

Rewterz Threat Alert –GandCrab Ransomware – Active IOCs
August 16, 2021
Rewterz Threat Alert – Evilnum APT Group – Active IOCs
August 16, 2021
Rewterz Threat Alert –GandCrab Ransomware – Active IOCs
August 16, 2021
Rewterz Threat Alert – Evilnum APT Group – Active IOCs
August 16, 2021Severity
High
Analysis Summary
ServHelper that is associated with the hacking group TA505 has been seen targeting financial and retail sectors. With the help of this backdoor, it enabled them to install and deploy other malware like Information Stealers (Predator Stealer), and Remote Access Trojans (RAT) (FlawedAmmy, NetSupport). It is delivered via NSIS installer, which, typically arrives as an attachment to a lure-based email. The loader checks to see if it is running in a virtualized environment to evade analysis techniques. It does this by checking for the presence of a Windows Defender file known to be present in virtualized environments. If this file is present, the installation will stop. If the file is not present, the installation proceeds. A PowerShell script contained within the NSIS installer’s directory is then executed. This script decrypts and invokes the main installer of ServHelper. Encryption is done with a combination of Base64 encoding and Triple DES Algorithm. This prevents commands from appearing in plain text. A further set of verification checks are done. The installer checks to ascertain if the instance has administrator privileges. If not, the installer will attempt to escalate privilege using DLL hacking with the assistance of Fubuki from UACME. This readily available collection of tools is typically used by penetration testers for research and privilege escalation. The installer also checks to see if the ROM size is greater than 2MB. If there is no ROM file, the installation stops as this is an indicator of virtualization. Once all components are decrypted, dropped, and installed, the ServHelper DLL is loaded. This specific variant only targets 64-bit Windows Operating Systems. Once the installation is complete, threat actors have backdoor access and are able to send and receive information.
Impact
- Cryptomining
- File Encryption
- Information Theft
- Exposure of Sensitive Data
Indicators of Compromise
Domain Name
- www[.]wheredoyougo[.]cn
- www[.]sdfisdgj[.]xyz
- www[.]pgf5ga4g4b[.]cn
- www[.]novacation[.]cn
- www[.]dsfamsi4b[.]cn
- www[.]asdjausg[.]cn
- www[.]afspfigjeb[.]cn
- wheredoyougo[.]cn
- sagbbrrww2[.]cn
- pgf5ga4g4b[.]cn
- homate[.]xyz
- geyaeb[.]dev
- dssagrgbe3irggg[.]xyz
- dsgiutugagb[.]cn
- dsfamsi4b[.]cn
- asdjausg[.]cn
MD5
- 0e297ffe25ebc5a6a3bbfef67b5d8cf4
- 04c08c702330905419267ac490b9850d
- ef90d0408ea2487d3c33aa5de3657008
- 8cd1ffe390e6308913b93c73fdcbe728
- b80e44d9eedd5fff1cd3ff0cfc1258af
- 993d53f22ea3cbca3bb1e6ba194bf50f
- 2b83bcf4d12f4c6937aae132573f87ec
- f4dc36def934cfc42e86dbd958bddce6
- a4edfae2aeafcee7c8d45928826c3a99
- 9e3905e054e78547ec4fbbbb73e92b78
SHA-256
- fea63897b4634538e9e73c0f69c2e943aebc8cebcffc1415f5ce21207fdfef92
- fe40b63a00a7d737baa87f493751a1b92ac782baaef2304b0ae65c5a1cbec58d
- f80df34accc8780a1eb9c733e4e5e5874cce6ad22e57ec8b827aa7f28318c5d1
- f36277c6faaed23129efacc83847153091cd1ef0b05650e0b8c29d13d95182a5
- f00f8b0d2602fc2e8bcf5899377f6a23beae9ea9df2c0a3c4e9aad4cae2ef522
- db710c90eaa2f83be99f1004b9eda6cfbf905a1ab116d1738a89f4eac443f4fe
- baad7552e8fc0461babc0293f7a3191509b347596d9ca8d2a82560992ff2c48e
- 9c7fc1304f9dada69594f64d230cb20ce3c1f83a41ca0e27b6274361941b3c67
- 7516b2271e4a887156d52f661cdfc561fded62338a72b56f50bf188c2f5f222a
- 5d4a0661cfb3cca59acd8a9fa433ec2c48d686da36f3890b73e7b9f37c60e980
SHA1
- 375de17ddda72306eb788c17820a7a97089a01e5
- 5f89aed32a0039773357216efe138dd6baef27bf
- 77d3d06c04e9c028e98e879bbd45f238dcd1c12c
- 2274dd05970bdf13a28f30c288b8e313720e6ef7
- 492003201b7f1a0a12230f2e245718de81bbad78
- ad4cf03948ec8b94fa997e261468dbe77bbaea8d
- 1a7759e91970f706d8b3d508415df8003d7ff585
- a26e5d7cd36a99561086951632ee3785d7cd2d89
- aec271a1282a7f489c32ec22935d0301fe1f14c8
- 57ced4325a4f1c93d6928e560e5c7209a4ed0282
URL
- http[:]//ww16[.]enroter1984[.]cn/bif/b[.]php
- http[:]//novacation[.]cn/juytfft/b[.]php
- http[:]//bromide[.]xyz/ssh[.]zip
- http[:]//beautyiconltd[.]cn/rigged[.]txt
- http[:]//beautyiconltd[.]cn/cnf[.]txt
- http[:]//94[.]158[.]245[.]88/mae/start[.]vbs
- http[:]//94[.]158[.]245[.]88/mae/ready[.]ps1
- http[:]//94[.]158[.]245[.]88/mae/Get-Content[.]ps1
- http[:]//94[.]158[.]245[.]88/drc[.]ps1
- http[:]//93[.]157[.]63[.]171/al[.]exe
- http[:]//91[.]212[.]150[.]205/al[.]exe
- http[:]//45[.]61[.]136[.]223/get/m5[.]php
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment.