id
int64
105
14.4k
text
stringlengths
41
889
entities
list
relations
list
3,611
Indicators of Compromise (IoCs) Indicator Attribution Trend Micro Pattern Detection 068d32a43191dc0164b600b85a1621be0154504fd477167422ff4a8fb3406d73 AnimalGames Backdoor.
[ { "end_offset": 149, "id": 10902, "label": "hash", "start_offset": 85 }, { "end_offset": 66, "id": 49391, "label": "identity", "start_offset": 55 }, { "end_offset": 170, "id": 49392, "label": "malware", "start_offset": 150 } ]
[ { "from_id": 10902, "id": 790, "to_id": 49392, "type": "indicates" } ]
3,389
test3.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 344cdbc2a7e0908cb6638bc7b81b6b697b32755bad3bed09c511866eff3876c7
[ { "end_offset": 22, "id": 10238, "label": "malware", "start_offset": 11 }, { "end_offset": 121, "id": 10239, "label": "hash", "start_offset": 57 }, { "end_offset": 55, "id": 49041, "label": "malware", "start_offset": 31 }, { "end_offset": 9, "id": 49040, "label": "FILEPATH", "start_offset": 0 } ]
[ { "from_id": 49040, "id": 588, "to_id": 49041, "type": "indicates" }, { "from_id": 10238, "id": 589, "to_id": 49041, "type": "duplicate-of" }, { "from_id": 49040, "id": 590, "to_id": 10239, "type": "duplicate-of" }, { "from_id": 10239, "id": 591, "to_id": 49041, "type": "indicates" } ]
4,250
Decompiled Form structure of Patchwork’s sample (795ae4097aa3bd5932be4110f6bd992f46d605d4c9e3afced314454d35395a59, Detected as TROJ_DELF.XXWZ)
[ { "end_offset": 38, "id": 12743, "label": "threat-actor", "start_offset": 29 }, { "end_offset": 113, "id": 12745, "label": "hash", "start_offset": 49 }, { "end_offset": 141, "id": 50053, "label": "malware", "start_offset": 127 } ]
[ { "from_id": 12745, "id": 907, "to_id": 50053, "type": "indicates" }, { "from_id": 12743, "id": 908, "to_id": 50053, "type": "uses" } ]
13,642
The fraudsters, whom we named “Water Nue,” primarily target accounts of financial executives to obtain credentials for further financial fraud.
[ { "end_offset": 40, "id": 51732, "label": "threat-actor", "start_offset": 31 }, { "end_offset": 92, "id": 51734, "label": "identity", "start_offset": 72 } ]
[ { "from_id": 51732, "id": 1148, "to_id": 51734, "type": "targets" } ]
613
The hot spots in the United States represents distribution servers which are created using fraud based accounts at various hosting providers that are hosting the Hancitor documents while the hotspots in Asia represent legitimate sites for small and medium businesses that have been compromised by the actors behind Hancitor campaign to host the malicious Hancitor documents.
[ { "end_offset": 170, "id": 46207, "label": "malware", "start_offset": 162 }, { "end_offset": 207, "id": 46208, "label": "location", "start_offset": 203 }, { "end_offset": 34, "id": 46206, "label": "location", "start_offset": 21 }, { "end_offset": 332, "id": 46210, "label": "campaign", "start_offset": 315 }, { "end_offset": 363, "id": 46211, "label": "malware", "start_offset": 355 } ]
[ { "from_id": 46207, "id": 168, "to_id": 46206, "type": "targets" }, { "from_id": 46207, "id": 169, "to_id": 46208, "type": "targets" } ]
4,908
Some commodity malware used included RedLine, Vidar, Predator The Thief, Nexus stealer, Azorult, Raccoon, Grand Stealer, Vikro Stealer, Masad (Google’s naming), and Kantal (Google’s naming) which shares code similarity with Vidar.
