RST TI Report Digest: 11 Mar 2024

RST Cloud
7 min readMar 11, 2024

This is a weekly threat intelligence report review from RST Cloud. We have analysed 42 threat intelligence reports this week and have presented a concise summary of the reports along with the extracted relevant metadata. You can find below a short summary of each report, related threats, tools, threat actors, a link to the source, and a number of extracted indicators of compromise (IoCs) from the original reports. More granular information, including TTPs, on all reports is available via RST Report Hub.

Title: New Banking Trojan CHAVECLOAK Targets Brazil

Link: https://www.fortinet.com/blog/threat-research/banking-trojan-chavecloak-targets-brazil

Summary: FortiGuard Labs uncovered a cyber threat involving the banking Trojan CHAVECLOAK, which is utilizing a malicious PDF file as its distribution method. This intricate attack involves the PDF downloading a ZIP file and leveraging DLL side-loading techniques to execute the final malware, designed to target Brazilian users for financial data theft. The threat landscape in South America encompasses various banking trojans like Casbaneiro, Guildma, and Grandoreiro, employing tactics such as phishing emails and browser manipulation to extract online banking details, emphasizing the need for heightened cybersecurity measures in the region.

Threats: chavecloak dll_sideloading_technique metamorfo astaroth mekotio grandoreiro

Indicators of compromise:
-------------------------
ip: 64.225.32.24
domain: mariashow.ddns.net
url: https://webattach.mail.yandex.net/message_part_real/notafiscalesdeletronicasufactrub66667kujhdfdjrwewgfg09t5h6854jhgjuur.zip, http://64.225.32.24/shn/inspecionando.php, http://64.225.32.24/desktop/inspecionando.php, http://mariashow.ddns.net/dtp/cnx.php, https://goo.su/ftd9owo
hash:
- sha256=51512659f639e2b6e492bba8f956689ac08f792057753705bf4b9273472c72c4,
- sha256=48c9423591ec345fc70f31ba46755b5d225d78049cfb6433a3cb86b4ebb5a028,
- sha256=4ab3024e7660892ce6e8ba2c6366193752f9c0b26beedca05c57dcb684703006,
- sha256=131d2aa44782c8100c563cd5febf49fcb4d26952d7e6e2ef22f805664686ffff,
- sha256=8b39baec4b955e8dfa585d54263fd84fea41a46554621ee46b769a706f6f965c,
- sha256=634542fdd6581dd68b88b994bc2291bf41c60375b21620225a927de35b5620f9,
- sha256=2ca1b23be99b6d46ce1bbd7ed16ea62c900802d8efff1d206bac691342678e55

Title: SapphireStealer Sneaks In: Deceptive Legal Documents Prey on Russians

Link: https://cyble.com/blog/sapphirestealer-sneaks-in-deceptive-legal-documents-prey-on-russians

Summary: Cyble Research and Intelligence Labs (CRIL) discovered a malicious campaign targeting Russian individuals, spreading SapphireStealer malware through a fake Russian government website disguised as PDF documents. Upon execution, the malware collects sensitive information like login credentials and web data, sending it to a Command-and-Control server. The threat actor responsible remains unknown, with the campaign using social engineering tactics to manipulate emotions and increase successful infections.

Threats: sapphirestealer sapphire credential_dumping_technique

Indicators of compromise:
-------------------------
ip: 193.39.185.4
domain: govermentu.ru
url: http://govermentu.ru/media/federalnoeupravlenie_postanovlenie_o_vozbuzdenie_ispolnitelnogo_proizvodstava.exe
hash:
- sha256=850a99d2039dadb0c15442b40c90aa4dac16319114455ab5904aa51e062fe6e1, sha1=6b44ab6c246c077ee0e6f51300654b3eec2fddc7, md5=5c025a9e86a125bf2f2ca5c1b29b42a6,
- md5=55bb772aea4303ca373fd8940663b6bd, sha256=c816d0be8d180573d14d230b438a22d7dda6368b1ef1733754eda9804f295a2f, sha1=b396a8d5e30fb179f3139d28b843b57bb8ae3f47

Title: The NGC2180 group spies on high-ranking targets using the DFKRAT implant

Link: https://rt-solar.ru/solar-4rays/blog/4124

Summary: The Solar 4RAYS team conducting a Compromise Assessment discovered a multi-stage malware attack involving the implant DFKRAT targeting an executive authority. The espionage-focused malware enables data exfiltration, interactive shell support, and potential downloading of additional malware from C2 control servers, with compromised servers in Greece and Indonesia used for the implant. The attackers, identified as the NGC2180 group, exhibited operational sophistication by leveraging DLL side-loading, unique processes, and encrypted communication with C2 servers, indicating potential political motivations.

Threats: ngc2180_group dfkrat dll_sideloading_technique timestomp_technique winrm_tool

Indicators of compromise:
-------------------------
ip: 152.89.244.99, 172.245.93.126
domain: windowscer.shop, iam.ottodigital.id, mail.inn.demokritos.gr
url: https://mail.inn.demokritos.gr/yui/2.7.0/fonts/foot.jsp, https://windowscer.shop/admin/login.php, https://152.89.244.99/admin/login.php, https://iam.ottodigital.id/emailotpauthenticationendpoint/css/css.jsp
hash:
- md5=379b72a6fadeb462ec884ca868025b6c,
- sha1=173a28539ca6dab5ac8c3b995abaa692f95c5fc4,
- md5=8ce681f1c9ddf69a4ad4d53de57e404f,
- md5=d7881fc5e3f93b39d3e84ccf988cc392,
- sha1=1cf5550ba6165341e28d773228634ae84cecbf23,
- sha1=277624720ede4ed518ac7af599147c7f6bbdf7a4, md5=bb64fcb014d913b92975fccd5fa3e9b1, sha256=144572ee5214f7289d1f71a44d90eb4ba2ac7d48f6e6b5b166f8ca7fe89afe9c,
- sha256=a7aa8a58a7f78b56623ed6475cb952ce82aec84e6ceebb2a8ffeea76edd3b486, md5=1da3ce8c4267bf982e43472a08fa2ca1, sha1=88c5c02581b4b7fd3897d440f41d2bada9b6e704,
- sha1=c899f4ae89f38ce5c8d25a2878cef43980930f2b, md5=dc9f192bb1f6db275feab8e8cfef28b9,
- sha1=da491c0e1dfdf632c7e03b223d975f1b5c84c63f, md5=2e131ee69a4eee238a5353f34a81faed, sha256=173ef7cc57507c21606926fbd2f2d8ea1c65fc911585ca857a2865d890be4eff,
- md5=7a90445dfb62f5d7b759b48c071b352c, sha1=804b14241e39eba26a6e6b1d678bb66791de1d2a, sha256=069f69df3dabe637c552739bd3274234dacf0f68f88fb18868fa43fb97a57bc1,
- sha256=0de1ddd6598e97e4e54ad09fb507e99ebfea4c2d6215b13fe5fd2fee0460499c, md5=97cb6c20b98cac47fd2e68049c8ce3e1, sha1=8075ba19ebbfc6fdd43aeccf1453b61aaac11ec9,
- sha1=f5092196c498a9c30c5a45273d3d37d678132634, sha256=16dc482c4bcb1655c7d4d72545425889a732443aaa50ba17378505b16fabb9f6, md5=e84bdb0848b48148507f53d6dc1eee08,
- sha1=6ba3cd97f36709c4316c19ef724c80b6109110a6, md5=0aba8aa717171fdcc5f501eded8f685c, sha256=a2f079a1919336c552c4a147e6ab77515734fd51624561342cc2f505697af9c2,
- sha1=051d4e42f2aff932f7e97355d1e9f6332fc9fa8c, md5=eeb1f109fc8185cfe9fb5393a0b6335b, sha256=92c942ba2f010153a2929934946878151a2145f705e45c153c2855baf2e3ab9a

Title: Unveiling Earth Kapre aka RedCurls Cyberespionage Tactics With Trend Micro MDR, Threat Intelligence. Unveiling Earth Kapre aka RedCurl s Cyberespionage Tactics With Trend Micro MDR, Threat Intelligence

Link: https://www.trendmicro.com/en_us/research/24/c/unveiling-earth-kapre-aka-redcurls-cyberespionage-tactics-with-t.html

Summary: The Trend Micro Managed Extended Detection and Response (MDR) team discovered intrusion sets used by the Earth Kapre cyberespionage group, also known as RedCurl and Red Wolf, involved in phishing campaigns targeting organizations globally. They use malicious attachments in phishing emails to infect machines, establish persistence through scheduled tasks, and exfiltrate sensitive data to command-and-control servers. The group employs legitimate tools like Powershell.exe and curl.exe for downloading subsequent stage malware, and obfuscation techniques to evade detection, utilizing Impacket for network protocol exploitation. The investigation emphasizes the group's tactics.

Threats: red_wolf_group crudler impacket_tool smbexec_tool netstat_tool

Indicators of compromise:
-------------------------
ip: 23.254.224.79
domain: preston.melaniebest.com
url: http://preston.melaniebest.com/ms/ms.tmp, https://preslive.cn.alphastoned.pro/ms/msa.tmp, https://unipreg.tumsun.com/ms/psa.tmp, http://report.hkieca.com/ms/msa.tmp, http://preston.melaniebest.com, http://preston.melaniebest.com/ms/curl.tmp, http://preston.melaniebest.com/ms/7za.tmp, http://preston.melaniebest.com/ms/msa.tmp, https://preslive.cn.alphastoned.pro/ms/curl.tmp, https://preslive.cn.alphastoned.pro/ms/7, http://unipreg.tumsun.com:80/ms/psa.tmp, http://unipreg.tumsun.com:80/ms/7za.tmp, https://preslive.cn.alphastoned.pro:443/ms/curl.tmp
hash:
- sha1=1cf5d081dcc474eefb710ce11f67ab2a9d5f829a,
- sha1=28ef33b00c9c347f35405ff0b35c499acd71573e,
- sha1=2003d2de9c155799fea82663245add57d59813aa,
- sha1=240e037af8964388d8ca92385528bece5e0c6546,
- sha1=5f0fea19115fea2596a6db636736ff96510b79fb,
- sha1=67dae474eb9eb8c2f7b8d315d84ca9b5de31d5da,
- sha1=732aa4679a372696b67c0666cd8c0279049d7a92,
- sha1=819c480f31650773a8e3de3ffb8f89a8ce062368,
- sha1=8a8f1dcdc301036fae02269da2d26f321886444b,
- sha1=8e5bacc6773843bac2f52c63bd0f6e4a868eb4da,
- sha1=ae5496ce5295a11957d7bb19c903c8128d0e73c1,
- sha1=df4099baa679fca159a301fb1b9aaa9d4ef4648c,
- sha1=f3cfbf02099830ce9492d231b4a00dbcb46facd4

Title: The Spreading Wave of Pig-Butchering Scams in India

Link: https://cyble.com/blog/the-spreading-wave-of-pig-butchering-scams-in-india

Summary: Cyble has identified a fraudulent scheme called the Pig-butchering scam targeting Indian investors through fake trading apps on the Google Play Store and App Store. The scammers use compromised developer accounts to distribute these apps and deceive victims with phishing sites, falsely claiming partnerships with reputable companies, and impersonating Indian brokerage firms. The scam also extends to Taiwan and Korea, with evidence suggesting Chinese cybercriminals as the masterminds behind the operation. Victims are lured through social media platforms with promises of high stock market returns, led to invest in fraudulent schemes, and left unable to withdraw their funds, with recent arrests in India revealing connections to cybercriminals in China, emphasizing the global and transnational nature of the operation.

Threats: pig_butchering_campaign

Indicators of compromise:
-------------------------
ip: 34.131.1.213
domain: app.panth-ss.vip, app.yongljt.com, giottusmh.com, giottusmk.com
url: https://provexfintech.com, https://www.protbg.com, https://downs.fcsdmp.top, https://downs.fxdxp.top, https://downs.fxdst.top, https://www.inueyd.com/?v=3
hash:
- sha256=faf7a001250ef1dbd2d6eaf8eabbd8d589c0960e871325808a7a1a76619c4b4f, sha1=87196e5cda572d63c43d52df200e823a9811e33a, md5=ecce84056298bc3bcc8c17d6ed12a29b,
- sha256=0a2fffb84d58dbf3cb2a50fd15d3cda9b3998c85c0424e29bf0964cc6bbda920, sha1=2288add2292e026cb32933943d2c9f105e57ed8d, md5=a522af373e24042e4b1995a186cfed6a,
- md5=e1b935f23c49ac0b1176c3b650e5bc12, sha256=52c36d2e1c5df64b96e017625fdd2d1c07e2a0b741c155735d09c068b23d54ad, sha1=53c40428b48050ecd851f58b020629f58b6bd18f

Title: Fenix Botnet Targeting LATAM Users. NarniaRAT

Link: https://www.esentire.com/blog/fenix-botnet-targeting-latam-users

Summary: The text outlines the discovery of two malware variants, NarniaRAT and BotnetFenix, in a cyber threat campaign targeting Latin American users. NarniaRAT focuses on exfiltrating files and monitoring browser processes related to banking activities in the region, while BotnetFenix, written in Rust, can download and execute remote tasks including reflective code loading and running PowerShell commands. The Threat Response Unit (TRU) identified the campaign targeting Latin American users in January 2024, with victims downloading a malicious zip archive disguised as a Government of Mexico website, leading to the installation of a Remote Access Trojan (RAT) with information-stealing capabilities. The emphasis is placed on recognizing initial infection vectors, such as visiting malicious websites, and the need for awareness regarding untrusted sites, as well as the significance of monitoring network traffic for abnormal patterns indicating C2 communication.

Threats: fenix narniarat process_injection_technique

Indicators of compromise:
-------------------------
ip: 45.77.71.28
domain: app.quantumservice.lat
url: https://app.quantumservice.lat/2xpbhudaa4/vc67j2.xls, https://app.quantumservice.lat/2xpbhudaa4/narnia.xls, https://app.quantumservice.lat/2xpbhudaa4/7agnsdgg4.txt
hash:
- md5=594804aa21887ee9d7b1b888f482d60c,
- md5=95260c9385dbb1f52004e7ab5aceda96,
- md5=a7fadf0050d4d0b2cefd808e16dfde69,
- md5=7f739c189c96d42bff65e8b7b7c42237,
- md5=43f6c3f92a025d12de4c4f14afa5d098,
- md5=cfb7d71a73585052041f8c9a057c83c6

Title: Penetration Tester’s Shadow: F.A.C.C.T. Experts investigated unknown Shadow ransomware attacks

Link: https://www.facct.ru/blog/shadow-ransomware

Summary: A series of cyberattacks from September 2022 to August 2023 in Russia targeted over a hundred entities, with the attackers identified by the cyber intelligence platform F.A.C.C.T. Threat Intelligence. The attacks were linked to the organized crime group Shadow within the ShadowTwelve syndicate, utilizing customized versions of LockBit 3.0 and Babuk ransomware to demand ransoms up to $3.5 million. The group employed widely available tools like Metasploit, SQLMap, ProxyShell-Scanner, Cobalt Strike, Mythic Athena, and Sliver for reconnaissance, exploitation, remote access, and data manipulation.

