Rewterz Threat Alert – Egregor Ransomware Using Rclone and Cobalt Strike
November 27, 2020Rewterz Threat Alert – Bandook Malware Targets Multiple Sectors
November 27, 2020Rewterz Threat Alert – Egregor Ransomware Using Rclone and Cobalt Strike
November 27, 2020Rewterz Threat Alert – Bandook Malware Targets Multiple Sectors
November 27, 2020Severity
Medium
Analysis Summary
A file named notepad.exe has been detected which is weaponized by threat actor to perform attack. Such software can be termed as Trojanized open-source software and it is hard to detect as open source software source code is available publicly. The weaponized notepad.exe is being dropped through Windows NT operating system kernel executable (ntoskrnl.exe) by exploiting ntoskrnl.exe or via network shares. The Notepad.exe will call executables ipconfig.exe, net.exe, reg.exe, systeminfo.exe, tasklist.exe. Besides, malicious notepad will search for Config.dat located in C:\Windows\Debug folder which legitimate Notepad will not. The malicious Notepad has additional code to load an encrypted blob file which is Config.dat to decrypt the code and executes it in the memory to ensure persistence of the backdoor.
Impact
Unauthorized Code Execution
Indicators of Compromise
MD5
- 9f95bad2ffdf61d0587cba710ba0f2f4
- 25f1a3328530ca92c38258f53b3ae69a
- 64627ba9b3737c530c4571ea819d9e1b
- 4372a8850a0968cecace4f1cb12df3a5
- 84a336d3629fb9bb1dceb41523057778
- b5a22f43252b89db6eab109c6ccf9962
- 38f9cb4bc4f1f92186bb63a7e995c648
- 3ecb971e7fa1ee6357dda4ce8384acbc
- e4a15bf88200eebd417912f9dcfb9a16
- c65dacc300cf5acaeb501e1e9933e2cc
- 80cfb7904e934182d512daa4fe0abbfb
SHA-256
- 1c3331b87dc55a8cc491846f2609d6226f66eb372716df349567ed619dd1b731
- ea6c3b993d830319b08871945cf2726dd6d8e62e8fed8fc42bcb053c38c78748
- ef7e21d874a387f07a9f74f01f2779a280ff06dff3dae0d41906d21e02f9c975
- 37e8d3ae4c34441b30098d7711df8ef0bcc12c395f265106b825221744b956bc
- 10c4067908181cebb72202d92ff7a054b19ef3aada939bf76178e35be9506525
- 33234dc94d926f1fc2831f40e27080739b415d485aa457d14a83617a3996089b
- 0b42bf15b77cfe9f9e693f2776691647e78a91be27f5bdb8d1a366be510a773f
- 64ba94000e2815898fb17e93deaa44ac0e1b4c55316af727b908dfe74c3b7ef6
- bacc02fd23c4f95da0fbc5c490b1278d327fea0878734ea9a55f108ef9f4312e
- 52d3ebe824ad60a939d64e73336e790884e3674b2d22dbe6e3c6b22061124161
- 6ac07424e5c9b87d76645aa041772ac8af12e30dc670be8adf1cf9f48e32944b
- 19938becb018e3459b49381c7efffabbe44a6450362b769ba85a3f1240b068d0
- 4fb94877cc150f591e5b61dc5641f33e93e67ae1912c2e122e7ef2a236046f1a
- f0a25444cf58b61ff6cdd86ff1cfa53a51ad426817a33bd0e098f4f0ff286f22
- 57eea67e3eebde707c3fb3473a858e7f895ae12aad37cc664f9c0512c0382e6a
- e5ce1c1b69bd12640c604971be311f9544adb3797df15199bd754d3aefe0a955
- 2f149a79f721bb78eb956f70183b531fb6a1b233ceb4a3d6385759a0b0c16fd3
- 382d9bf5da142d44de5fda544de4fffe2915a3ffc67964b993f3c051aa8c2989
- 09c99e37121722dd45a2c19ff248ecfe2b9f1e082381cc73446e0f4f82e0c468
- 42f5f1b08c9cee876bafdb6dc4188e8e29d26a07951e1083e08e2a4b0cb6d0ff
- 4421720e0321ac8b3820f8178eb8a5ff684388438b62c85f93df9743a1d9fdb9
SHA1
- f4ee990f533af247e61a6e53336a1681c0caf0f9
- b4c24eb0b664064ce06b25540f63e16b02f2c8a6
- 5fee6bc7d63dbc2eb538b919431c98abc956c7d3
- 250da25fa9d316cd6cd7d0c783f25c45f692e748
- 9df15f471083698b818575c381e49c914dee69de
- 8af3c65be1563747a526e9b223a776a2b484329f
- 1c774611d58dcd4b5eb14c63a9907256b6116045
- 754907f851d1d8b09c249caeef51d947ec3a4a63
- cabf31fe4230b2826efc5b8b80a3c647c4f2f038
- 5c1f9a59140b76b6bccc186fb31c31fd02440d3d
- 32c7a317b04e53c0c76afa3dad30e52ae7431e31
Remediation
- Block the threat indicators at their respective controls.
- Do not download open source software from untrusted sources.