Rewterz Threat Alert – Cerberus Banking Trojan – Active IOCs
August 30, 2021Rewterz Threat Alert – NetWire RAT Malware – Active IOCs
August 30, 2021Rewterz Threat Alert – Cerberus Banking Trojan – Active IOCs
August 30, 2021Rewterz Threat Alert – NetWire RAT Malware – Active IOCs
August 30, 2021Severity
High
Analysis Summary
VBA Rat relies on template injection to drop a full-featured Remote Access Trojan. This suspicious document name is (“Manifest.docx”) that executes two templates: one is macro-enabled and another one is HTML object. The Internet Explorer exploit (CVE-2021-26411) earlier used by Lazarus APT is an unusual discovery. Attackers are using social engineering techniques to infect targets.
VBA Rat that performs the following actions.
Collects victim’s info
Identifies the AV product running on a victim’s machine
Executes shell-codes
Deletes files
Uploads and downloads files
Reads disk and file systems information
CVE-2021-26411 – Internet Explorer Memory Corruption Vulnerability
Microsoft Internet Explorer could allow a remote attacker to execute arbitrary code on the system, caused by improper handling of objects in memory. By persuading a victim to open specially-crafted content, an attacker could exploit this vulnerability to execute arbitrary code on the system with the privileges of the victim.
Impact
- Credential Theft
- Exposure of sensitive data
- Unauthorized Access
Affected Vendors
Microsoft
Affected Products
- Microsoft Internet Explorer 9
- Microsoft Internet Explorer 11
- Microsoft Edge
- Microsoft Internet Explorer 11 on Windows 10 for 32-bit Systems
Indicators of Compromise
Domain Name
- cloud-documents[.]com
MD5
- a0b9a840adaba6664e7d26619c20bbd1
- 224cb9048f8743986b552d04f9e804cd
- 6775e38ea2ad51f95f090d37fc3ab484
SHA-256
- 03eb08a930bb464837ede77df6c66651d526bab1560e7e6e0e8466ab23856bac
- 0661fc4eb09e99ba4d8e28a2d5fae6bb243f6acc0289870f9414f9328721010a
- fffe061643271155f29ae015bca89100dec6b4b655fe0580aa8c6aee53f34928
SHA-1
- 0ac675e26b14a0bedf314799423d015f49f9a9f4
- 3567c37e030c07f8ab66f37b3f378b38bd14c92f
- d2e9dcec8fbf4f44db5795bdbd736e7ff2c7c23e
Remediation
Block all threat indicators at your respective controls.
Search for IOCs in your environment.
Use Microsoft Automatic Update to apply the appropriate patch for your system, or the Microsoft Security Update Guide
to search for available patches.
https://msrc.microsoft.com/update-guide/en-us/vulnerability/CVE-2020-26411