Rewterz Threat Advisory – CVE-2020-9288 – Fortinet FortiWLC cross-site scripting Vulnerability
June 24, 2020Rewterz Threat Alert – Lucifer New Cryptojacking and DDoS Hybrid Malware
June 25, 2020Rewterz Threat Advisory – CVE-2020-9288 – Fortinet FortiWLC cross-site scripting Vulnerability
June 24, 2020Rewterz Threat Alert – Lucifer New Cryptojacking and DDoS Hybrid Malware
June 25, 2020Severity
High
Analysis Summary
The Evil Corp group has been active since at least 2011 and has extensively used the Dridex banking Trojan and the BitPaymer ransomware. Researchers are reporting that in May 2020, the Evil Corp group began using a new ransomware package named WastedLocker. The group is selective in their targeting and typically target cloud environments, database services, file servers, and virtual machines. These types of targets have the potential of a higher financial return than targeting consumers. The distribution method used by the group has not changed and they continue to use the SocGholish fake update framework which delivers a CobaltStrike loader. A custom crypter named CryptOne is used to protect WastedLocker and it is also used by other malware families. When WastedLocker is executed, if it is not running with administrative rights, it will attempt to elevate its privileges using a UAC bypass technique. It will encrypt files on fixed, remote, removable, and shared drives. Rather than the common list of file types to encrypt, WastedLocker uses an exclusion list of directories and files which are not to be encrypted.
Impact
File encryption
Indicators of Compromise
SHA-256
- 5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367
- 887aac61771af200f7e58bf0d02cb96d9befa11deda4e448f0a700ccb186ce9d
- 8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80
- bcdac1a2b67e2b47f8129814dca3bcf7d55404757eb09f1c3103f57da3153ec8
- e3bf41de3a7edf556d43b6196652aa036e48a602bb3f7c98af9dae992222a8eb
- ed0632acb266a4ec3f51dd803c8025bccd654e53c64eb613e203c590897079b3
Remediation
Block all threat indicators at your respective controls.
Search for IOCs in your environment.