Security
Headlines
HeadlinesLatestCVEs

Headline

Threat Roundup for September 22 to September 29

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Sept. 22 and Sept. 29. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key

TALOS
#vulnerability#web#mac#windows#google#microsoft#js#git#c++#botnet#acer#auth#asp.net#ssl

Friday, September 29, 2023 12:09

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Sept. 22 and Sept. 29. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Additionally, please keep in mind that IOC searching is only one part of threat hunting. Spotting a single IOC does not necessarily indicate maliciousness. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.

For each threat described below, this blog post only lists 25 of the associated file hashes and up to 25 IOCs for each category. An accompanying JSON file can be found here that includes the complete list of file hashes, as well as all other IOCs from this post. A visual depiction of the MITRE ATT&CK techniques associated with each threat is also shown. In these images, the brightness of the technique indicates how prevalent it is across all threat files where dynamic analysis was conducted. There are five distinct shades that are used, with the darkest indicating that no files exhibited technique behavior and the brightest indicating that technique behavior was observed from 75 percent or more of the files.

The most prevalent threats highlighted in this roundup are:

Threat Name

Type

Description

Win.Packed.Zusy-10008867-0

Packed

Zusy, also known as TinyBanker or Tinba, is a trojan that uses man-in-the-middle attacks to steal banking information. When executed, it injects itself into legitimate Windows processes such as “explorer.exe” and “winver.exe.” When the user accesses a banking website, it displays a form to trick the user into submitting personal information.

Win.Dropper.Tofsee-10008793-0

Dropper

Tofsee is multi-purpose malware that features a number of modules used to carry out various activities such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Infected systems become part of the Tofsee spam botnet and are used to send large volumes of spam messages in an effort to infect additional systems and increase the overall size of the botnet under the operator’s control.

Win.Trojan.Fareit-10009186-1

Trojan

The Fareit trojan is primarily an information stealer with functionality to download and install other malware.

Win.Worm.Gh0stRAT-10009166-0

Worm

Gh0stRAT is a well-known family of remote access trojans designed to provide an attacker with complete control over an infected system. Capabilities include monitoring keystrokes, collecting video footage from the webcam, and uploading/executing follow-on malware. The source code for Gh0stRAT has been publicly available on the Internet for years, significantly lowering the barrier for actors to modify and reuse the code in new attacks.

Win.Dropper.Zeus-10008893-0

Dropper

Zeus is a trojan that steals information such as banking credentials using methods such as key-logging and form-grabbing.

Win.Malware.Generickdz-10009245-0

Malware

This is a BobSoft Delphi application that wraps malware. The malware uses process-hollowing to hide from detection and achieves persistence across reboots by leveraging an autostart key in the Windows registry.

Win.Packed.Zusy-10008867-0****Indicators of Compromise

  • IOCs collected from dynamic analysis of 29 samples

Registry Keys

Occurrences

<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES{0633EE93-D776-472F-A0FF-E1416B8B2E3A}
Value Name: FaviconPath

8

<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES{0633EE93-D776-472F-A0FF-E1416B8B2E3A}
Value Name: Deleted

8

<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES
Value Name: DefaultScope

8

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}

8

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\ASP.NET_4.0.30319\NAMES
Value Name: 1ZMejMG5DSKz4xyByFqV1GRMlS8HZQ6Yn1KIiSgrJp9d0orZV6hiWgaq32NtiiZG5uFkfMsmAD26oLZAmfrIDz3o8KCTgcuPBQ7GdIftHeaRqLswFjiJgA

