f57c37c76b92ba2b9
- 8e7a5500007c1552e1231bd1157433f7ef638672
- e20a4cc7f13f517491e772ce9e5c236aad2785f0
- a2c17f04ce259125bc43c8d6227ef594df51f18a
- 3d845a707f2825746637922d7dd10fab18558209
- 03023d7e3a54d915cca82429dfeedb1bebd5c182
- 7301382916d9f5274a4fb847579f75bc69c9c24b
Remediation
- Block all threat indicators at your respective controls.
- Check for IOC’s in your existing environment.