Rewterz Threat Advisory – Vulnerability in Microsoft Office for Mac Could Allow for Remote Code Execution
November 5, 2019Rewterz Threat Alert – Cerberus banking Trojan Targets Android Devices
November 5, 2019Rewterz Threat Advisory – Vulnerability in Microsoft Office for Mac Could Allow for Remote Code Execution
November 5, 2019Rewterz Threat Alert – Cerberus banking Trojan Targets Android Devices
November 5, 2019Severity
High
Analysis Summary
An active threat actor is found targeting and compromising different companies. The attacker operates a new server hosting a large stockpile of malicious files. The adversary can deploy ransomware as well as steal credit card information via a point-of-sale malware and remotely managed compromised infrastructure. These files shows that these attackers were able to obtain a deep level of access to victims’ infrastructure using ransomware like the DopplePaymer, credit card capture malware like the TinyPOS, as well as some loaders that execute code delivered directly from the command and control (C2).
The adversary is resourceful and has a widespread infrastructure. A WinRAR self-extracting archive (SFX) is used to extract the ransomware and execute the following command:
Path=C:\Users–redacted–\DesktopSetup=C:\Users–redacted–\Desktop\p1q135no.exe QWD5MRg95gUEfGVSvUGBY84h
On the same server a TinyPOS sample was also found. This malware is installed using a batch file.The batch file creates a scheduled task that will be executed every 6 hours.
The data going out is obfuscated using XOR operations with a hardcoded key of 0xcaef3d8a. The malware exfiltrates the hostname and the local IP of the infected system. It searches and parses targeted processes memory to retrieve credit card information, which is usually stored in tracks 1 and 2 of the magnetic strip of the credit card.
Other malicious tools hosted on the server include Mimikatz, a tool to retrieve Windows credentials from the memory, PsExec: A tool to remotely connect on Windows system (The attacker probably used it to pivot inside the infrastructure by using the credential previously retrieved.), Procdump: A tool to dump process. The attacker probably used it to dump the LSASS.exe process to then use with Mimikatz. The attacker likely was planning to carry out fake tech support scam to attempt to compromise infrastructure. This would likely be carried out by asking employees to execute specific commands or attempting to download the malware provided by the attacker.
Impact
- Files Encryption
- Theft of Credit Card Information
- Credential Theft
- Code Execution
Indicators of Compromise
Domain Name
- Jduuyerm[.]website
- techsupport[.]org[.]ru
- www.techsupport[.]org[.]ru
- techsupportlap[.]icu
- techsupportnet[.]icu
- aefawexxr54xrtrt[.]softether[.]net
MD5
- 8663a9dfa3b5c5b623d4364f320c64ef
- 81c30c38e33abf112b54697e8751954a
- 69061465ae5067710402c832412e2dae
- 8c54bbe3f191a8627bfeeb4cb02634a9
- 38e6484610d84de6a488c5d048e84e8c
- f6cb9538add106196db23b162ba82125
- 8663a9dfa3b5c5b623d4364f320c64ef
- 444581f3d716abeb88d9367392a0a9aa
- 967d62e4204430fc0d36887a46f5a781
- eb23f879a78736a27b5ce13a4bddaee2
SH256
- 0273d96cef6683e3fb205b8e841579b44bae16ff1e3ab57647b1a9d2947db5c7
- bc919680471fd1b631e80c37e83aeb6877f13f4ed47ae22100cf4d60e27a93a4
- b9a8710e55bb2d55bbeed9cebb83ac2f18f78818f0c05f18c96f766c8c47e2d9
- f658ddcf8e87de957a81bb92d44ce02913b427e8bccbe663669ee2613d355555
- dcb76dc106e586c6f8bfa82832a66f525a9addb5450912004e92dd578ff2a60a
- 04d0824f70be3666d79b2a49b85cf6b60b566d7b8cc9efd31195644514fb0cb1
- 0273d96cef6683e3fb205b8e841579b44bae16ff1e3ab57647b1a9d2947db5c7
- 619f0c489beac9a792b9b42fa6529b3faf4329692fb52d17123ef69733868845
- 98a4f69eff1f91f63fb74420ee4c16be508aa203d04f66e98b1dcb554def61ee
- b1e883222f3205db59ff812c6f6097291df12b1784c9e64eef674ab3a173c07a
SHA1
- 7cab077546328948ea4f801b175079bfbc6f63bd
- fceb70eafee76d2161e11248ce9849dee366e5b9
- 963f6c4e2f7c202fd1676eee27c160de2ad2f774
- 2fc2ecbed153344557386e80a2fbd097bf795559
- 8afd15b8273df0ebc10e6a8b78ce062f86cbf32e
- 4478f32dcce2de8f1959fb6cf50a9d4cc6c0ae06
- 7cab077546328948ea4f801b175079bfbc6f63bd
- d6704c8cf07fcfa1c35f9c65939d92a1301845f7
- 08558ce4fc178d3858c8579fcadfea0e131d7d8b
- 483ac8d56bb882162b871558e589655c7326a396
Source IP
- 185.254.188[.]11
- 185.212.128[.]189
Remediation
- Block the threat indicators at their respective controls.
- Do not acquire tech support services from unknown service providers.
- Do not download files attached in untrusted emails.