Rewterz
Rewterz Threat Alert –Raccoon Infostealer – Active IOCs
September 1, 2021
Rewterz
Rewterz Threat Alert – FormBook Malware – Active IOCs
September 1, 2021

Rewterz Threat Alert –Cobalt Strike Malware – Active IOCs

Severity

High

Analysis Summary

Cobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named ‘Beacon’ on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, keylogging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning, and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.

Impact

  • Data Exfiltration
  • Information Theft

Indicators of Compromise

Domain Name

  • tubaho[.]com
  • mitinob[.]com
  • radezig[.]com
  • wigeco[.]com
  • yeruje[.]com

IP

  • 23[.]82[.]128[.]160
  • 142[.]234[.]157[.]156
  • 23[.]82[.]19[.]156
  • 142[.]234[.]157[.]160
  • 104[.]243[.]34[.]57

Remediation

  • Block the threat indicators at their respective controls.
  • Do not visit links given in untrusted emails, even if they redirect to Google Drive.
  • Search for IOCs in your environment.