The Ramnit Web Browser Specialist: Hooker Number II

The Ramnit Web Browser Specialist: Hooker Number II

The Ramnit ecosystem is certainly something not so easy to explain. It is one of the oldest trojan bankers on the cyber-crime landscape. Indeed, we can trace back its activity to 2010, when it started to spread as a simple worm to subsequently acquire "financial" and "banking" features when its developers included into it parts of leaked Zeus source code, giving it the possibility to operate as a fully featured Banking Trojan. In the italian panorama, among the banks where … [Read more]

A dive into APT34 (aka OilRig, aka Cobalt Gypsy) “TwoFace” webshell

A dive into APT34 (aka OilRig, aka Cobalt Gypsy) "TwoFace" webshell

If we talk about cyber intrusions, a vulnerable exposed web service can very often represent the first route for the whole backend infrastructure. Beyond this, web ones are among the first services whose robustness is tested during a cyber attack. For this reason, every respecting offensive actor knows very well the concept of "webshell" and how the effectiveness of such tools can sometimes make the difference between a partial or total compromise of the target network.This post wants to … [Read more]

Quick and dirty over APT37 (aka Group123, aka ScarCruft) Android spying backdoor

Quick and dirty over APT37 (aka Group123, aka ScarCruft) Android spying backdoor

APT37 (aka Group123, aka ScarCruft) is an espionage hacking group involved in malicious activities since at least 2016. Despite the real goals of this threat group and their main objectives are currently unknown to the writer, APT37 seems to focus its efforts mainly against targets located in the region of South Korea.Usually this threat actor uses lure documents related to korean peninsula military / security / general affairs in their spear-phishing attempts and  often makes use of … [Read more]

APT32 / OceanLotus on ASEAN Affairs

APT32 / OceanLotus on ASEAN Affairs

OceanLotus (aka APT32) is a very active hacking group. It operates especially in the area of south-east Asia and, according to the security community, it is close to the Vietnamese government. Over the time, many intrusion attempts and data breach have been attributed to it. As for the more purely technical aspects, the group seems very well supported and often adopts advanced tactics and techniques in order to lower the probability of detection. In my personal opinion, the members of this group … [Read more]

jRAT += Houdini: New Year 2019

jRAT += Houdini: New Year 2019

In the late evening of 08-01-2019 a phishing document related to the Ministry of Defense of Turkey has been captured in the wild and caught my attention (md5: 0d3b1c3c4287fe12399dc29d88905e9c). Further investigations led to believe that a new malicious campaign aimed to the spreading of HWorm + jRat variants is raising up in these last days. Insights The phishing document (md5: 0d3b1c3c4287fe12399dc29d88905e9c) tries to attract the curiosity of the potential victims through a file name that … [Read more]

APT28 / Sofacy – SedUploader under the Christmas tree

APT28 / Sofacy - SedUploader under the Christmas tree

Another APT28 / Sofacy supposed decoy document related to defence and security sector [md5: f8a778d21003098075c9aef8ed58c6c3] has been captured in the wild yesterday evening. It's likely targeting at least one eastern europe country. The spear-phishing document collected seems to work primarly through the use of macro code to complete the cycle of infection. An image related to the decoy document is reported following:It seems similar, for some pieces of internal code, to the document … [Read more]

APT29 threat group seems to be back targeting US public / gov /defense sector

APT29, the well known hacking group, seems to be back with slightly different tactical and technical procedures to conduct its last cyber operation. In the late evening of 15  / 11, some malicious documents likely to be referred to the group in question have been submitted to a major online malware analysis platform (Virus Total - @DrunkBinary credits for the first discovery). The analyzed decoy document retrieved by me is clearly referring to a DoS (Department of State) PDF form that is shown … [Read more]

Dridex Downloader Analysis

Dridex Downloader Analysis

This morning I received on my company box an email with an attached .xlsm file named D92724446.xlsm coming from [email protected] Central and local AV engines did not found anything malicious and also a multiengine scan got 0/57 as result. I decided to investigate a little more in-depth in order to confirm that was a malicious file and to extract at least the code I was imagining being inside this document. These are some general info collected about the received file: Name: … [Read more]

A look at SANS Brussels Challenges

A look at SANS Brussels Challenges

This morning, a colleague of mine pointed out me to some reversing “challenges” addressed to participants of SANS Brussels 2015 (what? I was not there?). Why not to take a quick look and try to solve them ? I hope to publish the solutions/suggestions is not cause of rage for mentors of SANS, for whom I have a lot of esteem. However, at the time of this writing these challenges are online and accessible without any particular restriction at https://www.sansemea.com/challenges.php, therefore I … [Read more]

Pattern-Based Approach for In-Memory ShellCodes Detection

Pattern-Based Approach for In-Memory ShellCodes Detection

This topic has been dealt in one of my last technical articles. The document shows as it’s possible to approach an incident investigation on the basis of common instructions used by shellcodes to achieve their goals. The analysis is conducted within a memory dump. In this regard have been developed some yara custom rules that can be used as an aid for experienced analyst to quickly locate malicious code. Note, however, that this is a very wide topic (have you ever heard of padding, permutations, … [Read more]