id
int64
1
14.4k
text
stringlengths
3
5.01k
entities
list
relations
list
Comments
list
23
Please mark, I'm not a robot!
[]
[]
[]
3,518
The trigger format is: %system32/rundll32.exe <PROTUX file name> <export name>.
[ { "id": 49303, "label": "FILEPATH", "start_offset": 23, "end_offset": 45 } ]
[]
[]
9,530
Gh0st RAT
[ { "id": 29237, "label": "malware", "start_offset": 0, "end_offset": 9 } ]
[]
[]
14,112
Other public references also used the compiled binary time of samples attributed to APT37.
[ { "id": 48180, "label": "threat-actor", "start_offset": 84, "end_offset": 89 } ]
[]
[]
4,542
In the modern world, we must be able to trust the devices we use every day and ensure that foreign adversaries do not have access to sophisticated exploits.
[]
[]
[]
4,818
Consistent with CERT-UA reporting, TAG observed multiple Russian GRU actors - APT28 and Sandworm - conduct campaigns exploiting the Follina vulnerability.
[ { "id": 50750, "label": "identity", "start_offset": 35, "end_offset": 38 }, { "id": 50751, "label": "identity", "start_offset": 57, "end_offset": 75 }, { "id": 50752, "label": "threat-actor", "start_offset": 78, "end_offset": 83 }, { "id": 50753, "label": "threat-actor", "start_offset": 88, "end_offset": 96 }, { "id": 50749, "label": "identity", "start_offset": 16, "end_offset": 23 }, { "id": 50754, "label": "vulnerability", "start_offset": 132, "end_offset": 153 } ]
[ { "id": 1006, "from_id": 50753, "to_id": 50754, "type": "exploits" }, { "id": 1007, "from_id": 50752, "to_id": 50754, "type": "exploits" } ]
[]
1,470
For security reasons we are not posting the names of any of these apps.
[]
[]
[]
2,737
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[]
[]
[]
9,054
RATANKBA host manipulation console RATANKBA’s controllers use the “Nimo Software HTTP Retriever 1.0” user-agent string for its communication.
[ { "id": 27961, "label": "malware", "start_offset": 0, "end_offset": 8 }, { "id": 27962, "label": "location", "start_offset": 9, "end_offset": 13 }, { "id": 27963, "label": "malware", "start_offset": 35, "end_offset": 43 } ]
[]
[]
234
We monitored a list of 50 legitimate Ukraine-related domains (e.g., popular news and donation websites) and keywords (e.g., Ukraine, refugee) as targets for cybersquatting.
[ { "id": 45781, "label": "location", "start_offset": 125, "end_offset": 132 }, { "id": 45934, "label": "location", "start_offset": 38, "end_offset": 45 }, { "id": 44651, "label": "attack-pattern", "start_offset": 158, "end_offset": 172 } ]
[ { "id": 137, "from_id": 44651, "to_id": 45781, "type": "targets" } ]
[]
4,474
Other reporting from Microsoft has linked this spyware to the compromise of dozens of victims, including political dissidents, human rights activists, journalists, and academics.
[ { "id": 50270, "label": "identity", "start_offset": 21, "end_offset": 30 } ]
[]
[]
5,706
Figure 2. Fake installation pop-up The third attack vector used by Earth Lusca is the exploitation of vulnerabilities that exist in the public-facing applications — such as Microsoft Exchange ProxyShell and Oracle GlassFish — of its targets.
[ { "id": 17601, "label": "location", "start_offset": 33, "end_offset": 36 }, { "id": 17603, "label": "tools", "start_offset": 61, "end_offset": 67 }, { "id": 17604, "label": "threat-actor", "start_offset": 76, "end_offset": 87 }, { "id": 17605, "label": "location", "start_offset": 145, "end_offset": 151 }, { "id": 17607, "label": "location", "start_offset": 192, "end_offset": 200 }, { "id": 17609, "label": "location", "start_offset": 212, "end_offset": 215 } ]
[]
[]
5,148
I need a loaf of bread.
[]
[]
[]
3,367
Python.BIOPASS.A
[ { "id": 48985, "label": "malware", "start_offset": 0, "end_offset": 16 } ]
[]
[]
5,360
The content of /proc/mtd for an Asus RT-AC68U device is as follows: Figure 7.
[ { "id": 51364, "label": "FILEPATH", "start_offset": 15, "end_offset": 24 } ]
[]
[]
10,303
Troj.Win32.TRX.XXPE50FFF039 50b000a7d61885591ba4ec9df1a0a223dbceb1ac2facafcef3d65c8cbbd64d46 email.exe
[ { "id": 31452, "label": "SHA2", "start_offset": 29, "end_offset": 93 } ]
[]
[]
3,578
The watermarking technique is implemented through the module attributes of the assembly.
[]
[]
[]
5,065
Once a user provides credentials in the dialog, they are posted to an attacker controlled domain.
[]
[]
[]
11,128
For example in 2017, our Security Reliability Engineering team measured a record-breaking UDP amplification attack sourced out of several Chinese ISPs (ASNs 4134, 4837, 58453, and 9394), which remains the largest bandwidth attack of which we are aware.
[ { "id": 34002, "label": "attack-pattern", "start_offset": 94, "end_offset": 107 }, { "id": 34005, "label": "location", "start_offset": 163, "end_offset": 167 }, { "id": 34007, "label": "location", "start_offset": 176, "end_offset": 179 }, { "id": 34008, "label": "location", "start_offset": 242, "end_offset": 245 } ]
[]
[]
11,504
In addition to including phishing links directly in the email, the attackers also link to PDFs and/or DOCs, hosted on Google Drive and Microsoft One Drive, that contain a link to an attacker-controlled phishing domain.
[ { "id": 35193, "label": "attack-pattern", "start_offset": 25, "end_offset": 33 }, { "id": 35195, "label": "location", "start_offset": 131, "end_offset": 134 }, { "id": 35197, "label": "attack-pattern", "start_offset": 202, "end_offset": 210 } ]
[]
[]
14,375
One messy reality is that enterprises don’t manage all their endpoints.
[]
[]
[]
13,713
Indicators of compromise (IOCs) Threat actor-managed C&C URLs: https://highstreetmuch[.]xyz/hug/gate[.]php https://takeusall[.]online/benzz/gate[.]PHP MITRE ATT&CK® Matrix Tags Cloud | APT & Targeted Attacks | Research | Phishing | Articles, News, Reports
[ { "id": 51760, "label": "URL", "start_offset": 64, "end_offset": 107 }, { "id": 51761, "label": "URL", "start_offset": 108, "end_offset": 151 } ]
[]
[]
1,821
We noted that it can disable a number of antivirus products, previously identified by Aon’s researchers.
[ { "id": 45143, "label": "identity", "start_offset": 86, "end_offset": 103 } ]
[]
[]
11,724
Trojan.W97M.SIDEWINDER.A AB7C1967BF1FEFDFFDE93626B78EB30994655AB02F59E0ADB0935E3E599A953F RTF file Trojan.W97M.SIDEWINDER.A 2548A819E4C597BA5958D2D18BAA544452948E5B00271570192CCD79ABE88E8D 1.a JS file Trojan.JS.SIDEWINDER.A Downloader.
[ { "id": 36129, "label": "SHA2", "start_offset": 29, "end_offset": 93 }, { "id": 36130, "label": "SHA2", "start_offset": 134, "end_offset": 198 } ]
[]
[]
9,375
Figure 7. gooogle[.]press registration info
[]
[]
[]
5,468
However, we construe them to be different groups, possibly within the same community, with different objectives and modi operandi.
[]
[]
[]
1,011
Figure 4:
[]
[]
[]
6,567
A rough translation of this message is as follows: “Fxxk, when I am released, the server is offline, I can’t find the machine, the domain is expired, it is so bad.
[]
[]
[]
4,496
Last year, TAG identified an ongoing campaign targeting security researchers working on vulnerability research and development at different companies and organizations.
[ { "id": 50298, "label": "identity", "start_offset": 11, "end_offset": 14 } ]
[]
[]
376
Palo Alto Networks strongly advises organizations to patch immediately.
[ { "id": 46073, "label": "identity", "start_offset": 0, "end_offset": 18 } ]
[]
[]
5,344
Finally, a variable containg the next time a packet should be sent is updated and all of the parameters are sent to the modules again.
[]
[]
[]
3,305
If the value of the “type” argument is “Chrome”, it will use the AES secret key or DPAPI (for Chrome versions before 80) to decrypt the cookie file.
[ { "id": 48388, "label": "SOFTWARE", "start_offset": 94, "end_offset": 100 } ]
[]
[]
1,070
The particular vulnerability in question affects an Android feature known as “Toast.” “Toast” is a type of notification window that “pops” (like toast) on the screen.
[ { "id": 46555, "label": "SOFTWARE", "start_offset": 53, "end_offset": 60 } ]
[]
[]
5,541
In a separate attack, 962 online stores were hit in just 24 hours.
[]
[]
[]
13,051
In this blog, Trend Micro shares security recommendations for organizations to ensure stable security practices in a cloud-first world.
[]
[]
[]
2,974
For most, it’s something they set up once and forget about.
[]
[]
[]
13,154
We found the group was focused on stealing defense-, ocean-, and ship-related documents from target networks, which led us to believe that Tropic Trooper’s main purpose is to exfiltrate confidential information or intelligence.
[ { "id": 48938, "label": "threat-actor", "start_offset": 139, "end_offset": 152 } ]
[]
[]
4,301
Trend Micro Solutions Patchwork uses email as an entry point, which is why securing the email gateway is important.
[ { "id": 50095, "label": "identity", "start_offset": 0, "end_offset": 11 }, { "id": 50096, "label": "threat-actor", "start_offset": 22, "end_offset": 31 } ]
[]
[]
3,830
If Koadic finds that the system is conducive to the attacker’s interests, it downloads a base64-encrypted version of the ANEL malware from the Command-and-Control (C&C) server and executes it. Encrypted ANEL is decrypted using the “certutil -docode” command.
[ { "id": 11615, "label": "malware", "start_offset": 121, "end_offset": 125 }, { "id": 11618, "label": "malware", "start_offset": 204, "end_offset": 208 }, { "id": 49688, "label": "malware", "start_offset": 3, "end_offset": 9 } ]
[ { "id": 859, "from_id": 49688, "to_id": 11615, "type": "downloads" } ]
[]
928
While ransomware is a large problem for users, it’s important to realize that not all malware families are created equal.
[]
[]
[]
1,229
This separation of functions may be intended to avoid detection by security products.
[]
[]
[]
10,152
In the week of the 2017 presidential elections in Iran, Pawn Storm set up a phishing site targeting chmail.ir webmail users.
[ { "id": 30971, "label": "attack-pattern", "start_offset": 76, "end_offset": 84 } ]
[]
[]
4,703
Our Threat Analysis Group, or TAG, is dedicated to protecting users from threats posed by state-sponsored malware attacks and other advanced persistent threats.
[ { "id": 50590, "label": "identity", "start_offset": 4, "end_offset": 25 }, { "id": 50591, "label": "identity", "start_offset": 30, "end_offset": 33 } ]
[]
[]
2,062
A further account, l4cky-control, was also discovered.
[ { "id": 47154, "label": "identity", "start_offset": 19, "end_offset": 32 } ]
[]
[]
10,068
We also noticed the presence of an APK file hosted in one of the servers, suggesting that if the cybercriminals decide to go further than just infecting servers, they may decide to attack Android-based devices.
[ { "id": 30709, "label": "identity", "start_offset": 138, "end_offset": 142 }, { "id": 30710, "label": "location", "start_offset": 167, "end_offset": 170 } ]
[]
[]
8,660
Related IOCs
[]
[]
[]
10,557
We’ve also seen attackers try to trick people into downloading malware by impersonating health organizations: Generally, we’re not seeing an overall rise in phishing attacks by government-backed groups; this is just a change in tactics.
[ { "id": 32188, "label": "location", "start_offset": 141, "end_offset": 148 }, { "id": 32189, "label": "attack-pattern", "start_offset": 157, "end_offset": 165 }, { "id": 32190, "label": "identity", "start_offset": 211, "end_offset": 215 } ]
[]
[]
1,600
Based on the reviews, the application does not function very well as a remote, but in reality it doesn’t contain remote control capability.
[]
[]
[]
9,728
Enterprises can benefit from Trend Micro’s Smart Protection Suites with XGen™ security, which infuses high-fidelity machine learning into a blend of threat protection techniques to eliminate security gaps across any user activity and any endpoint. Indicators of Compromise (IoCs) C&C servers Ssl[.]arkouthrie[.]com s3[.]hiahornber[.]com widget[.]shoreoa[.]com SHA256 Delivery document (W2KM_OCEANLOTUS.A): 2bb855dc5d845eb5f2466d7186f150c172da737bfd9c7f6bc1804e0b8d20f22a Dropper (OSX_OCEANLOTUS.D): 4da8365241c6b028a13b82d852c4f0155eb3d902782c6a538ac007a44a7d61b4 Backdoor (OSX_OCEANLOTUS.D): 673ee7a57ba3c5a2384aeb17a66058e59f0a4d0cddc4f01fe32f369f6a845c8f Tags Malware | APT & Targeted Attacks | Endpoints | Research | Network
[ { "id": 29662, "label": "location", "start_offset": 13, "end_offset": 16 }, { "id": 29666, "label": "location", "start_offset": 79, "end_offset": 87 }, { "id": 29667, "label": "location", "start_offset": 108, "end_offset": 116 }, { "id": 29668, "label": "location", "start_offset": 157, "end_offset": 167 }, { "id": 29669, "label": "location", "start_offset": 192, "end_offset": 200 }, { "id": 29670, "label": "location", "start_offset": 231, "end_offset": 234 }, { "id": 29671, "label": "SHA2", "start_offset": 414, "end_offset": 478 }, { "id": 29672, "label": "tools", "start_offset": 488, "end_offset": 504 }, { "id": 29673, "label": "SHA1", "start_offset": 507, "end_offset": 571 }, { "id": 29674, "label": "tools", "start_offset": 582, "end_offset": 598 }, { "id": 29675, "label": "SHA1", "start_offset": 601, "end_offset": 665 }, { "id": 29676, "label": "location", "start_offset": 693, "end_offset": 696 } ]
[]
[]
8,823
In the threat actor toolkit, different types of attacks are used for different purposes: Phishing campaigns can be used like a scalpel—targeting specific groups or individuals with personalized lures that are more likely to trick them into taking action (like clicking on a malware link), while DDoS attacks are more like a hatchet—disrupting or blocking a site or a service entirely.
[ { "id": 27325, "label": "location", "start_offset": 56, "end_offset": 59 }, { "id": 27326, "label": "attack-pattern", "start_offset": 89, "end_offset": 97 }, { "id": 27327, "label": "location", "start_offset": 108, "end_offset": 111 }, { "id": 27328, "label": "location", "start_offset": 205, "end_offset": 208 }, { "id": 27329, "label": "location", "start_offset": 214, "end_offset": 220 }, { "id": 27330, "label": "location", "start_offset": 230, "end_offset": 234 }, { "id": 27331, "label": "location", "start_offset": 247, "end_offset": 253 }, { "id": 27332, "label": "location", "start_offset": 308, "end_offset": 311 } ]
[]
[]
11,497
TAG has also observed an increasing number of financially motivated actors targeting Ukraine.
[]
[]
[]
9,407
Collection Data from Local System T1533 Used to collect files from the device, including documents, photos, and media files
[ { "id": 28956, "label": "attack-pattern", "start_offset": 11, "end_offset": 33 }, { "id": 28957, "label": "location", "start_offset": 108, "end_offset": 111 }, { "id": 28958, "label": "location", "start_offset": 113, "end_offset": 118 } ]
[]
[]
2,365
For those interested in following our in-the-wild work, we will soon publish details surrounding another, unrelated campaign we discovered using two Chrome 0-days (CVE-2021-37973 and CVE-2021-37976).
[ { "id": 47418, "label": "vulnerability", "start_offset": 183, "end_offset": 197 }, { "id": 47419, "label": "SOFTWARE", "start_offset": 149, "end_offset": 155 }, { "id": 47417, "label": "vulnerability", "start_offset": 164, "end_offset": 178 } ]
[ { "id": 319, "from_id": 47419, "to_id": 47417, "type": "has" }, { "id": 320, "from_id": 47419, "to_id": 47418, "type": "has" } ]
[]
1,718
These many C2 mechanisms make Dyre much more difficult to fully take down than a simple single (or small group) of C2s.
[ { "id": 46893, "label": "malware", "start_offset": 30, "end_offset": 34 } ]
[]
[]
316
If your administrators and help desk are the only ones who need RDP access to your systems, disable RDP for the rest of your users.
[ { "id": 46013, "label": "SOFTWARE", "start_offset": 100, "end_offset": 103 }, { "id": 46012, "label": "SOFTWARE", "start_offset": 64, "end_offset": 67 } ]
[]
[]
1,510
This is an ELF file and there are various encrypted portions within it.
[]
[]
[]
9,795
Indicators of Compromise SHA256 Type Detection Name 41ee0ab77b474b0c84a1c25591029533f058e4454d9f83ba30159cc6309c65d1
[ { "id": 29845, "label": "location", "start_offset": 33, "end_offset": 37 }, { "id": 29846, "label": "SHA2", "start_offset": 53, "end_offset": 117 } ]
[]
[]
9,583
The browser then navigates to Gmail to begin the data collection.
[]
[]
[]
13,590
Note that the PHP code below is obfuscated.
[]
[]
[]
1,646
Many of the users who downloaded the tool may not be using one of the targeted Spanish or Australian networks.
[]
[]
[]
510
This demonstrates the diversity of ransomware and emphasizes how difficult it is to expand ransomware detection coverage with static profiling.
[]
[]
[]
6,803
If, however, these lines do not pass through this IF statement, an error would occur.
[]
[]
[]
3,826
Variable}.registry.HKCU Set HKEY_CURRENT_USER {Variable}.registry.HKLM Set HKEY_LOCAL_MACHINE {Variable}.registry.STRING Set String Value {Variable}.registry.BINARY Set Binary Value {Variable}.registry.DWORD Set DWORD Value {Variable}.registry.QWORD
[]
[]
[]
14,071
Figure 9 shows that SLUB used “Windows-RT-KB-2937636.dll,” while Freenki used “Windows-KB275122-x86.exe.” Figure 9 Naming convention for persistence.
[ { "id": 47392, "label": "FILEPATH", "start_offset": 79, "end_offset": 103 }, { "id": 47389, "label": "FILEPATH", "start_offset": 31, "end_offset": 56 }, { "id": 47395, "label": "malware", "start_offset": 65, "end_offset": 73 }, { "id": 43549, "label": "malware", "start_offset": 20, "end_offset": 24 } ]
[ { "id": 316, "from_id": 43549, "to_id": 47389, "type": "uses" }, { "id": 317, "from_id": 47395, "to_id": 47392, "type": "uses" } ]
[]
7,502
The configuration portion of the PowerShell script
[ { "id": 23343, "label": "attack-pattern", "start_offset": 33, "end_offset": 43 } ]
[]
[]
9,306
Credit card CVN number cc_first_name ff First name of cardholder cc_last_name gg Last name of cardholder bill_to_phone hh Phone number for billing bill_to_country ii
[]
[]
[]
8,109
Figure 4. Two-stage payload deployment Figure 5. Code showing how the dropper invokes extra DEX code To deploy the payload app callCam on the device without the user’s awareness
[ { "id": 25125, "label": "malware", "start_offset": 129, "end_offset": 136 } ]
[]
[]
13,101
That resulted in our collaboration to develop secure network guidelines for industrial robots using ROS.
[]
[]
[]
3,376
BIOPASS RAT Loader Backdoor.
[ { "id": 10222, "label": "malware", "start_offset": 0, "end_offset": 11 } ]
[]
[]
4,089
Furthermore, when Lilith RAT is terminated, it will try to clean itself to prevent being found by investigators.
[ { "id": 49923, "label": "malware", "start_offset": 18, "end_offset": 28 } ]
[]
[]
11,313
Like much of their tooling, HYPERSCRAPE is not notable for its technical sophistication, but rather its effectiveness in accomplishing Charming Kitten’s objectives.
