id
int64 105
14.4k
| text
stringlengths 39
889
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
1,789 | Infection chain Figure 1. AvosLocker infection chain According to our analysis, the suspected entry point is via the Zoho ManageEngine ADSelfService Plus (ADSS) exploit: Figure 2. | [
{
"id": 5293,
"label": "malware",
"start_offset": 31,
"end_offset": 41
},
{
"id": 46920,
"label": "vulnerability",
"start_offset": 127,
"end_offset": 178
}
] | [
{
"id": 260,
"from_id": 5293,
"to_id": 46920,
"type": "exploits"
}
] | [] |
1,790 | The ADSS exploit abusing CVE-2021-40539 Due to the lack of network traffic details, we could not identify the exact CVE ID of the security gap the attacker used. | [
{
"id": 46921,
"label": "vulnerability",
"start_offset": 25,
"end_offset": 39
},
{
"id": 46922,
"label": "malware",
"start_offset": 4,
"end_offset": 8
}
] | [
{
"id": 261,
"from_id": 46922,
"to_id": 46921,
"type": "exploits"
}
] | [] |
1,810 | The PowerShell downloads, installs, and allows the remote desktop tool AnyDeskMSI through the firewall. | [
{
"id": 46930,
"label": "tools",
"start_offset": 4,
"end_offset": 14
},
{
"id": 46931,
"label": "tools",
"start_offset": 71,
"end_offset": 81
}
] | [
{
"id": 262,
"from_id": 46930,
"to_id": 46931,
"type": "downloads"
}
] | [] |
1,811 | Figure 9. The PowerShell downloading and installing AnyDeskMSI | [
{
"id": 5340,
"label": "tools",
"start_offset": 19,
"end_offset": 29
},
{
"id": 46932,
"label": "tools",
"start_offset": 57,
"end_offset": 67
}
] | [
{
"id": 263,
"from_id": 5340,
"to_id": 46932,
"type": "downloads"
}
] | [] |
1,819 | Additional tools and components were copied to the compromised machine using AnyDeskMSI to scan the local network and disable security products. | [
{
"id": 46934,
"label": "tools",
"start_offset": 77,
"end_offset": 87
},
{
"id": 46936,
"label": "attack-pattern",
"start_offset": 91,
"end_offset": 113
},
{
"id": 46937,
"label": "attack-pattern",
"start_offset": 118,
"end_offset": 143
}
] | [
{
"id": 265,
"from_id": 46934,
"to_id": 46936,
"type": "uses"
},
{
"id": 266,
"from_id": 46934,
"to_id": 46937,
"type": "uses"
}
] | [] |
1,820 | The tools transferred using AnyDesk are: Netscan: To scan for other endpoints Nmap (log4shell.nse): To scan for Log4shell vulnerable endpoints Hacking tools Mimikatz and Impacket: For lateral movement PDQ deploy: For mass deployment of malicious script to multiple endpoints Aswarpot.sys: For disabling defense solutions. | [
{
"id": 46938,
"label": "tools",
"start_offset": 28,
"end_offset": 35
},
{
"id": 46944,
"label": "tools",
"start_offset": 158,
"end_offset": 166
},
{
"id": 46951,
"label": "attack-pattern",
"start_offset": 294,
"end_offset": 321
},
{
"id": 46940,
"label": "tools",
"start_offset": 79,
"end_offset": 83
},
{
"id": 46942,
"label": "FILEPATH",
"start_offset": 85,
"end_offset": 98
},
{
"id": 46947,
"label": "tools",
"start_offset": 171,
"end_offset": 179
},
{
"id": 46939,
"label": "tools",
"start_offset": 42,
"end_offset": 49
},
{
"id": 46943,
"label": "vulnerability",
"start_offset": 113,
"end_offset": 122
},
{
"id": 46950,
"label": "FILEPATH",
"start_offset": 276,
"end_offset": 288
},
{
"id": 46948,
"label": "attack-pattern",
"start_offset": 185,
"end_offset": 201
},
{
"id": 46949,
"label": "attack-pattern",
"start_offset": 218,
"end_offset": 253
},
{
"id": 46953,
"label": "tools",
"start_offset": 202,
"end_offset": 212
},
{
"id": 46956,
"label": "tools",
"start_offset": 276,
"end_offset": 284
},
{
"id": 46955,
"label": "attack-pattern",
"start_offset": 104,
"end_offset": 108
}
] | [
{
"id": 272,
"from_id": 46938,
"to_id": 46947,
"type": "downloads"
},
{
"id": 267,
"from_id": 46938,
"to_id": 46939,
"type": "downloads"
},
{
"id": 268,
"from_id": 46938,
"to_id": 46940,
"type": "downloads"
},
{
"id": 269,
"from_id": 46940,
"to_id": 46942,
"type": "uses"
},
{
"id": 271,
"from_id": 46938,
"to_id": 46944,
"type": "downloads"
},
{
"id": 273,
"from_id": 46938,
"to_id": 46953,
"type": "downloads"
},
{
"id": 276,
"from_id": 46938,
"to_id": 46956,
"type": "downloads"
}
] | [] |
1,823 | We found an Avast anti-rootkit driver installed as service 'asWarPot.sys' using the command sc.exe create aswSP_ArPot2 binPath= C:\windows\aswArPot.sys type= kernel. | [
{
"id": 46957,
"label": "FILEPATH",
"start_offset": 60,
"end_offset": 72
},
{
"id": 46958,
"label": "FILEPATH",
"start_offset": 92,
"end_offset": 98
},
{
"id": 46959,
"label": "FILEPATH",
"start_offset": 129,
"end_offset": 152
},
{
"id": 46960,
"label": "SOFTWARE",
"start_offset": 12,
"end_offset": 37
}
] | [
{
"id": 279,
"from_id": 46960,
"to_id": 46957,
"type": "consists-of"
}
] | [] |
1,828 | Mimikatz components were also copied to the affected machine via AnyDeskMSI. | [
{
"id": 5378,
"label": "tools",
"start_offset": 0,
"end_offset": 8
},
{
"id": 46961,
"label": "tools",
"start_offset": 65,
"end_offset": 75
}
] | [
{
"id": 277,
"from_id": 46961,
"to_id": 5378,
"type": "drops"
}
] | [] |
1,831 | Detecting and deleting Mimikatz We observed the PowerShell script disabling the security products by leveraging aswarpot.sys (a legitimate Avast Anti-Rootkit Driver). | [
{
"id": 5382,
"label": "tools",
"start_offset": 23,
"end_offset": 31
},
{
"id": 5383,
"label": "tools",
"start_offset": 53,
"end_offset": 63
},
{
"id": 46962,
"label": "SOFTWARE",
"start_offset": 144,
"end_offset": 169
},
{
"id": 46963,
"label": "FILEPATH",
"start_offset": 117,
"end_offset": 129
},
{
"id": 46964,
"label": "attack-pattern",
"start_offset": 71,
"end_offset": 102
}
] | [
{
"id": 278,
"from_id": 46962,
"to_id": 46963,
"type": "consists-of"
}
] | [] |
1,850 | After disabling the security products, the actors behind AvosLocker again tried to transfer other tools, namely Mimikatz and Impacket. | [
{
"id": 46979,
"label": "tools",
"start_offset": 112,
"end_offset": 120
},
{
"id": 46978,
"label": "malware",
"start_offset": 57,
"end_offset": 67
},
{
"id": 46980,
"label": "tools",
"start_offset": 125,
"end_offset": 133
}
] | [
{
"id": 280,
"from_id": 46978,
"to_id": 46979,
"type": "downloads"
},
{
"id": 281,
"from_id": 46978,
"to_id": 46980,
"type": "downloads"
}
] | [] |
1,852 | We also observed the execution of a password recovery tool XenArmor with C:\temp\pass\start.exe. | [
{
"id": 46982,
"label": "tools",
"start_offset": 63,
"end_offset": 71
},
{
"id": 46981,
"label": "FILEPATH",
"start_offset": 77,
"end_offset": 99
}
] | [
{
"id": 282,
"from_id": 46982,
"to_id": 46981,
"type": "consists-of"
}
] | [] |
1,858 | Deploying across the network We saw software deployment tool PDQ being used to deploy malicious batch scripts to multiple endpoints in the network. | [
{
"id": 46986,
"label": "attack-pattern",
"start_offset": 83,
"end_offset": 113
},
{
"id": 46985,
"label": "tools",
"start_offset": 65,
"end_offset": 68
}
] | [
{
"id": 283,
"from_id": 46986,
"to_id": 46985,
"type": "uses"
}
] | [] |
1,860 | While AvosLocker has been documented for its abuse of AnyDesk for lateral movement as its preferred application, we note that other remote access applications can also be abused to replace it. | [
{
"id": 45154,
"label": "malware",
"start_offset": 6,
"end_offset": 16
},
{
"id": 45155,
"label": "tools",
"start_offset": 54,
"end_offset": 61
},
{
"id": 45156,
"label": "attack-pattern",
"start_offset": 66,
"end_offset": 82
}
] | [
{
"id": 77,
"from_id": 45154,
"to_id": 45155,
"type": "uses"
},
{
"id": 284,
"from_id": 45156,
"to_id": 45155,
"type": "uses"
},
{
"id": 285,
"from_id": 45154,
"to_id": 45156,
"type": "uses"
}
] | [] |
1,872 | Avast responded to our notification with this statement: "We can confirm the vulnerability in an old version of our driver aswArPot.sys, which we fixed in our Avast 21.5 released in June 2021. | [
{
"id": 45157,
"label": "FILEPATH",
"start_offset": 123,
"end_offset": 135
},
{
"id": 45158,
"label": "SOFTWARE",
"start_offset": 159,
"end_offset": 169
},
{
"id": 45159,
"label": "TIME",
"start_offset": 182,
"end_offset": 191
},
{
"id": 45160,
"label": "identity",
"start_offset": 0,
"end_offset": 5
}
] | [
{
"id": 286,
"from_id": 45158,
"to_id": 45157,
"type": "consists-of"
}
] | [] |
1,882 | AvosLocker executable 05ba2df0033e3cd5b987d66b6de545df439d338a20165c0ba96cde8a74e463e5 Ransom.Win32.AVOSLOCKER.SMYXBLNT Mimikatz executable (x32 and x64) 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 HackTool.Win64.MIMIKATZ.ZTJA e81a8f8ad804c4d83869d7806a303ff04f31cce376c5df8aada2e9db2c1eeb98 HackTool.Win32.Mimikatz.CNFW Log4shell Nmap NSE script ddcb0e99f27e79d3536a15e0d51f7f33c38b2ae48677570f36f5e92863db5a96 Backdoor.Win32.CVE202144228.YACAH Impacket tool 14f0c4ce32821a7d25ea5e016ea26067d6615e3336c3baa854ea37a290a462a8 HackTool.Win32.Impacket.AA | [
{
"id": 5525,
"label": "tools",
"start_offset": 120,
"end_offset": 128
},
{
"id": 5529,
"label": "tools",
"start_offset": 352,
"end_offset": 356
},
{
"id": 5523,
"label": "SHA2",
"start_offset": 22,
"end_offset": 86
},
{
"id": 5530,
"label": "SHA2",
"start_offset": 368,
"end_offset": 432
},
{
"id": 5522,
"label": "malware",
"start_offset": 0,
"end_offset": 10
},
{
"id": 5527,
"label": "SHA2",
"start_offset": 154,
"end_offset": 218
},
{
"id": 5528,
"label": "SHA2",
"start_offset": 248,
"end_offset": 312
},
{
"id": 5533,
"label": "SHA2",
"start_offset": 481,
"end_offset": 545
},
{
"id": 5531,
"label": "tools",
"start_offset": 467,
"end_offset": 475
},
{
"id": 47007,
"label": "tools",
"start_offset": 546,
"end_offset": 572
},
{
"id": 47009,
"label": "tools",
"start_offset": 219,
"end_offset": 247
},
{
"id": 47011,
"label": "vulnerability",
"start_offset": 342,
"end_offset": 351
},
{
"id": 47012,
"label": "malware",
"start_offset": 87,
"end_offset": 119
},
{
"id": 47008,
"label": "tools",
"start_offset": 313,
"end_offset": 341
},
{
"id": 47010,
"label": "tools",
"start_offset": 433,
"end_offset": 466
}
] | [
{
"id": 288,
"from_id": 47012,
"to_id": 5522,
"type": "duplicate-of"
},
{
"id": 287,
"from_id": 5522,
"to_id": 5523,
"type": "consists-of"
}
] | [] |
1,887 | What sets Urpage attacks apart is its targeting of InPage, a word processor for Urdu and Arabic languages. | [
{
"id": 45163,
"label": "SOFTWARE",
"start_offset": 51,
"end_offset": 57
},
{
"id": 45162,
"label": "threat-actor",
"start_offset": 10,
"end_offset": 16
}
] | [
{
"id": 78,
"from_id": 45162,
"to_id": 45163,
"type": "targets"
}
] | [] |
1,893 | The link between Bahamut and Urpage can be best discussed by way of the multiple malicious Android samples that matched Bahamut's code and had C&C belonging to the Urpage infrastructure. | [
{
"id": 45170,
"label": "Infrastucture",
"start_offset": 143,
"end_offset": 146
},
{
"id": 45167,
"label": "threat-actor",
"start_offset": 120,
"end_offset": 128
},
{
"id": 5570,
"label": "threat-actor",
"start_offset": 17,
"end_offset": 24
},
{
"id": 5572,
"label": "threat-actor",
"start_offset": 29,
"end_offset": 35
},
{
"id": 5578,
"label": "threat-actor",
"start_offset": 164,
"end_offset": 170
},
{
"id": 47025,
"label": "SOFTWARE",
"start_offset": 91,
"end_offset": 106
}
] | [
{
"id": 289,
"from_id": 5570,
"to_id": 5572,
"type": "related-to"
}
] | [] |
1,903 | As with Bahamut applications, once downloaded and executed, it showed multiple malicious features that deal with stealing information. | [
{
"id": 47030,
"label": "attack-pattern",
"start_offset": 113,
"end_offset": 133
},
{
"id": 47029,
"label": "threat-actor",
"start_offset": 8,
"end_offset": 15
}
] | [
{
"id": 290,
"from_id": 47029,
"to_id": 47030,
"type": "uses"
}
] | [] |
1,921 | A malicious RTF file that exploits the CVE-2017-8750 and drops a malicious VB backdoor with C&C appswonder[.]info A malicious InPage file that exploits CVE-2017-12824 and drops two files, one non-malicious, and one malicious VB backdoor with C&C referfile[.]com Talos recently reported both C&C domain names with one type of campaign that targets iOS and involves MDM, and another type using VB and Delphi backdoors. | [
{
"id": 47039,
"label": "vulnerability",
"start_offset": 40,
"end_offset": 53
},
{
"id": 47042,
"label": "DOMAIN",
"start_offset": 247,
"end_offset": 262
},
{
"id": 47043,
"label": "identity",
"start_offset": 264,
"end_offset": 269
},
{
"id": 47044,
"label": "SOFTWARE",
"start_offset": 349,
"end_offset": 352
},
{
"id": 47045,
"label": "malware",
"start_offset": 3,
"end_offset": 16
},
{
"id": 47040,
"label": "vulnerability",
"start_offset": 153,
"end_offset": 167
},
{
"id": 47041,
"label": "DOMAIN",
"start_offset": 97,
"end_offset": 114
}
] | [
{
"id": 291,
"from_id": 47045,
"to_id": 47039,
"type": "exploits"
},
{
"id": 292,
"from_id": 47045,
"to_id": 47041,
"type": "communicates-with"
}
] | [] |
1,927 | One of the RTF files was found in a server related to Confucius (f1a54dca2fdfe59ec3f537148460364fb5d046c9b4e7db5fc819a9732ae0e063, detected as TROJ_CVE201711882.AG), while the other one (434d34c0502910c562f5c6840694737a2c82a8c44004fa58c7c457b08aac17bd,detected as Mal_CVE20170199-2) downloaded a VB Backdoor that pings back to twitck[.]com, a domain name belonging to Urpage. | [
{
"id": 5662,
"label": "SHA2",
"start_offset": 187,
"end_offset": 251
},
{
"id": 5659,
"label": "threat-actor",
"start_offset": 54,
"end_offset": 63
},
{
"id": 5660,
"label": "SHA2",
"start_offset": 65,
"end_offset": 129
},
{
"id": 47051,
"label": "malware",
"start_offset": 143,
"end_offset": 163
},
{
"id": 47052,
"label": "malware",
"start_offset": 264,
"end_offset": 281
},
{
"id": 47053,
"label": "DOMAIN",
"start_offset": 327,
"end_offset": 339
},
{
"id": 47054,
"label": "threat-actor",
"start_offset": 368,
"end_offset": 374
}
] | [
{
"id": 293,
"from_id": 5660,
"to_id": 5659,
"type": "authored-by"
},
{
"id": 294,
"from_id": 47051,
"to_id": 5660,
"type": "related-to"
},
{
"id": 295,
"from_id": 47051,
"to_id": 5659,
"type": "authored-by"
},
{
"id": 296,
"from_id": 5662,
"to_id": 5659,
"type": "authored-by"
},
{
"id": 297,
"from_id": 47052,
"to_id": 5659,
"type": "authored-by"
},
{
"id": 298,
"from_id": 47052,
"to_id": 47053,
"type": "beacons-to"
},
{
"id": 299,
"from_id": 47054,
"to_id": 47053,
"type": "controls"
}
] | [] |
1,929 | But this link is further fortified by the Android applications we found whose code is like that of Bahamut, with the C&C matching the usual name registration pattern of Patchwork’s group, as well as an infrastructure close to an old Patchwork domain. | [
{
"id": 45181,
"label": "SOFTWARE",
"start_offset": 42,
"end_offset": 49
},
{
"id": 45183,
"label": "threat-actor",
"start_offset": 169,
"end_offset": 178
},
{
"id": 45184,
"label": "threat-actor",
"start_offset": 233,
"end_offset": 242
},
{
"id": 45182,
"label": "malware",
"start_offset": 99,
"end_offset": 106
}
] | [
{
"id": 80,
"from_id": 45182,
"to_id": 45183,
"type": "attributed-to"
}
] | [] |
1,942 | The decoy documents tell more about Urpage's possible targets, as it contains text from articles about the region of Kashmir. | [
{
"id": 47066,
"label": "threat-actor",
"start_offset": 36,
"end_offset": 42
},
{
"id": 47067,
"label": "location",
"start_offset": 117,
"end_offset": 124
}
] | [
{
"id": 300,
"from_id": 47066,
"to_id": 47067,
"type": "targets"
}
] | [] |
1,986 | This post is also available in: 日本語 (Japanese) HelloXD is a ransomware family performing double extortion attacks that surfaced in November 2021. | [
{
"id": 45202,
"label": "malware",
"start_offset": 53,
"end_offset": 60
},
{
"id": 45203,
"label": "TIME",
"start_offset": 137,
"end_offset": 150
},
{
"id": 45205,
"label": "attack-pattern",
"start_offset": 95,
"end_offset": 111
}
] | [
{
"id": 81,
"from_id": 45202,
"to_id": 45205,
"type": "uses"
}
] | [] |
1,992 | During the analysis of the MicroBackdoor sample, Unit 42 observed the configuration and found an embedded IP address, belonging to a threat actor we believe is potentially the developer: x4k, also known as L4ckyguy, unKn0wn, unk0w, _unkn0wn and x4kme. | [
{
"id": 45216,
"label": "threat-actor",
"start_offset": 246,
"end_offset": 251
},
{
"id": 45209,
"label": "malware",
"start_offset": 28,
"end_offset": 41
},
{
"id": 45212,
"label": "threat-actor",
"start_offset": 207,
"end_offset": 215
},
{
"id": 45210,
"label": "identity",
"start_offset": 50,
"end_offset": 57
},
{
"id": 45213,
"label": "threat-actor",
"start_offset": 217,
"end_offset": 224
},
{
"id": 45211,
"label": "threat-actor",
"start_offset": 188,
"end_offset": 191
},
{
"id": 45214,
"label": "threat-actor",
"start_offset": 226,
"end_offset": 231
},
{
"id": 45215,
"label": "threat-actor",
"start_offset": 233,
"end_offset": 241
}
] | [
{
"id": 87,
"from_id": 45216,
"to_id": 45211,
"type": "duplicate-of"
},
{
"id": 83,
"from_id": 45212,
"to_id": 45211,
"type": "duplicate-of"
},
{
"id": 84,
"from_id": 45213,
"to_id": 45211,
"type": "duplicate-of"
},
{
"id": 85,
"from_id": 45214,
"to_id": 45211,
"type": "duplicate-of"
},
{
"id": 86,
"from_id": 45215,
"to_id": 45211,
"type": "duplicate-of"
},
{
"id": 88,
"from_id": 45209,
"to_id": 45211,
"type": "authored-by"
}
] | [] |
2,002 | The file description included the entry VlahmAV, a play on words on ClamAV, and the developer named the ransomware HelloXD and used another potential alias, uKnow, as the developer of HelloXD in the copyright section. | [
{
"id": 47109,
"label": "SOFTWARE",
"start_offset": 69,
"end_offset": 75
},
{
"id": 47111,
"label": "malware",
"start_offset": 116,
"end_offset": 123
},
{
"id": 47112,
"label": "malware",
"start_offset": 158,
"end_offset": 163
},
{
"id": 47110,
"label": "malware",
"start_offset": 185,
"end_offset": 192
}
] | [
{
"id": 302,
"from_id": 47110,
"to_id": 47112,
"type": "duplicate-of"
},
{
"id": 301,
"from_id": 47111,
"to_id": 47112,
"type": "duplicate-of"
}
] | [] |
2,013 | For example, LockBit 2.0 leverages Tox Chat for threat actor communications. | [
{
"id": 45221,
"label": "malware",
"start_offset": 13,
"end_offset": 24
},
{
"id": 45222,
"label": "tools",
"start_offset": 35,
"end_offset": 43
}
] | [
{
"id": 89,
"from_id": 45221,
"to_id": 45222,
"type": "uses"
}
] | [] |
2,027 | While the obfuscation and execution may differ between the two, both samples contain very similar core functionality, due to the author copying the leaked Babuk/Babyk source code in order to develop the HelloXD ransomware (Figure 7). | [
{
"id": 47122,
"label": "malware",
"start_offset": 203,
"end_offset": 210
},
{
"id": 47121,
"label": "malware",
"start_offset": 161,
"end_offset": 166
},
{
"id": 47120,
"label": "malware",
"start_offset": 155,
"end_offset": 160
}
] | [
{
"id": 303,
"from_id": 47121,
"to_id": 47122,
"type": "variant-of"
},
{
"id": 304,
"from_id": 47120,
"to_id": 47122,
"type": "variant-of"
}
] | [] |
2,030 | While there is a lot of overlap between HelloXD and Babuk, there are some small but crucial differences to take note of between Babuk and the two different variants. HelloXD version 1 is the least modified, utilizing Curve25519-Donna and a modified HC-128 algorithm to encrypt file data, while also containing the same CRC hashing routine incorporating the string dong, possibly referencing Chuong Dong, who had previously analyzed and reported on the first version of Babuk (Figure 8). | [
{
"id": 47125,
"label": "malware",
"start_offset": 53,
"end_offset": 58
},
{
"id": 47127,
"label": "malware",
"start_offset": 168,
"end_offset": 175
},
{
"id": 47128,
"label": "malware",
"start_offset": 471,
"end_offset": 476
},
{
"id": 47129,
"label": "identity",
"start_offset": 393,
"end_offset": 404
},
{
"id": 47124,
"label": "malware",
"start_offset": 41,
"end_offset": 48
},
{
"id": 47126,
"label": "malware",
"start_offset": 129,
"end_offset": 134
}
] | [
{
"id": 305,
"from_id": 47124,
"to_id": 47125,
"type": "variant-of"
}
] | [] |
2,058 | From the GitHub page, we also observed a URL to a site – xn--90a5ai[.]com(фсб[.]com) – resolving to the previously mentioned IP 164[.]68[.]114[.]29, which at this point in time only shows an animation of interconnecting points. | [
{
"id": 45239,
"label": "DOMAIN",
"start_offset": 74,
"end_offset": 83
},
{
"id": 45240,
"label": "IPV4",
"start_offset": 128,
"end_offset": 147
},
{
"id": 45237,
"label": "SOFTWARE",
"start_offset": 9,
"end_offset": 15
},
{
"id": 45238,
"label": "DOMAIN",
"start_offset": 57,
"end_offset": 73
}
] | [
{
"id": 306,
"from_id": 45238,
"to_id": 45240,
"type": "related-to"
},
{
"id": 307,
"from_id": 45239,
"to_id": 45240,
"type": "related-to"
}
] | [] |
2,059 | That being said, when looking at the HTML source code of the site, we discovered a couple of references to the user observed before – x4kme – and other aliases such as uKn0wn, which was observed in the HelloXD ransomware samples. | [
{
"id": 47152,
"label": "identity",
"start_offset": 168,
"end_offset": 174
},
{
"id": 47150,
"label": "identity",
"start_offset": 134,
"end_offset": 139
},
{
"id": 47151,
"label": "malware",
"start_offset": 202,
"end_offset": 209
}
] | [
{
"id": 308,
"from_id": 47150,
"to_id": 47152,
"type": "duplicate-of"
}
] | [] |
2,061 | , we were able to observe another GitHub account with the name l4ckyguy, sharing the profile picture, location and URL in the description, with a link to the previously observed account (x4kme), and a name, Ivan Topor, which we believe may be another alias for this threat actor. | [
{
"id": 45241,
"label": "SOFTWARE",
"start_offset": 34,
"end_offset": 40
},
{
"id": 45242,
"label": "identity",
"start_offset": 63,
"end_offset": 71
},
{
"id": 45243,
"label": "threat-actor",
"start_offset": 187,
"end_offset": 192
},
{
"id": 45244,
"label": "identity",
"start_offset": 207,
"end_offset": 218
},
{
"id": 6137,
"label": "location",
"start_offset": 111,
"end_offset": 114
},
{
"id": 6138,
"label": "location",
"start_offset": 195,
"end_offset": 198
},
{
"id": 6140,
"label": "location",
"start_offset": 236,
"end_offset": 239
}
] | [
{
"id": 93,
"from_id": 45243,
"to_id": 45244,
"type": "related-to"
},
{
"id": 92,
"from_id": 45243,
"to_id": 45242,
"type": "related-to"
}
] | [] |
2,064 | This particular IP was linked to a Contabo server that x4k had also included within their VirusTotal graph discussed above. | [
{
"id": 45245,
"label": "threat-actor",
"start_offset": 55,
"end_offset": 58
},
{
"id": 45247,
"label": "identity",
"start_offset": 35,
"end_offset": 42
},
{
"id": 45246,
"label": "SOFTWARE",
"start_offset": 90,
"end_offset": 101
}
] | [
{
"id": 94,
"from_id": 45245,
"to_id": 45247,
"type": "uses"
}
] | [] |
2,081 | Most of his videos, comments, configurations and tutorials are written in Russian – and when combined with knowledge gained from a few OPSEC mistakes – Russia is also where we believe x4k originates from. | [
{
"id": 47209,
"label": "threat-actor",
"start_offset": 184,
"end_offset": 187
},
{
"id": 47210,
"label": "location",
"start_offset": 152,
"end_offset": 158
}
] | [
{
"id": 310,
"from_id": 47209,
"to_id": 47210,
"type": "located-at"
}
] | [] |
2,103 | This post is also available in: 日本語 (Japanese) A recent vulnerability in the Kerberos authentication protocol, CVE-2020-17049 (dubbed Bronze Bit), has been disclosed by Microsoft. | [
{
"id": 45392,
"label": "identity",
"start_offset": 175,
"end_offset": 184
},
{
"id": 45390,
"label": "vulnerability",
"start_offset": 117,
"end_offset": 131
},
{
"id": 45393,
"label": "SOFTWARE",
"start_offset": 83,
"end_offset": 91
},
{
"id": 45391,
"label": "vulnerability",
"start_offset": 140,
"end_offset": 150
}
] | [
{
"id": 95,
"from_id": 45391,
"to_id": 45390,
"type": "duplicate-of"
}
] | [] |
2,114 | On August 22, 2018, the Apache Foundation released a critical security update for CVE-2018-1176, a remote code execution vulnerability affecting Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16. | [
{
"id": 47248,
"label": "TIME",
"start_offset": 3,
"end_offset": 18
},
{
"id": 47249,
"label": "vulnerability",
"start_offset": 82,
"end_offset": 95
},
{
"id": 47252,
"label": "SOFTWARE",
"start_offset": 145,
"end_offset": 199
},
{
"id": 47250,
"label": "vulnerability",
"start_offset": 99,
"end_offset": 134
}
] | [
{
"id": 311,
"from_id": 47252,
"to_id": 47249,
"type": "has"
},
{
"id": 312,
"from_id": 47252,
"to_id": 47250,
"type": "has"
}
] | [] |
2,185 | This new campaign used updated instances of the Tdrop malware family discovered in the Operation Troy campaign. | [
{
"id": 6580,
"label": "malware",
"start_offset": 48,
"end_offset": 53
},
{
"id": 47314,
"label": "campaign",
"start_offset": 87,
"end_offset": 110
}
] | [
{
"id": 313,
"from_id": 47314,
"to_id": 6580,
"type": "delivers"
}
] | [] |
2,285 | Parallel to the analysis, tracking, and technical disruption of this botnet, Google has filed a lawsuit against two individuals believed to be located in Russia for operating the Glupteba Botnet and its various criminal schemes. | [
{
"id": 47357,
"label": "identity",
"start_offset": 77,
"end_offset": 83
},
{
"id": 47356,
"label": "malware",
"start_offset": 179,
"end_offset": 187
},
{
"id": 47358,
"label": "location",
"start_offset": 154,
"end_offset": 160
}
] | [
{
"id": 314,
"from_id": 47356,
"to_id": 47358,
"type": "located-at"
}
] | [] |
2,298 | In late August 2021, TAG discovered watering hole attacks targeting visitors to Hong Kong websites for a media outlet and a prominent pro-democracy labor and political group. | [
{
"id": 45449,
"label": "TIME",
"start_offset": 8,
"end_offset": 19
},
{
"id": 45451,
"label": "attack-pattern",
"start_offset": 36,
"end_offset": 49
},
{
"id": 45453,
"label": "identity",
"start_offset": 134,
"end_offset": 173
},
{
"id": 45452,
"label": "location",
"start_offset": 80,
"end_offset": 90
},
{
"id": 45450,
"label": "identity",
"start_offset": 21,
"end_offset": 24
}
] | [
{
"id": 97,
"from_id": 45453,
"to_id": 45451,
"type": "targets"
},
{
"id": 96,
"from_id": 45451,
"to_id": 45452,
"type": "targets"
}
] | [] |
2,299 | The watering hole served an XNU privilege escalation vulnerability (CVE-2021-30869) unpatched in macOS Catalina, which led to the installation of a previously unreported backdoor. | [
{
"id": 47364,
"label": "vulnerability",
"start_offset": 68,
"end_offset": 82
},
{
"id": 47365,
"label": "SOFTWARE",
"start_offset": 97,
"end_offset": 111
},
{
"id": 47366,
"label": "vulnerability",
"start_offset": 28,
"end_offset": 66
}
] | [
{
"id": 315,
"from_id": 47365,
"to_id": 47364,
"type": "has"
}
] | [] |
2,313 | The exploit chain combined an RCE in WebKit exploiting CVE-2021-1789 which was patched on Jan 5, 2021 before discovery of this campaign and a 0-day local privilege escalation in XNU (CVE-2021-30869) patched on Sept 23, 2021. | [
{
"id": 45456,
"label": "vulnerability",
"start_offset": 55,
"end_offset": 68
},
{
"id": 45462,
"label": "SOFTWARE",
"start_offset": 178,
"end_offset": 181
},
{
"id": 45460,
"label": "TIME",
"start_offset": 210,
"end_offset": 223
},
{
"id": 45461,
"label": "attack-pattern",
"start_offset": 148,
"end_offset": 174
},
{
"id": 45457,
"label": "SOFTWARE",
"start_offset": 37,
"end_offset": 43
},
{
"id": 45458,
"label": "TIME",
"start_offset": 90,
"end_offset": 101
},
{
"id": 45459,
"label": "vulnerability",
"start_offset": 183,
"end_offset": 197
}
] | [
{
"id": 98,
"from_id": 45456,
"to_id": 45457,
"type": "has"
},
{
"id": 99,
"from_id": 45459,
"to_id": 45462,
"type": "has"
}
] | [] |
2,354 | Beer was able to quickly recognize this exploit as a variant of an earlier port type confusion vulnerability he analyzed in the XNU kernel (CVE-2020-27932). | [
{
"id": 47411,
"label": "SOFTWARE",
"start_offset": 128,
"end_offset": 138
},
{
"id": 47412,
"label": "vulnerability",
"start_offset": 140,
"end_offset": 154
}
] | [
{
"id": 318,
"from_id": 47412,
"to_id": 47411,
"type": "has"
}
] | [] |
2,365 | For those interested in following our in-the-wild work, we will soon publish details surrounding another, unrelated campaign we discovered using two Chrome 0-days (CVE-2021-37973 and CVE-2021-37976). | [
{
"id": 47418,
"label": "vulnerability",
"start_offset": 183,
"end_offset": 197
},
{
"id": 47419,
"label": "SOFTWARE",
"start_offset": 149,
"end_offset": 155
},
{
"id": 47417,
"label": "vulnerability",
"start_offset": 164,
"end_offset": 178
}
] | [
{
"id": 319,
"from_id": 47419,
"to_id": 47417,
"type": "has"
},
{
"id": 320,
"from_id": 47419,
"to_id": 47418,
"type": "has"
}
] | [] |
2,368 | We have uncovered a cyberespionage campaign being perpetrated by Earth Baku, an advanced persistent threat (APT) group with a known history of carrying out cyberattacks under the alias APT41. | [
{
"id": 47423,
"label": "threat-actor",
"start_offset": 185,
"end_offset": 190
},
{
"id": 47424,
"label": "threat-actor",
"start_offset": 65,
"end_offset": 75
}
] | [
{
"id": 321,
"from_id": 47424,
"to_id": 47423,
"type": "duplicate-of"
}
] | [] |
2,370 | Earth Baku deploys its ongoing campaign, which can be traced to as far back as July 2020, through multiple attack vectors that are designed based on different exploits or the infrastructure of its targeted victim's environment: • SQL injection to upload a malicious file • Installment through InstallUtil.exe in a scheduled task • Possibly a malicious link (LNK) file sent as an email attachment • Exploitation of the ProxyLogon vulnerability CVE-2021-26855 to upload a China Chopper web shell This campaign uses previously unidentified shellcode loaders, which we have named StealthVector and StealthMutant, and a backdoor, which we have dubbed ScrambleCross. | [
{
"id": 45480,
"label": "threat-actor",
"start_offset": 0,
"end_offset": 10
},
{
"id": 45472,
"label": "vulnerability",
"start_offset": 444,
"end_offset": 458
},
{
"id": 45474,
"label": "malware",
"start_offset": 578,
"end_offset": 591
},
{
"id": 45475,
"label": "malware",
"start_offset": 596,
"end_offset": 609
},
{
"id": 45476,
"label": "malware",
"start_offset": 648,
"end_offset": 661
},
{
"id": 45477,
"label": "TIME",
"start_offset": 79,
"end_offset": 88
},
{
"id": 45478,
"label": "FILEPATH",
"start_offset": 294,
"end_offset": 309
},
{
"id": 45479,
"label": "vulnerability",
"start_offset": 419,
"end_offset": 429
},
{
"id": 7033,
"label": "attack-pattern",
"start_offset": 231,
"end_offset": 244
},
{
"id": 7034,
"label": "attack-pattern",
"start_offset": 315,
"end_offset": 329
},
{
"id": 7036,
"label": "malware",
"start_offset": 471,
"end_offset": 484
}
] | [
{
"id": 100,
"from_id": 45479,
"to_id": 45472,
"type": "duplicate-of"
},
{
"id": 323,
"from_id": 45480,
"to_id": 7033,
"type": "uses"
},
{
"id": 324,
"from_id": 45480,
"to_id": 7034,
"type": "uses"
}
] | [] |
2,381 | After its payload is decrypted, StealthMutant performs process hollowing to execute its payload in a remote process. | [
{
"id": 7081,
"label": "attack-pattern",
"start_offset": 55,
"end_offset": 72
},
{
"id": 47444,
"label": "malware",
"start_offset": 32,
"end_offset": 45
}
] | [
{
"id": 325,
"from_id": 47444,
"to_id": 7081,
"type": "uses"
}
] | [] |
2,383 | Both StealthMutant and StealthVector contain a payload of either the Cobalt Strike beacon or ScrambleCross, a newly discovered backdoor. | [
{
"id": 47445,
"label": "malware",
"start_offset": 5,
"end_offset": 18
},
{
"id": 47448,
"label": "malware",
"start_offset": 93,
"end_offset": 106
},
{
"id": 47446,
"label": "malware",
"start_offset": 23,
"end_offset": 36
},
{
"id": 47447,
"label": "tools",
"start_offset": 69,
"end_offset": 82
}
] | [
{
"id": 326,
"from_id": 47446,
"to_id": 47447,
"type": "uses"
},
{
"id": 327,
"from_id": 47446,
"to_id": 47448,
"type": "uses"
},
{
"id": 328,
"from_id": 47445,
"to_id": 47447,
"type": "uses"
},
{
"id": 329,
"from_id": 47445,
"to_id": 47448,
"type": "uses"
}
] | [] |
2,386 | It has many of the same capabilities as another backdoor, Crosswalk, which has also been used by Earth Baku. | [
{
"id": 47451,
"label": "threat-actor",
"start_offset": 97,
"end_offset": 107
},
{
"id": 47450,
"label": "malware",
"start_offset": 58,
"end_offset": 67
}
] | [
{
"id": 330,
"from_id": 47451,
"to_id": 47450,
"type": "uses"
}
] | [] |
2,391 | But because Earth Baku has updated its toolset with StealthVector, StealthMutant, and ScrambleCross for this new campaign, we have identified it as its own separate operation. | [
{
"id": 45488,
"label": "threat-actor",
"start_offset": 12,
"end_offset": 22
},
{
"id": 45490,
"label": "malware",
"start_offset": 52,
"end_offset": 65
},
{
"id": 45491,
"label": "malware",
"start_offset": 67,
"end_offset": 80
},
{
"id": 45492,
"label": "malware",
"start_offset": 86,
"end_offset": 99
}
] | [
{
"id": 102,
"from_id": 45488,
"to_id": 45491,
"type": "uses"
},
{
"id": 103,
"from_id": 45488,
"to_id": 45492,
"type": "uses"
},
{
"id": 101,
"from_id": 45488,
"to_id": 45490,
"type": "uses"
}
] | [] |
2,393 | A timeline of Earth Baku’s previous campaign as APT41 and its new campaign How Earth Baku creates its malware tools Earth Baku is known for its use of self-developed tools. | [
{
"id": 47459,
"label": "threat-actor",
"start_offset": 14,
"end_offset": 24
},
{
"id": 47460,
"label": "threat-actor",
"start_offset": 48,
"end_offset": 53
},
{
"id": 47461,
"label": "threat-actor",
"start_offset": 79,
"end_offset": 89
},
{
"id": 47462,
"label": "threat-actor",
"start_offset": 116,
"end_offset": 126
}
] | [
{
"id": 331,
"from_id": 47459,
"to_id": 47460,
"type": "duplicate-of"
}
] | [] |
2,398 | On March 29, 2022, the Spring Cloud Expression Resource Access Vulnerability tracked in CVE-2022-22963 was patched with the release of Spring Cloud Function 3.1.7 and 3.2.3. | [
{
"id": 47468,
"label": "TIME",
"start_offset": 3,
"end_offset": 17
},
{
"id": 47470,
"label": "vulnerability",
"start_offset": 88,
"end_offset": 102
},
{
"id": 47469,
"label": "vulnerability",
"start_offset": 23,
"end_offset": 76
},
{
"id": 47471,
"label": "SOFTWARE",
"start_offset": 135,
"end_offset": 172
}
] | [
{
"id": 332,
"from_id": 47471,
"to_id": 47470,
"type": "has"
}
] | [] |
2,399 | Two days later on March 31, 2022, Spring released version 5.3.18 and 5.2.20 of Spring Framework to patch another more severe vulnerability tracked in CVE-2022-22965. | [
{
"id": 47472,
"label": "TIME",
"start_offset": 18,
"end_offset": 32
},
{
"id": 47473,
"label": "SOFTWARE",
"start_offset": 34,
"end_offset": 40
},
{
"id": 47474,
"label": "SOFTWARE",
"start_offset": 79,
"end_offset": 95
},
{
"id": 47475,
"label": "vulnerability",
"start_offset": 150,
"end_offset": 164
}
] | [
{
"id": 333,
"from_id": 47474,
"to_id": 47475,
"type": "has"
}
] | [] |
2,400 | The CVE-2022-22965 vulnerability allows an attacker unauthenticated remote code execution (RCE), which Unit 42 has observed being exploited in the wild. | [
{
"id": 45495,
"label": "vulnerability",
"start_offset": 4,
"end_offset": 18
},
{
"id": 45496,
"label": "attack-pattern",
"start_offset": 52,
"end_offset": 89
},
{
"id": 45497,
"label": "identity",
"start_offset": 103,
"end_offset": 110
}
] | [
{
"id": 105,
"from_id": 45496,
"to_id": 45495,
"type": "delivers"
}
] | [] |
2,404 | On April 8, we updated this blog to include statistics on SpringShell exploitation attempts that we identified by analyzing hits on the Spring Core Remote Code Execution Vulnerability threat prevention signature for the Palo Alto Networks Next-Generation Firewall, as well as alerts triggered in Cortex XDR. | [
{
"id": 47484,
"label": "SOFTWARE",
"start_offset": 297,
"end_offset": 307
},
{
"id": 47480,
"label": "TIME",
"start_offset": 4,
"end_offset": 11
},
{
"id": 47481,
"label": "vulnerability",
"start_offset": 59,
"end_offset": 70
},
{
"id": 47482,
"label": "vulnerability",
"start_offset": 137,
"end_offset": 184
},
{
"id": 47483,
"label": "SOFTWARE",
"start_offset": 221,
"end_offset": 264
}
] | [
{
"id": 334,
"from_id": 47481,
"to_id": 47482,
"type": "related-to"
}
] | [] |
2,407 | Affected Software and Versions Background on the Spring Framework Root Cause Analysis for CVE-2022-22965 | [
{
"id": 47486,
"label": "vulnerability",
"start_offset": 90,
"end_offset": 104
},
{
"id": 47485,
"label": "SOFTWARE",
"start_offset": 49,
"end_offset": 65
}
] | [
{
"id": 335,
"from_id": 47485,
"to_id": 47486,
"type": "has"
}
] | [] |
2,427 | Early in 2010, CVE-2010-1622 was assigned to a remote code execution vulnerability in the Spring Framework. | [
{
"id": 45513,
"label": "vulnerability",
"start_offset": 15,
"end_offset": 28
},
{
"id": 45514,
"label": "SOFTWARE",
"start_offset": 90,
"end_offset": 106
},
{
"id": 45515,
"label": "attack-pattern",
"start_offset": 47,
"end_offset": 68
},
{
"id": 45512,
"label": "TIME",
"start_offset": 0,
"end_offset": 13
}
] | [
{
"id": 106,
"from_id": 45514,
"to_id": 45513,
"type": "has"
},
{
"id": 107,
"from_id": 45515,
"to_id": 45513,
"type": "uses"
}
] | [] |
2,476 | This particular webshell is based on AntSword’s shell.jsp, which was modified to use a parameter of k3rwin instead of ant to load the class. | [
{
"id": 7400,
"label": "tools",
"start_offset": 37,
"end_offset": 45
},
{
"id": 47549,
"label": "identity",
"start_offset": 100,
"end_offset": 106
},
{
"id": 47548,
"label": "FILEPATH",
"start_offset": 48,
"end_offset": 57
}
] | [
{
"id": 336,
"from_id": 7400,
"to_id": 47548,
"type": "consists-of"
}
] | [] |
2,488 | The signature triggered on the creation of the webshell files, of which we observed the following file written: /usr/local/tomcat/work/Catalina/localhost/ROOT/org/apache/jsp/shell_jsp.java /usr/local/tomcat/webapps/ROOT/shell_.jsp SpringShell is officially assigned CVE-2022-22965, and the patch was released on March 31, 2022. | [
{
"id": 47567,
"label": "FILEPATH",
"start_offset": 190,
"end_offset": 231
},
{
"id": 47568,
"label": "vulnerability",
"start_offset": 268,
"end_offset": 282
},
{
"id": 47570,
"label": "vulnerability",
"start_offset": 233,
"end_offset": 244
},
{
"id": 47566,
"label": "FILEPATH",
"start_offset": 113,
"end_offset": 189
},
{
"id": 47569,
"label": "TIME",
"start_offset": 314,
"end_offset": 328
},
{
"id": 47571,
"label": "attack-pattern",
"start_offset": 47,
"end_offset": 55
}
] | [
{
"id": 337,
"from_id": 47570,
"to_id": 47568,
"type": "related-to"
},
{
"id": 339,
"from_id": 47570,
"to_id": 47567,
"type": "consists-of"
},
{
"id": 340,
"from_id": 47570,
"to_id": 47566,
"type": "consists-of"
}
] | [] |
2,491 | While CVE-2022-22963 is a different vulnerability in Spring Cloud Function (not technically part of SpringShell), a Threat Prevention signature is also available to ensure coverage at the perimeter. | [
{
"id": 47575,
"label": "vulnerability",
"start_offset": 101,
"end_offset": 112
},
{
"id": 47573,
"label": "vulnerability",
"start_offset": 7,
"end_offset": 21
},
{
"id": 47574,
"label": "SOFTWARE",
"start_offset": 54,
"end_offset": 66
}
] | [
{
"id": 341,
"from_id": 47574,
"to_id": 47573,
"type": "has"
}
] | [] |
2,496 | Palo Alto Networks Cortex XDR Prevent and Pro customers running agent version 7.4 and above with content version 450-87751 on Linux devices are protected from CVE-2022-22963 using the Java Deserialization module; customers running agent version 7.7 and content 480 and above are protected from CVE-2022-22963 and CVE-2022-22965 for both Windows and Linux using the Java Deserialization module; other OSes and exploits receive protections from post-exploitation activities using Behavioral Threat Protection, Password Theft Prevention, Anti Ransomware and other Anti Exploitation modules. | [
{
"id": 47587,
"label": "vulnerability",
"start_offset": 159,
"end_offset": 173
},
{
"id": 47585,
"label": "SOFTWARE",
"start_offset": 0,
"end_offset": 45
},
{
"id": 47588,
"label": "SOFTWARE",
"start_offset": 184,
"end_offset": 211
},
{
"id": 47590,
"label": "vulnerability",
"start_offset": 313,
"end_offset": 327
},
{
"id": 47591,
"label": "SOFTWARE",
"start_offset": 337,
"end_offset": 344
},
{
"id": 47593,
"label": "SOFTWARE",
"start_offset": 365,
"end_offset": 392
},
{
"id": 47586,
"label": "SOFTWARE",
"start_offset": 126,
"end_offset": 131
},
{
"id": 47589,
"label": "vulnerability",
"start_offset": 294,
"end_offset": 308
},
{
"id": 47592,
"label": "SOFTWARE",
"start_offset": 349,
"end_offset": 354
}
] | [
{
"id": 342,
"from_id": 47587,
"to_id": 47588,
"type": "related-to"
}
] | [] |
