• Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Press Release
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – APT-C-35 aka Donot Team – Active IOCs
January 20, 2023
Rewterz Threat Alert – Ursnif Banking Trojan aka Gozi – Active IOCs
January 20, 2023

Rewterz Threat Alert – CrySIS aka Dharma Ransomware – Active IOCs

January 20, 2023

Severity

High

Analysis Summary

Dharma ransomware is a type of malware that encrypts a victim’s files and demands payment in exchange for the decryption key. It is a variant of the CrySIS ransomware family, which was first discovered in 2016. The malware is typically spread through phishing emails, exploiting vulnerabilities in software, or through the use of exploit kits. Once a system is infected, the ransomware will encrypt files and append the “.dharma” or “.wallet” extension to the file name. The malware will then display a ransom note demanding payment in Bitcoin. It’s important to note that paying the ransom does not guarantee the recovery of files, and it is generally advised to not pay the ransom and instead restore from backups or use reputable decryption tools. Additionally, it is important to keep software up to date and to practice safe browsing habits in order to prevent infections. It’s also important to note that the attackers behind Dharma ransomware have been known to use double extortion tactics, where they not only encrypt files but also steal and threaten to publicly release sensitive information if the ransom is not paid.

Impact

  • Data Encryption

Indicators of Compromise

MD5

  • 58402f0f41e3bfecbea9ca1bcc0f0c2b
  • 928e37519022745490d1af1ce6f336f7

SHA-256

  • 276727bfacdeba0ba864fd6ccecab5fd0f244576dc503d7cf148a4deb90fc136
  • 6fb303dd8ba36381948127d44bd8541e4a1ab8af07b46526ace08458f2498850

SHA-1

  • 0a2b11df94790e1121c17e350eb846a236e0fbcf
  • b7840242393013f2c4c136ac7407e332be075702

Remediation

  • Block all threat indicators at your respective controls.
  • Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls
  • Emails from unknown senders should always be treated with caution.
  • Never trust or open ” links and attachments received from unknown sources/senders.
  • Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
  • Enable antivirus and anti-malware software and update signature definitions in a timely manner. Using multi-layered protection is necessary to secure vulnerable assets
  • Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.