Security
Headlines
HeadlinesLatestCVEs

Headline

Threat Roundup for April 14 to April 21

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between April 21 and April 28. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key

TALOS
#xss#vulnerability#web#mac#windows#google#microsoft#js#backdoor#botnet#acer#sap

Friday, April 28, 2023 17:04

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between April 21 and April 28. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found here that includes the complete list of file hashes, as well as all other IOCs from this post. A visual depiction of the MITRE ATT&CK techniques associated with each threat is also shown. In these images, the brightness of the technique indicates how prevalent it is across all threat files where dynamic analysis was conducted. There are five distinct shades that are used, with the darkest indicating that no files exhibited technique behavior and the brightest indicating that technique behavior was observed from 75 percent or more of the files.

The most prevalent threats highlighted in this roundup are:

Threat Name

Type

Description

Win.Dropper.Bifrost-9998862-0

Dropper

Bifrost is a backdoor with more than 10 variants. Bifrost uses the typical server, server builder, and client backdoor program configuration to allow a remote attacker, who uses the client, to execute arbitrary code on the compromised machine. Bifrost contains standard RAT features including a file manager, screen capture utility, keylogging, video recording, microphone and camera monitoring, and a process manager. In order to mark its presence in the system, Bifrost uses a mutex that may be named “Bif1234,” or “Tr0gBot.”

Win.Dropper.Tofsee-9997698-0

Dropper

Tofsee is multi-purpose malware that features a number of modules used to carry out various activities such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages in an effort to infect additional systems and increase the overall size of the botnet under the operator’s control.

Win.Virus.Ramnit-9997699-0

Virus

Ramnit is a banking trojan that monitors web browser activity on an infected machine and collects login information from financial websites. It also has the ability to steal browser cookies and attempts to hide from popular antivirus software.

Win.Dropper.Remcos-9998831-1

Dropper

Remcos is a remote access trojan (RAT) that allows attackers to execute commands on the infected host, log keystrokes, interact with a webcam, and capture screenshots. This malware is commonly delivered through Microsoft Office documents with macros, sent as attachments on malicious emails.

Win.Dropper.DarkComet-9998118-1

Dropper

DarkComet and related variants are a family of remote access trojans designed to provide an attacker with control over an infected system. Capabilities of this malware include the ability to download files from a user’s machine, mechanisms for persistence and hiding, and the ability to send back usernames and passwords from the infected system.

Win.Virus.Xpiro-9998650-1

Virus

Expiro is a known file infector and information-stealer that hinders analysis with anti-debugging and anti-analysis tricks.

Win.Dropper.LokiBot-9997784-0

Dropper

Lokibot is an information-stealing malware designed to siphon off sensitive information stored on an infected device. It is modular in nature, supporting the ability to steal sensitive information from a number of popular applications. It is commonly pushed via malicious documents delivered via spam emails.

Win.Downloader.Upatre-9998551-0

Downloader

Upatre is a malicious downloader often used by exploit kits and phishing campaigns. Upatre downloads and executes malicious executables, such as banking malware.

Win.Ransomware.Cerber-9998102-0

Ransomware

Cerber is ransomware that encrypts documents, photos, databases and other important files. Historically, this malware would replace files with encrypted versions and add the file extension “.cerber,” although in more recent campaigns other file extensions are used.

Threat Breakdown****Win.Dropper.Bifrost-9998862-0****Indicators of Compromise

  • IOCs collected from dynamic analysis of 36 samples

Registry Keys

Occurrences

<HKCU>\SOFTWARE\FORUM SERVER

6

<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS{OY2O4VXC-P514-O36S-5W0B-V135334Y4PE5}

6

<HKLM>\SOFTWARE\WOW6432NODE\FORUM SERVER

6

<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS{OY2O4VXC-P514-O36S-5W0B-V135334Y4PE5}
Value Name: StubPath

6

<HKCU>\SOFTWARE\FORUM SERVER
Value Name: FirstExecution

6

<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: tbtrb

6

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: bbbt

6

<HKCU>\SOFTWARE\FORUM SERVER
Value Name: FileNameAtual

6

<HKCU>\SOFTWARE\FORUM SERVER
Value Name: ByPersist

6

<HKCU>\SOFTWARE\FORUM SERVER
Value Name: FileName

6

<HKLM>\SOFTWARE\WOW6432NODE\FORUM SERVER
Value Name: HKLM

6

<HKCU>\SOFTWARE\FORUM SERVER
Value Name: HKCU

6

Mutexes

Occurrences

Spy-Net

6

Spy-Net_Sair

6

Bif1234

4

stb

1

Global\71b0ff21-e3cc-11ed-9660-001517619ccc

1

Global\a08a09e1-e3cc-11ed-9660-0015178afdb9

1

Global\6bc18981-e3cd-11ed-9660-0015170e0b8c

1

Global\1dc44421-e3cd-11ed-9660-0015177d9b69

1

Domain Names contacted by malware. Does not indicate maliciousness

Occurrences

mola1986[.]no-ip[.]org

6

Files and or directories created

Occurrences

%TEMP%\Decrypted.exe

13

%SystemRoot%\SysWOW64\btbrtb

6

%SystemRoot%\SysWOW64\btbrtb\btrbbtr.exe

6

File Hashes
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*See JSON for more IOCs

Coverage

Product

Protection

Secure Endpoint

Cloudlock

N/A

CWS

Email Security

Network Security

N/A

Stealthwatch

N/A

Stealthwatch Cloud

N/A

Secure Malware Analytics

Umbrella

N/A

WSA

N/A

Screenshots of Detection****Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Dropper.Tofsee-9997698-0****Indicators of Compromise

  • IOCs collected from dynamic analysis of 245 samples

Registry Keys

Occurrences

<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER
Value Name: DisableAntiSpyware

111

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: Start

111

<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU

111

<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU
Value Name: NoAutoRebootWithLoggedOnUsers

111

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WUAUSERV
Value Name: Start

111

<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU
Value Name: NoAutoUpdate

111

<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION
Value Name: DisableBehaviorMonitoring

111

<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION
Value Name: DisableOnAccessProtection

111

<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION
Value Name: DisableScanOnRealtimeEnable

111

<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION
Value Name: DisableIOAVProtection

111

<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER

111

<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION

111

<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE

111

<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS DEFENDER\FEATURES

111

<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS DEFENDER\FEATURES
Value Name: TamperProtection

111

<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER\REAL-TIME PROTECTION
Value Name: DisableRealtimeMonitoring

111

<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER SECURITY CENTER

111

<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU
Value Name: AUOptions

111

<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU
Value Name: AutoInstallMinorUpdates

111

<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER SECURITY CENTER\NOTIFICATIONS

111

<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS DEFENDER SECURITY CENTER\NOTIFICATIONS
Value Name: DisableNotifications

111

<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE\AU
Value Name: UseWUServer

111

<HKLM>\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\WINDOWSUPDATE
Value Name: DoNotConnectToWindowsUpdateInternetLocations

111

Mutexes

Occurrences

Random name

3

MSCTF.Asm.{00000009-4fb3f26-9d18-66b568-627b8a85e4b6}

3

Global\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}

3

Session\1\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}

3

Session\2\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}

3

Session\3\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}

3

Session\4\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}

3

Session\5\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}

3

Session\6\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}

3

Session\7\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}

3

Session\8\MSCTF.Asm.{04fb3f26-9d18-66b5-6862-7b8a85e4b620}

3

IP Addresses contacted by malware. Does not indicate maliciousness

Occurrences

176[.]113[.]115[.]145

124

185[.]11[.]61[.]125

5

179[.]43[.]154[.]216

3

192[.]229[.]211[.]108

2

69[.]192[.]209[.]23

2

Domain Names contacted by malware. Does not indicate maliciousness

Occurrences

cacerts[.]digicert[.]com

2

download[.]microsoft[.]com

2

Files and or directories created

Occurrences

%LOCALAPPDATA%\Yandex

89

%LOCALAPPDATA%\Yandex\YaAddon

89

\x5c\x55\x73\x65\x72\x73\x5c\x41\x64\x6d\x69\x6e\x69\x73\x74\x72\x61\x74\x6f\x72\x5c\x41\x70\x70\x44\x61\x74\x61\x5c\x4c\x6f\x63\x61\x6c\x5c\x4d\x69\x63\x72\x6f\x73\x6f\x66\x74\x5c\x57\x69\x6e\x64\x43e\x77\x73

4

File Hashes
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*See JSON for more IOCs

Coverage

Product

Protection

Secure Endpoint

Cloudlock

N/A

CWS

Email Security

Network Security

Stealthwatch

N/A

Stealthwatch Cloud

N/A

Secure Malware Analytics

Umbrella

N/A

WSA

N/A

Screenshots of Detection****Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Virus.Ramnit-9997699-0****Indicators of Compromise

  • IOCs collected from dynamic analysis of 12 samples

Registry Keys

Occurrences

<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: AntiVirusOverride

12

<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: AntiVirusDisableNotify

12

<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: FirewallDisableNotify

12

<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: FirewallOverride

12

<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: UpdatesDisableNotify

12

<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER
Value Name: UacDisableNotify

12

<HKLM>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM
Value Name: EnableLUA

12

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: EnableFirewall

12

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: DoNotAllowExceptions

12

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE
Value Name: DisableNotifications

12

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: Start

12

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: Start

12

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC
Value Name: Start

12

<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION
Value Name: jfghdug_ooetvtgk

12

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: JudCsgdy

12

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WUAUSERV
Value Name: Start

12

<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: Windows Defender

12

<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: Userinit

12

<HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON
Value Name: Userinit

12

Mutexes

Occurrences

{7930D12C-1D38-EB63-89CF-4C8161B79ED4}

12

{79345B6A-421F-2958-EA08-07396ADB9E27}

12

IP Addresses contacted by malware. Does not indicate maliciousness

Occurrences

35[.]205[.]61[.]67

12

142[.]250[.]80[.]46

12

103[.]224[.]182[.]246

11

46[.]165[.]254[.]201

11

72[.]26[.]218[.]70

11

195[.]201[.]179[.]207

11

208[.]100[.]26[.]245

11

206[.]191[.]152[.]58

11

72[.]251[.]233[.]245

11

Domain Names contacted by malware. Does not indicate maliciousness

Occurrences

google[.]com

12

testetst[.]ru

12

mtsoexdphaqliva[.]com

11

uulwwmawqjujuuprpp[.]com

11

twuybywnrlqcf[.]com

11

wcqqjiixqutt[.]com

11

ubgjsqkad[.]com

11

iihsmkek[.]com

11

tlmmcvqvearpxq[.]com

11

flkheyxtcedehipox[.]com

11

edirhtuawurxlobk[.]com

11

tfjcwlxcjoviuvtr[.]com

11

Files and or directories created

Occurrences

%LOCALAPPDATA%\bolpidti

12

%LOCALAPPDATA%\bolpidti\judcsgdy.exe

12

%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\judcsgdy.exe

12

\TEMP\nr3othpeM

12

File Hashes
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Coverage

Product

Protection

Secure Endpoint

Cloudlock

N/A

CWS

Email Security

Network Security

Stealthwatch

N/A

Stealthwatch Cloud

N/A

Secure Malware Analytics

Umbrella

WSA

Screenshots of Detection****Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Dropper.Remcos-9998831-1****Indicators of Compromise

