Rewterz Threat Advisory – Siemens CP1604 and CP1616 Multiple vulnerabilities
February 14, 2019Rewterz Threat Advisory – CVE-2018-17937 – gpsd, microjson Stack-Based Buffer Overflow Vulnerability
February 15, 2019Rewterz Threat Advisory – Siemens CP1604 and CP1616 Multiple vulnerabilities
February 14, 2019Rewterz Threat Advisory – CVE-2018-17937 – gpsd, microjson Stack-Based Buffer Overflow Vulnerability
February 15, 2019Severity: HIGH
Analysis Summary
Security analysts have found a bait document being circulated in the Middle East, designed specifically for Arabic users. It is an Office Word document with malicious macros embedded to drop and execute a backdoor packed by Enigma Virtual Box. It looks like this:
The backdoor program has a built-in keyword list containing names of people or opera movies to communicate with C2, which distributes control commands to further control the victim’s computer device. Investigations suggested that the attack is being carried out by Molerats.
The IP address (198[.]54[.]117[.]244) that took over the C2 domain name is bound with a large number of malicious domain names, and is not controlled by the threat actors currently.
Impact
System Compromise
Malware Infection
Indicators of Compromise
IP(s) / Hostname(s)
198[.]54[.]117[.]244
URLs
smartweb9[.]com
Filename
- 1.doc
- HelpPane.exe
- 02ded0222bde1e7584fd9f3058aa71ade9fbe881b57e546c599fd955eef1718c.sample
Malware Hash (MD5/SHA1/SH256)
- 02ded0222bde1e7584fd9f3058aa71ade9fbe881b57e546c599fd955eef1718c
- 063a50e5e4b4d17a23ac8c8b33501719
- 46173adc26721fb54f6e1a1091a892d4
Remediation
- Block the threat indicators at their respective controls.
- Spread awareness about Phishing attacks in your organization.
- Do not open unexpected emails even if they look harmless.
- Do not download document files attached in emails from unknown sources and strictly refrain from enabling macros when the source isn’t reliable.