Threats: metasploit_tool sqlmap_tool proxyshellscanner_tool dockerregistrygrabber_tool mythic_c2 athena_botnet c0met_group babuk lockbit crackmapexec_tool cobalt_strike sliver_c2_tool proxylogon_exploit proxynotshell_vuln proxyshell_vuln meterpreter_tool facefish beacon xenarmor_tool dynamic_linker_hijacking_technique

Indicators of compromise:
-------------------------
ip: 62.171.152.48, 91.207.183.54, 135.181.46.97, 64.226.104.111
domain: vindowsupdt.ru, huibudesh.lol, stela-artua.xyz
url: http://62.171.152.48:8000, http://64.226.104.111/ssh1200
hash:
- sha1=96e06691a3c430aac9c43a2bb2b347dda88e4ade,
- sha1=01e414085c2c21c9f971c4889e8ddbe85e4f3a65,
- sha1=f1a4abd70f8e56711863f9e7ed0a4a865267ec77,
- sha1=7c113a202124ba3ca4fb39c8437789bdc69fdd8f,
- sha1=77ceaff8710d84069df4f2f20e37b3ed4005bc19,
- sha1=c9eea274813603cb2686ac902383352384312319,
- sha1=fd7980d3e437f28000fa815574a326e569eb548e

Title: Magnet Goblin Targets Publicly Facing Servers Using 1-Day Vulnerabilities

Link: https://research.checkpoint.com/2024/magnet-goblin-targets-publicly-facing-servers-using-1-day-vulnerabilities

Summary: The text highlights the tactics of Magnet Goblin, a financially motivated threat actor exploiting 1-day vulnerabilities in public-facing services like Ivanti Connect Secure VPN, Magento, and Qlink Sense. The group deploys custom Linux backdoors such as NerbianRAT and MiniNerbian, alongside tools like ScreenConnect and AnyDesk for financial gain. Magnet Goblin's recent campaign involved a new Linux variant of NerbianRAT and JavaScript credential stealer WARPWIRE, showcasing their quick adoption of vulnerabilities and focus on targeting edge devices with custom malware families. The group also exploits Magento servers as Command and Control servers.

Threats: magnet_goblin_group nerbian_rat warpwire screenconnect_tool anydesk_tool ligolo cactus