1

IP Addresses contacted by malware. Does not indicate maliciousness

Occurrences

192[.]229[.]211[.]108

8

13[.]107[.]21[.]200

6

5[.]42[.]65[.]101

6

94[.]142[.]138[.]4

5

91[.]103[.]252[.]48

4

23[.]66[.]172[.]122

4

23[.]33[.]182[.]75

4

172[.]67[.]75[.]172

3

176[.]123[.]9[.]142

3

23[.]49[.]102[.]168

2

104[.]26[.]13[.]31

1

104[.]26[.]12[.]31

1

172[.]67[.]34[.]170

1

23[.]5[.]148[.]218

1

23[.]7[.]109[.]223

1

194[.]169[.]175[.]232

1

104[.]87[.]86[.]90

1

23[.]200[.]226[.]142

1

23[.]220[.]114[.]168

1

95[.]214[.]24[.]103

1

65[.]109[.]240[.]180

1

23[.]214[.]126[.]151

1

Domain Names contacted by malware. Does not indicate maliciousness

Occurrences

go[.]microsoft[.]com

8

www[.]bing[.]com

8

cacerts[.]digicert[.]com

8

learn[.]microsoft[.]com

8

api[.]ip[.]sb

5

pastebin[.]com

1

dob[.]boggy[.]top

1

Files and or directories created

Occurrences

%LOCALAPPDATA%\SystemCache

12

%LOCALAPPDATA%\ElevatedDiagnostics

5

%LOCALAPPDATA%\ElevatedDiagnostics\Reports

5

\x5c\x55\x73\x65\x72\x73\x5c\x41\x64\x6d\x69\x6e\x69\x73\x74\x72\x61\x74\x6f\x72\x5c\x41\x70\x70\x44\x61\x74\x61\x5c\x4c\x6f\x63\x61\x6c\x5c\x4d\x69\x63\x72\x6f\x73\x6f\x66\x74\x5c\x57\x69\x6e\x64\x43e\x77\x73

1

File Hashes

0428e12f7bace624928c34073f5312473bf71c82de6a2f253306def471a4adf1
0900e88d7d4150623fa82b4d24ab4ff6d5a8951487c29238366c6bd881927b8e
0e8b8b16107a20aad175f56412f5d6620d2c1a807d86a452082cdd3f6dbb8011
1a6e21b399560930b061631c4ff475ee8408d28bbd4e385f23e6398ec96ef405
23ade5f024786791ff66513652970a54c43ea4a7be24a638cba66691c8cb71ee
25d4e6d9964c37115bc7210fec766438fb6380f314e7466405da59cefeb047ce
3e4d1ba7a3b90eb25289789f3be0e147d1c76b1566f3a0d02f84705a5b5468bc
4b2a69fe45e67b60fd162e588d09cf12a4958593a47ab03dca6279ccde674b21
70d1f6b40bc0008f5d818d3ab52bf91510298e84c09e806b1e37a128bc702a8e
7e8b3ca776836d299d6d906a9fc0e2ecb4471441be88cb6a0ad0f7eaaf483dd6
845f60706e697966f4812673a45f102db1d7f6c3c16ffaf57ca473ebcc30e855
84dbe000b9f0052541eed920de12d1d342cfa44662eda0f64684907d9b931ce6
880593452289c2ecbe0ea3e2896b7da917b52e0e152da71f92acea768ce9ba28
8cc83360e1e67b5d073dc82fd4b4ef08d2fc6f2fa222110ff3bbe2bac80c8381
90f286fd48d1d6d5a5377a3b3d2f79f13db0368c7001a4c43ec92aa34ffd850a
af6db888f95d5021a2c5ea9d41ebc43ef2b77ad1163822a456d67e6ce78c4b3b
b0431ddbf3ba31cfb4313e9ce7de5189c8eacd9069e25691f5769ccd6edb23b6
b509ab0ecf5e7b08f5b5b5726f0ea7030fa3470d4b6e484ba397067f403a83ec
b691cd89916ca4986ed42aa690138ff98a47300942b19720e7906418a2c22a3a
c1dfa3ab3ad30bea5ec4e3291f5000889bb69f1ed27cea11a212f768bf8e750b
ce59592235d7804211f5faf26152cb19bd7934a0dafe2cbdf0ba9d4102f5870a
cfc1f7b4d3b617aac9c76c038a51d87b78745a5d54d8daf05c43c2ebbdf81c44
d4665f9b5fc920f707f412bd41c99d1ae5b91b70e68d26c65acb976025586f91
d6cc7d0c6a10eedc5f21492af7d85c1b6313dc1f7020059179108cff938f4af4
d92eecac9866dd9f42f2f8850c445997b16aae7db08ddcf6f078e13fa1c4c549
*See JSON for more IOCs

Coverage

Product

Protection

Secure Endpoint

Cloudlock

N/A

CWS

Email Security

Network Security

Stealthwatch

N/A

Stealthwatch Cloud

N/A

Secure Malware Analytics

Umbrella

N/A

WSA

N/A

Screenshots of Detection****Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Dropper.Tofsee-10008793-0****Indicators of Compromise

  • IOCs collected from dynamic analysis of 21 samples

Registry Keys

Occurrences

<HKU>.DEFAULT\CONTROL PANEL\BUSES

3

<HKU>.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config2

3

<HKU>.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config0

3

<HKU>.DEFAULT\CONTROL PANEL\BUSES
Value Name: Config1

3

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\FPRMIAZV
Value Name: Type

1

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\FPRMIAZV
Value Name: Start

1

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\FPRMIAZV
Value Name: ErrorControl

1

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\FPRMIAZV
Value Name: DisplayName

1

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\FPRMIAZV
Value Name: WOW64

1

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\FPRMIAZV
Value Name: ObjectName

1

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\FPRMIAZV
Value Name: Description

1

<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\fprmiazv

1

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SCEZVNMI

1

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SCEZVNMI
Value Name: Type

1

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SCEZVNMI
Value Name: Start

1

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SCEZVNMI
Value Name: ErrorControl

1

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SCEZVNMI
Value Name: DisplayName

1

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SCEZVNMI
Value Name: WOW64

1

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SCEZVNMI
Value Name: ObjectName

1

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SCEZVNMI
Value Name: Description

1

<HKLM>\SOFTWARE\MICROSOFT\WINDOWS DEFENDER\EXCLUSIONS\PATHS
Value Name: C:\Windows\SysWOW64\scezvnmi

1

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\HRTOKCBX

1

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\HRTOKCBX
Value Name: Type

1

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\HRTOKCBX
Value Name: Start

1

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\HRTOKCBX
Value Name: ErrorControl

1

Mutexes

Occurrences

Global<random guid>

9

IP Addresses contacted by malware. Does not indicate maliciousness

Occurrences

142[.]250[.]176[.]196

3

176[.]113[.]115[.]136

3

80[.]66[.]75[.]4

3

176[.]113[.]115[.]135

3

104[.]127[.]87[.]210

3

45[.]143[.]201[.]238

3

62[.]122[.]184[.]92

3

176[.]113[.]115[.]84/31

3

62[.]122[.]184[.]58

3

46[.]173[.]215[.]145

3

34[.]120[.]241[.]214

3

149[.]154[.]167[.]99

2

31[.]13[.]65[.]52

2

37[.]1[.]217[.]172

2

142[.]250[.]65[.]163

2

52[.]101[.]40[.]29

2

93[.]115[.]25[.]13

1

93[.]115[.]25[.]10

1

93[.]115[.]25[.]73

1

93[.]115[.]25[.]110

1

66[.]254[.]114[.]62

1

142[.]250[.]179[.]164

1

104[.]26[.]0[.]70

1

20[.]70[.]246[.]20

1

20[.]112[.]250[.]133

1

*See JSON for more IOCs

Domain Names contacted by malware. Does not indicate maliciousness

Occurrences

249[.]5[.]55[.]69[.]bl[.]spamcop[.]net

3

249[.]5[.]55[.]69[.]cbl[.]abuseat[.]org

3

249[.]5[.]55[.]69[.]dnsbl[.]sorbs[.]net

3

249[.]5[.]55[.]69[.]in-addr[.]arpa

3

249[.]5[.]55[.]69[.]sbl-xbl[.]spamhaus[.]org

3

249[.]5[.]55[.]69[.]zen[.]spamhaus[.]org

3

microsoft-com[.]mail[.]protection[.]outlook[.]com

3

microsoft[.]com

3

www[.]google[.]com

3

www[.]evernote[.]com

3

steamcommunity[.]com

3

vanaheim[.]cn

3

i[.]instagram[.]com

2

work[.]a-poster[.]info

2

t[.]me

2

ag-filmwissenschaft[.]de

1

escolanacionalbrasil[.]com[.]br

1

smtp[.]mqmatt[.]demon[.]co[.]uk

1

goldorbit[.]co

1

wallet[.]moonstake[.]io

1

droneattitude[.]fr

1

xn–bro-365-n2a[.]de

1

leakmaster[.]fr

1

mx[.]mqmatt[.]demon[.]co[.]uk

1

tcmferramentas[.]com[.]br

1

*See JSON for more IOCs

Files and or directories created

Occurrences

%SystemRoot%\SysWOW64\config\systemprofile

3

%SystemRoot%\SysWOW64\config\systemprofile:.repos

3

%SystemRoot%\SysWOW64\fprmiazv

1

%SystemRoot%\SysWOW64\scezvnmi

1

%TEMP%\gaasvfjv.exe

1

%TEMP%\gnqlkeey.exe

1

%TEMP%\dkrujxqa.exe

1

File Hashes
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Coverage

Product

Protection

Secure Endpoint

Cloudlock

N/A

CWS

Email Security

Network Security

Stealthwatch

N/A

Stealthwatch Cloud

N/A

Secure Malware Analytics

Umbrella

WSA

Screenshots of Detection****Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Trojan.Fareit-10009186-1****Indicators of Compromise

