• Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Press Release
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – Cerberus Banking Trojan – Active IOCs
August 30, 2021
Rewterz Threat Alert – NetWire RAT Malware – Active IOCs
August 30, 2021

Rewterz Threat Alert – VBA Rat Using Double Attack Vectors – Active IOCs

August 30, 2021

Severity

High

Analysis Summary

VBA Rat relies on template injection to drop a full-featured Remote Access Trojan. This suspicious document name is (“Manifest.docx”) that executes two templates: one is macro-enabled and another one is HTML object. The Internet Explorer exploit (CVE-2021-26411) earlier used by Lazarus APT is an unusual discovery. Attackers are using social engineering techniques to infect targets.

VBA Rat that performs the following actions.

Collects victim’s info
Identifies the AV product running on a victim’s machine
Executes shell-codes
Deletes files
Uploads and downloads files
Reads disk and file systems information
CVE-2021-26411 – Internet Explorer Memory Corruption Vulnerability

Microsoft Internet Explorer could allow a remote attacker to execute arbitrary code on the system, caused by improper handling of objects in memory. By persuading a victim to open specially-crafted content, an attacker could exploit this vulnerability to execute arbitrary code on the system with the privileges of the victim.

Impact

  • Credential Theft
  • Exposure of sensitive data
  • Unauthorized Access

Affected Vendors

Microsoft

Affected Products

  • Microsoft Internet Explorer 9
  • Microsoft Internet Explorer 11
  • Microsoft Edge
  • Microsoft Internet Explorer 11 on Windows 10 for 32-bit Systems

Indicators of Compromise

Domain Name

  • cloud-documents[.]com

MD5

  • a0b9a840adaba6664e7d26619c20bbd1
  • 224cb9048f8743986b552d04f9e804cd
  • 6775e38ea2ad51f95f090d37fc3ab484

SHA-256

  • 03eb08a930bb464837ede77df6c66651d526bab1560e7e6e0e8466ab23856bac
  • 0661fc4eb09e99ba4d8e28a2d5fae6bb243f6acc0289870f9414f9328721010a
  • fffe061643271155f29ae015bca89100dec6b4b655fe0580aa8c6aee53f34928

SHA-1

  • 0ac675e26b14a0bedf314799423d015f49f9a9f4
  • 3567c37e030c07f8ab66f37b3f378b38bd14c92f
  • d2e9dcec8fbf4f44db5795bdbd736e7ff2c7c23e

Remediation

Block all threat indicators at your respective controls.
Search for IOCs in your environment.
Use Microsoft Automatic Update to apply the appropriate patch for your system, or the Microsoft Security Update Guide
to search for available patches.
https://msrc.microsoft.com/update-guide/en-us/vulnerability/CVE-2020-26411

  • Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.