Rewterz
Rewterz Threat Advisory – ICS: Delta Industrial Automation DOPSoft TBK File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
September 10, 2021
Rewterz
Rewterz Threat Alert – Malicious IOCs targeting Microsoft MSHTML Vulnerability – Active IOCs
September 10, 2021

Rewterz Threat Alert – TeamTNT with New Campaign aka “Chimaera”

Severity

High

Analysis Summary

The cybercrime group TeamTNT has been tracked by various research groups for a while now, with several articles that were written about their activity that is focused on Docker workloads. In May, researchers team described the group’s attempts to spread cryptocurrency miners via exposed Docker API servers. In August, researchers released an analysis of several images that are stored under TeamTNT’s Dockerhub account: hildeteamtnt. The attackers install this tool in order to map the cloud environment of their victim and execute system commands without deploying malicious code on the server, When abused, Weave Scope gives the attacker full visibility and control over all assets in the victim’s cloud environment, essentially functioning as a backdoor. Attackers thus can gain access to all information about the victim’s server environment as well as the ability to control installed applications, making or breaking connections between cloud workloads, use of the memory and CPU, and “a list of existing containers with the ability to start, stop and open interactive shells in any of these containers,” according to the researcher.

Impact

  • Gain access
  • Control over a victims system

Indicators of Compromise

Domain Name

  • chimaera[.]cc

IP

  • 85[.]214[.]149[.]236

MD5

  • 782b94c95c5e6eee4c396910b1a9c9f9
  • 11d85a39722734273adb7a0b21ac29a6
  • f8747d55ca29c18edffb38b35522f252
  • fd486a6a0c30fea7fdc578fb576dcd8b
  • 777e1d9b717d339a7582e06ab28d0dd3
  • bd9c6ba78ef91549f38ef76c22a55359
  • 0da186f3e1f8c89c5fbe5672cbdf05b6
  • 9ae176daeba86137a994770ec4b4510c
  • 54130adf66d5bfa4e4b9f04b3933e493
  • 572c47986c61bf2fcd7f134299fcd5b2
  • dd89ab7314e13989bdcae176a82078ac
  • 3686a9b208e6fb661cbae93cd6e26260
  • 479b6bc7dfc3b65370c9668e5da6bf0d
  • 9364c5f0a2594db56f9254cd99f9e9b0

SHA-256

  • 220737c1ee400061e886eab23471f98dba38fa8e0098a018ea75d479dceece05
  • b6f0203ddf24cd04489cbbed24059d84504a2ba904659681ad05b7d2c130d4b5
  • fa9b38a2bd1acfd6b1b24af27cb82ea5620502d7e9cb8a913dceb897f2bcf87c
  • 721d15556bd3c22f3b4c6240ff9c6d58bfa60b73b3793fa8cdc64b9e89521c5b
  • 95809d96f85e1571a3120c7c09a7f34fa84cb5902ad5172398dc2bb0ff1dd24a
  • 0ae5c1ddf91f8d5e64d58eb5395bf2216cc86d462255868e98cfb70a5a21813f
  • f82ea98d1dc5d14817c80937b91b381e9cd29d82367a2dfbde60cfb073ea4316
  • 2d85b47cdb87a81d5fbac6000b8ee89daa1d8a3c8fbb5d2bce7a840dd348ff1d
  • a4000315471cf197c0552aeec0e7afbe0a935b86ff9afe5b1443812d3f7185fa
  • af2cf9af17f6db338ba3079b312f182593bad19fab9075a77698f162ce127758
  • 1b72088fc6d780da95465f80ab26ba094d89232ff30a41b1b0113c355cfffa57
  • 3cc54142b5f88d03fb0552a655e32e94f366c9e3bb387404c6f381cfea506867
  • a46c870d1667a3ee31d2ba8969c9024bdb521ae8aad2079b672ce8416d85e8df
  • 7bb1bd97dc93f0acf22eff6a5cbd9be685d18c8dbc982a24219928159c916c69

SHA-1

  • 37d059f2c2b635d7da59970c7ba2512a3658cd27
  • 44ab37c899c7f28770c5b2621e96d175890fbd19
  • ebfb2575fc38fb5cd8651e2dd4c32adc0cd38548
  • 260b829fbf48e4b75e7273e80d575a5ca3c7a67b
  • 2dedafccec26c368ed4aa7ae30971996577435e4
  • de91c0bff09bc793bbbc52c2e66b7c86307905aa
  • a917ab4301ab25749d6e867a1812e61b3b09df3f
  • e7ad20f142e4faad7f37fe06ab6a0e0212387796
  • 1c5f5986b92e3392d4cfaa531c88cd06b5cfd361
  • 48193cee044078ba308b958cc50a42564c581159
  • 9ed46a6dde1dc1de4eed8185c1d622a5fc97092c
  • 69787ef68ff5b0dfa7cbceee99c3e52d3cb8ef5b
  • 3b0231ea896db354bd48181054a8f182ce98ed7e
  • f815667e9cbd9206e812c7b664e34b72255e0e01

Remediation

  • Block all threat indicators at your respective controls.
  • Search for IOCs in your environment.