

Rewterz Threat Advisory –CVE-2022-31108 – Node.js mermaid module Vulnerability
July 1, 2022
Rewterz Threat Alert – Quasar RAT – Active IOCs
July 1, 2022
Rewterz Threat Advisory –CVE-2022-31108 – Node.js mermaid module Vulnerability
July 1, 2022
Rewterz Threat Alert – Quasar RAT – Active IOCs
July 1, 2022Severity
High
Analysis Summary
Racoon gathers private data such as credit card numbers, cryptocurrency wallet addresses, login passwords, and browser information like cookies and history. It was discovered in the wild for the first time in April 2019. This malware is a C++ program that allows you to steal data from common browsers and cryptocurrency wallets. Exploit kits are used to deploy the virus, which employs browser-based vulnerabilities to lead users to landing sites containing exploit codes. It’s also propagated through phishing efforts that persuade victims to run the malicious payload or macros. This info stealer collects related to the machine, such as the OS arch and version, hardware information, and installed apps.
On March 25, 2022 – a key developer died in the Russia-Ukraine War. Therefore the operator of Raccoon Stealer, who was
active on a dark web forum, temporarily suspended his operations. On May 17, 2022, the operator announced the completion
of the development of a new version of the stealer, and on June 9, the operator resumed activity on the dark web forum
Impact
- Data exfiltration
- Credential theft
- Financial loss
Indicators of Compromise
IP
- 136[.]244[.]65[.]99
- 138[.]197[.]179[.]146
- 140[.]82[.]52[.]55
- 142[.]132[.]180[.]233
- 142[.]132[.]225[.]253
- 146[.]19[.]247[.]28
- 149[.]202[.]65[.]236
- 164[.]92[.]172[.]4
- 167[.]235[.]245[.]75
- 178[.]128[.]94[.]180
MD5
- 214add3ebdd5b429fda7c00e7f01b864
- 0cfa58846e43dd67b6d9f29e97f6c53e
- 1d7d285f77ed5460fe9aada4c04dcfcf
- d28ba705f24c9e51564c46aefab26754
- 6844edfec32e4323ecfedc458f7d3b86
- 92d3194f6c3511b40def1b3c8f86e585
SHA-256
- 0123b26df3c79bac0a3fda79072e36c159cfd1824ae3fd4b7f9dea9bda9c7909
- 022432f770bf0e7c5260100fcde2ec7c49f68716751fd7d8b9e113bf06167e03
- 048c0113233ddc1250c269c74c9c9b8e9ad3e4dae3533ff0412d02b06bdf4059
- 0c722728ca1a996bbb83455332fa27018158cef21ad35dc057191a0353960256
- 2106b6f94cebb55b1d55eb4b91fa83aef051c8866c54bb75ea4fd304711c4dfc
- 263c18c86071d085c69f2096460c6b418ae414d3ea92c0c2e75ef7cb47bbe693
SHA-1
- 7cead6f1e4c4b0824365268cdd5d168acf56265c
- 19d9fbfd9b23d4bd435746a524443f1a962d42fa
- 9c6e393d8b2eac432720518f8991c86ad8fa94b7
- 0c6bb0d8f2611775b495a019c63f95b1377f2054
- 465d756d89a18d40a2721e74d99b4df8dc9438a8
- e9aaee23127a796285e3e227e4d92e3cf572c529
Remediation
- Block the threat indicators at their respective controls.
- Search for IOCs in your environment.