[ { "end_offset": 119, "id": 50930, "label": "malware", "start_offset": 106 }, { "end_offset": 134, "id": 50931, "label": "malware", "start_offset": 121 }, { "end_offset": 71, "id": 50925, "label": "malware", "start_offset": 53 }, { "end_offset": 86, "id": 50926, "label": "malware", "start_offset": 73 }, { "end_offset": 95, "id": 50927, "label": "malware", "start_offset": 88 }, { "end_offset": 104, "id": 50928, "label": "malware", "start_offset": 97 }, { "end_offset": 141, "id": 50932, "label": "malware", "start_offset": 136 }, { "end_offset": 171, "id": 50933, "label": "malware", "start_offset": 165 }, { "end_offset": 229, "id": 50934, "label": "malware", "start_offset": 224 }, { "end_offset": 44, "id": 50923, "label": "malware", "start_offset": 37 }, { "end_offset": 51, "id": 50924, "label": "malware", "start_offset": 46 } ]
[ { "from_id": 50933, "id": 1032, "to_id": 50934, "type": "variant-of" } ]
4,547
Many Russian government cyber assets have remained focused on Ukraine and related issues since the invasion began, while Russian APT activity outside of Ukraine largely remains the same.
[ { "end_offset": 160, "id": 50344, "label": "location", "start_offset": 153 }, { "end_offset": 69, "id": 50342, "label": "location", "start_offset": 62 }, { "end_offset": 132, "id": 50343, "label": "threat-actor", "start_offset": 121 }, { "end_offset": 36, "id": 50346, "label": "threat-actor", "start_offset": 5 } ]
[ { "from_id": 50346, "id": 943, "to_id": 50342, "type": "targets" } ]
4,471
For example, TAG discovered campaigns targeting Armenian users which utilized zero-day vulnerabilities in Chrome and Internet Explorer.
[ { "end_offset": 37, "id": 50266, "label": "campaign", "start_offset": 28 }, { "end_offset": 16, "id": 50261, "label": "identity", "start_offset": 13 }, { "end_offset": 134, "id": 50265, "label": "SOFTWARE", "start_offset": 117 }, { "end_offset": 56, "id": 50262, "label": "location", "start_offset": 48 }, { "end_offset": 102, "id": 50263, "label": "vulnerability", "start_offset": 78 }, { "end_offset": 112, "id": 50264, "label": "SOFTWARE", "start_offset": 106 } ]
[ { "from_id": 50266, "id": 935, "to_id": 50262, "type": "targets" }, { "from_id": 50266, "id": 936, "to_id": 50263, "type": "exploits" }, { "from_id": 50264, "id": 937, "to_id": 50263, "type": "has" }, { "from_id": 50265, "id": 938, "to_id": 50263, "type": "has" } ]
14,072
We can see how the Freenki malware, previous SLUB campaigns, and Operation Earth Kitsune share many common TTPs in their delivery and persistence mechanisms.
[ { "end_offset": 31, "id": 47402, "label": "malware", "start_offset": 23 }, { "end_offset": 54, "id": 47403, "label": "malware", "start_offset": 49 }, { "end_offset": 92, "id": 47425, "label": "campaign", "start_offset": 69 } ]
[ { "from_id": 47402, "id": 344, "to_id": 47403, "type": "related-to" }, { "from_id": 47402, "id": 345, "to_id": 47425, "type": "related-to" } ]
3,692
FIN7 attacks can and inject code into processes and hijack the search order used to load DLL files.
[ { "end_offset": 4, "id": 49484, "label": "threat-actor", "start_offset": 0 }, { "end_offset": 32, "id": 49485, "label": "attack-pattern", "start_offset": 21 }, { "end_offset": 98, "id": 49486, "label": "attack-pattern", "start_offset": 52 } ]
[ { "from_id": 49484, "id": 804, "to_id": 49485, "type": "uses" }, { "from_id": 49484, "id": 805, "to_id": 49486, "type": "uses" } ]
3,555
We took a look at one of the samples captured from Capesand that was used to deploy the njRat malware – notably its main executable NotepadEx.
[ { "end_offset": 93, "id": 10758, "label": "malware", "start_offset": 88 }, { "end_offset": 59, "id": 49337, "label": "malware", "start_offset": 51 } ]
[ { "from_id": 49337, "id": 786, "to_id": 10758, "type": "delivers" } ]
3,379
test3.exe BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 281c938448e32eb12fe8c5439ef06cea848668cf57fed5ad64b9a8d1e07de561
[ { "end_offset": 22, "id": 10224, "label": "malware", "start_offset": 11 }, { "end_offset": 121, "id": 10225, "label": "hash", "start_offset": 57 }, { "end_offset": 9, "id": 49026, "label": "FILEPATH", "start_offset": 0 }, { "end_offset": 55, "id": 49027, "label": "malware", "start_offset": 31 } ]
[ { "from_id": 49026, "id": 566, "to_id": 10224, "type": "indicates" }, { "from_id": 10225, "id": 567, "to_id": 10224, "type": "indicates" }, { "from_id": 49027, "id": 568, "to_id": 10224, "type": "duplicate-of" }, { "from_id": 49026, "id": 569, "to_id": 10225, "type": "duplicate-of" } ]
3,369
cdaemon.txt BIOPASS RAT Python Script (Cdaemon module) Trojan
[ { "end_offset": 24, "id": 10184, "label": "malware", "start_offset": 13 }, { "end_offset": 11, "id": 48986, "label": "FILEPATH", "start_offset": 0 } ]
[ { "from_id": 48986, "id": 547, "to_id": 10184, "type": "indicates" } ]
1,992
During the analysis of the MicroBackdoor sample, Unit 42 observed the configuration and found an embedded IP address, belonging to a threat actor we believe is potentially the developer: x4k, also known as L4ckyguy, unKn0wn, unk0w, _unkn0wn and x4kme.
[ { "end_offset": 251, "id": 45216, "label": "threat-actor", "start_offset": 246 }, { "end_offset": 41, "id": 45209, "label": "malware", "start_offset": 28 }, { "end_offset": 215, "id": 45212, "label": "threat-actor", "start_offset": 207 }, { "end_offset": 57, "id": 45210, "label": "identity", "start_offset": 50 }, { "end_offset": 224, "id": 45213, "label": "threat-actor", "start_offset": 217 }, { "end_offset": 191, "id": 45211, "label": "threat-actor", "start_offset": 188 }, { "end_offset": 231, "id": 45214, "label": "threat-actor", "start_offset": 226 }, { "end_offset": 241, "id": 45215, "label": "threat-actor", "start_offset": 233 } ]
[ { "from_id": 45216, "id": 87, "to_id": 45211, "type": "duplicate-of" }, { "from_id": 45212, "id": 83, "to_id": 45211, "type": "duplicate-of" }, { "from_id": 45213, "id": 84, "to_id": 45211, "type": "duplicate-of" }, { "from_id": 45214, "id": 85, "to_id": 45211, "type": "duplicate-of" }, { "from_id": 45215, "id": 86, "to_id": 45211, "type": "duplicate-of" }, { "from_id": 45209, "id": 88, "to_id": 45211, "type": "authored-by" } ]
4,570
Ghostwriter/UNC1151, a threat actor attributed to Belarus, has remained active targeting accounts of webmail and social media networks of Polish users.
[ { "end_offset": 19, "id": 50408, "label": "threat-actor", "start_offset": 12 }, { "end_offset": 11, "id": 50407, "label": "threat-actor", "start_offset": 0 }, { "end_offset": 57, "id": 50409, "label": "location", "start_offset": 50 }, { "end_offset": 144, "id": 50410, "label": "location", "start_offset": 138 } ]
[ { "from_id": 50408, "id": 962, "to_id": 50407, "type": "duplicate-of" }, { "from_id": 50407, "id": 963, "to_id": 50409, "type": "attributed-to" }, { "from_id": 50408, "id": 964, "to_id": 50409, "type": "attributed-to" }, { "from_id": 50408, "id": 965, "to_id": 50410, "type": "targets" }, { "from_id": 50407, "id": 966, "to_id": 50410, "type": "targets" } ]
4,728
Most recently, we reported in May on five zero-day vulnerabilities affecting Chrome and Android which were used to compromise Android users.
[ { "end_offset": 83, "id": 50632, "label": "SOFTWARE", "start_offset": 77 }, { "end_offset": 95, "id": 50633, "label": "SOFTWARE", "start_offset": 88 }, { "end_offset": 133, "id": 50634, "label": "SOFTWARE", "start_offset": 126 }, { "end_offset": 66, "id": 50635, "label": "vulnerability", "start_offset": 37 } ]
[ { "from_id": 50632, "id": 983, "to_id": 50635, "type": "has" }, { "from_id": 50633, "id": 984, "to_id": 50635, "type": "has" }, { "from_id": 50634, "id": 985, "to_id": 50635, "type": "has" } ]
345
On October 19, the Kafeine posted a blog discussing the inclusion of CVE-2014-0556 in the Nuclear Pack exploit kit, which was installing CryptoWall 2.0.
