每周高级威胁情报解读(2024.11.15~11.21)
Common Information
Type Value
UUID 87e05670-29cb-4e8d-bc3b-5c31b54fc180
Fingerprint 37f8f98cb53644e9
Analysis status DONE
Considered CTI value 2
Text language
Published Nov. 15, 2024, midnight
Added to db Nov. 22, 2024, 12:49 p.m.
Last updated Dec. 18, 2024, 10:13 a.m.
Headline 每周高级威胁情报解读(2024.11.15~11.21)
Title 每周高级威胁情报解读(2024.11.15~11.21)
Detected Hints/Tags/Attributes 37/2/64
RSS Feed
Attributes
Details Type #Events CTI Value
Details CVE 13
cve-2024-48990
Details CVE 12
cve-2024-48991
Details CVE 12
cve-2024-48992
Details CVE 13
cve-2024-11003
Details CVE 11
cve-2024-10224
Details Domain 227
mp.weixin.qq.com
Details Domain 56
cyble.com
Details Domain 146
research.checkpoint.com
Details Domain 5
editproai.pro
Details Domain 5
editproai.org
Details Domain 265
blog.talosintelligence.com
Details Domain 62
blog.sekoia.io
Details Domain 239
unit42.paloaltonetworks.com
Details Domain 16
blog.lumen.com
Details Domain 12
intezer.com
Details Email 1
这些邮件来自一个欺诈性地址alert@il-cert.net
Details File 1
的计划任务用于持久化且请求下一阶段sostener.vbs
Details File 3
dllskyfal.txt
Details File 2
便在计算机内%temp%目录下创建一个名为xxx.ps1
Details File 2
和xx2.vbs
Details File 2
运行andeloader将dcrat注入到regsvcs.exe
Details File 4
signedconnection.zip
Details File 1
如signedconnection.exe
Details File 4
signedconnection.exe
Details File 1
实际为onedrive相关程序filecoauth.exe
Details File 1
它运行后会通过dll侧加载的方式运行同目录下的secur32.dll
Details File 1
而secur32.dll
Details File 1
原压缩包中的qt5core.dll
Details File 1
发现恶意压缩包signedconnection.zip
Details File 2
其中db.txt
Details File 2
以从远程的github地址下载info1.txt
Details File 2
up1.txt
Details File 2
和down1.txt
Details File 2
down1.txt
Details File 2
解密后的info1.txt
Details File 1
%appdata%\ahnlab\avira.txt
Details File 2
解密后的up1.txt
Details File 2
主要负责将包含受害者系统信息的avira.txt
Details File 2
解密后的down1.txt
Details File 1
%appdata%\utf8settings.ini
Details File 1
并伪造成cmd.exe
Details File 1
并重命名为cmd.exe
Details File 1
木马程序xclient.exe
Details File 1
在virustotal上被多款杀毒引擎检测为trojan.msi
Details File 1
攻击的核心在于background.js
Details File 1
文章还提到一个名为go-encrypt.exe
Details File 1
虽然不能确认go-encrypt.exe
Details Threat Actor Identifier - APT-C 91
APT-C-36
Details Threat Actor Identifier - APT-C 16
APT-C-55
Details Url 2
https://mp.weixin.qq.com/s/ddccjhbjuta7ia4hggsa1a
Details Url 1
https://mp.weixin.qq.com/s/n4rycel4ajtqx7e9tvdyag
Details Url 1
https://cyble.com/blog/donots-attack-on-maritime-defense-manufacturing
Details Url 1
https://mp.weixin.qq.com/s/gzmor8jkjelzuj5bphpjya
Details Url 2
https://research.checkpoint.com/2024/wezrat-malware-deep-dive
Details Url 1
https://mp.weixin.qq.com/s/t5rw9poiz7al-nct5rle5g
Details Url 1
https://www.bitdefender.com/en-us/blog/labs/inside-bitdefender-labs-investigation-of-a-malicious-facebook-ad-campaign-targeting-bitwarden-users
Details Url 1
https://www.bleepingcomputer.com/news/security/fake-ai-video-generators-infect-windows-macos-with-infostealers
Details Url 1
https://blog.talosintelligence.com/new-pxa-stealer
Details Url 1
https://mp.weixin.qq.com/s/kpphc1mvlkr5qvi9pfbhpw
Details Url 1
https://blog.sekoia.io/helldown-ransomware-an-overview-of-this-emerging-threat
Details Url 1
https://unit42.paloaltonetworks.com/frostygoop-malware-analysis
Details Url 2
https://blog.lumen.com/one-sock-fits-all-the-use-and-abuse-of-the-nsocks-botnet
Details Url 1
https://intezer.com/blog/research/babble-babble-babble-babble-babble-babble-babbleloader
Details Url 1
https://blog.qualys.com/vulnerabilities-threat-research/2024/11/19/qualys-tru-uncovers-five-local-privilege-escalation-vulnerabilities-in-needrestart