2,516 | The FBI has connected Conti to more than 400 cyberattacks against organizations worldwide, three-quarters of which are based in the U.S., with demands as high as $25 million. | [
{
"id": 47712,
"label": "threat-actor",
"start_offset": 23,
"end_offset": 28
},
{
"id": 47713,
"label": "location",
"start_offset": 133,
"end_offset": 137
},
{
"id": 47711,
"label": "identity",
"start_offset": 5,
"end_offset": 8
}
] | [
{
"id": 343,
"from_id": 47712,
"to_id": 47713,
"type": "targets"
}
] | [] |
2,555 | Credential theft has been known to be a key part of the Shamoon 2 attacks. | [
{
"id": 47749,
"label": "attack-pattern",
"start_offset": 1,
"end_offset": 17
},
{
"id": 47750,
"label": "threat-actor",
"start_offset": 57,
"end_offset": 66
}
] | [
{
"id": 348,
"from_id": 47750,
"to_id": 47749,
"type": "uses"
}
] | [] |
2,557 | And from this we can see how credential theft is the keystone of Shamoon 2 attacks; if an organization can prevent credential theft, the Shamoon 2 attacks can’t succeed. | [
{
"id": 47751,
"label": "attack-pattern",
"start_offset": 30,
"end_offset": 46
},
{
"id": 47753,
"label": "attack-pattern",
"start_offset": 116,
"end_offset": 132
},
{
"id": 47752,
"label": "threat-actor",
"start_offset": 66,
"end_offset": 75
},
{
"id": 47754,
"label": "threat-actor",
"start_offset": 138,
"end_offset": 147
}
] | [
{
"id": 346,
"from_id": 47752,
"to_id": 47751,
"type": "uses"
},
{
"id": 347,
"from_id": 47754,
"to_id": 47753,
"type": "uses"
}
] | [] |
2,558 | In our research, we’re able to outline that Shamoon 2 enters and spreads through an organization in three stages: These stages are outlined in the image below. And that credential theft is a key element in each stage: It’s also worth noting that credentials are a keystone issue in Shamoon 2 wave 2 too: we saw evidence of targeting an organization’s virtual desktop infrastructure (VDI) solutions with default credentials. | [
{
"id": 47755,
"label": "threat-actor",
"start_offset": 45,
"end_offset": 54
},
{
"id": 47758,
"label": "campaign",
"start_offset": 286,
"end_offset": 302
},
{
"id": 47756,
"label": "attack-pattern",
"start_offset": 172,
"end_offset": 188
}
] | [
{
"id": 349,
"from_id": 47758,
"to_id": 47756,
"type": "uses"
}
] | [] |
2,561 | We do believe there is evidence suggestive of a connection between Shamoon 2 and the Magic Hound campaign, which could indicate these two attack campaigns could have worked in conjunction with each other to execute the Shamoon 2 attacks. | [
{
"id": 47761,
"label": "campaign",
"start_offset": 85,
"end_offset": 105
},
{
"id": 47760,
"label": "campaign",
"start_offset": 67,
"end_offset": 76
},
{
"id": 47762,
"label": "campaign",
"start_offset": 219,
"end_offset": 228
}
] | [
{
"id": 350,
"from_id": 47761,
"to_id": 47760,
"type": "related-to"
}
] | [] |
2,594 | In December 2021, the Ministry of Health of Brazil fell victim to an attack claimed by Lapsus$ (Figure 2). | [
{
"id": 47778,
"label": "TIME",
"start_offset": 3,
"end_offset": 16
},
{
"id": 47780,
"label": "threat-actor",
"start_offset": 87,
"end_offset": 94
},
{
"id": 47779,
"label": "identity",
"start_offset": 22,
"end_offset": 50
}
] | [
{
"id": 351,
"from_id": 47780,
"to_id": 47779,
"type": "targets"
}
] | [] |
2,596 | This was followed in short order by attacks on South American telecoms providers Claro and Embratel, Brazilian state-owned postal service “Correios,” and Portuguese media giant Impresa. | [
{
"id": 47784,
"label": "location",
"start_offset": 101,
"end_offset": 110
},
{
"id": 47785,
"label": "identity",
"start_offset": 139,
"end_offset": 147
},
{
"id": 47786,
"label": "location",
"start_offset": 154,
"end_offset": 164
},
{
"id": 47781,
"label": "location",
"start_offset": 47,
"end_offset": 61
},
{
"id": 47783,
"label": "identity",
"start_offset": 91,
"end_offset": 99
},
{
"id": 47787,
"label": "identity",
"start_offset": 176,
"end_offset": 184
},
{
"id": 47782,
"label": "identity",
"start_offset": 81,
"end_offset": 86
}
] | [
{
"id": 352,
"from_id": 47787,
"to_id": 47786,
"type": "located-at"
},
{
"id": 353,
"from_id": 47785,
"to_id": 47784,
"type": "located-at"
},
{
"id": 354,
"from_id": 47782,
"to_id": 47781,
"type": "located-at"
},
{
"id": 355,
"from_id": 47783,
"to_id": 47781,
"type": "located-at"
}
] | [] |
2,597 | This initial focus has led to speculation that Lapsus$ Group may be Brazilian, although we understand the choice of targets to have been influenced by extended team members rather than the team leadership. | [
{
"id": 47788,
"label": "threat-actor",
"start_offset": 47,
"end_offset": 54
},
{
"id": 47789,
"label": "location",
"start_offset": 68,
"end_offset": 77
}
] | [
{
"id": 356,
"from_id": 47788,
"to_id": 47789,
"type": "located-at"
}
] | [] |
2,598 | Apart from Argentinian eCommerce provider Mercado Libre / Mercado Pago, subsequent victimology has departed South America and pivoted to focus on the high-tech sector. Recent public victims have included: It should be understood that in addition there are likely any number of other victims, targeted by attacks not known in the public sphere. | [
{
"id": 45606,
"label": "location",
"start_offset": 12,
"end_offset": 23
},
{
"id": 45608,
"label": "identity",
"start_offset": 43,
"end_offset": 56
},
{
"id": 45609,
"label": "identity",
"start_offset": 59,
"end_offset": 71
},
{
"id": 45610,
"label": "location",
"start_offset": 109,
"end_offset": 122
}
] | [
{
"id": 357,
"from_id": 45608,
"to_id": 45606,
"type": "located-at"
},
{
"id": 358,
"from_id": 45609,
"to_id": 45606,
"type": "located-at"
},
{
"id": 359,
"from_id": 45609,
"to_id": 45608,
"type": "related-to"
}
] | [] |
2,601 | For example, in the “proof” of the Okta breach posted on the Lapsus$ Group’s Telegram channel, the actor states: “… our focus was ONLY on okta customers” (Figure 3) | [
{
"id": 45614,
"label": "identity",
"start_offset": 138,
"end_offset": 142
},
{
"id": 45611,
"label": "identity",
"start_offset": 35,
"end_offset": 39
},
{
"id": 45612,
"label": "threat-actor",
"start_offset": 61,
"end_offset": 68
},
{
"id": 45613,
"label": "SOFTWARE",
"start_offset": 77,
"end_offset": 85
}
] | [
{
"id": 360,
"from_id": 45612,
"to_id": 45611,
"type": "targets"
}
] | [] |
2,613 | Although the commodity malware RedLine Stealer has been implicated for credential harvesting in some attacks, it’s unclear if this is first- or third-party, and it cannot be used as a definitive indicator of Lapsus$-specific activity. | [
{
"id": 45617,
"label": "malware",
"start_offset": 32,
"end_offset": 47
},
{
"id": 45618,
"label": "attack-pattern",
"start_offset": 72,
"end_offset": 93
},
{
"id": 45619,
"label": "threat-actor",
"start_offset": 209,
"end_offset": 216
}
] | [
{
"id": 109,
"from_id": 45618,
"to_id": 45617,
"type": "delivers"
}
] | [] |
2,630 | This post is also available in: 日本語 (Japanese) LockBit 2.0 is ransomware as a service (RaaS) that first emerged in June 2021 as an upgrade to its predecessor LockBit (aka ABCD Ransomware), which was first observed in September 2019. | [
{
"id": 47805,
"label": "TIME",
"start_offset": 121,
"end_offset": 130
},
{
"id": 47806,
"label": "malware",
"start_offset": 164,
"end_offset": 171
},
{
"id": 47808,
"label": "TIME",
"start_offset": 223,
"end_offset": 237
},
{
"id": 47804,
"label": "malware",
"start_offset": 53,
"end_offset": 64
},
{
"id": 47807,
"label": "malware",
"start_offset": 177,
"end_offset": 192
}
] | [
{
"id": 361,
"from_id": 47804,
"to_id": 47806,
"type": "variant-of"
},
{
"id": 363,
"from_id": 47807,
"to_id": 47806,
"type": "duplicate-of"
}
] | [] |
2,633 | While several top-tier RaaS affiliate programs, such as Babuk, DarkSide and REvil (aka Sodinokibi) disappeared from the underground in 2021, LockBit 2.0 continued to operate and gradually became one of the most active ransomware operations. | [
{
"id": 47813,
"label": "threat-actor",
"start_offset": 88,
"end_offset": 98
},
{
"id": 47810,
"label": "threat-actor",
"start_offset": 57,
"end_offset": 62
},
{
