Cyclops: a likely replacement for BellaCiao
Common Information
Type Value
UUID b8af5e5a-f48a-4ad6-aa27-3b40f23f612a
Fingerprint adc1a7912477a7d4
Analysis status DONE
Considered CTI value 2
Text language
Published Aug. 14, 2024, 11:14 a.m.
Added to db Aug. 31, 2024, 10:52 a.m.
Last updated Nov. 17, 2024, 10:40 p.m.
Headline Cyclops: a likely replacement for BellaCiao
Title Cyclops: a likely replacement for BellaCiao
Detected Hints/Tags/Attributes 82/2/39
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 422 Inside The Lab - HarfangLab https://harfanglab.io/insidethelab/feed 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details Domain 1
lialb.autoupdate.uk
Details Domain 1
iuxyf.lialb.autoupdate.uk
Details Domain 1
autoupdate.uk
Details Domain 1
mail-updateservice.info
Details Domain 1
ns2.autoupdate.uk
Details Domain 1
ns2.mail-updateservice.info
Details Domain 3
maill-support.com
Details Domain 1
twittsupport.com
Details Domain 1
msn-service.co
Details Domain 1
ns2.freeheadlines.top
Details Domain 1
ns2.servicechecker.top
Details Domain 1
servicechecker.top
Details Domain 1
servicesupdate.info
Details Domain 1
mail-update.info
Details Domain 1
mailupdate.info
Details Domain 1
freeheadlines.top
Details Domain 1
servicepackupdate.info
Details Domain 1
systemupdate.info
Details Domain 5
harfanglab.io
Details File 21
sqlserver.exe
Details File 26
os.exe
Details File 2126
cmd.exe
Details File 306
services.exe
Details File 3
5bc57431-a7a9-49ad-944d-b93b7d35d0fc.pdf
Details sha256 1
fafa68e626f1b789261c4dd7fae692756cf71881c7273260af26ca051a094a69
Details IPv4 1
88.80.145.126
Details IPv4 1441
127.0.0.1
Details IPv4 1
127.0.30.3
Details IPv4 1
88.80.145.93
Details IPv4 1
88.80.145.122
Details IPv4 1
88.80.145.137
Details IPv4 1
88.80.145.132
Details Threat Actor Identifier - APT 194
APT35
Details Url 1
https://127.0.0.1:55561/api/v3/update|cyclops
Details Url 1
https://harfanglab.io/insidethelab
Details Url 3
https://www.bitdefender.com/blog/businessinsights/unpacking-bellaciao-a-closer-look-at-irans-latest-malware
Details Url 2
https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/final/en-us/microsoft-brand/documents/5bc57431-a7a9-49ad-944d-b93b7d35d0fc.pdf
Details Url 1
https://www.microsoft.com/en-us/security/blog/2024/01/17/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs
Details Yara rule 1
rule charmingkitten_cyclops {
	meta:
		description = "Detects Cyclops Golang Malware"
		references = "TRR240801"
		hash = "fafa68e626f1b789261c4dd7fae692756cf71881c7273260af26ca051a094a69"
		date = "2024-08-05"
		author = "HarfangLab"
		context = "file"
	strings:
		$go = " Go build ID: \""
		$a1 = "dep\tback-service\t(devel)" ascii fullword
		$a2 = "/brain-loader-enc.gox00"
		$a3 = "back-service/go-mux/api"
		$a4 = "/JD-M42KItJncJfqb38qh/"
	condition:
		filesize > 2MB and filesize < 20MB and (uint16(0) == 0x5A4D) and $go and (2 of ($a*))
}