  • IOCs collected from dynamic analysis of 10 samples

Registry Keys

Occurrences

<HKCU>\SOFTWARE\MSWORDOFFICESVC-QHO80M

10

<HKCU>\SOFTWARE\MSWORDOFFICESVC-QHO80M
Value Name: EXEpath

10

<HKCU>\SOFTWARE\MSWORDOFFICESVC-QHO80M
Value Name: WD

10

Mutexes

Occurrences

Remcos_Mutex_Inj

10

Mutex_RemWatchdog

10

mswordofficesvc-QHO80M

10

Domain Names contacted by malware. Does not indicate maliciousness

Occurrences

kelikjoinset[.]freedynamicdns[.]org

10

noblegas[.]myftp[.]org

10

Files and or directories created

Occurrences

%APPDATA%\remcos

10

%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\mswordsvc.vbe

10

%APPDATA%\mswordsvc.exe

10

File Hashes

1068d5259b58c67b37559c2c5aaaffaa524cd38f05c99625b5b1bc97667388df
38606579b809ca28086c04af33a2bf54fbbd5a045ef60052dda6775a6e71a875
486aa0afed7943aed6838bce23d4d04410f9b5570ca90aa481f17ebecd2ad094
53718f911be349fb0bb16c2cd3464a4a786c41d1f34ec4830cd5d5a1a50a9fde
5678468ae9e47c877300c8de9d3f12dbd65f89bdc3af8838b30341f7451e3b7a
ba1a8e84a9bc1a73bfa49aeb376be2a18eff3a0e980fe0ebdb6ad5478b7e479d
cc0ca5bdd31ae56f5585b16988ef09ffd914d5bb461c6692e086484f892988d4
d2896ee59f6a2d1c1149c58e647e2c3dcdc7cb9011845a75254563f659298373
d3f05239dda9f9c81b42d7ad5f83459f8183b8592c323aa17fbb04103c08be3d
d74c4daab9d068fe6388596dc4daf7d93e61d1aa4868ec69f9ccd59eac2de1a8

Coverage

Product

Protection

Secure Endpoint

Cloudlock

N/A

CWS

Email Security

Network Security

N/A

Stealthwatch

N/A

Stealthwatch Cloud

N/A

Secure Malware Analytics

Umbrella

N/A

WSA

N/A

Screenshots of Detection****Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Dropper.DarkComet-9998118-1****Indicators of Compromise

  • IOCs collected from dynamic analysis of 23 samples

Registry Keys

Occurrences

<HKCU>\SOFTWARE\DC3_FEXEC

23

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: kb2456.exe

23

Mutexes

Occurrences

DC_MUTEX-13F3AYC

23

IP Addresses contacted by malware. Does not indicate maliciousness

Occurrences

162[.]125[.]4[.]15

23

Domain Names contacted by malware. Does not indicate maliciousness

Occurrences

dl[.]dropbox[.]com

23

zoukiny[.]no-ip[.]biz

23

Files and or directories created

Occurrences

%APPDATA%\dclogs

23

%TEMP%\tmp<random, matching [A-F0-9]{1,4}>.tmp

23

%TEMP%\tmpBD03.tmp.exe

3

%TEMP%\temp_GujQurApmI

2

%TEMP%\temp_GujQurApmI\svchost.exe

2

%TEMP%\temp_AoPXtxyscR

2

%TEMP%\temp_AoPXtxyscR\svchost.exe

2

%TEMP%\tmpC06C.tmp.exe

2

%TEMP%\temp_MhOpOytNAS\svchost.exe

1

%TEMP%\tmpBF9C.tmp.exe

1

%TEMP%\temp_dgFaHSHFIP\svchost.exe

1

%TEMP%\tmpBAF0.tmp.exe

1

%TEMP%\temp_XbxDBxrtQM\svchost.exe

1

%TEMP%\temp_hYMuQAMQTy\svchost.exe

1

%TEMP%\tmpBF44.tmp.exe

1

%TEMP%\temp_AChkJWUFGO\svchost.exe

1

%TEMP%\tmpC28E.tmp.exe

1

%TEMP%\temp_ktuFuZaySw\svchost.exe

1

%TEMP%\tmpCC7D.tmp.exe

1

%TEMP%\temp_jTWgKpaNic\svchost.exe

1

%TEMP%\tmpC453.tmp.exe

1

%TEMP%\temp_gwLGQvZjwn\svchost.exe

1

%TEMP%\tmpFFFB.tmp.exe

1

%TEMP%\temp_gFRVVtvPLv\svchost.exe

1

%TEMP%\tmpC0BA.tmp.exe

1

*See JSON for more IOCs

File Hashes

0405c695532cdfadb49cd6e5dc0175e2740a6b34df032e0d6370ac57781bc0b9
099393350020fa9d643c1fd02dd8e0c8e2c9090ff5d4ff96a807b03cc927dae6
0b9d53d8392c6af28951737704765fb1a7c75a849633ef4e4a1d7b7be861f6d7
1ba1034f63585a98afac1b985f866ec53e66ba500c8a7e499521e47e66e7867e
276e6b279f8cf83b531fcee7fe2f770f1814b5d63ba25aa407bf1676698d09c7
2d67a134e9a81d3f55017c4c3e395e90194d6ad6cf2d24b6f567f9df0729f55e
2ed27da0b1a0cf9949aba612b54427c7d104e1fe44c98e363b3cef43289d7924
37c13c62990a05a6105024b075eb672723a0838eadec043618b4222ca15520b5
3fe6cb53ea8f0a35f828fc1e87ad9cf6a27081695ef9b709fb3367c2e8c21e82
506a3537c3afbb25783fe817f230595b3c7369eaf737ee84475a6ed1d5c5c5ec
66d64aad782b2ba9baf1fa04c5738d55bd23754dba179b7c01fe15837ee6b6b7
781529034cef2a9316fb18187611f911d2d6463f56636e7d6393045a88302614
786be271e7f3f8249203417bd8547b42e3dceb9440e228d844a78c85f2dc7822
8534b61a4f0c0dc39da45ddf6a874edfbaf0ea9ab36c58f470ae3e062f81c6b2
88789c72981be3e3f57b31771ab73ad52089f65a8b5f0544d3ae5ed9e8b14f6e
889b3fe85d94c61276540ea86de2de983c7d7357eaf394717e0705cd365a307f
8f12b7340c8cc0c6c7c3c3f6ed64a3f8850fa035d1f811dc4255b128ab00d4c5
a7b80aea4110f98e399e64abb923dee60f70650041593358297542c33f6b8a8e
b83385710b54918cdb2814e555c0b6189a2c5ba46bc2cb0a435b5b8f5a5b51cb
b837289b0f42bdfbe726dfafbae51a0b5cb5af21a3a2859bedaea7ab770d2482
ca67b7e760c2d09004928da6736f4784cc05899ea7ae4bf19deb16d4fee047ce
d24f72779958896980e074e15cc9abb88daa041c13123525db3d6ee33be32b81
ffe2607eec8bda28fc38b19bbef00cfcd572f3335b3773c4df758526243f128b

Coverage

Product

Protection

Secure Endpoint

Cloudlock

N/A

CWS

Email Security

Network Security

Stealthwatch

N/A

Stealthwatch Cloud

N/A

Secure Malware Analytics

Umbrella

N/A

WSA

N/A

Screenshots of Detection****Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Virus.Xpiro-9998650-1****Indicators of Compromise

  • IOCs collected from dynamic analysis of 18 samples

Registry Keys

Occurrences

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WSCSVC
Value Name: Start

18

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WINDEFEND
Value Name: Start

18

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V2.0.50727_32
Value Name: Type

18

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V2.0.50727_64
Value Name: Type

18

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V4.0.30319_32
Value Name: Type

18

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V4.0.30319_32
Value Name: Start

18

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V4.0.30319_64
Value Name: Type

18

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\CLR_OPTIMIZATION_V4.0.30319_64
Value Name: Start

18

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\COMSYSAPP
Value Name: Type

18

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\COMSYSAPP
Value Name: Start

18

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MOZILLAMAINTENANCE
Value Name: Type

18

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MOZILLAMAINTENANCE
Value Name: Start

18

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MSISERVER
Value Name: Type

18

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\MSISERVER
Value Name: Start

