• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Advisory – Oracle PeopleSoft Enterprise Learning Management Multiple Vulnerabilities
April 18, 2019
Rewterz Threat Advisory – IBM Security QRadar SIEM Multiple Vulnerabilities
April 19, 2019

Rewterz Threat Alert – Gustuff Banking Botnet Targeting Financial Institutions

April 18, 2019

Severity

Medium

Analysis Summary

A banking botnet was rcently observed targeting Australian financial institutions. The researchers believe that this Android-based campaign is related to the recent “ChristinaMorrow” spam campaign. The infection vector is via SMS text, targeting between four and five potential victims at a time. If a victim clicks the URL contained in the text message, it will attempt to resolve to a command and control server and try to install the malware on the victim’s device. The malware being utilized includes the following functionalities: the ability to steal a victim’s credentials, contacts, phone numbers/names, files, and photos from an infected device. Gathering of such information suggests that more complex social engineering attacks are to follow. 

Impact

  • Credential Theft
  • Information Disclosure

Indicators of Compromise

IP(s) / Hostname(s)

  • 78[.]46[.]201[.]36
  • 88[.]99[.]170[.]84
  • 88[.]99[.]227[.]26
  • 94[.]130[.]106[.]117
  • 88[.]99[.]174[.]200
  • 88[.]99[.]189[.]31

URLs

  • homevideo2-12l[.]ml
  • facebook-photos-au[.]su
  • videohosting1-5j[.]gq
  • http[:]//88[.]99[.]227[.]26/html2/2018/GrafKey/new-inj-135-3-dark[.]html
  • http[:]//88[.]99[.]227[.]26/html2/arc92/au483x[.]zip
  • http[:]//94[.]130[.]106[.]117[:]8080/api/v1/report/records[.]php
  • http[:]//88[.]99[.]227[.]26/html2/new-inj-135-3-white[.]html
  • http[:]//facebook-photos-au[.]su/ChristinaMorrow
  • http[:]//homevideo2-12l[.]ml/mms3/download_3[.]php

Malware Hash (MD5/SHA1/SH256)

  • 369fcf48c1eb982088c22f86672add10cae967af82613bee6fb8a3669603dc48 
  • b2d4fcf03c7a8bf135fbd3073bea450e2e6661ad8ef2ab2058a3c04f81fc3f3e 
  • 8f5d5d8419a4832d175a6028c9e7d445f1e99fdc12170db257df79831c69ae4e 
  • a5ebcdaf5fd10ec9de85d62e48cc97a4e08c699a7ebdeab0351b86ab1370557d 
  • 84578b9b2c3cc1c7bbfcf4038a6c76ae91dfc82eef5e4c6815627eaf6b4ae6f6 
  • 89eecd91dff4bf42bebbf3aa85aa512ddf661d3e9de4c91196c98f4fc325a018 
  • 9edee3f3d539e3ade61ac2956a6900d93ba3b535b6a76b3a9ee81e2251e25c61 
  • 0e48e5dbc3a60910c1460b382d28e087a580f38f57d3f82d4564309346069bd1 
  • c113cdd2a5e164dcba157fc4e6026495a1cfbcb0b1a8bf3e38e7eddbb316e01f 
  • 1819d2546d9c9580193827c0d2f5aad7e7f2856f7d5e6d40fd739b6cecdb1e9e 
  • b213c1de737b72f8dd7185186a246277951b651c64812692da0b9fdf1be5bf15 
  • 453e7827e943cdda9121948f3f4a68d6289d09777538f92389ca56f6e6de03f0 
  • 88034e0eddfdb6297670d28ed810aef87679e9492e9b3e782cc14d9d1a55db84 
  • e08f08f4fa75609731c6dd597dc55c8f95dbdd5725a6a90a9f80134832a07f2e 
  • 01c5b637f283697350ca361f241416303ab6123da4c6726a6555ac36cb654b5c 
  • 1fb06666befd581019af509951320c7e8535e5b38ad058069f4979e9a21c7e1c 
  • 6bdfb79f813448b7f1b4f4dbe6a45d1938f3039c93ecf80318cedd1090f7e341 
  • 0246dd4acd9f64ff1508131c57a7b29e995e102c74477d5624e1271700ecb0e2 

Remediation

  • Block all threat indicators at their respective controls.
  • Search for existing signs of the indicated IOCs in your environment.
  • Ensure anti-virus software and associated files are up to date.
  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.