Rewterz Threat Alert – Increased Office 365 Phishing Campaigns Attacks Related to COVID-19
June 23, 2020Rewterz Threat Advisory – CVE-2020-9665 – Adobe Magento Commerce and Open Source cross-site scripting
June 24, 2020Rewterz Threat Alert – Increased Office 365 Phishing Campaigns Attacks Related to COVID-19
June 23, 2020Rewterz Threat Advisory – CVE-2020-9665 – Adobe Magento Commerce and Open Source cross-site scripting
June 24, 2020Severity
Medium
Analysis Summary
Emerging during the pandemic, a new threat group is targeting Taiwanese users with COVID-19 themed phishing campaigns. The use of COVID-19 themes as a lure has been a consistent tactic in their campaigns since their appearance. The most recent campaign indicates a clear intent to victimize users in Taiwan based on the content and language. The email claims that the attachment contains information regarding making an appointment for testing at the Taiwan CDC. The researchers note the email was high quality and indicated sophisticated targeting, unlike most phishing emails which contain grammatical mistakes or appear to be fake. Attached is an ISO containing a packed .NET executable identified as RoboSki. RoboSki, upon execution, runs a DLL file in memory that extracts shell code from an embedded PNG image. The shell code, in turn, drops the next payload in memory, the ReZer0 malware. This kicks off a chain of payload executions in memory leading to the final payload, which in this campaign is the Nanocore RAT.
Impact
- Credential theft
- Exposure of sensitive data
Indicators of Compromise
MD5
- 0f3feea28e99381970d9f50a49d58a74
- 4903d9ffb602801ed30ca75275773b4a
- e468ae6521717f48fb0469c0d34c7b84
- 0362f695e45afe0c5887851ea87d46c7
SHA-256
- 080ff06496d8b6b5e6307059e378ed7052e381a6f130d89385c778edf32ae996
- 9fbb3df3c9b58626be3f9e66e8b4abd811a8069839374ade15cc405eb3b4d816
- 0aa87ed22e193e1c6aa9944cf1b9e88ec4ae6a5b3f975e3fb72c0f5b06b864f2
- 51B0165FBA9CF8E0B7BFEBDC33E083ECC44D37CDBB15B5159B88B71E52B0255B
- d5d3cf535b3313077956d5708225cf8029b039ed0652ee670ce25ea80d2b00c0
SHA1
- fcd655242f18ec6adc00d57424e62acee797d38d
- 1e92ac2ff286e30bd2b7256ab2ac5b3177201a02
- 229dc04d91d3756a9ba7d59125cd32f748cc92a9
- 3aea3327ee6f8ce0d28f19cba9a09d16c3f694d2
Remediation
- Block all threat indicators at your respective controls.
- Always be suspicious about emails sent by unknown senders.
- Never click on the links/attachments sent by unknown senders.