カオス化する A41APT キャンペーンに対して私達ができること(公開版)
Image Description
Common Information
Type Value
UUID 227cd9a3-a631-4e7e-b383-0e320d1f47d4
Fingerprint e11a12f91e8c548991ddf3ce0679cae9026dadbc81baffa9fcf64807a1cb2ea2
Analysis status DONE
Considered CTI value 2
Text language
Published None
Added to db March 12, 2024, 7:57 p.m.
Last updated Aug. 31, 2024, 1:55 a.m.
Headline カオス化する A41APT キャンペーンに対して私達ができること(公開版)
Title カオス化する A41APT キャンペーンに対して私達ができること(公開版)
Detected Hints/Tags/Attributes 51/3/60
Attributes
Details Type #Events CTI Value
Details CVE 150
cve-2018-13379
Details CVE 3
cve-2020-3125
Details CVE 397
cve-2021-44228
Details Domain 18
blog.trendmicro.co.jp
Details Domain 5
secretdump.py
Details Domain 46
jsac.jpcert.or.jp
Details Domain 15
www.macnica.co.jp
Details Domain 144
www.fortinet.com
Details Domain 22
nsfocusglobal.com
Details Domain 1373
twitter.com
Details Domain 397
www.microsoft.com
Details Domain 281
docs.microsoft.com
Details Domain 2
www.monferriina.com
Details File 5
secretdump.py
Details File 130
ws2_32.dll
Details File 146
wininet.dll
Details File 3
httpswin32.dll
Details File 2
httpsx64_d.dll
Details File 3
tcpcx64.dll
Details File 1122
svchost.exe
Details File 4
jsac2021_202_niwa-yanagishita_jp.pdf
Details File 5
jsac2021_202_niwa-yanagishita_en.pdf
Details File 43
0.pdf
Details File 6
mpressioncss_ta_report_2020_5.pdf
Details File 2
c:\windows\routinemaintenance.exe
Details File 2
c:\windows\ceiprole.exe
Details File 2
c:\windows\vss\writers\system\familysafety.exe
Details File 2
c:\windows\system32\winrm\0409\usoclient.exe
Details File 2
c:\windows\system32\da-dk\dataproviders.exe
Details sha256 2
cf5ec3b803563d8ef68138f5303ebc362b72da36da29b9cba3062ae996db9234
Details sha256 2
c13f93b7bb1f8f5f9bd6dd4d25f7af873119c8b8248490de6bd9b29d0c68783e
Details sha256 2
9bec85e6a3d811826580540b541723c6b5236377a3a980b1ffa5bf5f749a99d4
Details sha256 2
7db327cc7bd622038f69b4df4178ca3145659a73cbcb10d0228e48f2ece60896
Details sha256 2
c0ed7939945726b61100009b926917723fdc5f9b2df0be070f2a500b6edf161c
Details sha256 2
0a570b32d14799f6351ee211093567450d41705ca79e236a38ca15f135d78bfd
Details sha256 2
2da5e37ec4c7059a7935165039ea31b0c9cc8f1bb0d0c620759776979158cf30
Details sha256 2
e8797b4334fbaa067d5f91d1481bd8f55bf2e45483a92a8ea7030c2c604dd273
Details sha256 2
68dd499bca62e004c97ccc17f68e3d6dde2885446924dabe8cc525763caa08a3
Details sha256 2
1f1bcb03b008c4fdd462e7d2b5db5ca321ff6d56bbb22cddd39c82df1f6a038f
Details sha256 2
7337071599eb49c75c63dff210aa516ea8dbbe99a8a66237f66f3f3c7f5aed31
Details sha256 2
59986e20e03774c7d0f5adb4eca394f5f51b01a8c2ba9cb6c1ce30f9312b9566
Details sha256 4
8efcecc00763ce9269a01d2b5918873144746c4b203be28c92459f5301927961
Details sha256 4
20fc3cf1afcad9e6f19e9abebfc9daf374909801d874c3d276b913f12d6230ec
Details IPv4 2
168.100.8.20
Details IPv4 2
192.248.183.113
Details IPv4 2
185.10.16.115
Details Threat Actor Identifier - APT 278
APT10
Details Url 4
https://blog.trendmicro.co.jp/archives/29842
Details Url 4
https://jsac.jpcert.or.jp/archive/2021/pdf/jsac2021_202_niwa-yanagishita_jp.pdf
Details Url 4
https://jsac.jpcert.or.jp/archive/2021/pdf/jsac2021_202_niwa-yanagishita_en.pdf
Details Url 1
https://blog.kaspersky.co.jp/apt10-sophisticated-multi-layered-loader-ecipekac-discovered-in-a41apt-campaign
Details Url 1
https://securelist.com/apt10-sophisticated-multi-layered-loader-ecipekac-discovered-in-a41apt-campaign/10151
Details Url 1
https://media.kasperskydaily.com/wp-content/uploads/sites/86/2021/02/25140359/greatidea_a41_v1.0.pdf
Details Url 6
https://www.macnica.co.jp/business/security/manufacturers/files/mpressioncss_ta_report_2020_5.pdf
Details Url 3
https://www.fortinet.com/blog/threat-research/uncovering-new-activity-by-apt-
Details Url 2
https://nsfocusglobal.com/insights-into-ransomware-spread-using-exchange-1-day-vulnerabiliti
Details Url 2
https://twitter.com/manu_de_lucia/status/1430115616862638080
Details Url 2
https://twitter.com/fr0gger_/status/1430213808434339842
Details Url 2
https://www.microsoft.com/security/blog/2021/12/11/guidance-for-preventing-detecting-and-
Details Url 2
https://docs.microsoft.com/ja-jp/sysinternals/downloads/autoruns