  • IOCs collected from dynamic analysis of 24 samples

Registry Keys

Occurrences

<HKCU>\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS

18

<HKLM>\SYSTEM\CONTROLSET001\SERVICES\SCHEDULE
Value Name: NextAtJobId

6

<HKCU>\SOFTWARE\WINRAR

6

<HKLM>\SAM\SAM\DOMAINS\ACCOUNT\USERS\000003E9
Value Name: F

6

<HKLM>\SAM\SAM\DOMAINS\ACCOUNT\USERS\000001F5
Value Name: F

6

<HKLM>\SAM\SAM\DOMAINS\ACCOUNT\USERS\000003EC
Value Name: F

6

<HKCU>\SOFTWARE\WINRAR
Value Name: HWID

6

<HKLM>\SOFTWARE\WOW6432NODE\PWRKXXZKWU

5

<HKCU>\SOFTWARE\PWRKXXZKWU

5

<HKCU>\SOFTWARE\NVIDIA CORPORATION

2

<HKCU>\SOFTWARE\NVIDIA CORPORATION\GLOBAL

2

<HKCU>\SOFTWARE\NVIDIA CORPORATION\GLOBAL\NVUPDSRV

2

<HKCU>\SOFTWARE\NVIDIA CORPORATION\GLOBAL\NVUPDSRV
Value Name: value

2

<HKCU>\SOFTWARE\NVIDIA CORPORATION\GLOBAL\NVUPDSRV
Value Name: GUID

2

<HKLM>\SOFTWARE\CLASSES\M1.DOCUMENT\DEFAULTICON

1

<HKLM>\SOFTWARE\CLASSES\M1.DOCUMENT\SHELL\OPEN\DDEEXEC

1

<HKLM>\SOFTWARE\CLASSES\M1.DOCUMENT\SHELL\PRINT\DDEEXEC

1

<HKLM>\SOFTWARE\CLASSES\M1.DOCUMENT\SHELL\PRINTTO\DDEEXEC

1

<HKLM>\SOFTWARE\CLASSES\M1.DOCUMENT\SHELL\OPEN\COMMAND

1

<HKLM>\SOFTWARE\CLASSES\M1.DOCUMENT\SHELL\PRINT\COMMAND

1

<HKLM>\SOFTWARE\CLASSES\M1.DOCUMENT\SHELL\PRINTTO\COMMAND

1

<HKLM>\SOFTWARE\CLASSES.EWRWER

1

<HKLM>\SOFTWARE\CLASSES.EWRWER\SHELLNEW
Value Name: NullFile

1

<HKLM>\SOFTWARE\CLASSES\M1.DOCUMENT\INSERTABLE

1

<HKLM>\SOFTWARE\CLASSES\M1.DOCUMENT\PROTOCOL\STDFILEEDITING\VERB\0

1

Mutexes

Occurrences

85485515

23

Global\MD7H82HHF7EH2D73

2

SQCIK-B9ZAV-QTJCA

1

GLOBAL{<random GUID>}

1

Global\dc1806a1-5c3b-11ee-9660-00151739c869

1

Local{<random GUID>}

1

IP Addresses contacted by malware. Does not indicate maliciousness

Occurrences

212[.]47[.]210[.]141

2

85[.]234[.]129[.]33

1

62[.]212[.]132[.]148

1

77[.]72[.]24[.]240

1

81[.]169[.]154[.]37

1

83[.]142[.]191[.]37

1

178[.]32[.]62[.]1

1

81[.]169[.]187[.]148

1

87[.]106[.]69[.]18

1

Domain Names contacted by malware. Does not indicate maliciousness

Occurrences

volwsak[.]pw

6

volekas[.]pw

6

discover-lang[.]com

5

net-forwarding[.]com

5

t14qb[.]mrbasic[.]com

2

tkpt[.]fvgd[.]biz

2

vbqq[.]fvgd[.]biz

2

ztnf[.]axvf[.]biz

2

aaej[.]axvf[.]biz

1

bhtd[.]fvgd[.]biz

1

bkzb[.]ethv[.]biz

1

fmwz[.]fvgd[.]biz

1

mtid[.]ethv[.]biz

1

tycy[.]axvf[.]biz

1

frgodogcat[.]com

1

ns9[.]ildepizza[.]com

1

u8x26[.]mrbasic[.]com

1

fmwz[.]axvf[.]biz

1

xdfv[.]fvgd[.]biz

1

tycy[.]ethv[.]biz

1

xdfv[.]ethv[.]biz

1

bkzb[.]fvgd[.]biz

1

vbqq[.]ethv[.]biz

1

hrvv[.]ethv[.]biz

1

vyic[.]axvf[.]biz

1

*See JSON for more IOCs

Files and or directories created

Occurrences

%System32%\Tasks\At1

6

%SystemRoot%\Tasks\At1.job

6

%SystemRoot%\calc2.exe

6

%TEMP%\st1m.bat

3

%APPDATA%\Ymak

1

%LOCALAPPDATA%\hjakeri.dll

1

%TEMP%\FB_20CD.tmp

1

%TEMP%\FB_20CD.tmp.exe

1

%TEMP%\FB_257F.tmp

1

%TEMP%\FB_257F.tmp.exe

1

%TEMP%\tmpc254a5e1.bat

1

%APPDATA%\Uzyz

1

%APPDATA%\Uzyz\ebesa.fye

1

%APPDATA%\Ymak\udvyn.exe

1

%APPDATA%\Yqociv

1

%APPDATA%\Yqociv\qivu.zys

1

File Hashes
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Coverage

Product

Protection

Secure Endpoint

Cloudlock

N/A

CWS

Email Security

Network Security

Stealthwatch

N/A

Stealthwatch Cloud

N/A

Secure Malware Analytics

Umbrella

N/A

WSA

N/A

Screenshots of Detection****Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Worm.Gh0stRAT-10009166-0****Indicators of Compromise