"id": 47811,
"label": "threat-actor",
"start_offset": 64,
"end_offset": 72
},
{
"id": 47812,
"label": "threat-actor",
"start_offset": 77,
"end_offset": 82
},
{
"id": 47814,
"label": "TIME",
"start_offset": 136,
"end_offset": 140
},
{
"id": 47815,
"label": "malware",
"start_offset": 142,
"end_offset": 153
}
] | [
{
"id": 364,
"from_id": 47813,
"to_id": 47812,
"type": "variant-of"
}
] | [] |
2,677 | Technically speaking, we have observed LockBit 2.0 affiliates leveraging the following tactics, techniques and procedures: Windows SysInternals PsExec has been utilized for both persistence and execution purposes. | [
{
"id": 47880,
"label": "threat-actor",
"start_offset": 40,
"end_offset": 51
},
{
"id": 47879,
"label": "tools",
"start_offset": 125,
"end_offset": 152
}
] | [
{
"id": 365,
"from_id": 47880,
"to_id": 47879,
"type": "uses"
}
] | [] |
2,681 | The LockBit group claimed that LockBit 2.0 is “the fastest encryption software all over the world” and provided a comparative table showing the encryption speed of various ransomware samples. LockBit 2.0 also contains a self-spreading feature, clears logs and can print the ransom note on network printers until the paper runs out. A management panel that affiliates can use to manage victims and affiliate accounts, generate new ransomware builds and generate the decryptor if the demanded ransom is paid also exists. | [
{
"id": 47888,
"label": "threat-actor",
"start_offset": 5,
"end_offset": 12
},
{
"id": 47889,
"label": "malware",
"start_offset": 32,
"end_offset": 43
},
{
"id": 47890,
"label": "threat-actor",
"start_offset": 194,
"end_offset": 205
}
] | [
{
"id": 367,
"from_id": 47889,
"to_id": 47888,
"type": "authored-by"
}
] | [] |
2,682 | LockBit 2.0 operators also released an information-stealer dubbed StealBit, which was developed to support affiliates of the LockBit 2.0 RaaS when exfiltrating data from breached companies. | [
{
"id": 45655,
"label": "malware",
"start_offset": 66,
"end_offset": 74
},
{
"id": 45654,
"label": "threat-actor",
"start_offset": 0,
"end_offset": 11
},
{
"id": 45656,
"label": "threat-actor",
"start_offset": 125,
"end_offset": 136
}
] | [
{
"id": 111,
"from_id": 45655,
"to_id": 45654,
"type": "authored-by"
}
] | [] |
2,704 | On Saturday, Microsoft disclosed a critical vulnerability in Internet Explorer, CVE-2014-1776, affecting Internet Explorer versions 6 through 11. | [
{
"id": 47941,
"label": "TIME",
"start_offset": 3,
"end_offset": 11
},
{
"id": 47942,
"label": "identity",
"start_offset": 13,
"end_offset": 22
},
{
"id": 47944,
"label": "vulnerability",
"start_offset": 80,
"end_offset": 93
},
{
"id": 47945,
"label": "SOFTWARE",
"start_offset": 105,
"end_offset": 133
},
{
"id": 47943,
"label": "SOFTWARE",
"start_offset": 61,
"end_offset": 78
}
] | [
{
"id": 368,
"from_id": 47944,
"to_id": 47945,
"type": "has"
}
] | [] |
2,749 | Vulnerability Details CVE-2014-6271 exists in all versions of Bash and is related to how environment variables are processed when the shell starts up. | [
{
"id": 47993,
"label": "vulnerability",
"start_offset": 24,
"end_offset": 37
},
{
"id": 47994,
"label": "tools",
"start_offset": 64,
"end_offset": 68
}
] | [
{
"id": 369,
"from_id": 47994,
"to_id": 47993,
"type": "has"
}
] | [] |
2,801 | While the initial attack vector for these attacks is unknown, it is certain that the spread of the ransomware occurs through active exploitation of the ETERNALBLUE vulnerability (CVE-2017-0144) in Microsoft Windows. | [
{
"id": 48017,
"label": "vulnerability",
"start_offset": 179,
"end_offset": 192
},
{
"id": 48018,
"label": "SOFTWARE",
"start_offset": 197,
"end_offset": 214
},
{
"id": 8563,
"label": "vulnerability",
"start_offset": 152,
"end_offset": 163
}
] | [
{
"id": 371,
"from_id": 48018,
"to_id": 48017,
"type": "has"
},
{
"id": 373,
"from_id": 8563,
"to_id": 48017,
"type": "related-to"
}
] | [] |
2,816 | Reports quickly emerged that this attack was effective due to the presence of code exploiting a vulnerability (CVE-2017-0144) in Microsoft Windows (code named: ETERNALBLUE) that was released as part of the Equation Group dump by the Shadow Brokers in their fifth leak on April 14, 2017. | [
{
"id": 48034,
"label": "SOFTWARE",
"start_offset": 130,
"end_offset": 147
},
{
"id": 48035,
"label": "TIME",
"start_offset": 272,
"end_offset": 286
},
{
"id": 48033,
"label": "vulnerability",
"start_offset": 112,
"end_offset": 125
},
{
"id": 8600,
"label": "vulnerability",
"start_offset": 161,
"end_offset": 172
},
{
"id": 8601,
"label": "threat-actor",
"start_offset": 207,
"end_offset": 221
},
{
"id": 8602,
"label": "threat-actor",
"start_offset": 230,
"end_offset": 248
}
] | [
{
"id": 377,
"from_id": 48034,
"to_id": 48033,
"type": "has"
},
{
"id": 378,
"from_id": 8600,
"to_id": 48033,
"type": "related-to"
},
{
"id": 379,
"from_id": 8600,
"to_id": 8601,
"type": "related-to"
}
] | [] |
2,845 | The WanaCrypt0r ransomware spreads itself by heavily scanning over TCP port 445 (associated with SMB) and attempting to exploit the ETERNALBLUE vulnerability on systems. | [
{
"id": 48049,
"label": "malware",
"start_offset": 5,
"end_offset": 16
},
{
"id": 8683,
"label": "vulnerability",
"start_offset": 133,
"end_offset": 144
}
] | [
{
"id": 381,
"from_id": 48049,
"to_id": 8683,
"type": "exploits"
}
] | [] |
2,849 | It has been reported that the DOUBLEPULSAR backdoor (also from the Equation Group leak by Shadow Brokers) is installed and used to execute the malware after successful exploitation of a host via ETERNALBLUE, but this warrants further analysis. | [
{
"id": 48054,
"label": "threat-actor",
"start_offset": 67,
"end_offset": 81
},
{
"id": 8706,
"label": "threat-actor",
"start_offset": 90,
"end_offset": 104
},
{
"id": 8709,
"label": "vulnerability",
"start_offset": 195,
"end_offset": 206
},
{
"id": 8704,
"label": "vulnerability",
"start_offset": 30,
"end_offset": 42
}
] | [
{
"id": 383,
"from_id": 48054,
"to_id": 8709,
"type": "exploits"
},
{
"id": 382,
"from_id": 48054,
"to_id": 8704,
"type": "exploits"
}
] | [] |
2,866 | Late last month reports surfaced that a new Internet Explorer vulnerability (CVE-2014-1776) was being exploited in targeted attacks. | [
{
"id": 48064,
"label": "SOFTWARE",
"start_offset": 44,
"end_offset": 62
},
{
"id": 48065,
"label": "vulnerability",
"start_offset": 77,
"end_offset": 90
}
] | [
{
"id": 384,
"from_id": 48064,
"to_id": 48065,
"type": "has"
}
] | [] |
2,879 | Last year, exploitation of CVE-2013-3163 targeted Internet Explorer 8 and earlier this year, we found exploitation of CVE-2014-0322 in Internet Explorer 10. | [
{
"id": 48076,
"label": "vulnerability",
"start_offset": 27,
"end_offset": 40
},
{
"id": 48077,
"label": "SOFTWARE",
"start_offset": 50,
"end_offset": 69
},
{
"id": 48079,
"label": "SOFTWARE",
"start_offset": 135,
"end_offset": 155
},
{
"id": 48078,
"label": "vulnerability",
"start_offset": 118,
"end_offset": 131
}
] | [
{
"id": 385,
"from_id": 48077,
"to_id": 48076,
"type": "has"
},
{
"id": 386,
"from_id": 48079,
"to_id": 48078,
"type": "has"
}
] | [] |
3,088 | They grouped these vulnerabilities under the names “Spectre” (CVE-2017-5753 and CVE-2017-5715) and “Meltdown” (CVE-2017-5754). | [
{
"id": 48151,
"label": "vulnerability",
"start_offset": 63,
"end_offset": 76
},
{
"id": 48152,
"label": "vulnerability",
"start_offset": 81,
"end_offset": 94
},
{
"id": 48153,
"label": "vulnerability",
"start_offset": 112,
"end_offset": 125
},
{
"id": 48154,
"label": "vulnerability",
"start_offset": 53,
"end_offset": 60
},
{
"id": 48155,
"label": "vulnerability",
"start_offset": 101,
"end_offset": 109
}
] | [
{
"id": 388,
"from_id": 48154,
"to_id": 48151,
"type": "related-to"
}
] | [] |
3,169 | We discovered a new malware that targets online gambling companies in China via a watering hole attack, in which visitors are tricked into downloading a malware loader disguised as a legitimate installer for well-known apps such as Adobe Flash Player or Microsoft Silverlight. | [
{
"id": 48286,