[ { "id": 34577, "label": "location", "start_offset": 5, "end_offset": 9 }, { "id": 34579, "label": "threat-actor", "start_offset": 135, "end_offset": 150 } ]
[]
[]
3,801
It also abuses three legitimate MS Office functions:
[ { "id": 49673, "label": "SOFTWARE", "start_offset": 32, "end_offset": 41 } ]
[]
[]
12,088
Android App: https://www.virustotal.com/gui/file/5d3ff202f20af915863eee45916412a271bae1ea3a0e20988309c16723ce4da5/detection Android App C2: communication-shield[.]site cdsa[.]xyz
[]
[]
[]
14,087
Even when the threat actor was not using the “JSON” format, the commands embedded in the various samples show a surprising amount of similarities.
[]
[]
[]
11,264
Collect files Collects the specified file from an endpoint during an investigation Submit a file for sandbox analysis Submits a file to the Trend Micro Vision One sandbox for automated analysis Retrieve sandbox analysis report Retrieves the analysis report, IOCs, or artifacts available after automated analysis Quarantine email message
[]
[]
[]
7,118
We provided a detailed analysis of this new HyperBro version in our research.
[ { "id": 22273, "label": "malware", "start_offset": 44, "end_offset": 52 } ]
[]
[]
1,741
Attackers send emails that appear to be from a person or company that you trust.
[]
[]
[]
8,270
The payload was still njRAT.
[ { "id": 25528, "label": "malware", "start_offset": 22, "end_offset": 27 } ]
[]
[]
6,525
مکتبة إلکترونیة.pdf 70cab18770795ea23e15851fa49be03314dc081fc44cdf76e8f0c9b889515c1b Trojan.
[ { "id": 20233, "label": "SHA1", "start_offset": 20, "end_offset": 84 } ]
[]
[]
3,866
Figure 15. Koadic’s communication traffic Medium- to long-term mitigation
[ { "id": 49726, "label": "malware", "start_offset": 12, "end_offset": 18 } ]
[]
[]
727
The open-source OMI package is designed to provide a portable infrastructure backbone for web-based management tools, such as diagnostic monitoring, log analytic services and automation functionality within UNIX and Linux systems.
[ { "id": 46299, "label": "SOFTWARE", "start_offset": 207, "end_offset": 211 }, { "id": 46301, "label": "SOFTWARE", "start_offset": 16, "end_offset": 27 }, { "id": 46300, "label": "SOFTWARE", "start_offset": 216, "end_offset": 221 } ]
[]
[]
4,732
TAG also recently released information on a segment of attackers we call “hack-for-hire” that focuses on compromising accounts and exfiltrating data as a service.
[ { "id": 50640, "label": "attack-pattern", "start_offset": 74, "end_offset": 87 }, { "id": 50641, "label": "attack-pattern", "start_offset": 131, "end_offset": 161 }, { "id": 50639, "label": "identity", "start_offset": 0, "end_offset": 3 } ]
[]
[]
3,229
The third scheduled task —is called “big.txt”— is responsible for implementing the BIOPASS RAT malware.
[ { "id": 48350, "label": "FILEPATH", "start_offset": 37, "end_offset": 44 }, { "id": 9841, "label": "attack-pattern", "start_offset": 10, "end_offset": 24 }, { "id": 9842, "label": "malware", "start_offset": 83, "end_offset": 94 } ]
[]
[]
3,258
Encoded “join” event sent to the C&C server Figure 19.
[]
[]
[]
6,220
The email exfiltration flow with WebSocket backdoor Figure 14.
[]
[]
[]
9,097
Lurk compromised systems by exploiting web browser vulnerabilities via drive-by download attacks.
[ { "id": 28092, "label": "malware", "start_offset": 0, "end_offset": 4 } ]
[]
[]
14,010
When determining attribution, the most interesting leads are the ones that can deduce information about the malware author’s working environment.
[]
[]
[]
12
If you re-test these hashes again from last week you can see an average of 49/57 engines that detect last week’s threat – but that’s too little, too late for anyone who already lost data.
[]
[]
[]
2,018
There are also no magic bytes within the packed payload, unlike UPX-packed binaries, which contain the magic bytes UPX!.
[ { "id": 47116, "label": "tools", "start_offset": 64, "end_offset": 67 } ]
[]
[]
9,800
Given their targets, we have named this campaign “Operation ENDTRADE,” and identified some of the findings in our research “Operation ENDTRADE: TICK’s Multi-Stage Backdoors for Attacking Industries and Stealing Classified Data”.
