Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related indicators across ThreatConnect’s CAL™ (Collective Analytics Layer).
Note: Viewing the pages linked in this blog post requires a ThreatConnect account. If you don’t have one, please click here to request your free TC Open account.
Roundup Highlight: SLOTHFULMEDIA RAT and Ryuk
In this Roundup, we highlight the threat Malware: SLOTHFULMEDIA RAT.
According to US-CERT: This file is a 32-bit Windows executable file that is dropped and executed by 448838B2A60484EE78C2198F2C0C9C85 (in the sample reviewed and published on by US-CERT). The file is called ‘mediaplayer.exe’. When executed, it will look for a file called ‘Junk9’ and will attempt to delete it. The file ‘Junk9’ was not available for analysis. Next, it will take a screenshot of the user’s desktop and name it ‘Filter3.jpg’ and store this in the local directory. The program then looks for a service called ‘TaskFrame’ and attempts to start it. The ‘TaskFrame’ service is able to delete, add, or modify registry keys, and start and stop a keylogger program on the system. If the ‘TaskFrame’ service is already installed and running the program will terminate.
Several files were identified via a YARA rule as the RAT component of SLOTHFULMEDIA, and the embedded configs were extracted using a SLOTHFULMEDIA Config Extractor (Ghidra script to extract out the config section of the SLOTHFULMEDIA RAT component). Based on this analysis, we identified the following C2 infrastructure:
Additionally, ThreatConnect Research identified the domain qnglsmc[.]com in 20201029D: Probable SLOTHFULMEDIA Related Infrastructure. This domain is probably associated to the actor behind SLOTHFULMEDIA/QueenOfClubs based on the overlapping IP 103.78.242[.]69 with sdvro[.]net and sharing the same registration timestamp, 2020-03-09T00:50:10Z, and registrar as tnelgnmc[.]com.
At this time we have no other information on the extent to which, if any, this infrastructure has been used maliciously.
ThreatConnect Research Team Intelligence: Items recently created or updated in the ThreatConnect Common Community by our Research Team.
- 20201109A: Ryuk Infrastructure Registered on 11/7/20 ThreatConnect Research identified a set of most likely Wizard Spider / UNC1878 / Ryuk domains registered on November 7 2020. These domains were registered through NameCheap, have similar strings compared to previously identified Ryuk infrastructure, and are hosted on dedicated servers from previously used ISPs. No related files or SSL certificates identified at this time.
- 20201109D: Ryuk Infrastructure Registered on 11/8/20 ThreatConnect Research identified a set of most likely Wizard Spider / UNC1878 / Ryuk domains registered on November 8 2020. These domains were registered through NameCheap, have similar strings compared to previously identified Ryuk infrastructure, and are hosted on dedicated servers from previously used ISPs. No related files or SSL certificates identified at this time.
- 20201107A: File Matching YARA Rule Associated to Mustang Panda PlugX ThreatConnect Research identified a Mustang Panda PlugX binary and extracted Command and Control locations from the embedded configuration.
- 20201104A: Instagram and TinyURL Spoofing Domains Hosted at 83.97.20[.]89 ThreatConnect Research identified three domains that were registered in early November 2020 through OrangeWebsite and are hosted on a probable dedicated server at 220.127.116.11. Per urlscan.io, one domain domain redirects to Instagram’s legitimate site, while the other two redirect to TinyURL. At this time, we don’t have any information on the extent to which this infrastructure has been used maliciously.
- 20201105A: Suspicious Domains Registered Using wangsanli@tutamail[.]com ThreatConnect Research identified a suspicious domain registered through THCservers on April 29 2020 using wangsanli@tutamail[.]com. This domain went unhosted before resolving to a seemingly non-dedicated server at 103.230.180[.]30 starting around November 4 2020. The wangsanli@tutamail[.]com email address was also previously used to register the domain onlinedaily-stats[.]com (179.63.242[.]226) through Veeble on January 31 2020. These domains may also be associated with configstats[.]com (5.2.211[.]99), which was registered through Nemohosts on April 27 2020 and previously co-located with onlinedaily-stats[.]com. After registration through Nemohosts, configstats[.]com began using TopDNS name servers, which was something previously seen in Fancy Bear infrastructure in 2017. However, this name server isn’t unique to Fancy Bear and another actor could host their infrastructure similarly. At this time we have no information on the extent to which this infrastructure has been used maliciously, nor can we assess who it is associated with.
- 20201105B: Suspicious Njalla Domains servinsideconn[.]com and innerserv20[.]com ThreatConnect Research identified two domains registered through Njalla on November 3 2020 about a minute apart and almost certainly are associated with the same actor. As of November 5 2020, the domains are hosted on probable dedicated servers at the aforementioned IPs. Per Censys, Let’s Encrypt SSL certificates were also created for the domains and their www subdomains on November 3 2020. We currently don’t have any information on the extent to which this infrastructure has been used maliciously.
- 20201109B: Thallium Infrastructure Registered Through MonoVM ThreatConnect Research identified several domains recently registered through MonoVM using psh1968216@daum[.]net that most likely are associated with Thallium activity.
Technical Blogs and Reports Incidents with Active and Observed Indicators: Incidents associated to one or more Indicators with an Active status and at least one global Observation across the ThreatConnect community. These analytics are provided by ThreatConnect’s CAL™ (Collective Analytics Layer).
- Bridging the Gap Between Application and Network Security with CleanBrowsing
- Threat Roundup for October 23 to October 30
- AA20-304A: Iranian Advanced Persistent Threat Actor Identified Obtaining Voter Registration Data
- AA20-302A: Ransomware Activity Targeting the Healthcare and Public Health Sector
- AR20-303A: MAR-10310246-2.v1 – PowerShell Script: ComRAT
- Emotet C2 Deltas from 2020/11/02 as of 01:00EDT or 06:00UTC
- CSS-JS Steganography in Fake Flash Player Update Malware
- At the User’s Expense: Threat Actors Weaponize Companies’ Employee Reimbursements During the Pand…
- Emotet C2 Deltas from 2020/11/03 as of 16:00EDT or 21:00UTC
- INJ3CTOR3 Operation – Leveraging Asterisk Servers for Monetization
- Emotet C2 Deltas from 2020/11/04 as of 15:45EDT or 20:45UTC
- Cybercriminals Targeting Multiple Vulnerabilities in WordPress Plugins
- Threat Roundup for October 30 to November 6
- Cryptojacking Targeting WebLogic TCP/7001, (Sat, Nov 7th)
- HMRC smishing tax scam targets UK banking customers
- Emotet C2 Deltas from 2020/11/09 as of 15:00EST or 20:00UTC
- Emotet C2 Deltas from 2020/11/03 as of 16:00EST or 21:00UTC
To receive ThreatConnect notifications about any of the above, remember to check the “Follow Item” box on that item’s Details page.