SharePoint 0-Day Exploited to Deploy Warlock Ransomware – Active IOCs
July 25, 2025Stealc Information Stealer Malware – Active IOCs
July 25, 2025SharePoint 0-Day Exploited to Deploy Warlock Ransomware – Active IOCs
July 25, 2025Stealc Information Stealer Malware – Active IOCs
July 25, 2025Severity
High
Analysis Summary
A Vietnam-based threat group, APT32 (OceanLotus Group) has been active since 2014. It is well-known for carrying out sophisticated attacks on a variety of private companies, journalists, foreign governments, and activists, with a major focus on Southeast Asian nations such as Vietnam, the Philippines, Laos, and Cambodia. This threat group has utilized smart web breaches to compromise victims.
APT32 uses a unique suite of fully-featured malware in combination with commercially available tools to undertake targeted operations that are congruent with Vietnamese state interests. The APT32 attack includes irrelevant code to deceive security tools and go undetected. Threat actors behind this group appear to be well-resourced and supported since they employ a diverse collection of domains and IP addresses as command and control infrastructure.
Impact
- Espionage and Intellectual Theft
- Extrusion of Data
Indicators of Compromise
MD5
- b326435c8ac36039300139fff3734db2
- bf1d250ca4e5672aada0817d4849da68
- cf3f59e2c4c8767697ea46475171697c
- 91a476fea45abc8b208e0a9e3293f774
- a7a0add66b205967562c1fa9643b8421
- 22538214a3c917ff3b13a9e2035ca521
- 02f4701559fc40067e69bb426776a54f
- 5598baa59c716590d8841c6312d8349e
- c33782c94c29dd268a42cbe03542bca5
- 454b85dc32dc8023cd2be04e4501f16a
SHA-256
- f7e7e316c6935286d9153e6b777750626d02daf23b9e7f43905bf7c6e76df7b2
- 52ba0fd4b275a8e817dd5896534c51d824032cbb1b6fb12c0ae6e82c97ecb849
- 576e7ae5e4ecbf73a3887ae350211f7dbc63e4c1d0a5f13c1d09feafa9f79130
- ef8c06dd4097724447343026ec1431405b82c7c95f74e02903f480388c592138
- 676947e8b56979c903f44a0de549b109c9d31066a714c8fed1b318653431d5ad
- b69c192e2361dd303ec6cb1062948a9c60152f94d1a975dd99b2ec404214c5f6
- 2b5225816089467aacdcd201a44989a2f78491c29f6fad41b52731bfefc1b886
- f85f44ebdd341f22f0cbd408ee40f162d697fc48c3824c897b61980fa38a4d92
- be19d98b5449a052c03b189d9687543d619c8c1893f12709ef6bef6ff7657510
- 68dfa75e916f4fb44a071851965493a324d331e37b791e21c45feba54aec23d8
SHA1
- cf3fb8d112ad64216b3b0fec83deb0d19b5f8fd1
- 2f078f3ed2ce7e67e54c198edb2f9acc8afa236c
- d2e729c1ef43f777e2a0d1467d284f6041b9ec84
- 8524e3d0ada54957b5a12f87424a8358899f44b8
- a92ba87b1df475535a089fc3d2a3690aa1c59a6f
- 6083b1c3cdfc5dbc27010cc38d3d66c6ddcf0347
- c7a2684ec7dc6484655e8dfe5b184341c416a3e0
- 93708b635f11f182d5541274d0ac7b7d5baf3795
- 6a8d20cf325b766e69f6133b3a7325034b76948c
- 06adabcb962b5cf5d9fb63542518a5b80b5a9ad4
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Never trust or open links and attachments received from unknown sources/senders.
- Maintain cyber hygiene by updating your antivirus software and implementing a patch management lifecycle.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zerodays.
- Enable antivirus and antimalware software and update signature definitions on time. Using multilayered protection is necessary to secure vulnerable assets.
- Enforce strong password policies across the organization. Encourage the use of complex passwords and enable multifactor authentication (MFA) wherever possible to add an extra layer of security.
- Deploy reliable endpoint protection solutions that include antivirus, antimalware, and host-based intrusion prevention systems (HIPS) to detect and block malicious activities.
- Utilize web filtering and content inspection tools to block access to malicious websites and prevent users from downloading malicious files.
- Deploy IDPS solutions to detect and block suspicious network traffic and intrusions.
- Conduct regular vulnerability assessments and penetration testing to identify weaknesses in the network infrastructure and address them before they are exploited by attackers.