• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Advisory – CVE-2019-6534 AVEVA Uncontrolled Search Path Element Vulnerability
March 21, 2019
Rewterz Threat Alert – CVE-2018-20250 JNEC. A Ransomware Delivered Through WinRAR Exploit
March 21, 2019

Rewterz Threat Alert – Ransomware LockerGoga Hits HYDRO via Active Directory

March 21, 2019

Severity

High

Analysis Summary

Hydro a  Norwegian aluminium manufacturer company has been hit by lockergoga ransomware attack which appeared to be “slow and sloppy” according to the company officials. After enumerating files on the system, the malware would invoke a separate process for each file to be encrypted. Encrypted files had a “.locked” extension added to the file’s name. They also indicated that the malware did not appear to have any evasion techniques, although it was digitally signed by a valid certificate (the certificate has since been revoked).

The message is shown after the file encryption. 

Hydro Hit by LockerGoga Ransomware via Active Directory

Impact

Malware infection

Indicators of Compromise

Email Address abbschevis@protonmail.com
asuxidoruraep1999@o2.pl
couwetizotofo@o2.pl
dharmaparrack@protonmail.com
ijuqodisunovib98@o2.pl
romanchukeyla@protonmail.com
suzumcpherson@protonmail.com
wyattpettigrew8922555@mail.com
Malware Hash (MD5/SHA1/SH256) 750f943fd8f57b6ebbbace17cb4ced03
758dc3049ca9c341c467bf7584fea77d
7875cbf4a0d2bf8dcfc3e8050d9155d7
989c5454046d063763761caf32d530cc
baeab56fc43111e778df3bb41ed018c4
e11502659f6b5c5bd9f78f534bc38fea
e9cf132ec4ae53fd577acd75d0f2f2fd
16bcc3b7f32c41e7c7222bf37fe39fe6
b5fd5c913de8cbb8565d3c7c67c0fbaa4090122b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Remediation

  • Block threat indicators at your respective controls.
  • Keep systems/ applications  at current released patched levels.
  • Search for these IOC’s in your environment.
  • Ensure anti virus files and software associated with are up to date.
  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.