

Rewterz Threat Advisory – CVE-2022-23437 – Apache Xerces2 Java XML Parser Vulnerability
January 25, 2022
Rewterz Threat Alert – Lazarus APT Group – Active IOCs
January 25, 2022
Rewterz Threat Advisory – CVE-2022-23437 – Apache Xerces2 Java XML Parser Vulnerability
January 25, 2022
Rewterz Threat Alert – Lazarus APT Group – Active IOCs
January 25, 2022Severity
High
Analysis Summary
Donot APT group has been actively dropping malicious samples and targeting Government users to exfiltrate data. The group has previously been active in the past and has now again shifted its focus to phishing campaigns. The group has a history of attacking Pakistani government officials and military personnel and has been linked to India. They previously targeted Pakistani users with android malware named (StealJob) was used to target Pakistani android mobile users by Phishing on the name of “Kashmiri Voice” The attackers hunt for confidential information and intellectual property. The hackers’ targets include countries in South Asia, in particular, the state sector of Pakistan.
Impact
- Information Theft and Espionage
Indicators of Compromise
Domain Name
- files[.]easycldshare[.]xyz
Filename
- yts[.]dll
- rundll32[.]exe
MD5
- 3f6a297147fe5498e7fdaa958c23a152
SHA-256
- 715ea2906434f021110515606a941d72315b8997384c1fa3e93e176f1e90886c
SHA-1
- 9b932c608fe88ba02aa824dd72db3476d4b308ca
URL
- http[:]//worldfile[.]xyz/269LPtq84u4pLqye/jnj3GFBTIGohYrCQ[.]php
- http[:]//worldfile[.]xyz/269LPtq84u4pLqye/jnj3GFBTIGohYrCQHMzQ9gJ3sHXFBrlgU5sHI6scYl86Xm4W
- http[:]//worldfile[.]xyz/269LPtq84u4pLqye/jnj3GFBTIGohYrCQHMzQ9gJ3sHXFBrlgU5sHI6scYl86Xm4W[.]rtf
Remediation
- Block the threat indicators at their respective controls.
- Search for IOCs in your environment.