

Rewterz Threat Alert – Phobos Ransomware – Active IOCs
September 2, 2021
Rewterz Threat Advisory – CVE-2021-34746 – Cisco Enterprise NFV Infrastructure Software Authentication Bypass Vulnerability
September 2, 2021
Rewterz Threat Alert – Phobos Ransomware – Active IOCs
September 2, 2021
Rewterz Threat Advisory – CVE-2021-34746 – Cisco Enterprise NFV Infrastructure Software Authentication Bypass Vulnerability
September 2, 2021Severity
High
Analysis Summary
Cryptbot is delivered as a Trojan malware. The Cryptbot Trojan Malware hides within legitimate software in order to be installed by its victims.Some malicious websites and many of them appear on the top pages such as cracks and serials of popular commercial software are entered in search engines, many victims have downloaded this malware and execute on their systems.
Impact
- Credential Theft
- Information Theft
- Expose of Sensitive Data
Indicators of Compromise
Domain Name
- str-master[.]pw
IP
- 54[.]202[.]26[.]55
- 105[.]109[.]211[.]84
MD5
- decec0149d94826aa21f3b2765e1c4b4
- 1ee6c64c48fd9aedbae599a1e6df5a44
- 34339f5f8f3b303aad00272edfa2827f
- 0c517e5d1c375969dbd64a2c8534acbd
SHA-256
- 685549196c77e82e6273752a6fe522ee18da8076f0029ad8232c6e0d36853675
- cd6f28682f90302520ca88ce639c42671a73dc3e6656738e20d2558260c02533
- f148e9a2089039a66fa624e1ffff5ddc5ac5190ee9fdef35a0e973725b60fbc9
- 4ff53d69adcdca685d012c7c15a04ead56cd271ee5a63772a2049372598708ce
SHA-1
- 30c4c507acecf7c4e0203d8540f21d699c2d6652
- 33c1c05167e611ad85a3845f42f2e0e43942aa7b
- e1273963b7b1b7613f77e0ce353c108ae7557968
- f52c28f7a648146776f6ab85331dc61241be574a
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment.