

Multiple Apache HugeGraph Products Vulnerabilities
April 24, 2024
LockBit Ransomware – Active IOCs
April 24, 2024
Multiple Apache HugeGraph Products Vulnerabilities
April 24, 2024
LockBit Ransomware – Active IOCs
April 24, 2024Severity
High
Analysis Summary
Since at least February 2024, three distinct stealers—CryptBot, LummaC2, and Rhadamanthys—have been distributed by a new, continuous malware campaign that is hosted on Content Delivery Network (CDN) cache sites.
With a reasonable degree of confidence, Cisco Talos has linked the behavior to a threat actor known as CoralRaider, a suspected Vietnamese-origin organization that surfaced earlier this month. Based on multiple overlaps in the tactics, techniques, and procedures (TTPs) of CoralRaider's Rotbot campaign, this assessment is made. These overlaps include the Windows Shortcut file used as the initial attack vector, the intermediate PowerShell decryptor and payload download scripts, and the FoDHelper technique used to circumvent the victim machine's User Access Controls (UAC).
The campaign's targets include the United States, Nigeria, Pakistan, Ecuador, Germany, Egypt, the United Kingdom, Poland, the Philippines, Norway, Japan, Syria, and Turkey, among other business verticals and geographical areas. Attack chains increase the risk of a widespread attack by having users download files posing as movie files using a web browser.

The researchers said, “This threat actor is using a Content Delivery Network (CDN) cache to store the malicious files on their network edge host in this campaign, avoiding request delay. The actor is using the CDN cache as a download server to deceive network defenders.”
Phishing emails are thought to have been the first source of access for drive-by downloads, as they were used to spread booby-trapped URLs that led to ZIP archives that contained Windows shortcut files (LNK files). After the shortcut file executes a PowerShell script to retrieve an HTML application (HTA) payload stored on the CDN cache, JavaScript code is executed by the embedded PowerShell loader to initiate a covert operation that eventually downloads and executes one of the three stealer malware programs.
The modular PowerShell loader script is made to get around the User Access Controls (UAC) on the victim's computer by utilizing a method known as FoDHelper. Vietnamese threat actors have also used this technique to get in touch with another stealer known as NodeStealer, which can steal data from Facebook accounts.
No matter what is used, the stealer virus takes use of victims' data, including bank information, credentials, system and browser data, and cryptocurrency wallets. The campaign stands out because it makes use of an upgraded version of CryptBot, which includes additional anti-analysis methods and also gathers data from authenticator apps and password manager databases.
Impact
- Sensitive Information Theft
- Credential Theft
- Financial Loss
Indicators of Compromise
MD5
- d24a95ce58cd861b6f16fc38804e8bad
- 95d0f6c667aa66ac301a4e2b15157280
- 4b92593d1c2547c17b1ffacf1d957263
- 72e8ce3548c019fe9d558f9218987993
- 2e5c432d17b45d6d5fc99671ebd64dce
- ad473710fbc9b8d949ef27d06c99805d
- afd81f255b0572f3e84b78d1f20eb189
SHA-256
- 150dd450f343c7b1e3b2715eae3ed470c1c1fadf91f2048516315f1500a58ffa
- 74ea6e91c00baad0b77575740eb7f0fb5ad1d05ddea8227dc1aa477e179e62df
- 3ae459746637e6f5536f3ba4158c822031578335505a512df3c31728cac8f627
- 88528be553f2a6f72e2ae0243ea907d5dcdcd7c8777831b4c3ab2a67128bc9b9
- fd53383d85b39e68d817e39030aa2184764ab4de2d478b7e33afc39dd9661e96
- e68c9aedfd080fe8e54b005482fcedb16f97caa6f7dcfb932c83b29597c6d957
- 8c732ec41550851cc933e635708820ec9202fddc69232ca4ed625d420aec3d86
SHA1
- 43cbac46a7dd816ef5c7c851557290f7d5fc18c4
- f57d8b201e50a75b3d8af35fed2eeb385507ce6a
- 9989a8eadc8604c843137b2014e5518ffa744f18
- 260a18065704384b0e9c8897b01323eb1242a0d2
- acbed6e427b51d2171794633efd068925e7741fe
- d6bc2da997a8985cf2e80011bf36b6be28ad9338
- feeee8320e5218e99f02f4a5ed0e6f4061cd70b3
URL
- http://kzeight8ht.top/upload.php
- http://peasanthovecapspll.shop/api
- http://culturesketchfinanciall.shop/api
- http://liabilityarrangemenyit.shop/api
- http://secretionsuitcasenioise.shop/api
- http://triangleseasonbenchwj.shop/api
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Do not download documents attached in emails from unknown sources and strictly refrain from enabling macros when the source isn’t reliable.
- Ensure that all systems, software, and applications are up-to-date with the latest security patches. Regularly check for and apply updates to eliminate known vulnerabilities that attackers could exploit.
- Educate employees about phishing emails, social engineering tactics, and safe online behavior. Effective training can reduce the likelihood of users inadvertently initiating an attack.
- Regularly back up critical data and systems to offline or isolated storage. Test the backup restoration process to ensure that it is effective in case of an attack.
- Deploy strong endpoint protection solutions that include advanced threat detection, behavior monitoring, and real-time protection against malware and ransomware.
- Employ robust email filtering and anti-phishing solutions to detect and prevent malicious attachments and links from reaching user inboxes.
- Conduct regular penetration testing and security assessments to identify vulnerabilities and weaknesses in your network and systems. Address any findings promptly.
- Thoroughly assess third-party vendors and software before integrating them into your environment. Ensure they have strong security practices and adhere to cybersecurity standards.