Kevin Beaumont · @GossiTheDog
22975 followers · 873 posts · Server cyberplace.social

Caught DEV-0302 (ransomware group) using in the wild again.

#zippyreads

Last updated 2 years ago

Kevin Beaumont · @GossiTheDog
16363 followers · 1251 posts · Server cyberplace.social
Kevin Beaumont · @GossiTheDog
14002 followers · 811 posts · Server cyberplace.social

A bit of - MSTIC are tracking DEV-0408 using and (well, they should be, they might not realise it but they’re tracking same actors).

#threatintel #zippyreads #defenderexplode

Last updated 2 years ago

Kevin Beaumont · @GossiTheDog
22668 followers · 656 posts · Server cyberplace.social

@buffaloverflow Rich strikes again :O and PoC, if anybody wants to have a play.

- Adds the read only flag on file in ZIP to bypass MOTW without November OS patches.
- Inflates file size on unzip, to evade logging in telemetry/detection.

gist.github.com/rxwx/8299693ac

#defenderexplode #zippyreads

Last updated 2 years ago

Kevin Beaumont · @GossiTheDog
22547 followers · 616 posts · Server cyberplace.social

UK energy supply trojan

Energy themed trojan using MOTW bypass and Defender AV telemetry bypass

Riffing off UK energy supply issues

IoCs
C2 docusign-octopus-energy.com
Filename OctopusEnergyS.pdf..lnk
Hash 7ff60dd9d6b5de8f5235d4d3975d8fcfbc96ceaec9aafb9ab9bd40f192490ff9
Size 300mb

Filename %AppData%\Local\Temp\.hta

Writes self using certutil decode.

Trojan DLL, 323mb:

\AppData\Local\Temp\x.dll

#threatintel #octopus #zippyreads #defenderexplode

Last updated 2 years ago

Kevin Beaumont · @GossiTheDog
22197 followers · 536 posts · Server cyberplace.social
Kevin Beaumont · @GossiTheDog
21230 followers · 318 posts · Server cyberplace.social

As found by @buffaloverflow, and have been used in the wild since early October. Might write a blog on the Defender issue later as this stuff is just sailing through MS suite still. infosec.exchange/@buffaloverfl

#zippyreads #defenderexplode

Last updated 2 years ago

Kevin Beaumont · @GossiTheDog
21185 followers · 294 posts · Server cyberplace.social

COVID restrictions email targeting Tsinghua University in China. Exploits to bypass Mark of the Web.

Encoded HTA file if you're on certain IPs: privatebin.net/?dd5316ff29194d

IoCs
C2 mailtsinghua.sinacn.co f946663a780806693ea3fb034215bd6da25971eb07d28fe9c209594c90ec3225
21733711a098785e9df7f7ec0afe6b9d9a80b417b256255667dd8747702da74f

#threatintel #zippyreads

Last updated 2 years ago

Kevin Beaumont · @GossiTheDog
14604 followers · 156 posts · Server cyberplace.social

Great sample caught by @k3dg3

Exploits (read only file for bypass of Mark-of-the-Web) and , a large file zero day in Microsoft Defender AV which breaks their telemetry and detection.

Targets Italy. Calls michaelpagerecruitment-ukoffers.]com

virustotal.com/gui/file/13846a

#malware #threatintel #zippyreads #defenderexplode

Last updated 2 years ago