18

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\OSE
Value Name: Type

18

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\OSE
Value Name: Start

18

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\UI0DETECT
Value Name: Type

18

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\UI0DETECT
Value Name: Start

18

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\VDS
Value Name: Type

18

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\VDS
Value Name: Start

18

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\VSS
Value Name: Type

18

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\VSS
Value Name: Start

18

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WBENGINE
Value Name: Type

18

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WBENGINE
Value Name: Start

18

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\WMIAPSRV
Value Name: Type

18

Mutexes

Occurrences

kkq-vx_mtx64

18

kkq-vx_mtx65

18

kkq-vx_mtx66

18

kkq-vx_mtx67

18

kkq-vx_mtx68

18

kkq-vx_mtx69

18

kkq-vx_mtx70

18

kkq-vx_mtx71

18

kkq-vx_mtx72

18

kkq-vx_mtx73

18

kkq-vx_mtx74

18

kkq-vx_mtx75

18

kkq-vx_mtx76

18

kkq-vx_mtx77

18

kkq-vx_mtx78

18

kkq-vx_mtx79

18

kkq-vx_mtx80

18

kkq-vx_mtx81

18

kkq-vx_mtx82

18

kkq-vx_mtx83

18

kkq-vx_mtx84

18

kkq-vx_mtx85

18

kkq-vx_mtx86

18

kkq-vx_mtx87

18

kkq-vx_mtx88

18

*See JSON for more IOCs

Files and or directories created

Occurrences

%ProgramFiles(x86)%\Microsoft Office\Office14\GROOVE.EXE

18

%ProgramFiles(x86)%\Mozilla Maintenance Service\maintenanceservice.exe

18

%SystemRoot%\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

18

%SystemRoot%\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

18

%SystemRoot%\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

18

%SystemRoot%\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

18

%System32%\FXSSVC.exe

18

%System32%\UI0Detect.exe

18

%System32%\VSSVC.exe

18

%System32%\alg.exe

18

%System32%\dllhost.exe

18

%System32%\msdtc.exe

18

%System32%\msiexec.exe

18

%System32%\snmptrap.exe

18

%System32%\sppsvc.exe

18

%System32%\wbem\WmiApSrv.exe

18

%System32%\wbengine.exe

18

%SystemRoot%\ehome\ehsched.exe

18

%SystemRoot%\SysWOW64\dllhost.exe

18

%SystemRoot%\SysWOW64\svchost.exe

18

%SystemRoot%\SysWOW64\dllhost.vir

18

%SystemRoot%\SysWOW64\msiexec.vir

18

%SystemRoot%\SysWOW64\svchost.vir

18

%ProgramFiles%\Internet Explorer\iexplore.vir

18

%CommonProgramFiles(x86)%\microsoft shared\source engine\ose.vir

18

*See JSON for more IOCs

File Hashes
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Coverage

Product

Protection

Secure Endpoint

Cloudlock

N/A

CWS

Email Security

Network Security

N/A

Stealthwatch

N/A

Stealthwatch Cloud

N/A

Secure Malware Analytics

Umbrella

N/A

WSA

N/A

Screenshots of Detection****Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Dropper.LokiBot-9997784-0****Indicators of Compromise

  • IOCs collected from dynamic analysis of 46 samples

Registry Keys

Occurrences

<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS
Value Name: Path

2

<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS
Value Name: Hash

2

<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS
Value Name: Triggers

2

<HKLM>\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS
Value Name: DynamicInfo

2

Mutexes

Occurrences

hGaolUAEhBhpUPhRKOMCEdZwRZtiMG

20

jXKhDsqpdQybVuPEmbAKwiHxLWIux

18

CbrYMlytSPCzlXpbEHuxopJkpncgG

4

3749282D282E1E80C56CAE5A

1

ATdPKSSVGkktNJiqkeIrKymIi

1

IP Addresses contacted by malware. Does not indicate maliciousness

Occurrences

34[.]229[.]94[.]227

43

Domain Names contacted by malware. Does not indicate maliciousness

Occurrences

lancetasks[.]com

43

poyrezbunker[.]xyz

1

Files and or directories created

Occurrences

%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\windrive.exe

43

%APPDATA%\windrive.exe

43

%System32%\Tasks\windrive

43

%APPDATA%\Setupexe.exe

42

%APPDATA%\D282E1

1

%APPDATA%\D282E1\1E80C5.lck

1

%APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2580483871-590521980-3826313501-500\a18ca4003deb042bbee7a40f15e1970b_d19ab989-a35f-4710-83df-7b2db7efe7c5

