• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Advisory – Vulnerability in Microsoft Office for Mac Could Allow for Remote Code Execution
November 5, 2019
Rewterz Threat Alert – Cerberus banking Trojan Targets Android Devices
November 5, 2019

Rewterz Threat Alert – Active C2 Detected Hosting Ransomware, POS Malware and Others

November 5, 2019

Severity

High

Analysis Summary

An active threat actor is found targeting and compromising different companies. The attacker operates a new server hosting a large stockpile of malicious files. The adversary can deploy ransomware as well as steal credit card information via a point-of-sale malware and remotely managed compromised infrastructure. These files shows that these attackers were able to obtain a deep level of access to victims’ infrastructure using ransomware like the DopplePaymer, credit card capture malware like the TinyPOS, as well as some loaders that execute code delivered directly from the command and control (C2).

The adversary is resourceful and has a widespread infrastructure. A WinRAR self-extracting archive (SFX) is used to extract the ransomware and execute the following command:
Path=C:\Users–redacted–\DesktopSetup=C:\Users–redacted–\Desktop\p1q135no.exe QWD5MRg95gUEfGVSvUGBY84h

On the same server a TinyPOS sample was also found. This malware is installed using a batch file.The batch file creates a scheduled task that will be executed every 6 hours.
The data going out is obfuscated using XOR operations with a hardcoded key of 0xcaef3d8a. The malware exfiltrates the hostname and the local IP of the infected system. It searches and parses targeted processes memory to retrieve credit card information, which is usually stored in tracks 1 and 2 of the magnetic strip of the credit card.
Other malicious tools hosted on the server include Mimikatz, a tool to retrieve Windows credentials from the memory, PsExec: A tool to remotely connect on Windows system (The attacker probably used it to pivot inside the infrastructure by using the credential previously retrieved.), Procdump: A tool to dump process. The attacker probably used it to dump the LSASS.exe process to then use with Mimikatz. The attacker likely was planning to carry out fake tech support scam to attempt to compromise infrastructure. This would likely be carried out by asking employees to execute specific commands or attempting to download the malware provided by the attacker.

Impact

  • Files Encryption
  • Theft of Credit Card Information
  • Credential Theft
  • Code Execution

Indicators of Compromise

Domain Name

  • Jduuyerm[.]website
  • techsupport[.]org[.]ru
  • www.techsupport[.]org[.]ru
  • techsupportlap[.]icu
  • techsupportnet[.]icu
  • aefawexxr54xrtrt[.]softether[.]net

MD5

  • 8663a9dfa3b5c5b623d4364f320c64ef
  • 81c30c38e33abf112b54697e8751954a
  • 69061465ae5067710402c832412e2dae
  • 8c54bbe3f191a8627bfeeb4cb02634a9
  • 38e6484610d84de6a488c5d048e84e8c
  • f6cb9538add106196db23b162ba82125
  • 8663a9dfa3b5c5b623d4364f320c64ef
  • 444581f3d716abeb88d9367392a0a9aa
  • 967d62e4204430fc0d36887a46f5a781
  • eb23f879a78736a27b5ce13a4bddaee2

SH256

  • 0273d96cef6683e3fb205b8e841579b44bae16ff1e3ab57647b1a9d2947db5c7
  • bc919680471fd1b631e80c37e83aeb6877f13f4ed47ae22100cf4d60e27a93a4
  • b9a8710e55bb2d55bbeed9cebb83ac2f18f78818f0c05f18c96f766c8c47e2d9
  • f658ddcf8e87de957a81bb92d44ce02913b427e8bccbe663669ee2613d355555
  • dcb76dc106e586c6f8bfa82832a66f525a9addb5450912004e92dd578ff2a60a
  • 04d0824f70be3666d79b2a49b85cf6b60b566d7b8cc9efd31195644514fb0cb1
  • 0273d96cef6683e3fb205b8e841579b44bae16ff1e3ab57647b1a9d2947db5c7
  • 619f0c489beac9a792b9b42fa6529b3faf4329692fb52d17123ef69733868845
  • 98a4f69eff1f91f63fb74420ee4c16be508aa203d04f66e98b1dcb554def61ee
  • b1e883222f3205db59ff812c6f6097291df12b1784c9e64eef674ab3a173c07a

SHA1

  • 7cab077546328948ea4f801b175079bfbc6f63bd
  • fceb70eafee76d2161e11248ce9849dee366e5b9
  • 963f6c4e2f7c202fd1676eee27c160de2ad2f774
  • 2fc2ecbed153344557386e80a2fbd097bf795559
  • 8afd15b8273df0ebc10e6a8b78ce062f86cbf32e
  • 4478f32dcce2de8f1959fb6cf50a9d4cc6c0ae06
  • 7cab077546328948ea4f801b175079bfbc6f63bd
  • d6704c8cf07fcfa1c35f9c65939d92a1301845f7
  • 08558ce4fc178d3858c8579fcadfea0e131d7d8b
  • 483ac8d56bb882162b871558e589655c7326a396

Source IP

  • 185.254.188[.]11
  • 185.212.128[.]189

Remediation

  • Block the threat indicators at their respective controls.
  • Do not acquire tech support services from unknown service providers.
  • Do not download files attached in untrusted emails.
  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.