  • IOCs collected from dynamic analysis of 31 samples

Registry Keys

Occurrences

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: EvtMgr

31

Mutexes

Occurrences

174.139.65.202:8760

31

M174.139.65.202:8760

31

Global<random guid>

31

IP Addresses contacted by malware. Does not indicate maliciousness

Occurrences

174[.]139[.]65[.]205

31

174[.]139[.]65[.]202/31

31

Files and or directories created

Occurrences

\1.txt

31

%TEMP%<random, matching '[a-z]{4,9}’>.exe

31

<random, matching [a-z]{7,15}>

6

\lrcmq

2

\lrcmq\wybmh.ymw

2

\lrcmq\ReadMe.txt

2

\fejyf\svamaxhsy.vms

1

\efjqqprp\abtvmh.bva

1

\svqpd\pcgdt.cdp

1

\vjrfw\idvsblp.dsi

1

\bguta\vzihmd.zhv

1

\imzbs\lgccxccv.gcl

1

\udbstlvp\idbat.dai

1

\xihzc\otojrb.tjo

1

\dzsvfx\ixzyo.xyi

1

\yfahi\qbifb.bfq

1

\ymcmn\oklllrus.klo

1

\lhjdg\kmsxaybss.mxk

1

\qultury\xpjhq.phx

1

\opawz\dzsvfx.zvd

1

\lmvot\wgqdg.gdw

1

\lwajlifh\wfijai.fjw

1

\ffrycfmqw\kilqo.iqk

1

\lyonu\ywprw.wry

1

\cvszt\vgixf.gxv

1

*See JSON for more IOCs

File Hashes
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*See JSON for more IOCs

Coverage

Product

Protection

Secure Endpoint

Cloudlock

N/A

CWS

Email Security

Network Security

N/A

Stealthwatch

N/A

Stealthwatch Cloud

N/A

Secure Malware Analytics

Umbrella

N/A

WSA

N/A

Screenshots of Detection****Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Dropper.Zeus-10008893-0****Indicators of Compromise

  • IOCs collected from dynamic analysis of 12 samples

Registry Keys

Occurrences

<HKCU>\SOFTWARE\MICROSOFT\INTERNET EXPLORER\PRIVACY
Value Name: CleanCookies

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.101
Value Name: CheckSetting

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.103
Value Name: CheckSetting

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.100
Value Name: CheckSetting

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.102
Value Name: CheckSetting

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\ACTION CENTER\CHECKS{E8433B72-5842-4D43-8645-BC2C35960837}.CHECK.104
Value Name: CheckSetting

1

<HKCU>\SOFTWARE\MICROSOFT\GOACAK

1

<HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN
Value Name: {738044C7-06CF-34DA-23BD-3CA69922D313}

1

<HKCU>\SOFTWARE\MICROSOFT\GOACAK
Value Name: Hosa

1

Mutexes

Occurrences

Local{959438EF-7AE7-D2CE-23BD-3CA69922D313}

1

Local{959438EC-7AE4-D2CE-23BD-3CA69922D313}

1

Local{BE325DDE-1FD6-F968-23BD-3CA69922D313}

1

GLOBAL{<random GUID>}

1

Domain Names contacted by malware. Does not indicate maliciousness

Occurrences

sauti[.]com[.]ua

1

Files and or directories created

Occurrences

%TEMP%\tmp0aabb930.bat

1

%APPDATA%\Syefa

1

%APPDATA%\Syefa\hapa.exe

1

%APPDATA%\Yqly

1

%APPDATA%\Yqly\ixyc.nuk

1

File Hashes

299b13d4abf4778c8aee767664199ae66ad8b5272b7d03154e0d67177d45f782
47c4de16f346d43f1d01e891545099538d195fc92bb153bbbd19cf8c61c447f4
5d70499ee878a0967ff397c09451afdd9f37b411532a1c1ee4f3069ea99058f2
5db027d44698ce496cf23eb5dd9b227898edb7b54bd65528218e4795205a1c9c
6ae6bb2ba9196186c7014b5bfd97f0e2971e540a97fe680bec37274e879577fb
6ec59e9586a5e1d8ded53176e8e324e2dbd0b24455e16cedf850d696c7b89fea
b9e9380a9ce7ad925d002999811482323df4d8472d39426f67ef117800f83539
bc7ccda17dc399f52e02c98009e0353835574e575c89247873f3cb99747b161f
bed77c67f4d93e31843ba750f2c6774a9a10c2ae6a99019dc8a1a7140f68bd6f
d48b70b404041e1e3a62d838e02c574b98d31d3fdb589f4bf9a2b470894a195b
dfb679e2b49952f5dac9182daa68ea3121dd8afc582a0d7e620941c61a96b744
dffff68e9e9b25c181829bd68f64c21d8679a21b2d00f7eaead8335e4b3f4f02

Coverage

Product

Protection

Secure Endpoint

Cloudlock

N/A

CWS

Email Security

Network Security

N/A

Stealthwatch

N/A

Stealthwatch Cloud

N/A

Secure Malware Analytics

Umbrella

N/A

WSA

N/A

Screenshots of Detection****Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

Win.Malware.Generickdz-10009245-0****Indicators of Compromise

  • IOCs collected from dynamic analysis of 37 samples

Registry Keys

Occurrences

<HKCU>\SOFTWARE\MICROSOFT\CITYDAYMUXBDTZQMCTPQF

37

<HKCU>\SOFTWARE\MICROSOFT\CITYDAYMUXBDTZQMCTPQF
Value Name: fQptCmQZtDBxUm

37

IP Addresses contacted by malware. Does not indicate maliciousness

Occurrences

23[.]221[.]227[.]169

13

204[.]8[.]99[.]144

11

116[.]202[.]120[.]165

10

23[.]221[.]227[.]172

10

116[.]202[.]120[.]166

9

204[.]8[.]99[.]146

7

23[.]12[.]144[.]141

4

23[.]207[.]202[.]25

3

23[.]207[.]202[.]50

2

23[.]207[.]202[.]61

2

23[.]12[.]144[.]134

2

23[.]207[.]202[.]8

1

Domain Names contacted by malware. Does not indicate maliciousness

Occurrences

dist[.]torproject[.]org

37

apps[.]identrust[.]com

37

Files and or directories created

Occurrences

%APPDATA%\tor

37

%APPDATA%\tor\lock

37

%APPDATA%\tor\state.tmp

37

%APPDATA%\tor\keys

37

%ProgramFiles%\MicrosoftEdgeUpdateTaskMachinUA\LXofuCuCRy

37

%ProgramFiles%\MicrosoftEdgeUpdateTaskMachinUA\LXofuCuCRy\LXofuCuCRybdyb

37

%ProgramFiles%\MicrosoftEdgeUpdateTaskMachinUA\LXofuCuCRy\data

37

%ProgramFiles%\MicrosoftEdgeUpdateTaskMachinUA\LXofuCuCRy\data\geoip

37

%ProgramFiles%\MicrosoftEdgeUpdateTaskMachinUA\LXofuCuCRy\data\geoip6

37

%ProgramFiles%\MicrosoftEdgeUpdateTaskMachinUA\LXofuCuCRy\tor

37

%ProgramFiles%\MicrosoftEdgeUpdateTaskMachinUA\LXofuCuCRy\tor\pluggable_transports

37

%ProgramFiles%\MicrosoftEdgeUpdateTaskMachinUA\LXofuCuCRy\tor\pluggable_transports\lyrebird.exe

37

%ProgramFiles%\MicrosoftEdgeUpdateTaskMachinUA\LXofuCuCRy\tor\tor.exe

37

%ProgramFiles%\MicrosoftEdgeUpdateTaskMachinUA\LXofuCuCRy\authorized_clients

37

%ProgramFiles%\MicrosoftEdgeUpdateTaskMachinUA\LXofuCuCRy\hostname.tmp

37

%ProgramFiles%\MicrosoftEdgeUpdateTaskMachinUA\LXofuCuCRy\hs_ed25519_public_key.tmp

37

%ProgramFiles%\MicrosoftEdgeUpdateTaskMachinUA\LXofuCuCRy\hs_ed25519_secret_key.tmp

37

%ProgramFiles%\MicrosoftEdgeUpdateTaskMachinUA

37

%ProgramFiles%\MicrosoftEdgeUpdateTaskMachinUA\MicrosoftEdgeUpdateTaskMachinUA.exe

37

%TEMP%\rICllE

37

%CommonProgramFiles%\SSL\openssl.cnf

36

%System32%\Tasks\MicrosoftEdgeUpdateTaskMachinUA

34

File Hashes
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*See JSON for more IOCs

Coverage

Product

Protection

Secure Endpoint

Cloudlock

N/A

CWS

Email Security

Network Security

Stealthwatch

N/A

Stealthwatch Cloud

N/A

Secure Malware Analytics

Umbrella

N/A

WSA

N/A

Screenshots of Detection****Secure Endpoint

Secure Malware Analytics

MITRE ATT&CK

TALOS: Latest News

Something to Read When You Are On Call and Everyone Else is at the Office Party