[ { "id": 29868, "label": "location", "start_offset": 0, "end_offset": 5 }, { "id": 29869, "label": "location", "start_offset": 40, "end_offset": 48 }, { "id": 29870, "label": "location", "start_offset": 71, "end_offset": 74 }, { "id": 29871, "label": "threat-actor", "start_offset": 144, "end_offset": 148 }, { "id": 29872, "label": "location", "start_offset": 198, "end_offset": 201 } ]
[]
[]
2,188
By doing this, they were able to target organizations that relied on the distributor’s security camera solution and infect their systems with malware.
[]
[]
[]
2,181
Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[]
[]
[]
5,260
The apps mainly used Middle East-based news and sociopolitical themes as social engineering hooks and abused social media to further proliferate.
[ { "id": 51300, "label": "attack-pattern", "start_offset": 73, "end_offset": 91 }, { "id": 51301, "label": "attack-pattern", "start_offset": 102, "end_offset": 121 } ]
[]
[]
13,834
In the end, it returns the modified table.
[]
[]
[]
3,855
It also downloads the following: Accevent.exe <-> Microsoft Accessible Event Watcher 7.2.0.0 event.dll <-> the loader of ssssss.ddd, (Detected as TROJ_ANELLDR) ssssss.ddd (lena_http.bin) <-> encrypted BKDR_ANEL (Detected as BKDR_ANELENC)
[ { "id": 49708, "label": "FILEPATH", "start_offset": 161, "end_offset": 171 }, { "id": 49711, "label": "malware", "start_offset": 225, "end_offset": 237 }, { "id": 49705, "label": "FILEPATH", "start_offset": 34, "end_offset": 46 }, { "id": 49706, "label": "FILEPATH", "start_offset": 94, "end_offset": 103 }, { "id": 49707, "label": "FILEPATH", "start_offset": 122, "end_offset": 132 }, { "id": 49709, "label": "FILEPATH", "start_offset": 173, "end_offset": 186 }, { "id": 49710, "label": "malware", "start_offset": 202, "end_offset": 211 }, { "id": 49712, "label": "malware", "start_offset": 147, "end_offset": 159 }, { "id": 49713, "label": "SOFTWARE", "start_offset": 51, "end_offset": 93 } ]
[]
[]
12,283
Host IOCs Registry Keys HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\KernelConfig HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DriverConfig HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SSL Update File Paths C:\Windows\System32\Nwsapagent.sys C:\Windows\System32\helpsvc.sys C:\ProgramData\USOShared\uso.bin C:\ProgramData\VMware\vmnat-update.bin C:\ProgramData\VirtualBox\update.bin
[ { "id": 38092, "label": "location", "start_offset": 0, "end_offset": 4 }, { "id": 38093, "label": "REGISTRYKEY", "start_offset": 24, "end_offset": 83 }, { "id": 38094, "label": "REGISTRYKEY", "start_offset": 84, "end_offset": 143 }, { "id": 38095, "label": "REGISTRYKEY", "start_offset": 144, "end_offset": 198 } ]
[]
[]
10,222
The RATs were also sent to a wider net of targets including various industries around the world.
[ { "id": 31229, "label": "malware", "start_offset": 35, "end_offset": 38 }, { "id": 31230, "label": "location", "start_offset": 90, "end_offset": 95 } ]
[]
[]
10,767
It provides a comprehensive defense tailored to protect organizations against targeted attacks and advanced threats through specialized engines, custom sandboxing, and seamless correlation across the entire attack lifecycle, allowing it to detect threats like REDBALDKNIGHT’s attacks even without any engine or pattern update.
[ { "id": 32911, "label": "location", "start_offset": 95, "end_offset": 98 }, { "id": 32912, "label": "location", "start_offset": 164, "end_offset": 167 }, { "id": 32913, "label": "threat-actor", "start_offset": 260, "end_offset": 273 } ]
[]
[]
4,393
In the version tested, the C2 was unobfuscated and stored as a hardcoded string.
[]
[]
[]
4,120
Opens command shell 0x5007 Unknown 0x5009 Closes command shell 0x500A
[]
[]
[]