da_667 · @da_667
3307 followers · 142 posts · Server infosec.exchange

Found this article in my threat intel feed:

asec.ahnlab.com/en/45312/

Looks like NetSupport RAT?

C2 domain/port: tradinghuy.duckdns[.]org:1488.

We have rules in the ETOPEN ruleset to catch NetSupport CnC Checkin, and the response from the server:

2035892 (NetSupport Remote Admin Checkin)
2035895 (NetSupport Remote Admin Response)

#threatintel #malware #netsupportrat #snort #suricata #iocsharing #ioc

Last updated 2 years ago

da_667 · @da_667
3305 followers · 136 posts · Server infosec.exchange

Saw this today on birdsite - apparently there's a massive vidar stealer campaign with 1300+ domains registered with a good amount of typo squatting going on.

gist.github.com/qbourgue/a8187

credit to @crep1x@twitter.com

For the time being, they are all registered to a single IP address oddly enough, so instead of vomiting out a massive amount of DNS rules today, I opted to create a rule that catches the query response with the IP address in question.

Additionally, here is triage sandbox run: tria.ge/230107-vnc9bahd7x/beha

Finally, suricata sid 2036316 is a part of the ET OPEN ruleset, and will detect Arkei/Vidar/Mars stealer variants -- tested against the pcap generated from the triage run.

Happy Monday, MFers.

#threatintel #malware #infostealer #snort #suricata #vidar #ioc #iocsharing

Last updated 2 years ago

da_667 · @da_667
3223 followers · 232 posts · Server infosec.exchange

Hey folks, I'm on vacation until next year. I don't take a lot of time off over the course of the year, and our work culture is such that we have management that encourages us to do so, so I elected to take off Christmas break to spend it with my wife.

I won't be available to to or sigs until January 3rd of next year. I would be honored if you directed your threat intelligence to @et_labs on twitter, or community.emergingthreats.net to ensure that your requests for coverage, and your inquiries are being met.

Thank you so much. I hope you have a great holiday, and let us start the new year off together strong.

#infosec #cti #iocsharing #snort #suricata

Last updated 2 years ago

da_667 · @da_667
3097 followers · 235 posts · Server infosec.exchange

Found this in our threat feed:
trendmicro.com/content/dam/tre

Trend Micro found a campaign with chaos rat dropping XMRIG miners it looks like? The blog post is gone, but the file hashes and IOCs are still there. It looks like we have some coverage via:

2024897 ET USER_AGENTS Go HTTP Client User-Agent

2037145 ET MALWARE Win32/Khaosz.A!MTB Checkin

Of course the Go HTTP Client User-Agent rule is very generic coverage for software using the Go language HTTP library default user-agent. More often than not, that warrants looking at (hunting) but the results may not necessarily be malicious.

#malware #threatintel #iocs #iocsharing #snort #suricata #cryptojacking #chaosrat

Last updated 2 years ago

da_667 · @da_667
3096 followers · 234 posts · Server infosec.exchange