• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Advisory – CVE-2020-3940 – VMware Workspace ONE SDK information disclosure Vulnerability
January 13, 2020
Rewterz Threat Alert – Android Trojan Targeting Mobile apps in Massive Text Campaigns
January 14, 2020

Rewterz Threat Alert – Muddy Water Summer Mirage Campaign – IOC’s

January 13, 2020

Severity

High

Analysis Summary

Prevailion uncovered two new malicious documents; one which discussed Stephen Moore’s appointment to the Federal Reserve, the second document discussed companies that extract and process crude oil. Both of these documents relied upon socially engineering their victims into enabling macros in order to infect the targeted workstation. Once macros were enabled, the threat actor-written code would attempt to obtain a trojan hosted on an adversarial payload command and control node. This was a fully functional remote access trojan, that would allow the threat actors to interact with the compromised workstation via the adversarial interactive command and control node. 

LhauEBqVGcR6snVnnm3ECvgvU20jQ70kuUOy2nExaQB-N8V32ZxdTFt3QaxvWeReWtTge675-0eVSWMd-7bvWLMzfvVBrPPvlx-Id9LSHpQ3Ut3nqoCOZehpAqqWorbFqAP6RDlG

Impact

  • Credential theft
  • Exposure of sensitive information

Indicators of Compromise

MD5

  • 1f738218a4da659f3d58ff4abaa4edd7
  • 34f759180146dcce3990e2c61677d949
  • 72f92f81721fe832316f7b27ad328e17
  • b0de46b50e209b185987010238fc65f0

SHA-256

  • f779ccc3da9d8c62a9596c3567b38cabfa1b1292129c1a77db67aaffb7828fe2
  • f327abed77b4b19b4471eaebf722295b8e50a47f36a4d7662cac91b1a622e64a
  • 4d72dcd33379fe7a34f9618e692f659fa9d318ab623168cd351c18ca3a805af1
  • 95c650a540ed5385bd1caff45ba06ff90dc0773d744efc4c2e4b29dda102fcce

SHA1

  • b28317940c141824586d92aa0ccf08994ebf2560
  • dbdf6617b5f2d065e1e2dac06b64cdfb88dfe105
  • 24dd2472b98af30daa1df4a6e22f4f80c06b6669
  • 196b1e7c0918eb262d2a55ec23d86ce1776b8c61

URL

  • http[:]//194[.]187[.]249[.]78/
  • http[:]//38[.]132[.]99[.]167/crf[.]txt
  • http[:]//91[.]132[.]139[.]196/prxy[.]php?rCecms=H3OpAirStrike
  • http[:]//104[.]237[.]255[.]195/p[.]txt

Remediation

  • Block all threat indicators at your respective controls.
  • Always be suspicious about emails sent by unknown senders.
  • Never click on the links/attachments sent by unknown senders.
  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.