• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – Spamhaus Phishing Scam Delivers Ursnif Malware
February 3, 2020
Rewterz Threat Advisory – CVE-2020-3111 – Cisco IP Phone Remote Code Execution and Denial of Service Vulnerability
February 6, 2020

Rewterz Threat Alert – Iranian Campaign Tailored to US Companies Introduces TONEDEAF 2.0

February 3, 2020

Severity

High

Analysis Summary

APT34 (also known as OilRig or Helix Kitten) is a cluster of Iranian government-backed cyber espionage activities that has been active since 2014. The group is known to target various international organizations, mainly in the Middle East. Among their targeted industries are government agencies, financial services, energy and utilities, telecommunications, and oil and gas. In late January 2020, a file named survey.xls was discovered that was designed to look like an employee satisfaction survey tailored to either Westat employees or Westat customers. At first the spreadsheet appeared to be blank. Only once the victim enables macros, the survey is displayed to the user and the malicious VBA code begins to execute.The embedded VBA code unpacks a zip file into a temporary folder, extracts a “Client update.exe” executable file and installs it to “C:UsersvalsClient update.exe”. “Client update.exe” is actually a highly modified version of the TONEDEAF malware, which is named TONEDEAF 2.0. Finally, the crtt function creates a scheduled task “CheckUpdate” that runs the unpacked executable five minutes after being infected by it, as well as on future log-ons.

Impact

  • Unauthorized Code Execution
  • Detection Evasion
  • Information Theft

Indicators of Compromise

Domain Name

manygoodnews[.]com

Filename

  • Client update[.]exe
  • survey[.]xls

MD5

  • 17150a137c43235ad07011b552f9ff27
  • b15552213169ad3b8efb14470987a335
  • 51e362e8dc8d5ed7228af47ed913242a
  • 8beb7bb883a091d2690982d9d46d3bb4
  • e2fc67d5572f66f92c21a9d95a4df2d0

SHA-256

  • c10cd1c78c180ba657e3921ee9421b9abd5b965c4cdfaa94a58e383b45bb72ca
  • a897164e3547f0ce3aaa476b0364a200769e8c07ce825bcfdc43939dd1314bb1
  • d61eecd7492dfa461344076a93fc2668dc28943724190faf3d9390f8403b6411
  • 20b3d046ed617b7336156a64a0550d416afdd80a2c32ce332be6bbfd4829832c
  • 4c323bc11982b95266732c01645c39618550e68f25c34f6d3d79288eae7d4378

Remediation

  • Block the threat indicators at their respective controls.
  • Do not download files/click on URLs attached in untrusted emails.
  • Do not enable macros for files coming from unverified sources.
  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.