id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
1,315 | PlugX file uses Symantec logo icon. | [
{
"id": 3983,
"label": "malware",
"start_offset": 0,
"end_offset": 5
},
{
"id": 46668,
"label": "identity",
"start_offset": 16,
"end_offset": 24
}
] | [] | [] |
1,316 | Upon execution, the malware will install itself as a service with the following parameters: It may also set the following registry key for persistence: | [] | [] | [] |
1,317 | PlugX is a well-studied malware family with a long history of use in targeted attacks. | [
{
"id": 44968,
"label": "malware",
"start_offset": 1,
"end_offset": 6
}
] | [] | [] |
1,318 | More information on its history is available at the following links. | [] | [] | [] |
1,319 | FormerFirstRAT This remote administration tool (RAT) is referred to as “FormerFirstRAT” by its authors. | [
{
"id": 3989,
"label": "malware",
"start_offset": 1,
"end_offset": 15
},
{
"id": 3992,
"label": "malware",
"start_offset": 74,
"end_offset": 88
}
] | [] | [] |
1,320 | FormerFirstRAT communicates using unencrypted HTTP over port 443; the use of mismatching ports and communication protocols is not uncommon in targeted attack campaigns. | [
{
"id": 3993,
"label": "malware",
"start_offset": 0,
"end_offset": 14
},
{
"id": 46669,
"label": "campaign",
"start_offset": 142,
"end_offset": 167
}
] | [
{
"id": 210,
"from_id": 46669,
"to_id": 3993,
"type": "uses"
}
] | [] |
1,321 | In addition, port / protocol mis-match traffic can be an indicator of bad activity. | [] | [] | [] |
1,322 | When the malware starts, it writes the following registry key to ensure persistence: The malware then proceeds to send an HTTP POST request with information about the victim system. | [] | [] | [] |
1,323 | The following information is collected: | [] | [] | [] |
1,324 | The following settings are used for command and control: The malware encrypts network communication using the AES128 encryption cipher. | [] | [] | [] |
1,325 | It uses the MD5 of 'tucwatkins' in order to generate the key. | [] | [] | [] |
1,326 | All data is sent via HTTP POST requests. | [] | [] | [] |
1,327 | While not a distinct TTP, the author of this malware may be a soap-opera fan. | [] | [] | [] |
1,328 | The following code demonstrates how you can decrypt the malware communications using Python: The malware then enters a loop where it will send out periodic requests to the remote server. | [] | [] | [] |
1,329 | The remote server has the ability to respond and provide instructions to the RAT. | [] | [] | [] |
1,330 | We have identified the following functionalities: | [] | [] | [] |
1,331 | An example HTTP POST request can be seen below. NFlog When loaded inside of a running process, NFlog begins by spawning a new thread. | [
{
"id": 4011,
"label": "malware",
"start_offset": 50,
"end_offset": 55
},
{
"id": 4012,
"label": "malware",
"start_offset": 98,
"end_offset": 103
}
] | [] | [] |
1,332 | This new thread is responsible for all malicious activities produced by this DLL. | [] | [] | [] |
1,333 | Initially, the malware will set the following registry key: Where [current_executable_filename] is the path to the current running executable, which is acquired via a call to GetModuleFileNameA. | [] | [] | [] |
1,334 | This registry key ensures that the malware will persist across reboots when the current user logs in. | [] | [] | [] |
1,335 | Multiple string obfuscation routines are included in this malware sample. | [] | [] | [] |
1,336 | Strings contained in the binary are decrypted via a simple binary XOR against a single byte key of 0x25. | [] | [] | [] |
1,337 | The malware proceeds to create a named event object of 'GoogleZCM' and uses this event in order to ensure only one instance of this malware is running at a given time. | [] | [] | [] |
1,338 | The malware proceeds to make an attempt at binding to the local host on port 1139. | [] | [] | [] |
1,339 | The malware attempts to ensure Internet connectivity by making a request to www.microsoft.com. | [
{
"id": 46670,
"label": "DOMAIN",
"start_offset": 77,
"end_offset": 94
}
] | [] | [] |
1,340 | An example request is shown below. | [] | [] | [] |
1,341 | Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! | [] | [] | [] |
1,342 | By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
1,343 | This post is also available in: 日本語 (Japanese) Beginning on Jan. 14, 2022, reports began emerging about a series of attacks targeting numerous Ukrainian government websites. | [
{
"id": 46672,
"label": "identity",
"start_offset": 149,
"end_offset": 169
},
{
"id": 46671,
"label": "TIME",
"start_offset": 66,
"end_offset": 79
}
] | [] | [] |
1,344 | As a result of these attacks, numerous government websites were found to be either defaced or inaccessible. | [] | [] | [] |
1,346 | A day later, public reporting outlined new malware called WhisperGate that originally was observed on Jan. 13, 2022. | [
{
"id": 46675,
"label": "TIME",
"start_offset": 102,
"end_offset": 115
},
{
"id": 46676,
"label": "malware",
"start_offset": 58,
"end_offset": 69
}
] | [] | [] |
1,347 | This malware disables Windows Defender Threat Protection, is destructive in nature and was discovered to have targeted multiple organizations in Ukraine. | [
{
"id": 44970,
"label": "SOFTWARE",
"start_offset": 22,
"end_offset": 56
},
{
"id": 44971,
"label": "location",
"start_offset": 145,
"end_offset": 152
}
] | [] | [] |
1,348 | Microsoft has publicly attributed the use of this custom malware to a threat actor they refer to as DEV-0586. | [
{
"id": 4045,
"label": "threat-actor",
"start_offset": 100,
"end_offset": 108
},
{
"id": 46677,
"label": "identity",
"start_offset": 0,
"end_offset": 9
}
] | [] | [] |
1,349 | Though both attacks have targeted Ukrainian organizations, the two threats have so far been implemented in separate situations. | [
{
"id": 46678,
"label": "identity",
"start_offset": 35,
"end_offset": 58
}
] | [] | [] |
1,350 | As a result of these events, Palo Alto Networks researchers took immediate action to ensure that customers anywhere in the world can be appropriately protected against these reported threats, however they may be exploited. | [
{
"id": 44972,
"label": "identity",
"start_offset": 30,
"end_offset": 48
}
] | [] | [] |
1,351 | These attacks ultimately resulted in the investigation of the following two threats: Palo Alto Networks customers can use Xpanse or Threat Prevention for the Next-Generation Firewall to identify vulnerable and/or internet-facing instances of OctoberCMS. | [
{
"id": 46679,
"label": "identity",
"start_offset": 86,
"end_offset": 104
},
{
"id": 46680,
"label": "SOFTWARE",
"start_offset": 123,
"end_offset": 129
},
{
"id": 46681,
"label": "SOFTWARE",
"start_offset": 133,
"end_offset": 150
},
{
"id": 46682,
"label": "SOFTWARE",
"start_offset": 243,
"end_offset": 253
}
] | [] | [] |
1,352 | Protections against WhisperGate malware have been included in Cortex XDR, as well as in the WildFire and Advanced URL Filtering subscriptions for the Next-Generation Firewall. | [
{
"id": 4060,
"label": "SOFTWARE",
"start_offset": 92,
"end_offset": 100
},
{
"id": 4058,
"label": "malware",
"start_offset": 20,
"end_offset": 31
},
{
"id": 46683,
"label": "SOFTWARE",
"start_offset": 62,
"end_offset": 72
}
] | [] | [] |
1,353 | There is a Cortex XSOAR pack available to assist with detecting and mitigating both threats. | [
{
"id": 44973,
"label": "SOFTWARE",
"start_offset": 11,
"end_offset": 23
}
] | [] | [] |
1,354 | CVE-2021-32648 Vulnerability WhisperGate Malware Family Mitigation Actions Hunting for WhisperGate Conclusion Additional Resources | [
{
"id": 46685,
"label": "malware",
"start_offset": 30,
"end_offset": 41
},
{
"id": 46684,
"label": "vulnerability",
"start_offset": 1,
"end_offset": 15
},
{
"id": 46686,
"label": "malware",
"start_offset": 88,
"end_offset": 99
}
] | [] | [] |
1,355 | The CVE-2021-32648 vulnerability lies within the OctoberCMS platform prior to version 1.0.472 and results in an attacker gaining access to any account via a specially crafted account password reset request. | [
{
"id": 46687,
"label": "vulnerability",
"start_offset": 5,
"end_offset": 19
},
{
"id": 46688,
"label": "SOFTWARE",
"start_offset": 50,
"end_offset": 60
}
] | [
{
"id": 211,
"from_id": 46688,
"to_id": 46687,
"type": "has"
}
] | [] |
1,356 | This vulnerability is believed to have allowed threat actors to gain access to the underlying websites leveraged by the Ukraine government. | [
{
"id": 44974,
"label": "identity",
"start_offset": 120,
"end_offset": 138
}
] | [] | [] |
1,357 | Once the vulnerability was discovered, Palo Alto Networks threat researchers quickly began reverse-engineering the patch that remediated this vulnerability and were able to produce a working proof of concept (PoC) in a very short time. | [
{
"id": 46689,
"label": "identity",
"start_offset": 40,
"end_offset": 58
}
] | [] | [] |
1,358 | Later that day, a public PoC surfaced, allowing organizations to better understand this vulnerability and how it is exploited. | [
{
"id": 4075,
"label": "TIME",
"start_offset": 0,
"end_offset": 14
}
] | [] | [] |
1,359 | Using our PoC, we created the following demonstration video of how a malicious actor would exploit the CVE-2021-32648 vulnerability, log into the compromised OctoberCMS account and to deface a web page hosted by the server: | [
{
"id": 44975,
"label": "vulnerability",
"start_offset": 103,
"end_offset": 117
},
{
"id": 44976,
"label": "SOFTWARE",
"start_offset": 158,
"end_offset": 168
}
] | [
{
"id": 49,
"from_id": 44976,
"to_id": 44975,
"type": "has"
}
] | [] |
1,360 | To determine how this vulnerability was exploited, we analyzed the patch that developers added to OctoberCMS version 1.0.472 to mitigate the CVE-2021-32648 vulnerability. | [
{
"id": 46690,
"label": "vulnerability",
"start_offset": 141,
"end_offset": 155
},
{
"id": 46692,
"label": "SOFTWARE",
"start_offset": 98,
"end_offset": 108
}
] | [
{
"id": 212,
"from_id": 46692,
"to_id": 46690,
"type": "has"
}
] | [] |
1,361 | We discovered that the vulnerable code existed in the Auth/Models/User.php file within the October Rain library of OctoberCMS. | [
{
"id": 46693,
"label": "FILEPATH",
"start_offset": 54,
"end_offset": 74
},
{
"id": 46694,
"label": "SOFTWARE",
"start_offset": 115,
"end_offset": 125
}
] | [] | [] |
1,362 | The code that exposes this vulnerability is within a function named checkResetPasswordCode, specifically, line 281 in User.php. | [
{
"id": 44977,
"label": "FILEPATH",
"start_offset": 118,
"end_offset": 126
}
] | [] | [] |
1,363 | The following line of code attempts to validate the inbound password reset request by comparing the reset code submitted within the HTTP request with the reset code generated by OctoberCMS during a legitimate reset process: To exploit this vulnerability, the actor would simply supply a boolean true value as the reset code within a custom-crafted HTTP request to reset the password of an account. | [
{
"id": 46695,
"label": "SOFTWARE",
"start_offset": 178,
"end_offset": 188
}
] | [] | [] |
1,364 | By supplying the boolean true, the comparison between boolean true and the reset code string results in a boolean true, even though the two variables have different types. | [] | [] | [] |
1,365 | This effectively validates the actor’s inbound password reset request, which allows the actor to then change the password To fix this vulnerability in version 1.0.472, the OctoberCMS developer changed the line of code above to use === instead of == when comparing the values of the reset code provided by the user via an HTTP POST request. | [
{
"id": 44978,
"label": "SOFTWARE",
"start_offset": 173,
"end_offset": 183
}
] | [] | [] |
1,366 | The difference between === and == involves the === comparing the value and type of value of the variable, not just the value, as happens when using ==. | [] | [] | [] |
1,367 | To demonstrate the difference, the following two commands run PHP code to show that a comparison of the string code with boolean true using == results in a boolean true, while the same comparison using === results in a boolean false: As a result of the analysis of the CVE-2021-32648 vulnerability, various product protections were created or enhanced. | [
{
"id": 46696,
"label": "vulnerability",
"start_offset": 270,
"end_offset": 284
}
] | [] | [] |
1,368 | More information about these protections can be found within the Mitigation Actions section of the briefing. | [] | [] | [] |
1,369 | First observed by Microsoft on Jan. 13, 2022, WhisperGate malware is computer network attack (CNA) malware aimed at deleting Microsoft Windows Defender and corrupting files on the target. | [
{
"id": 46699,
"label": "identity",
"start_offset": 19,
"end_offset": 29
},
{
"id": 46697,
"label": "SOFTWARE",
"start_offset": 126,
"end_offset": 152
},
{
"id": 46698,
"label": "TIME",
"start_offset": 32,
"end_offset": 45
},
{
"id": 46700,
"label": "malware",
"start_offset": 47,
"end_offset": 58
}
] | [] | [] |
1,370 | It consists of two samples: One appears as ransomware while the other is a beaconing implant used to deliver an in-memory Microsoft Intermediate Language (MSIL) payload. | [
{
"id": 4118,
"label": "identity",
"start_offset": 122,
"end_offset": 131
}
] | [] | [] |
1,371 | The in-memory code uses Living Off the Land Binaries (LOLBINs) to evade detection and also performs anti-analysis techniques, as it will fail to detonate when certain monitoring tools exist. | [
{
"id": 44979,
"label": "tools",
"start_offset": 24,
"end_offset": 62
}
] | [] | [] |
1,372 | At the time of writing, there are two known samples identified as WhisperGate: Stage1.exe and Stage2.exe. | [
{
"id": 46701,
"label": "malware",
"start_offset": 66,
"end_offset": 77
},
{
"id": 46702,
"label": "FILEPATH",
"start_offset": 79,
"end_offset": 89
},
{
"id": 46703,
"label": "FILEPATH",
"start_offset": 94,
"end_offset": 104
}
] | [] | [] |
1,373 | Stage1.exe purports to be ransomware, as it overwrites the target’s master boot record with 512 bytes and upon reboot displays the following ransom note: Stage2.exe is a beaconing implant that performs an HTTPS connection to download a JPG file hosted on Discord’s content delivery network (CDN). | [
{
"id": 46706,
"label": "FILEPATH",
"start_offset": 155,
"end_offset": 165
},
{
"id": 46707,
"label": "Infrastucture",
"start_offset": 256,
"end_offset": 296
},
{
"id": 46705,
"label": "FILEPATH",
"start_offset": 0,
