Rewterz Threat Advisory – CVE-2023-25805 – Node.js versionn module Vulnerability
February 22, 2023Rewterz Threat Alert – “Stealc” – An Information Stealer Malware Found in Several Instances in the Wild – Active IOCs
February 22, 2023Rewterz Threat Advisory – CVE-2023-25805 – Node.js versionn module Vulnerability
February 22, 2023Rewterz Threat Alert – “Stealc” – An Information Stealer Malware Found in Several Instances in the Wild – Active IOCs
February 22, 2023Severity
Medium
Analysis Summary
The malware loader, Bumblebee, is used to download Cobalt Strike and perhaps other malware such as ransomware. It also replaces the BazarLoader backdoor, which is previously used to transmit ransomware payloads. This new malware is linked to a number of threat actors, including several well-known ransomware.
According to researchers, the appearance of Bumblebee in phishing attempts in March correlates with a drop in the use of BazarLoader for distributing file-encrypting malware.
Bumblebee is distributed in the form of ISO files that contain malicious DLL and shortcut files. It employs different techniques to avoid detection. It can determine virtualization environment processes to prevent operating on virtual machines. Banking information, password, and identity theft are the main impact of this malware.
Bumblebee malware is designed to download and run additional payloads in order to infect computers with other malware. Bumblebee can be used to inject information stealers, cryptocurrency miners, and other malware since it is designed to drop extra payloads. The C2 (Command and Control) server is where Bumblebee gets commands. It is used by attackers to download and execute files directly, inject malicious DLLs, and create operating system persistence. This new malware is linked to a number of threat actors, including several well-known ransomware
Impact
- Credential Theft
- Financial Loss
- Sensitive Data Exposure
Indicators of Compromise
IP
- 108.62.141.20
- 104.168.140.145
- 51.68.145.171
- 108.62.118.170
- 192.119.72.133
- 23.108.57.201
MD5
- 6e4e21b15f5c27ca82b7934fa6544c5d
- 323ee7e3d79671befe72fe6f79f0f6b3
- 5ac5d2bfb46d310338ad8bb70a0b562d
SHA-256
- 897e53b648020ab28663240bbbce54546cf6f55b35019fd4aa2a209c4a3b1832
- 91e43c044fdcad13a25d772b91065f78ac7a809a57ace84a4606c4c3e92afaa2
- 05aa0587937c153ffbd573c6ba35a446e7c9eae62a39308d6e800e127156c468
SHA-1
- f78efb588be3ca19966f3b46dbdb2d98b44de408
- 2442ca895275f9a4bda44c18273ad6b8d6815780
- bf07b0e67bb50fec99ff89b17ec6d4f8a19a57e0
Remediation
- Emails from unknown senders should always be treated with caution.
- Never trust or open ” links and attachments received from unknown sources/senders.
- Block all threat indicators at your respective controls.
- Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls
- ?Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.