每周高级威胁情报解读(2024.12.13~12.19)
Common Information
Type Value
UUID 965541c2-1d9d-4a7c-85aa-da8368cd0c37
Fingerprint af52a17bf6a4ecc5
Analysis status DONE
Considered CTI value 1
Text language
Published Dec. 13, 2024, midnight
Added to db Dec. 21, 2024, 3:43 a.m.
Last updated Dec. 23, 2024, 12:11 p.m.
Headline 每周高级威胁情报解读(2024.12.13~12.19)
Title 每周高级威胁情报解读(2024.12.13~12.19)
Detected Hints/Tags/Attributes 42/2/59
RSS Feed
Attributes
Details Type #Events CTI Value
Details CVE 2
cve-2023-28905
Details Domain 463
securelist.com
Details Domain 9
jacknwoods.com
Details Domain 297
mp.weixin.qq.com
Details Domain 9
ledger.com
Details Domain 5
ledger-recovery.info
Details Domain 25
www.wiz.io
Details Domain 139
trendmicro.com
Details Domain 20
www.netskope.com
Details Domain 149
securityaffairs.com
Details Domain 91
www.zscaler.com
Details Email 4
support@ledger.com
Details File 2
worldclient.ini
Details File 9
hmpalert.sys
Details File 6
hmpalert.dll
Details File 2335
cmd.exe
Details File 1
laboral.xz
Details File 17
dismcore.dll
Details File 26
dism.exe
Details File 1
该shellcode下载gdfinstall.exe
Details File 3
和gameuxinstallhelper.dll
Details File 3
白加黑的gameuxinstallhelper.dll
Details File 1
该导出函数解密数据后执行updated.ps1
Details File 2
updated.ps1
Details File 1
最后下载的dll首先注入svchost.exe
Details File 3
并使用schtasks.exe
Details File 1
darkgate-malware.html
Details File 1
攻击者通过cmd.exe
Details File 2
调用rundll32.exe
Details File 1
加载safestore.dll
Details File 1
通过anydesk.exe
Details File 1
投放的systemcert.exe
Details File 1
a3x和autoit3.exe
Details File 39
autoit3.exe
Details File 2
美国司法部.pdf
Details File 1
美国政府请求在刑事问题上进行国际合作.docx
Details File 5
idrinit.exe
Details File 5
productstatistics3.dll
Details File 1
pumakit-sophisticated-rootkit.html
Details File 9
1.bin
Details File 1
volkswagen-group-infotainment-unit-flaws.html
Details Threat Actor Identifier - APT-C 103
APT-C-36
Details Url 1
https://securelist.com/careto-is-back/114942
Details Url 1
https://www.proofpoint.com/us/blog/threat-insight/hidden-plain-sight-ta397s-new-attack-chain-delivers-espionage-rats
Details Url 1
https://mp.weixin.qq.com/s/wlduwr3wvuo37eaorxs8ag
Details Url 2
https://security.lookout.com/threat-intelligence/article/gamaredon-russian-android-surveillanceware
Details Url 1
https://www.bleepingcomputer.com/news/security/new-fake-ledger-data-breach-emails-try-to-steal-crypto-wallets
Details Url 1
https://www.securonix.com/blog/analyzing-fluxconsole-using-tax-themed-lures-threat-actors-exploit-windows-management-console-to-deliver-backdoor-payloads
Details Url 1
https://mp.weixin.qq.com/s/aqmjt3vzwh3qf0ozxt2roq
Details Url 1
https://mp.weixin.qq.com/s/fzs-0mvk15cime6ikysyvw
Details Url 2
https://www.wiz.io/blog/diicot-threat-group-malware-campaign
Details Url 1
https://trendmicro.com/en_us/research/24/l/darkgate-malware.html
Details Url 1
https://www.netskope.com/blog/new-yokai-side-loaded-backdoor-targets-thai-officials
Details Url 1
https://securityaffairs.com/172016/malware/pumakit-sophisticated-rootkit.html
Details Url 1
https://mp.weixin.qq.com/s/cxzbppktm3tti53hyh8jmg
Details Url 3
https://pypi.org
Details Url 2
https://www.zscaler.com/blogs/security-research/inside-zloader-s-latest-trick-dns-tunneling
Details Url 1
https://securityaffairs.com/172024/hacking/volkswagen-group-infotainment-unit-flaws.html
Details Url 1
https://www.securityweek.com/critical-vulnerabilities-found-in-ruijie-reyee-cloud-management-platform