"end_offset": 10
}
] | [
{
"id": 213,
"from_id": 46706,
"to_id": 46707,
"type": "beacons-to"
}
] | [] |
1,374 | Discord’s CDN is a user-created service that allows users to host attachments and is not malicious. | [
{
"id": 46708,
"label": "SOFTWARE",
"start_offset": 0,
"end_offset": 7
}
] | [] | [] |
1,375 | The hosted file is retrieved from the following URL: hxxps://cdn.discordapp[.]com/attachments/928503440139771947/930108637681184768/Tbopbh.jpg | [
{
"id": 46709,
"label": "URL",
"start_offset": 54,
"end_offset": 143
}
] | [] | [] |
1,376 | File Tbopbh.jpg is the malicious payload that is in-memory loaded and kicks off the destructive capabilities. | [
{
"id": 46710,
"label": "FILEPATH",
"start_offset": 5,
"end_offset": 15
}
] | [] | [] |
1,377 | The following patterns of activities are associated with this payload: 1. File InstallUtil.exe is copied to the host’s %TEMP% directory, e.g. C:\Users\[USERNAME]\AppData\Local\Temp. | [
{
"id": 44981,
"label": "FILEPATH",
"start_offset": 80,
"end_offset": 95
},
{
"id": 44983,
"label": "FILEPATH",
"start_offset": 120,
"end_offset": 126
},
{
"id": 44982,
"label": "FILEPATH",
"start_offset": 143,
"end_offset": 181
}
] | [] | [] |
1,378 | This file is a legitimate Microsoft Windows binary. | [
{
"id": 4137,
"label": "identity",
"start_offset": 26,
"end_offset": 35
}
] | [] | [] |
1,379 | Two instances of PowerShell are spawned with an encoded command to sleep for 10 seconds, e.g. C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMQAwAA== 3. | [
{
"id": 46711,
"label": "FILEPATH",
"start_offset": 94,
"end_offset": 151
},
{
"id": 46712,
"label": "tools",
"start_offset": 17,
"end_offset": 27
}
] | [] | [] |
1,380 | A Visual Basic Script (VBS) is created in C:\Users\[USERNAME]\AppData\Local\Temp named: Nmddfrqqrbyjeygggda.vbs 4. Process wscript.exe is used to execute the VBS script in step 3. | [
{
"id": 44985,
"label": "FILEPATH",
"start_offset": 88,
"end_offset": 111
},
{
"id": 44986,
"label": "FILEPATH",
"start_offset": 124,
"end_offset": 135
},
{
"id": 44984,
"label": "FILEPATH",
"start_offset": 42,
"end_offset": 80
}
] | [] | [] |
1,381 | The VBS script is used to call PowerShell to set Windows Defender exclusion path to C:\ e.g. C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath 'C:\' 5. AdvancedRun.exe is created and written to the C:\Users\[USERNAME]\AppData\Local\Temp directory. 6. | [
{
"id": 46713,
"label": "FILEPATH",
"start_offset": 84,
"end_offset": 87
},
{
"id": 46716,
"label": "FILEPATH",
"start_offset": 185,
"end_offset": 188
},
{
"id": 46718,
"label": "tools",
"start_offset": 49,
"end_offset": 65
},
{
"id": 46714,
"label": "FILEPATH",
"start_offset": 93,
"end_offset": 150
},
{
"id": 46715,
"label": "FILEPATH",
"start_offset": 194,
"end_offset": 209
},
{
"id": 46717,
"label": "FILEPATH",
"start_offset": 240,
"end_offset": 278
},
{
"id": 46719,
"label": "tools",
"start_offset": 31,
"end_offset": 41
},
{
"id": 46720,
"label": "tools",
"start_offset": 4,
"end_offset": 14
}
] | [] | [] |
1,382 | AdvancedRun.exe is used to execute PowerShell.exe to delete and stop Windows Defender. | [
{
"id": 46721,
"label": "FILEPATH",
"start_offset": 0,
"end_offset": 15
},
{
"id": 46722,
"label": "FILEPATH",
"start_offset": 35,
"end_offset": 49
},
{
"id": 46723,
"label": "SOFTWARE",
"start_offset": 69,
"end_offset": 85
}
] | [] | [] |
1,383 | The following command parameters are passed to AdvancedRun: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" /WindowState 0 /CommandLine "rmdir 'C:\ProgramData\Microsoft\Windows Defender' -Recurse" /StartDirectory "" /RunAs 8 /Run "C:\Users\USERNAME]AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\sc.exe" /WindowState 0 /CommandLine "stop WinDefend" /StartDirectory "" /RunAs 8 /Run 7. | [
{
"id": 44990,
"label": "FILEPATH",
"start_offset": 313,
"end_offset": 339
},
{
"id": 44987,
"label": "FILEPATH",
"start_offset": 62,
"end_offset": 119
},
{
"id": 44988,
"label": "FILEPATH",
"start_offset": 157,
"end_offset": 198
},
{
"id": 44989,
"label": "FILEPATH",
"start_offset": 245,
"end_offset": 297
},
{
"id": 46724,
"label": "SOFTWARE",
"start_offset": 47,
"end_offset": 58
}
] | [] | [] |
1,384 | PowerShell process used to delete Windows Defender, e.g. C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe rmdir 'C:\ProgramData\Microsoft\Windows Defender' -Recurse 8. File InstallUtil.exe running from C:\Users\[USERNAME]\AppData\Local\Temp directory. | [
{
"id": 4148,
"label": "tools",
"start_offset": 0,
"end_offset": 10
},
{
"id": 46727,
"label": "FILEPATH",
"start_offset": 122,
"end_offset": 163
},
{
"id": 46726,
"label": "FILEPATH",
"start_offset": 57,
"end_offset": 114
},
{
"id": 46728,
"label": "FILEPATH",
"start_offset": 183,
"end_offset": 198
},
{
"id": 46725,
"label": "tools",
"start_offset": 34,
"end_offset": 50
},
{
"id": 46729,
"label": "FILEPATH",
"start_offset": 212,
"end_offset": 251
}
] | [] | [] |
1,385 | The in-memory payload (Tbopbh.jpg) is running within the context of the InstallUtil.exe process 9. Multiple instances of cmd.exe calling Ping.exe to delete file InstallUtil.exe, e.g. cmd.exe /min /C ping 111.111.111[.]111 -n 5 -w 10 > Nul & Del /f /q %TEMP%\InstallUtil.exe 10. File AdvancedRun.exe is deleted from the C:\Users\[USERNAME]\AppData\Local\Temp directory by the stage2.exe binary. 11. ICMP traffic to host: 111.111.111[.]111 12. | [
{
"id": 4149,
"label": "malware",
"start_offset": 122,
"end_offset": 129
},
{
"id": 4150,
"label": "malware",
"start_offset": 184,
"end_offset": 191
},
{
"id": 4151,
"label": "tools",
"start_offset": 200,
"end_offset": 204
},
{
"id": 4152,
"label": "IPV4",
"start_offset": 205,
"end_offset": 222
},
{
"id": 4154,
"label": "IPV4",
"start_offset": 423,
"end_offset": 440
},
{
"id": 46732,
"label": "FILEPATH",
"start_offset": 285,
"end_offset": 300
},
{
"id": 46730,
"label": "FILEPATH",
"start_offset": 23,
"end_offset": 33
},
{
"id": 46731,
"label": "FILEPATH",
"start_offset": 252,
"end_offset": 274
},
{
"id": 46733,
"label": "FILEPATH",
"start_offset": 321,
"end_offset": 387
}
] | [] | [] |
1,386 | All files and directories, including those on mounted USB drives, excluding the floppy drive (A:) are targeted. | [
{
"id": 46734,
"label": "FILEPATH",
"start_offset": 94,
"end_offset": 96
}
] | [] | [] |
1,387 | The following file extensions are overwritten with a one-byte value of 0xCC. | [] | [] | [] |
1,388 | 13. Targeted files greater than one megabyte are truncated to one megabyte when overwritten. | [] | [] | [] |
1,389 | 14. Virus & Threat protection is no longer available from Windows Security. | [
{
"id": 46735,
"label": "SOFTWARE",
"start_offset": 59,
"end_offset": 75
}
] | [] | [] |
1,390 | Organizations running OctoberCMS prior to Build 472 and v1.1.5 are encouraged to update to the latest version. | [
{
"id": 46736,
"label": "SOFTWARE",
"start_offset": 23,
"end_offset": 33
}
] | [] | [] |
1,391 | Additionally, in order for this vulnerability to be exploited, the web server must be running PHP below 7.4. | [
{
"id": 46737,
"label": "SOFTWARE",
"start_offset": 94,
"end_offset": 97
}
] | [] | [] |
1,392 | Palo Alto Networks customers receive protections against the OctoberCMS vulnerability in the following ways: Palo Alto Networks customers receive protections against WhisperGate malware in the following ways: The Cortex XSOAR "WhisperGate & CVE-2021-32648'' pack can help automatically detect and mitigate the two threats. | [
{
"id": 44991,
"label": "identity",
"start_offset": 1,
"end_offset": 19
},
{
"id": 44996,
"label": "SOFTWARE",
"start_offset": 216,
"end_offset": 228
},
{
"id": 44998,
"label": "vulnerability",
"start_offset": 244,
"end_offset": 258
},
{
"id": 44993,
"label": "identity",
"start_offset": 111,
"end_offset": 129
},
{
"id": 44994,
"label": "vulnerability",
"start_offset": 62,
"end_offset": 86
},
{
"id": 44995,
"label": "malware",
"start_offset": 168,
"end_offset": 179
},
{
"id": 4172,
"label": "malware",
"start_offset": 230,
"end_offset": 241
}
] | [
{
"id": 51,
"from_id": 44995,
"to_id": 44998,
"type": "exploits"
},
{
"id": 214,
"from_id": 4172,
"to_id": 44998,
"type": "exploits"
}
] | [] |
1,393 | Read more on the XSOAR marketplace. | [] | [] | [] |
1,394 | If you think you may have been compromised or have an urgent matter, get in touch with the Unit 42 Incident Response team or call North America Toll-Free: 866.486.4842 (866.4.UNIT42), EMEA: +31.20.299.3130, APAC: +65.6983.8730, or Japan: +81.50.1790.0200. | [
{
"id": 46738,
"label": "identity",
"start_offset": 92,
"end_offset": 99
},
{
"id": 46739,
"label": "location",
"start_offset": 131,
"end_offset": 144
},
{
"id": 46740,
"label": "location",
"start_offset": 185,
"end_offset": 189
},
{
"id": 46741,
"label": "location",
"start_offset": 208,
"end_offset": 212
},
{
"id": 46742,
"label": "location",
"start_offset": 232,
"end_offset": 237
}
] | [] | [] |
1,395 | Palo Alto Networks Cortex XDR customers may leverage the following XQL queries, written by the Cortex Managed Threat Hunting service experts, to hunt their datasets for indicators related to WhisperGate malware: The Unit 42 Threat Intelligence team remains vigilant in monitoring this evolving situation, is actively hunting for known indicators from recent events and is ready to put protections in place to thwart attacks against our customers. | [
{
"id": 45003,
"label": "malware",
"start_offset": 192,
"end_offset": 203
},
{
"id": 45002,
"label": "identity",
"start_offset": 1,
"end_offset": 19
},
{
"id": 45001,
"label": "SOFTWARE",
"start_offset": 20,
"end_offset": 30
},
{
"id": 45004,
"label": "identity",
"start_offset": 218,
"end_offset": 225
},
{
"id": 46744,
"label": "identity",
"start_offset": 218,
"end_offset": 250
},
{
"id": 46745,
"label": "identity",
"start_offset": 96,
"end_offset": 133
}
] | [] | [] |
1,396 | Product-specific protections have been implemented as a result of research performed in recent days, and those protections will be augmented as needed as more details come to light. | [] | [] | [] |
1,397 | Palo Alto Networks will update this Threat Brief with new information and recommendations as they become available. | [
{
"id": 46746,
"label": "identity",
"start_offset": 0,
"end_offset": 18
}
] | [] | [] |
1,398 | Updated March 4, 2022, at 6:15 a.m. PT. | [
{
"id": 45006,
"label": "TIME",
"start_offset": 9,
"end_offset": 39
}
] | [] | [] |
1,399 | Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
1,400 | At 06:47 PST on May 20 Palo Alto Networks WildFire detected the start of the latest Kuluoz spam campaign. | [
{
"id": 4212,
"label": "SOFTWARE",
"start_offset": 42,
"end_offset": 50
},
{
"id": 46747,
"label": "TIME",
"start_offset": 3,
"end_offset": 22
},
{
"id": 46748,
"label": "identity",
"start_offset": 23,
"end_offset": 41
},
{
"id": 46749,
"label": "campaign",
"start_offset": 84,
"end_offset": 104