Indicators of compromise:
-------------------------
ip: 172.86.66.165, 94.156.71.115, 23.184.48.132, 91.92.240.113, 45.9.149.215, 45.153.240.73
domain: biondocenere.com, who-international.com, mailchimp-addons.com, allsecurehosting.com, dev-clientservice.com, oncloud-analytics.com, cloudflareaddons.com, textsmsonline.com, proreceive.com
url: http://94.156.71.115/lxrt, http://91.92.240.113/aparche2, http://45.9.149.215/aparche2, https://www.miltonhouse.nl/pub/opt/processor.php, http://91.92.240.113/auth.js, http://91.92.240.113/login.cgi, http://91.92.240.113/agent, http://45.9.149.215/agent, http://94.156.71.115/agent, http://94.156.71.115/instali.ps1, http://94.156.71.115/ligocert.dat, http://94.156.71.115/angel.dat, http://94.156.71.115/windows.xml, http://94.156.71.115/instal1.ps1, http://94.156.71.115/maintenance.ps1, http://94.156.71.115/baba.dat, http://cloudflareaddons.com/assets/img/image_slider15.1.png, https://theroots.in/pub/media/avatar/223sam.jpg
hash:
- sha256=027d03679f7279a2c505f0677568972d30bc27daf43033a463fafeee0d7234f6,
- sha256=9cb6dc863e56316364c7c1e51f74ca991d734dacef9029337ddec5ca684c1106,
- sha256=9d11c3cf10b20ff5b3e541147f9a965a4e66ed863803c54d93ba8a07c4aa7e50,
- sha256=d3fbae7eb3d38159913c7e9f4c627149df1882b57998c8acaac5904710be2236,
- sha256=df91410df516e2bddfd3f6815b3b4039bf67a76f20aecabccffb152e5d6975ef,
- sha256=99fd61ba93497214ac56d8a0e65203647a2bc383a2ca2716015b3014a7e0f84d,
- sha256=9ff0dcce930bb690c897260a0c5aaa928955f4ffba080c580c13a32a48037cf7,
- sha256=3367a4c8bd2bcd0973f3cb22aa2cb3f90ce2125107f9df2935831419444d5276,
- sha256=f23307f1c286143b974843da20c257901cf4be372ea21d1bb5dea523a7e2785d,
- sha256=f1e7c1fc06bf0ea40986aa20e774d6b85c526c59046c452d98e48fe1e331ee4c,
- sha256=926aeb3fda8142a6de8bc6c26bc00e32abc603c21acd0f9b572ec0484115bb89,
- sha256=894ab5d563172787b052f3fea17bf7d51ca8e015b0f873a893af17f47b358efe,
- sha256=1079e1b6e016b070ebf3e1357fa23313dcb805d3a6805088dbc3ab6d39330548,
- sha256=e134e053a80303d1fde769e50c2557ade0852fa827bed9199e52f67bac0d9efc,
- sha256=7967def86776f36ab6a663850120c5c70f397dd3834f11ba7a077205d37b117f,
- sha256=9895286973617a79e2b19f2919190a6ec9afc07a9e87af3557f3d76b252292df,
- sha256=bd9edc3bf3d45e3cdf5236e8f8cd57a95ca3b41f61e4cd5c6c0404a83519058e,
- sha256=b35f11d4f54b8941d4f1c5b49101b67b563511a55351e10ad4ede17403529c16,
- sha256=7b1d1e639d1994c6235d16a7ac583e583687660d7054a2a245dd18f24d10b675,
- sha256=8fe1ed1e34e8758a92c8d024d73c434665a03e94e5eb972c68dd661c5e252469,
- sha256=fa317b071da64e3ee18d82d3a6a216596f2b4bca5f4d3277a091a137d6a21c45

Title: Exploiting Document Templates: Stego-Campaign Deploying Remcos RAT and Agent Tesla

Link: https://www.cyfirma.com/outofband/exploiting-document-templates-stego-campaign-deploying-remcos-rat-and-agent-tesla

Summary: The research conducted by CYFIRMA reveals a sophisticated cyber threat utilizing a stego-campaign with a malicious .docx file to deliver the Remcos Remote Access Trojan (RAT) and the Agent Tesla malware. This multi-stage attack involves template injection in Microsoft Office documents to bypass traditional email security measures, leading to remote control, keylogging, data theft, and more. Threat actors employ various tactics, such as exploiting the Equation Editor Vulnerability, using VB scripts and PowerShell for payload execution, and steganography to encode malicious payloads, underlining the need for proactive cybersecurity measures to counter such advanced attacks. The report emphasizes the evolving tactics and methods used by threat actors to evade detection and achieve their malicious goals, highlighting the connections to Command and Control servers in orchestrating the campaign.

Threats: remcos_rat agent_tesla steganography_technique lolbin_technique winrm_tool xworm_rat spear-phishing_technique process_injection_technique

Indicators of compromise:
-------------------------
ip: 119.63.80.29, 178.237.33.50, 107.173.4.15, 115.251.187.194
domain:
url: http://someofthelovercantbuyhappinessfromthe@shtu.be/5f0848, http://107.173.4.15/gbn/mydearcutieireallyloveryoualwaysforgreatthingshappenedinsideofusforloverstogetreadyforthepointounderstandtheupdationforproccess.doc, http://shut.be/5f0848, http://107.173.4.15/gbn/mydearcutieireallyloveryou, https://paste.ee/d/amgog, https://uploaddeimagens.com.br/images/007826222, http://45.74.19.84/xampp/bkp/vbs_novo_new_image.jpg?1707826222, http://45.74/xampp/bkp/vbs_novo_new_image.jpg, http://107.173.4.15/35005/hza.txt, http://107.173.4.15/35005/modernlover.vbs, http://45.74.19.84/xampp/bkp/vbs_novo_new_image.jpg, https://uploaddeimagens.com.br/images/004/739/227/original/new_image.jpg?1707826222
hash:
- md5=7e9afffcd5105a119308bc5e1289fda4,
- sha256=29325e23a684f782db14a1bf0dc56c65228e666d1f561808413a735000de3515,
- md5=65efdcbd4bc64e6e48d82bfa31f710fd,
- md5=b1db2292ba6cdddc3237f97f0ee0324f,
- md5=e765e253ada44cc90df9e196df0d1ef1,
- md5=2672a881a5374e507c3ca3a152617c21,
- md5=7ed7dfb7e823a6eb10591d86a2d25222,
- md5=e85e113f938d9f64de952308c0ad8333,
- md5=5f8d4be7bb31e0177d29df6f65abe6fc,
- md5=ce91eb459e4f6a9e2871088d855cd211,
- md5=ddb09774c5a870c73cf0cf71e6d97d3e,
- md5=853c04a0494a2256e063583a4aab465b,
- md5=85cbf9b1a0e3d8fda14a86535e0692d9,
- md5=9696b0f6ab7eaa2c312eeeb67b0e5f70,
- md5=85259bc31dece470af6778bd27f30488

Title: TA577 phishing campaign uses NTLMv2 handshakes to steal user credentials/hashes.

Link: https://medium.com/@Intel_Ops/ta577-phishing-campaign-uses-ntlmv2-handshakes-to-steal-user-credentials-hashes-6c736ce1c2dc

Summary: The blog post by Intel-Ops delves into the infrastructure utilized by TA577, a threat group based in Russia, in their recent phishing campaign. TA577, active since 2020, has been distributing various malware like Qbot, IcedID, SystemBC, and Cobalt Strike, with reports indicating a shift towards Pikabot and DarkGate. Deutsche Telekom CERT observed TA577 employing .HTML files for establishing outbound SMB connections to file:// URLs to capture NTLMv2 handshakes and steal credentials. The analysis also uncovered their usage of Impacket and specific IPs associated with potentially malicious activities, highlighting the importance of monitoring ASNs, authentication types, and domain patterns to identify TA577's tactics and infrastructure deployment tactics.

Threats: ta577_group impacket_tool cobalt_strike qakbot icedid systembc smokeloader gozi pikabot darkgate

Indicators of compromise:
-------------------------
ip: 103.124.104.22, 104.129.20.167, 204.44.125.68, 66.63.188.19, 89.117.2.33, 155.94.208.137, 103.124.104.76, 89.117.2.34, 54.36.229.25
domain: shopsportswearamerica.com, buysportswearusa.com, files-adcb.com, account-office.com, activity-check.com, appshare-box.com, connect-bsigorup.com, docusignservice.com, google-gsuitecloud.com, hash.10dsecurity.com, info-zapp.com, laboratoriosprovets.com, levelbrin.com, mail2.linkindatafile.info, mail2.networthfundreport.info, matrix.lakeys.net, primrloock.org, redenservices.com, services-helpdesk.com, sevrice-now.com, test.vryno.dev
url:
hash:
- sha256=0000000000000000000000000000000041414141414141414141414141414141,
- sha256=2bf2033dbf501c6d1f063e64b737f30c2ab11dd1fb2e65a7dd4b2a88c71f23e5,
- sha1=4ad651cad39078157b64b3c2784fc5c78b8bc547,
- sha1=acbfa5f3e98deff0c4bbe7f652cfd3af13d57fc7

This article was generated with the assistance of an artificial intelligence language model, ChatGPT.

--

--

RST Cloud

We democratise and revolutionise the field of Cyber Threat Intelligence and make it accessible, affordable, and effective for a wider range of companies!