

Rewterz Threat Alert – Qakbot (Qbot) Malware – Active IOCs
January 25, 2022
Rewterz Threat Alert – SharpPanda Chinese APT Group Targets Southeast Asian Government – Active IOCs
January 25, 2022
Rewterz Threat Alert – Qakbot (Qbot) Malware – Active IOCs
January 25, 2022
Rewterz Threat Alert – SharpPanda Chinese APT Group Targets Southeast Asian Government – Active IOCs
January 25, 2022Severity
High
Analysis Summary
Molerats APT – also known as Moonlight, Extreme Jackal, and Gaza Hackers Team – have been active since 2012. They made headlines in 2012 when they conducted a cyberattack against Israeli government. The targeted nations expanded to include Palestine, U.S., and also the UK. Molerats is a politically motivated nation-state actor that is conducting cyber espionage using three new malware variants:
- SharpStage Backdoor
- DropBook backdoor
- MoleNet Downloader
Molerats use Dropbox, Google Drive, and other legitimate services to drop spyware for cyber espionage against the Middle-East.

They use content written in the Arabic language related to the Palestinian conflict with Israel which encloses a macro that can execute a PowerShell command for fetching malware
Impact
- Data Exfiltration
- Cyber Espionage
- Political and Economic Loss
Indicators of Compromise
MD5
- 4c61985a5c8c11eb516e592397343f27
- b0f7e462dde681004f5b2b1eca1f38e0
- 79c25e297870ce68907f2c25564a161f
- 1b1ec8ae327a5543423978e7e58fc44c
- 5f70d52d2be4d0389eeb1c7e27d5e9bd
- a559547c0815d1a4c025d6de25108a70
- 3158e619788d56669175490817863fb1
- eea1c70128060e6246bc959a873be7da
- 60e9b1c155263385f51b80345c292269
- f4d70ad2e247123db47bb6bfcddf6333
- 8f201c59e28bb3fb6c09f5c424972988
- 2ca3f1b013c26f9147547c6d67d02a8c
- ae3d8576594867cfd55bac9fe12d6a54
- af44e1c376503429bef73e668e56ab7a
- 380962723eae3e610e957c075b884dd5
SHA-256
- 553127cb586591cbfbae54dd4e28d4cd40fdddebaf4e0e7e1f3f23c446a621bb
- 58f926d9bd70c144f8697905bf81dfff046a12929639dfba3a6bd30a26367823
- 782681add2e26a17f4ad415b5b30f280c93f954a40ec4f00e0e60f9ef3884ac9
- 688f79ba03554bbaf2be513416360ce44757b2f69103e6043ab66508611fe01a
- 69af17199ede144d1c743146d4a7b7709b765e57375d4a4200ea742dabef75ef
- caab3635c747d037eff7d8597698636c9a597ff631840e551011011bd4608245
- 2578cbf4980569b372e06cf414c3da9e29226df4612e2fc6c56793f77f8429d8
- 54eadcd0b93f0708c8621d2d8d1fb4016f617680b3b0496343a9b3fed429aaf9
- 6afa011e2da6b009ab8e10a59c55c0f0c2161ca19f6305002f95dd532cf594bf
- 5b0693731f100b960720d67bda6f3e6df1c25b7d5024d11cf61c13e7492f18cf
- 5b186548de81bc1d1ce92c042a6c488a647d80e570dd58c8d3f34910c12aba87
- f5894e8c68aa2d3e34f7c967e6c4ad3cf35b399d452826148c2dd99958fa2af4
- 4e2bede5a455218844d18ff7086d9d35714499afb4d8d2c609274e1a05c67339
- 49eb73f776e4e6d87d9701a135769c843847e7af6f5372fa99aba97b8c6af639
- f323a150d7597f46d29eb3a3c56f74e11d18caf164f9176c8c1b2fa0031cc729
SHA-1
- 0a2b7ac50f1467588b0e0b1b73fdfd270eaf86a0
- 7f0e609cd49a51b1e0fcc08499a618136451f689
- 0eb6fd1bbc58fff0d85fe01e6528939650f8965c
- d59fccb2cfb79cf26b332e40b102aa35d67b44ff
- 7f3d04f54ffff9751d037398752107856f563e73
- 8ec4d30a3040e260174cabb4b0c3959233b53929
- 2da78a9a8b3005fcf64028b035ab6f1a26ac290c
- c3be6ad66b8de00741901ea9556621ef3515ee85
- 810ad432a3cec7b6ffca3268685d21f11b1b1688
- 11c38b5c1bef14939410ebddcfec9c8a5e0e6aae
- 549d6a3123ea553d2bec5ef01029cd48fc50e0db
- dde1e4ed199cca865a43f400646157cf3f42dd05
- 52693b5624d8ec23a5884653eecdf44502292109
- 8b74574582a0adceb8b218399877c3f57daae57f
- d30810bdd1fe0e771c810659cabdb024985c4e7f
URL
- https[:]//doc-0s-acdocs[.]googleusercontent[.]com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/9bqijre42671eatme7gki86fteputh
- 9h/1607592975000/05594231565667585421/*/1NnMlUPwkxK4_wAJwrqxqBAfdKCPDxyeh?e=download
- https[:]//www[.]artlifelondon[.]com/beta/medias[.]php
- http[:]//artlifelondon[.]com/hamas_internal_elections[.]rar
- https[:]//yourbusiness[.]azcentral[.]com/plan-seminar-workshop-14583[.]html
- https[:]//www[.]forextradingtipsblog[.]com/beta/mediasG[.]php?NamePC=&NameUser=&Mask=0
- https[:]//forextradingtipsblog[.]com/SaudiRecognitionofIsrael[.]php
- https[:]//app[.]simplenote[.]com/p/04T5bp
- https[:]//exchangeupdates[.]com/enterprise/Wenterprise[.]php
Remediation
- Block the threat indicators at their respective controls.
- Search for IOCs in your environment.