[ { "end_offset": 13, "id": 44706, "label": "TIME", "start_offset": 3 }, { "end_offset": 151, "id": 44707, "label": "malware", "start_offset": 137 }, { "end_offset": 82, "id": 44708, "label": "vulnerability", "start_offset": 69 }, { "end_offset": 114, "id": 44709, "label": "malware", "start_offset": 90 }, { "end_offset": 26, "id": 44710, "label": "threat-actor", "start_offset": 19 } ]
[ { "from_id": 44707, "id": 15, "to_id": 44708, "type": "exploits" }, { "from_id": 44709, "id": 16, "to_id": 44707, "type": "delivers" }, { "from_id": 44710, "id": 17, "to_id": 44709, "type": "authored-by" } ]
3,977
Indicators of compromise Filename Path SHA-256 Detection Notes ss.exe C:\temp\ ee63b49aca1495a170ea7273316385b606f3fd2df1e48e9f4de0f241d98bd055 HackTool.Win32.CATLIKE.A Vulnerability Scanner LG.exe C:\temp\ C:\hp\ 5099264b16208d88c9bca960751f5e3de7a5420986fa0d7e2b2a6b16af3909e9 HackTool.Win32.JoeWare.A. JoeWare Local Group Manipulation tool LG.dat C:\hp\ 5099264b16208d88c9bca960751f5e3de7a5420986fa0d7e2b2a6b16af3909e9 HackTool.Win32.JoeWare.A. JoeWare Local Group Manipulation tool mpBD6D42.dat C:\Users C:\Perflogs C:\hp C:\temp e9be71848d1faa0c41db4c6a1e901747d98fb0b3cca027f8be85ea5e339b75e3 HackTool.MSIL.Mimikatz.AF Mimikatz Tags Endpoints | APT & Targeted Attacks | Research | Network | Articles, News, Reports
[ { "end_offset": 291, "id": 12061, "label": "hash", "start_offset": 227 }, { "end_offset": 439, "id": 12063, "label": "hash", "start_offset": 375 }, { "end_offset": 151, "id": 12060, "label": "hash", "start_offset": 87 }, { "end_offset": 658, "id": 12066, "label": "tools", "start_offset": 650 }, { "end_offset": 621, "id": 12065, "label": "hash", "start_offset": 557 }, { "end_offset": 208, "id": 49840, "label": "FILEPATH", "start_offset": 202 }, { "end_offset": 648, "id": 49845, "label": "malware", "start_offset": 623 }, { "end_offset": 373, "id": 49847, "label": "FILEPATH", "start_offset": 367 }, { "end_offset": 519, "id": 49848, "label": "FILEPATH", "start_offset": 507 }, { "end_offset": 541, "id": 49849, "label": "FILEPATH", "start_offset": 521 }, { "end_offset": 555, "id": 49850, "label": "FILEPATH", "start_offset": 542 }, { "end_offset": 75, "id": 49837, "label": "FILEPATH", "start_offset": 69 }, { "end_offset": 225, "id": 49842, "label": "FILEPATH", "start_offset": 219 }, { "end_offset": 85, "id": 49838, "label": "FILEPATH", "start_offset": 77 }, { "end_offset": 177, "id": 49839, "label": "malware", "start_offset": 153 }, { "end_offset": 218, "id": 49841, "label": "FILEPATH", "start_offset": 210 }, { "end_offset": 317, "id": 49843, "label": "malware", "start_offset": 293 }, { "end_offset": 465, "id": 49844, "label": "malware", "start_offset": 441 }, { "end_offset": 365, "id": 49846, "label": "FILEPATH", "start_offset": 359 } ]
[ { "from_id": 12060, "id": 869, "to_id": 49839, "type": "indicates" }, { "from_id": 49838, "id": 870, "to_id": 49839, "type": "indicates" }, { "from_id": 49837, "id": 871, "to_id": 49839, "type": "indicates" }, { "from_id": 12061, "id": 872, "to_id": 49843, "type": "indicates" }, { "from_id": 49842, "id": 873, "to_id": 49843, "type": "indicates" }, { "from_id": 49841, "id": 874, "to_id": 49843, "type": "indicates" }, { "from_id": 49840, "id": 875, "to_id": 49843, "type": "indicates" }, { "from_id": 49846, "id": 876, "to_id": 49844, "type": "indicates" }, { "from_id": 49847, "id": 877, "to_id": 49844, "type": "indicates" }, { "from_id": 12063, "id": 878, "to_id": 49844, "type": "indicates" }, { "from_id": 49848, "id": 879, "to_id": 49845, "type": "indicates" }, { "from_id": 49849, "id": 880, "to_id": 49845, "type": "indicates" }, { "from_id": 49850, "id": 881, "to_id": 49845, "type": "indicates" }, { "from_id": 12065, "id": 882, "to_id": 49845, "type": "indicates" } ]
3,408
BIOPASS RAT Loader Backdoor.Win64.BIOPASS.A 98a91356e0094c96d81bd27af407dd48c3c91aaf97da6794aeb303597a773749 Silverlight1.exe
[ { "end_offset": 11, "id": 10273, "label": "malware", "start_offset": 0 }, { "end_offset": 110, "id": 10274, "label": "hash", "start_offset": 46 }, { "end_offset": 44, "id": 49074, "label": "malware", "start_offset": 20 }, { "end_offset": 128, "id": 49075, "label": "FILEPATH", "start_offset": 112 } ]
[ { "from_id": 10273, "id": 650, "to_id": 49074, "type": "duplicate-of" }, { "from_id": 49075, "id": 651, "to_id": 10274, "type": "duplicate-of" }, { "from_id": 49075, "id": 652, "to_id": 49074, "type": "indicates" }, { "from_id": 10274, "id": 653, "to_id": 49074, "type": "indicates" } ]
532
One example here is Makop, contained in a 7z archive along with an infostealer malware (SHA256: DE6DFA018773E07C218EF1DF62CE0D99A708841BF1DDFB4C6AD7E323D5D666A4).
[ { "end_offset": 78, "id": 1760, "label": "malware", "start_offset": 67 }, { "end_offset": 160, "id": 1761, "label": "hash", "start_offset": 96 }, { "end_offset": 44, "id": 46154, "label": "tools", "start_offset": 42 } ]
[ { "from_id": 1761, "id": 156, "to_id": 1760, "type": "related-to" } ]
4,551
Here is a deeper look at some campaign activity TAG has observed since our last update: Turla, a group publicly attributed to Russia’s Federal Security Service (FSB), recently hosted Android apps on a domain spoofing the Ukrainian Azov Regiment.
[ { "end_offset": 51, "id": 50355, "label": "identity", "start_offset": 48 }, { "end_offset": 93, "id": 50356, "label": "threat-actor", "start_offset": 88 }, { "end_offset": 165, "id": 50357, "label": "identity", "start_offset": 135 }, { "end_offset": 132, "id": 50358, "label": "location", "start_offset": 126 }, { "end_offset": 190, "id": 50359, "label": "SOFTWARE", "start_offset": 183 }, { "end_offset": 244, "id": 50360, "label": "identity", "start_offset": 221 } ]
[ { "from_id": 50356, "id": 946, "to_id": 50357, "type": "attributed-to" }, { "from_id": 50357, "id": 947, "to_id": 50358, "type": "located-at" }, { "from_id": 50357, "id": 948, "to_id": 50360, "type": "impersonates" } ]
13,800
Therefore, the first-stage shellcode takes the PID of the Windows Service — which the first-stage shellcode and the succeeding backdoor both inject into — hides the target process, and embeds that PID into the second-stage shellcode.
[ { "end_offset": 37, "id": 48789, "label": "tools", "start_offset": 27 }, { "end_offset": 73, "id": 48790, "label": "SOFTWARE", "start_offset": 58 }, { "end_offset": 152, "id": 48791, "label": "attack-pattern", "start_offset": 141 } ]
[ { "from_id": 48789, "id": 464, "to_id": 48790, "type": "duplicate-of" }, { "from_id": 48789, "id": 465, "to_id": 48791, "type": "uses" } ]
3,451
K23605346: BIG-IP iControl REST vulnerability CVE-2022-1388 EnemyBot Attempts to Exploit CVE-2022-1388 30f7e1998d162dfad69d6d8abb763ae4033bbd4a015d170b1ad3e20d39cd4e20 da647646cd36a3acb716b4266e9032f9c1caf555b7667e1dbe5bef89e7d2fdbb b39d2a1202351d3be5d9906ec47ee05c305302124dddec5538dc7b9924c6b85d ad6d44c70f83431bedf890967f2da0607c9b1f79591fb1b2697160f5b1c1a75c 1f93a6696f7bf1b2067cc503583deb4840404ebeeba89579bd303f57000baeb7 9a72aab2a3d1d6e66c185966597a52a8726ca25f5d9e2195af44f98d8b1847d5 53214f4d2d2dfd02b46f416cbdcb6f3a764820a50da4d59926f829b96cf82a6c 20.187.67[.]224 192.132.218[.]149 85.203.23[.]73 116.48.110[.]159 hxxps://transfer[.]sh/dlxo3I/1.sh hxxp://20.239.193[.]47/kele.sh hxxp://20.239.193[.]47/kele1 hxxp://20.187.86[.]47/dadda Updated May 16, 2022 Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address!
[ { "end_offset": 69, "id": 10440, "label": "malware", "start_offset": 61 }, { "end_offset": 234, "id": 10442, "label": "hash", "start_offset": 170 }, { "end_offset": 299, "id": 10443, "label": "hash", "start_offset": 235 }, { "end_offset": 364, "id": 10444, "label": "hash", "start_offset": 300 }, { "end_offset": 494, "id": 10446, "label": "hash", "start_offset": 430 }, { "end_offset": 559, "id": 10447, "label": "hash", "start_offset": 495 }, { "end_offset": 576, "id": 10448, "label": "IPV4", "start_offset": 561 }, { "end_offset": 594, "id": 10449, "label": "IPV4", "start_offset": 577 }, { "end_offset": 609, "id": 10450, "label": "IPV4", "start_offset": 595 }, { "end_offset": 626, "id": 10451, "label": "IPV4", "start_offset": 610 }, { "end_offset": 169, "id": 10441, "label": "hash", "start_offset": 105 }, { "end_offset": 429, "id": 10445, "label": "hash", "start_offset": 365 }, { "end_offset": 60, "id": 49225, "label": "vulnerability", "start_offset": 12 }, { "end_offset": 692, "id": 49228, "label": "url", "start_offset": 662 }, { "end_offset": 721, "id": 49229, "label": "url", "start_offset": 693 }, { "end_offset": 103, "id": 49226, "label": "vulnerability", "start_offset": 90 }, { "end_offset": 749, "id": 49230, "label": "url", "start_offset": 722 }, { "end_offset": 771, "id": 49231, "label": "TIME", "start_offset": 759 }, { "end_offset": 661, "id": 49227, "label": "url", "start_offset": 628 } ]
[ { "from_id": 10440, "id": 760, "to_id": 49226, "type": "exploits" } ]
2,299
The watering hole served an XNU privilege escalation vulnerability (CVE-2021-30869) unpatched in macOS Catalina, which led to the installation of a previously unreported backdoor.
[ { "end_offset": 82, "id": 47364, "label": "vulnerability", "start_offset": 68 }, { "end_offset": 111, "id": 47365, "label": "SOFTWARE", "start_offset": 97 }, { "end_offset": 66, "id": 47366, "label": "vulnerability", "start_offset": 28 } ]
[ { "from_id": 47365, "id": 315, "to_id": 47364, "type": "has" } ]
537
One example is an exploit RTF that led to downloading and installing Makop ransomware remotely.
[ { "end_offset": 29, "id": 44767, "label": "attack-pattern", "start_offset": 18 }, { "end_offset": 85, "id": 44768, "label": "malware", "start_offset": 69 } ]
[ { "from_id": 44767, "id": 21, "to_id": 44768, "type": "delivers" } ]
13,610
In this example, AdobeAirFlashInstaller.exe (legitimate file) sideloads xerces-c_2_1_0.dll (patched legitimate file), which then sideloads ulibs.dll (malicious file).
