

Rewterz Threat Alert – Lazarus Group’s New Campaign Exploits Log4j to Distribute Remote Access Trojans – Active IOCs
December 13, 2023
Rewterz Threat Alert – An Emerging Ducktail Infostealer – Active IOCs
December 13, 2023
Rewterz Threat Alert – Lazarus Group’s New Campaign Exploits Log4j to Distribute Remote Access Trojans – Active IOCs
December 13, 2023
Rewterz Threat Alert – An Emerging Ducktail Infostealer – Active IOCs
December 13, 2023Severity
Medium
Analysis Summary
PikaBot is a sophisticated and highly evasive malware that targets Windows operating systems. This malware exhibits a range of malicious behaviors, including data exfiltration, remote command execution, and system persistence. It poses a significant threat to both individual users and organizations. PikaBot is classified as a Trojan malware, specifically a Remote Access Trojan (RAT). It enables unauthorized remote access to infected systems, allowing threat actors to gain control over the compromised machine. PikaBot is primarily distributed through phishing emails, malicious attachments, or compromised websites. Once executed, it employs various techniques, such as exploiting software vulnerabilities and social engineering, to infect target systems.
This malware ensures its persistence on infected machines through multiple means. It modifies registry entries, creates autorun entries, and establishes hidden services or scheduled tasks. These techniques enable the malware to maintain its presence across system reboots.
PikaBot establishes communication with its command and control server using various methods, including HTTP, DNS, or even legitimate service protocols. It utilizes encryption and obfuscation techniques to evade detection and hide its malicious activities. It is designed to steal sensitive information from infected systems. It can capture keystrokes, take screenshots, record audio, and collect stored credentials. The stolen data is typically transmitted to the attacker-controlled servers for further exploitation or monetization.
Impact
- Unauthorized Access
- Information Theft
Indicators of Compromise
MD5
- 1ccb0807ef5add8105cc16de6e1e0934
- 5ec9330e5c95e3b5049a5cdeb7012c61
- 659f655690658ca578f00e48f8ecad04
- 259df394526f5c05d21e776353706201
SHA-256
- e5ea77c1d2431eb235ff2d88d412fe737c3fa0c89de871c32b5dc57e1a320caa
- ab2121ab61a587c9243e34fd425c57f6b40813d3288e62b81cd838e4dcc30abe
- e83f167ff6f1f0c1ef0839908e884f3e64dd0f7c1c8d893f9956f9f6ac1736b4
- 372b1db01a6ee52f0bc024f26e326011d46b76e84d998601b4ae9345149a1113
SHA-1
- 636bd7c1d93126e39c4b4ae7316946c0350e65b0
- 350c53c67a081e0108d9a447ae136e3b74507a36
- ebe6a659370ce3f7b0c85fd584ac43afbfcd9af6
- bb5163fc3eb838de4123582005a742b1cc7eb29c
URL
- https://graytoner.com/7U8YzwN/1337.dat
- https://kulasid.com/iknXn/0.6769039862828654.dat
- https://rositan.com/iuZGk/0.5901726467613055.dat
- https://feritins.com/pk6z0JV/0.38662045497742236.dat
- https://liokinch.com/OxGDSlD/0.6111062734851184.dat
- https://rosceman.com/awPtEe/0.327583181400535.dat
Remediation
- Block all threat indicators at your respective controls.
- Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls
- Emails from unknown senders should always be treated with caution. Never trust or open links and attachments received from unknown sources/senders.
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- Patch and upgrade any platforms and software on time and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.