"label": "attack-pattern",
"start_offset": 82,
"end_offset": 102
},
{
"id": 48287,
"label": "attack-pattern",
"start_offset": 126,
"end_offset": 150
},
{
"id": 48291,
"label": "malware",
"start_offset": 16,
"end_offset": 27
},
{
"id": 48285,
"label": "location",
"start_offset": 70,
"end_offset": 75
},
{
"id": 48289,
"label": "SOFTWARE",
"start_offset": 254,
"end_offset": 275
},
{
"id": 48290,
"label": "identity",
"start_offset": 41,
"end_offset": 66
},
{
"id": 48288,
"label": "SOFTWARE",
"start_offset": 232,
"end_offset": 250
}
] | [
{
"id": 396,
"from_id": 48291,
"to_id": 48290,
"type": "targets"
},
{
"id": 397,
"from_id": 48290,
"to_id": 48285,
"type": "located-at"
},
{
"id": 398,
"from_id": 48291,
"to_id": 48286,
"type": "uses"
},
{
"id": 399,
"from_id": 48291,
"to_id": 48287,
"type": "uses"
}
] | [] |
3,173 | What makes BIOPASS RAT particularly interesting is that it can sniff its victim’s screen by abusing the framework of Open Broadcaster Software (OBS) Studio, a popular live streaming and video recording app, to establish live streaming to a cloud service via Real-Time Messaging Protocol (RTMP). | [
{
"id": 48296,
"label": "malware",
"start_offset": 11,
"end_offset": 22
},
{
"id": 48298,
"label": "SOFTWARE",
"start_offset": 258,
"end_offset": 293
},
{
"id": 48297,
"label": "SOFTWARE",
"start_offset": 117,
"end_offset": 148
}
] | [
{
"id": 400,
"from_id": 48296,
"to_id": 48297,
"type": "targets"
}
] | [] |
3,174 | In addition, the attack misuses the object storage service (OSS) of Alibaba Cloud (Aliyun) to host the BIOPASS RAT Python scripts as well as to store the exfiltrated data from victims. | [
{
"id": 48300,
"label": "malware",
"start_offset": 103,
"end_offset": 114
},
{
"id": 48299,
"label": "Infrastucture",
"start_offset": 68,
"end_offset": 90
}
] | [
{
"id": 401,
"from_id": 48299,
"to_id": 48300,
"type": "hosts"
}
] | [] |
3,178 | Furthermore, BIOPASS RAT also creates scheduled tasks to load the Cobalt Strike shellcode during the initialization, indicating that the malicious actor behind the attack still heavily relies on Cobalt Strike. | [
{
"id": 48304,
"label": "malware",
"start_offset": 13,
"end_offset": 24
},
{
"id": 48305,
"label": "tools",
"start_offset": 66,
"end_offset": 79
},
{
"id": 48306,
"label": "tools",
"start_offset": 195,
"end_offset": 208
}
] | [
{
"id": 402,
"from_id": 48304,
"to_id": 48305,
"type": "uses"
}
] | [] |
3,179 | We also found several clues that show how the malware might be connected with the Winnti Group(also known as APT41). | [
{
"id": 48308,
"label": "threat-actor",
"start_offset": 110,
"end_offset": 115
},
{
"id": 48307,
"label": "threat-actor",
"start_offset": 83,
"end_offset": 95
}
] | [
{
"id": 403,
"from_id": 48307,
"to_id": 48308,
"type": "duplicate-of"
}
] | [] |
3,180 | In this blog entry, we will dive deeper into BIOPASS RAT with a detailed technical analysis of the infection chain, the different components of the malware, and any possible associations with Winnti. | [
{
"id": 48309,
"label": "threat-actor",
"start_offset": 192,
"end_offset": 198
},
{
"id": 48310,
"label": "malware",
"start_offset": 45,
"end_offset": 56
}
] | [
{
"id": 404,
"from_id": 48310,
"to_id": 48309,
"type": "related-to"
}
] | [] |
3,182 | The initial delivery mechanism of BIOPASS RAT uses of a watering hole, a compromised website in which the malicious actors inject their custom JavaScript code to deliver malware. | [
{
"id": 48312,
"label": "attack-pattern",
"start_offset": 56,
"end_offset": 69
},
{
"id": 48311,
"label": "malware",
"start_offset": 34,
"end_offset": 45
}
] | [
{
"id": 405,
"from_id": 48311,
"to_id": 48312,
"type": "uses"
}
] | [] |
3,199 | Authenticode-signed files are either downloaded from the official websites (as seen in sample c47fabc47806961f908bed37d6b1bbbfd183d564a2d01b7cae87bd95c20ff8a5) or are hosted on Alibaba Cloud OSS on the attackers’ account. | [
{
"id": 48324,
"label": "Infrastucture",
"start_offset": 177,
"end_offset": 194
},
{
"id": 9783,
"label": "SHA1",
"start_offset": 94,
"end_offset": 158
}
] | [
{
"id": 406,
"from_id": 48324,
"to_id": 9783,
"type": "hosts"
}
] | [] |
3,215 | An old sample of the module (30ccfbf24b7c8cc15f85541d5ec18feb0e19e75e1e4d2bca9941e6585dad7bc7) is likely a watchdog to check the status of another module that is known as “c1222”. The malicious actors can change this behavior by replacing the content of the cdaemon.txt service in the cloud so that when combined with the regular execution of the scheduled task, the cdaemon task can behave like a backdoor. | [
{
"id": 48338,
"label": "malware",
"start_offset": 172,
"end_offset": 177
},
{
"id": 48339,
"label": "FILEPATH",
"start_offset": 259,
"end_offset": 270
},
{
"id": 9814,
"label": "SHA2",
"start_offset": 29,
"end_offset": 93
},
{
"id": 9821,
"label": "attack-pattern",
"start_offset": 348,
"end_offset": 362
}
] | [
{
"id": 407,
"from_id": 9814,
"to_id": 48338,
"type": "related-to"
}
] | [] |
3,281 | The malware downloads OBS Studio files if the OBS folder and config file are not found in the root directory. | [
{
"id": 48378,
"label": "malware",
"start_offset": 5,
"end_offset": 12
},
{
"id": 48377,
"label": "SOFTWARE",
"start_offset": 23,
"end_offset": 33
}
] | [
{
"id": 408,
"from_id": 48378,
"to_id": 48377,
"type": "downloads"
}
] | [] |
3,315 | Although these are not implemented inside the BIOPASS RAT malware, we have observed two additional plug-ins that are written in Python (“getwechatdb” and “xss_spoof”) and were deployed by the threat actor to a victim who had been infected with Cobalt Strike. | [
{
"id": 48398,
"label": "malware",
"start_offset": 46,
"end_offset": 57
},
{
"id": 48399,
"label": "SOFTWARE",
"start_offset": 128,
"end_offset": 134
},
{
"id": 48400,
"label": "tools",
"start_offset": 244,
"end_offset": 257
}
] | [
{
"id": 409,
"from_id": 48398,
"to_id": 48400,
"type": "uses"
}
] | [] |
3,336 | The main script used to manipulate traffic with WinDivert Potential links with the Winnti group | [
{
"id": 48944,
"label": "threat-actor",
"start_offset": 87,
"end_offset": 99
},
{
"id": 48943,
"label": "tools",
"start_offset": 48,
"end_offset": 57
}
] | [
{
"id": 505,
"from_id": 48944,
"to_id": 48943,
"type": "uses"
}
] | [] |
3,337 | We have found several connections between BIOPASS RAT and the Winnti Group: | [
{
"id": 10096,
"label": "malware",
"start_offset": 42,
"end_offset": 53
},
{
"id": 48945,
"label": "threat-actor",
"start_offset": 62,
"end_offset": 74
}
] | [
{
"id": 506,
"from_id": 48945,
"to_id": 10096,
"type": "uses"
}
] | [] |
3,340 | It is well known that the Winnti Group has previously used stolen certificates from game studios to sign its malware. | [
{
"id": 48950,
"label": "attack-pattern",
"start_offset": 59,
"end_offset": 78
},
{
"id": 48949,
"label": "threat-actor",
"start_offset": 26,
"end_offset": 38
}
] | [
{
"id": 507,
"from_id": 48949,
"to_id": 48950,
"type": "uses"
}
] | [] |
3,342 | Information from the stolen certificates 2. While checking the stolen certificates, we found a server-side variant of the Derusbi malware sample (e5fdb754c1a7c36c288c46765c9258bb2c7f38fa2a99188a623182f877da3783) that was signed with the same stolen certificate. | [
{
"id": 10119,
"label": "SHA2",
"start_offset": 153,
"end_offset": 217
},
{
"id": 48955,
"label": "malware",
"start_offset": 129,
"end_offset": 144
}
] | [
{
"id": 508,
"from_id": 10119,
"to_id": 48955,
"type": "indicates"
}
] | [] |
3,345 | 3. We found an interesting Cobalt Strike loader (a7e9e2bec3ad283a9a0b130034e822c8b6dfd26dda855f883a3a4ff785514f97) that embeds a URL that leads to the BIOPASS RAT loader. | [
{
"id": 10125,
"label": "SHA2",
"start_offset": 54,
"end_offset": 118
},
{
"id": 10126,
"label": "malware",
"start_offset": 156,
"end_offset": 167
},
{
"id": 48957,
"label": "tools",
"start_offset": 32,
"end_offset": 45
}
] | [
{
"id": 509,
"from_id": 10125,
"to_id": 48957,
"type": "indicates"
},
{
"id": 510,
"from_id": 10125,
"to_id": 10126,
"type": "drops"
}
] | [] |