Geekmaster 👽:system76: · @Geekmaster
155 followers · 1204 posts · Server ioc.exchange

actors used a variant of

Financially motivated threat actors used an unpatched security bypass to deliver ransomware without any security warnings

blog.google/threat-analysis-gr

#Magniber #ransomware #microsoft #smartscreen #bypass

Last updated 2 years ago

Proof of Concept: Delivery via /#msix packages.
In our test case we needed administrative permissions to install the package with putty.exe as our test payload.

We did test it first with a binary, but Windows Defender caught the payload and that didn't look so nice on a screenshot 😅

Our .appx demo package is based off of a in-the-wild sample of that was signed with a stolen signature (Jan 2022). With this change in Windows 11 it is now possible to install unsigned appx packages (given required perms).
twitter.com/f0wlsec/status/148

Detection opportunities:
- Execution out of C:\Program Files\WindowsApps\
- Looking for the special OID documented by Microsoft here: learn.microsoft.com/en-us/wind

We are going to publish our rules for this tomorrow, stay tuned.

#malware #appx #wannacry #ransomware #Magniber #yara

Last updated 2 years ago

Picking up where we left off yesterday: We created two rules for the delivery method. You can find them in our GitHub Repository and on @abuse_ch Yaraify ⬇️ Have a nice weekend and happy hunting 🔍

github.com/SIFalcon/Detection/

yaraify.abuse.ch/yarahub/rule/

yaraify.abuse.ch/yarahub/rule/

#yara #Magniber #ransomware

Last updated 2 years ago

is continuing to spread fake Windows Update installers (.msi), but since yesterday the threat actors are also distributing .iso archives instead of .zip files. You can find our brief analysis of the msi and the lnk file below ⬇️

AvastThreatLabs first reported about the .zip file distribution yesterday: twitter.com/AvastThreatLabs/st

IoC:
5G offer.lnk 5ab873527a526cd4ea2bead2b302b38a
5G-Installer 126f77e151529eeb3b2f42c49691e9c0
Binary.UpdateBinary 10ccc8f56a2894d18d71f9f32a923aa7
iso fedb6673626b89a9ee414a5eb642a9d9

We uploaded the samples mentioned above to @abuse_ch
Malware Bazaar, have fun :)

bazaar.abuse.ch/browse/tag/Mag

#Magniber #ransomware

Last updated 2 years ago

TribalCyberSecurity · @tribalcyber
25 followers · 7 posts · Server infosec.exchange
Jérôme Segura · @malwareinfosec
413 followers · 42 posts · Server infosec.exchange

Something interesting with ransomware delivery.

Seeing the previous URI pattern again (sub domains).

#Magniber #magnitudeek

Last updated 2 years ago

Jérôme Segura · @malwareinfosec
292 followers · 29 posts · Server infosec.exchange

halldie[.]fit
perwish[.]email
209.94.59[.]32

#malvertising #Magniber #ransomware

Last updated 2 years ago

aixzellent.com 🇺🇦 · @aixzellent
8 followers · 738 posts · Server mastodaix.de

Gefährliche : ein angebliches Sicherheitsupdate für Windows 10 beinhaltet die Ransomware , welche in das System der Nutzer:innen durch die Installation eingeschleust wird.
Die Ransomware verschlüsselt die Nutzerdaten & fordert Lösegeld. Weitere Infos:

aixzellent.com/r/f9l

#Sicherheitsupdates #Magniber

Last updated 3 years ago