}
] | [] | [] |
1,401 | The total number of e-mails detected quickly rose to over 30,000 per hour around noon PST and had not begun to slow down as of 1:30PM PST. | [
{
"id": 45007,
"label": "TIME",
"start_offset": 127,
"end_offset": 137
},
{
"id": 4218,
"label": "TIME",
"start_offset": 81,
"end_offset": 89
}
] | [] | [] |
1,402 | Kuluoz is a descendant of the Asprox malware and spreads by sending copies of itself as an e-mail attachment. | [
{
"id": 46751,
"label": "malware",
"start_offset": 31,
"end_offset": 37
},
{
"id": 46750,
"label": "malware",
"start_offset": 1,
"end_offset": 7
},
{
"id": 46752,
"label": "attack-pattern",
"start_offset": 61,
"end_offset": 109
}
] | [
{
"id": 216,
"from_id": 46750,
"to_id": 46751,
"type": "variant-of"
},
{
"id": 217,
"from_id": 46751,
"to_id": 46752,
"type": "uses"
},
{
"id": 218,
"from_id": 46750,
"to_id": 46752,
"type": "uses"
}
] | [] |
1,403 | As the malware infects more systems, the systems begin sending more e-mails which leads to more infections. | [] | [] | [] |
1,404 | Kuluoz makes money for its owner by installing other malware, such as crimeware or fake antivirus programs. | [
{
"id": 45008,
"label": "malware",
"start_offset": 0,
"end_offset": 6
},
{
"id": 45009,
"label": "attack-pattern",
"start_offset": 70,
"end_offset": 79
},
{
"id": 45010,
"label": "attack-pattern",
"start_offset": 83,
"end_offset": 106
}
] | [
{
"id": 53,
"from_id": 45008,
"to_id": 45009,
"type": "uses"
},
{
"id": 54,
"from_id": 45008,
"to_id": 45010,
"type": "uses"
}
] | [] |
1,405 | Kuluoz e-mails often trick the reader into thinking they are delivery notifications (such as UPS or Fedex), or notices from airlines or payment processors. | [
{
"id": 46753,
"label": "malware",
"start_offset": 1,
"end_offset": 7
}
] | [] | [] |
1,406 | In this case the e-mails claim to contain a document about a court case. | [] | [] | [] |
1,407 | Subject: Hearing of your case in Court | [] | [] | [] |
1,408 | From: Notice of Appearance Pretrial Notice, Please, download the copy of the court notice attached herewith to read the details. | [] | [] | [] |
1,409 | Note: The case may be heard by the judge in your absence if you do not come. | [] | [] | [] |
1,410 | Truly yours, Clerk to the Court. | [] | [] | [] |
1,411 | Olivia Smith | [
{
"id": 46754,
"label": "identity",
"start_offset": 0,
"end_offset": 12
}
] | [] | [] |
1,412 | Each e-mail carries one of the following attachments: These attachments are different versions of the malware that has been packed to evade antivirus engines. | [] | [] | [] |
1,413 | Twelve of the 53 scanners on virustotal.com now detect the first variant of the malware, but only three detect the latest version. | [
{
"id": 45011,
"label": "SOFTWARE",
"start_offset": 29,
"end_offset": 43
}
] | [] | [] |
1,414 | To determine where the highest number of infected nodes are, we mapped the sending IP address for each of the attach e-mails to their rough geographic location. | [] | [] | [] |
1,416 | Geographic Distribution of Koluoz Spam Nodes in North America Thus far we’ve detected the following command and control servers in use. | [
{
"id": 45013,
"label": "Infrastucture",
"start_offset": 35,
"end_offset": 45
},
{
"id": 45016,
"label": "Infrastucture",
"start_offset": 103,
"end_offset": 121
},
{
"id": 45012,
"label": "malware",
"start_offset": 28,
"end_offset": 34
},
{
"id": 45014,
"label": "location",
"start_offset": 49,
"end_offset": 62
}
] | [
{
"id": 55,
"from_id": 45012,
"to_id": 45013,
"type": "communicates-with"
},
{
"id": 56,
"from_id": 45013,
"to_id": 45014,
"type": "located-at"
}
] | [] |