Rewterz
Rewterz Threat Alert –GandCrab Ransomware – Active IOCs
September 7, 2021
Rewterz
Rewterz Threat Alert – Android Malware Targets Taxpayers in India
September 7, 2021

Rewterz Threat Alert – Ferocious Kitten APT Group Targeting Iran – Active IOCs

Severity

High

Analysis Summary

Ferocious Kitten is an APT group that has been active since at least 2015 and has been targeting Persian-speaking individuals who appear to be based in Iran. Although it has been active for a long time, the group has mostly operated under the radar and has not been covered by security researchers. The malware dropped by the APT group is dubbed ‘MarkiRAT’ and used to record keystrokes, clipboard content, provide file download and upload capabilities as well as the ability to execute arbitrary commands on the victim machine. Some of the TTP used by this threat actor are reminiscent of other groups that are active against a similar set of targets, such as Domestic Kitten and Rampant Kitten.

After opening the document, no content is displayed, inducing the victim to enable the macro to view the information. Once the victim enables the macro, the malicious executable file will be released for execution, and the macro code will set the body font color to black to display the information and confuse the victim, Display of the bait information.

Impact

  • Information Theft Espionage
  • Credential Theft
  • Data loss

Indicators of Compromise

Domain Name

  • microsoft[.]microcaft[.]xyz

MD5

  • 3e38999a11cda8c9290dbe02b0e4634a

SHA-256

  • b0d85647a0715e84a569fc79f6df3b9b82bac11e388948b767b4dbc7c721af47

SHA1

  • 28dd15a35e28ad5efb8e695113cc5bd092788a12

URL

  • http[:]//microsoft[.]microcaft[.]xyz/

Remediation

  • Block all threat indicators at your respective controls.
  • Search for IOCs in your environment