[ { "end_offset": 148, "id": 51698, "label": "FILEPATH", "start_offset": 139 }, { "end_offset": 43, "id": 51696, "label": "FILEPATH", "start_offset": 17 }, { "end_offset": 90, "id": 51697, "label": "FILEPATH", "start_offset": 72 } ]
[ { "from_id": 51696, "id": 1136, "to_id": 51697, "type": "related-to" }, { "from_id": 51697, "id": 1137, "to_id": 51698, "type": "related-to" } ]
14,305
Code snippet of register.bat Uninstall.exe is a copy of the open-source hacking tool Mimikatz (https://github[.]com/gentilkiwi/mimikatz).
[ { "end_offset": 28, "id": 48520, "label": "FILEPATH", "start_offset": 16 }, { "end_offset": 42, "id": 48521, "label": "FILEPATH", "start_offset": 29 }, { "end_offset": 89, "id": 48522, "label": "malware", "start_offset": 88 }, { "end_offset": 135, "id": 48524, "label": "URL", "start_offset": 95 }, { "end_offset": 94, "id": 48523, "label": "malware", "start_offset": 85 } ]
[ { "from_id": 48521, "id": 442, "to_id": 48523, "type": "related-to" }, { "from_id": 48520, "id": 443, "to_id": 48521, "type": "related-to" }, { "from_id": 48523, "id": 444, "to_id": 48524, "type": "related-to" } ]
1,852
We also observed the execution of a password recovery tool XenArmor with C:\temp\pass\start.exe.
[ { "end_offset": 71, "id": 46982, "label": "tools", "start_offset": 63 }, { "end_offset": 99, "id": 46981, "label": "FILEPATH", "start_offset": 77 } ]
[ { "from_id": 46982, "id": 282, "to_id": 46981, "type": "consists-of" } ]
535
We also observed that Mailto (AKA NetWalker) tends to deliver ransomware in a highly obfuscated PowerShell script.
[ { "end_offset": 28, "id": 1765, "label": "malware", "start_offset": 22 }, { "end_offset": 43, "id": 1766, "label": "malware", "start_offset": 34 }, { "end_offset": 113, "id": 46155, "label": "attack-pattern", "start_offset": 78 } ]
[ { "from_id": 1766, "id": 162, "to_id": 1765, "type": "duplicate-of" }, { "from_id": 46155, "id": 160, "to_id": 1766, "type": "delivers" }, { "from_id": 46155, "id": 161, "to_id": 1765, "type": "delivers" } ]
2,633
While several top-tier RaaS affiliate programs, such as Babuk, DarkSide and REvil (aka Sodinokibi) disappeared from the underground in 2021, LockBit 2.0 continued to operate and gradually became one of the most active ransomware operations.
[ { "end_offset": 98, "id": 47813, "label": "threat-actor", "start_offset": 88 }, { "end_offset": 62, "id": 47810, "label": "threat-actor", "start_offset": 57 }, { "end_offset": 72, "id": 47811, "label": "threat-actor", "start_offset": 64 }, { "end_offset": 82, "id": 47812, "label": "threat-actor", "start_offset": 77 }, { "end_offset": 140, "id": 47814, "label": "TIME", "start_offset": 136 }, { "end_offset": 153, "id": 47815, "label": "malware", "start_offset": 142 } ]
[ { "from_id": 47813, "id": 364, "to_id": 47812, "type": "variant-of" } ]
3,281
The malware downloads OBS Studio files if the OBS folder and config file are not found in the root directory.
[ { "end_offset": 12, "id": 48378, "label": "malware", "start_offset": 5 }, { "end_offset": 33, "id": 48377, "label": "SOFTWARE", "start_offset": 23 } ]
[ { "from_id": 48378, "id": 408, "to_id": 48377, "type": "downloads" } ]
1,355
The CVE-2021-32648 vulnerability lies within the OctoberCMS platform prior to version 1.0.472 and results in an attacker gaining access to any account via a specially crafted account password reset request.
[ { "end_offset": 19, "id": 46687, "label": "vulnerability", "start_offset": 5 }, { "end_offset": 60, "id": 46688, "label": "SOFTWARE", "start_offset": 50 } ]
[ { "from_id": 46688, "id": 211, "to_id": 46687, "type": "has" } ]