

Rewterz Threat Alert – Black Guard Stealer – Active IOCs
April 5, 2022
Rewterz Threat Alert – GuLoader Malspam Campaign – Active IOCs
April 5, 2022
Rewterz Threat Alert – Black Guard Stealer – Active IOCs
April 5, 2022
Rewterz Threat Alert – GuLoader Malspam Campaign – Active IOCs
April 5, 2022Severity
High
Analysis Summary
Deep Panda is a suspected Chinese threat actor group that compromises high-tech sector companies, including government, defense, financial, and telecommunications. This group’s aliases include Shell Crew, WebMasters, KungFu Kittens, and PinkPanther. Currently, this group is targeting VMware Horizon servers with the Log4Shell exploit to install a new Fire Chili rootkit. Deep Panda’s main purpose is to infiltrate networks in order to gather intelligence and steal secrets from government and corporate organizations. This threat actor group employed a variety of zero-day exploits to propagate malware, including the well-known Poison Ivy. Deep Panda is also suspected of being responsible for data breaches at Anthem, a US-based healthcare organization. This group is skilled at exploiting software vulnerabilities and conducting complex social engineering attacks.
Impact
- Information Theft and Espionage
Indicators of Compromise
MD5
- aa3b1909e1a0d7537e641ca471b363e2
SHA-256
- 66c3dfcb2cc0dfb60e40115e08fc293276e915c2536de9ed6a374481279b852b
SHA-1
- 8d01d7f7c5019154e2eb2e959dbc29d570947368
Remediation
- Search for IOCs in your environment.
- Block all threat indicators at your respective control