1

File Hashes
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*See JSON for more IOCs

Coverage

Product

Protection

Secure Endpoint

Cloudlock

N/A

CWS

Email Security

Network Security

N/A

Stealthwatch

N/A

Stealthwatch Cloud

N/A

Secure Malware Analytics

Umbrella

N/A

WSA

N/A

Screenshots of Detection****Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Downloader.Upatre-9998551-0****Indicators of Compromise

  • IOCs collected from dynamic analysis of 25 samples

IP Addresses contacted by malware. Does not indicate maliciousness

Occurrences

51[.]222[.]30[.]164

25

Domain Names contacted by malware. Does not indicate maliciousness

Occurrences

groupesorepco[.]com

25

bulkbacklinks[.]com

25

Files and or directories created

Occurrences

%TEMP%\hummy.exe

25

File Hashes
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*See JSON for more IOCs

Coverage

Product

Protection

Secure Endpoint

Cloudlock

N/A

CWS

Email Security

Network Security

N/A

Stealthwatch

N/A

Stealthwatch Cloud

N/A

Secure Malware Analytics

Umbrella

N/A

WSA

N/A

Screenshots of Detection****Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Ransomware.Cerber-9998102-0****Indicators of Compromise

  • IOCs collected from dynamic analysis of 98 samples

Mutexes

Occurrences

ipc.{8067AF37-05F3-E0A7-F91D-CF35012EB051}

96

itbeoinopoc

96

IP Addresses contacted by malware. Does not indicate maliciousness

Occurrences

19[.]48[.]17[.]0/27

96

77[.]12[.]57[.]0/27

96

87[.]98[.]176[.]0/22

96

178[.]128[.]255[.]179

58

104[.]20[.]20[.]251

33

104[.]20[.]21[.]251

32

172[.]67[.]2[.]88

31

104[.]26[.]8[.]86

22

172[.]67[.]74[.]49

21

104[.]26[.]9[.]86

15

Domain Names contacted by malware. Does not indicate maliciousness

Occurrences

api[.]blockcypher[.]com

96

bitaps[.]com

58

chain[.]so

58

btc[.]blockr[.]io

58

qfjhpgbefuhenjp7[.]1bxzyr[.]top

38

Files and or directories created

Occurrences

%TEMP%\d19ab989

96

%TEMP%\d19ab989\4710.tmp

96

%TEMP%\d19ab989\a35f.tmp

96

%LOCALAPPDATA%\Microsoft\Office\Groove1\System\CSMIPC.dat

96

%TEMP%\tmp<random, matching [A-F0-9]{1,4}>.tmp

96

%TEMP%\tmp<random, matching [A-F0-9]{1,4}>.bmp

96

<dir>_R_E_A_D___T_H_I_S___<random, matching '[A-F0-9]{4,8}’>_.txt

96

<dir>_R_E_A_D___T_H_I_S___<random, matching '[A-F0-9]{4,8}’>_.hta

96

\pc\users\public\recorded tv\sample media\win7_scenic-demoshort_raw.wtv

69

File Hashes
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*See JSON for more IOCs

Coverage

Product

Protection

Secure Endpoint

Cloudlock

N/A

CWS

Email Security

Network Security

Stealthwatch

N/A

Stealthwatch Cloud

N/A

Secure Malware Analytics

Umbrella

N/A

WSA

N/A

Screenshots of Detection****Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

TALOS: Latest News

New PXA Stealer targets government and education sectors for sensitive information