Rewterz
Rewterz Threat Alert – Zeppelin Ransomware – IoCs
July 1, 2020
Rewterz
Rewterz threat Alert – Promethium’s StrongPity3 Targeting New Victims
July 1, 2020

Rewterz Threat Alert – TA505 Active Again – IoCs

Severity

High

Analysis Summary’

TA505 is a prolific cybercriminal group known for its attacks against multiple financial institutions and retail companies using malicious spam campaigns and different malware. In the group’s latest campaign, the group is targeting financial institution employees via phishing email luring them to download malicious attachments. After successfully installing the malware, it connects to command and control (C2) server and download the SDBot Remote Access Trojan (RAT) and harvest financial data. Data exfiltration is the major goal of this campaign and is currently active and targeting users in different organizations. Researchers believe that TA505 seems to stick to their google drive names for the download domain for this campaign as well. Some files were believed to be distributing the Clop ransomware.

Impact

  • Data Exfiltration
  • Financial loss
  • Unauthorized remote access
  • Files encryption 

Indicators of Compromise

Domain Name

  • app[.]boxrcdn[.]com
  • shr-0746734[.]direct-share[.]com
  • drive[.]google-eu-cdn[.]com
  • shr-9466488[.]direct-share[.]com
  • drive[.]google-us-cdn[.]com
  • direct-upt[.]com
  • alpha-telemetry-microsoft[.]com
  • usr-telemetry-microsoft[.]com
  • music-server11-facebook[.]com
  • mira-store[.]com
  • music-server17-facebook[.]com

MD5

  • f615f7d0a7982f6c7242b4c536c7807e
  • 21e6616c87d71f55e7fe1c515d89e9c6
  • 1df72c8030212114451baf714d7387d0
  • 7f0653f9d8522e91185b01060dafae80
  • 92d0ca02e6874926e5b5fe7cf7351d7b

SHA-256

  • 0d4f2d354fd2aca85b2719d749eb88c1f444309ae27f3824f0faac8bdbfa4249
  • 07ec31270252b02de498c0bf5ff98ce570004c34cd5d439323d2408524e6b019
  • cff2bcf79f0950c94285188a0b0b7bb3c4706438de7cefc1d412e48692f44244
  • 9da33d14fdbf8c566b10df21a453c604a1d199af9ed4fd99fd5da755f104b1f3
  • a1a98e7ad53525c71775b5fc646ede230f74e0d837e7909cb87f702691a1ef2f
  • 0fcabd1b282115f5b301618198f15a8a813dfadc781c117346c133e7a0d39948
  • f2e3f951cde838860429fe33c461aeb3308b4111eb649b12a000de343c62035b
  • 1ec119e53f86134b6552c4852656ba5c8bf048fd1b83f2f80e7cc63af6c4b7c9
  • 955dbc7e39627002a5a9ef1199257a980697ceabb14c24ad46a4067c6252439e
  • 20b0c08678d478f8c12dae4a1513e6ef60ee69b6e763e9d150402ee5aedd7407
  • 85aca36895c66bf671d1d5849a23452bd369164cc2506d6b3509791103ed67ad

SHA1

  • a68217d80d88c794faf39d465dd27812862e8e19
  • cb46dfe091501e5741bbfa4626303f1221ff1245
  • fb56fd2df1a2adbfe8835a644a26dfcd65733ea2
  • 7796c5917414630d2f6d46fbf334653bda89d0fd
  • 59bf4a34d72028c48ef47af81ce1248119bab784

URL

  • https[:]//app[.]boxrcdn[.]com/2l0azne4mepklm7jmepp/
  • https[:]//drive[.]google-us-cdn[.]com/file/d/1XfjKEt18odZrtCbpQsllnAoLcwdpDsPS/

Remediation

  • Block the threat indicators at their respective controls. 
  • Do not download untrusted attachments from emails.