Barberousse · @barberousse_bin
147 followers · 41 posts · Server todon.eu

analyzed a new backdoor. It uses the open-source QMQTT library to communicate with its C&C server over so we named it MQsTTang. This library depends on parts of the Qt framework, statically linked in the executable. welivesecurity.com/2023/03/02/

A sample of MQsTTang was identified by @Unit42_Intel@twitter.com on 2023-02-17. As stated in that thread, the backdoor uses the legitimate MQTT broker 3.228.54.173. This has the benefit of hiding their actual C&C servers from victims and analysts. twitter.com/Unit42_Intel/statu

This malware family is also tracked as "Kumquat" by @threatinsight@twitter.com: twitter.com/aRtAGGI/status/162

Like in previous campaigns, filenames related to politics and diplomacy are used to lure targets. These include:
- CVs Amb Officer PASSPORT Ministry Of Foreign Affairs.exe
- Documents members of delegation diplomatic from Germany.Exe
- PDF_Passport and CVs of diplomatic members from Tokyo of JAPAN.eXE

IoCs:
πŸ“„ SHA-1
02D95E0C369B08248BFFAAC8607BBA119D83B95B
430C2EF474C7710345B410F49DF853BDEAFBDD78
0EA5D10399524C189A197A847B8108AA8070F1B1
740C8492DDA786E2231A46BFC422A2720DB0279A
🚨 ESET Detection Name
Win32/Agent.AFBI trojan
🌐 Servers
80.85.156[.]151
80.85.157[.]3
185.144.31[.]86

@ESETresearch

#esetresearch #MustangPanda #mqtt

Last updated 3 years ago

Leonard/Janis Robert KΓΆnig · @ljrk
150 followers · 8885 posts · Server todon.eu

RT @ESETresearch
discovered and reported to the manufacturer three buffer overflow vulnerabilities in UEFI firmware of several Notebook devices, affecting more than 70 various models including several ThinkBook models. @smolar_m 1/6

#esetresearch #lenovo

Last updated 3 years ago

Leonard/Janis Robert KΓΆnig · @ljrk
150 followers · 8885 posts · Server todon.eu

RT @ESETresearch
discovered three high-impact UEFI vulnerabilities affecting Lenovo consumer laptops. Their exploitation would allow attackers to deploy and successfully execute UEFI malware, such as LoJax or ESPecter, on the affected devices. @smolar_m welivesecurity.com/2022/04/19/ 1/7

#esetresearch

Last updated 3 years ago

Tsuki · @tsuki_
38 followers · 5090 posts · Server mastodon.social

RT @ESETresearch@twitter.com

discovered an SFile variant for the FreeBSD platform, targeting a partially state-owned company in πŸ‡¨πŸ‡³. It encrypts files with the following file extensions @cherepanov74@twitter.com 1/3

πŸ¦πŸ”—: twitter.com/ESETresearch/statu

#esetresearch #ransomware #china

Last updated 4 years ago

Joxean Koret (@matalaz) · @joxean
1057 followers · 11007 posts · Server mastodon.social

I wonder how many reversers were owned because they used a pirate version of IDA
twitter.com/ESETresearch/statu

RT @ESETresearch@twitter.com

discovered a trojanized IDA Pro installer, distributed by the APT group. Attackers bundled the original IDA Pro 7.5 software developed by @HexRaysSA@twitter.com with two malicious components. @cherepanov74@twitter.com 1/5

πŸ¦πŸ”—: twitter.com/ESETresearch/statu

#lazarus #esetresearch

Last updated 4 years ago

Joxean Koret (@matalaz) · @joxean
1434 followers · 11891 posts · Server mastodon.social

I wonder how many reversers were owned because they used a pirate version of IDA
twitter.com/ESETresearch/statu

RT @ESETresearch@twitter.com

discovered a trojanized IDA Pro installer, distributed by the APT group. Attackers bundled the original IDA Pro 7.5 software developed by @HexRaysSA@twitter.com with two malicious components. @cherepanov74@twitter.com 1/5

πŸ¦πŸ”—: twitter.com/ESETresearch/statu

#lazarus #esetresearch

Last updated 4 years ago

Joxean Koret (@matalaz) · @joxean
1057 followers · 11007 posts · Server mastodon.social

LOOOOOOOOOOOOOOOOOOOOOL!

RT @ESETresearch@twitter.com

discovered a trojanized IDA Pro installer, distributed by the APT group. Attackers bundled the original IDA Pro 7.5 software developed by @HexRaysSA@twitter.com with two malicious components. @cherepanov74@twitter.com 1/5

πŸ¦πŸ”—: twitter.com/ESETresearch/statu

#esetresearch #lazarus

Last updated 4 years ago

Joxean Koret (@matalaz) · @joxean
1434 followers · 11891 posts · Server mastodon.social

LOOOOOOOOOOOOOOOOOOOOOL!

RT @ESETresearch@twitter.com

discovered a trojanized IDA Pro installer, distributed by the APT group. Attackers bundled the original IDA Pro 7.5 software developed by @HexRaysSA@twitter.com with two malicious components. @cherepanov74@twitter.com 1/5

πŸ¦πŸ”—: twitter.com/ESETresearch/statu

#esetresearch #lazarus

Last updated 4 years ago