campaign image
Exploit of Romcom RAT's
RAT Romcom

The RomCom RAT is a malicious software program used by a threat actor to remotely control compromised systems, often by impersonating well-known brands and deploying fake versions of legitimate software through phishing campaigns.

Domains Source Last Update
aaa.stage.16549040.dns.alleivice.com SOCRadar 2023-01-31
teoresp.com SOCRadar 2023-01-31
advanced-ip-scaner.com SOCRadar 2023-01-31
tinheranter.com SOCRadar 2023-01-31
optasko.com SOCRadar 2023-01-31
cuba4ikm4jakjgmkeztyawtdgr2xymvy6nvgw5cglswg3si76icnqd.onion SOCRadar 2023-01-31
witorophron.com SOCRadar 2023-01-31
combinedresidency.org SOCRadar 2023-01-31
leftthenhispar.ru SOCRadar 2023-01-31
nastylgilast.com SOCRadar 2023-01-31
thehentoftbet.ru SOCRadar 2023-01-31
toftoflethens.com SOCRadar 2023-01-31
notfiled.com SOCRadar 2023-01-31
tycahatit.ru SOCRadar 2023-01-31
kurvalarva.com SOCRadar 2023-01-31
otinrofha.ru SOCRadar 2023-01-31
babbedidndu.ru SOCRadar 2023-01-31
you-supported.com SOCRadar 2023-01-31
johntotrepwron.com SOCRadar 2023-01-31
reninparwil.com SOCRadar 2023-01-31
vu42i55fqimjx6koo7oqh3zzvy2xghqe7ot4h2ftcv2pimbauupjyqyd.onion SOCRadar 2023-01-31
nagirlstylast.com SOCRadar 2023-01-31
fabickng.ru SOCRadar 2023-01-31
advanced-ip-scanners.com SOCRadar 2023-01-31
torsketronand.ru SOCRadar 2023-01-31
tandugolastsp.com SOCRadar 2023-01-31
ningwitjohnno.ru SOCRadar 2023-01-31
dgtlocean.com SOCRadar 2023-01-31
4qzm.com SOCRadar 2023-01-31
facabeand.com SOCRadar 2023-01-31
Hashes Source Last Update
4de5d433af5701462517719ce097bb4c0e5676c9 SOCRadar 2023-01-31
eaced2fcfdcbf3dca4dd77333aaab055345f3ab4 SOCRadar 2023-01-31
550f42c5b555893d171285dc8b15b4b5 SOCRadar 2023-01-31
3e3a7116eeadf99963077dc87680952cca87ff4fe60a552041a2def6b45cbeea SOCRadar 2023-01-31
4c32ef0836a0af7025e97c6253054bca SOCRadar 2023-01-31
05681ff7cae6b28f5714628a269caa5115da49c94737ce82ec09b4312e40fd26 SOCRadar 2023-01-31
ac09cbfee4cf89d7b7a755c387e473249684f18aa699eb651d119d19e25bff34 SOCRadar 2023-01-31
3e6f9e73ca7bf856c3f5aeb44dc793ec4927b842 SOCRadar 2023-01-31
cf6ec2999b5d67df89a5350dfcff611d SOCRadar 2023-01-31
de239ac43508c4fd4c9069a9b6a4a3f8 SOCRadar 2023-01-31
1b943afac4f476d523310b8e3afe7bca761b8cbaa9ea2b9f01237ca4652fc834 SOCRadar 2023-01-31
b5d202456ac2ce7d1285b9c0e2e5b7ddc03da1cbca51b5da98d9ad72e7f773b8 SOCRadar 2023-01-31
e80d80521238008bf6f429e072eaf6030c06e2d3123d03ea9b36f5a232a1ec90 SOCRadar 2023-01-31
d907be57b5ef2af8a8b45d5f87aa4773 SOCRadar 2023-01-31
f8144fa96c036a8204c7bc285e295f9cd2d1deb0379e39ee8a8414531104dc4a SOCRadar 2023-01-31
13ab5762ff5023163b1ca7c7749112b3673cd3db SOCRadar 2023-01-31
a1649dec72c316587b10d92993aee1ec SOCRadar 2023-01-31
a304497ff076348e098310f530779002a326c264 SOCRadar 2023-01-31
f538b035c3de87f9f8294bec272c1182f90832a4e86db1e47cbb1ab26c9f3a0b SOCRadar 2023-01-31
d1a84706767bfb802632a262912e95a8 SOCRadar 2023-01-31
10a5612044599128981cb41d71d7390c15e7a2a0c2848ad751c3da1cbec510a2 SOCRadar 2023-01-31
0afed8d1b7c36008de188c20d7f0e2283251a174261547aab7fb56e31d767666 SOCRadar 2023-01-31
d0bbbc1866062f9a772776be6b7ef135d6c5e002 SOCRadar 2023-01-31
5f187393acdeb67e76126353c74b6080d3e6ccf28ae580658c670d8b6e4aacc1 SOCRadar 2023-01-31
02a733920c7e69469164316e3e96850d55fca9f5f9d19a241fad906466ec8ae8 SOCRadar 2023-01-31
3a8b7c1fe9bd9451c0a51e4122605efc98e7e4e13ed117139a13e4749e211ed0 SOCRadar 2023-01-31
2f93bf6feb96aa13973cb923abcf402d3d829cb6 SOCRadar 2023-01-31
04972228302e569da856e4fa45f679ed SOCRadar 2023-01-31
9959e90d255c0221e9754db53e321ab4c7434488 SOCRadar 2023-01-31
1817cc163482eb21308adbd43fb6be57fcb5ff11fd74b344469190bb48d8163b SOCRadar 2023-01-31
f31620e7e22a30f408e5d683922f5029 SOCRadar 2023-01-31
1a21a1e626fd342e794bcc3b06981d2c SOCRadar 2023-01-31
9aa1f37517458d635eae4f9b43cb4770880ea0ee171e7e4ad155bbdee0cbe732 SOCRadar 2023-01-31
596eaef93bdcd00a3aedaf6ad6d46db4429eeba61219b7e01b1781ebbf6e321b SOCRadar 2023-01-31
3d4502066a338e19df58aa4936c37427feecce9ab8d43abff4a7367643ae39ce SOCRadar 2023-01-31
7e00bfb622072f53733074795ab581cf6d1a8b4fc269a50919dda6350209913c SOCRadar 2023-01-31
db3b1f224aec1a7c58946d819d729d0903751d1867113aae5cca87e38c653cf4 SOCRadar 2023-01-31
e0d89c88378dcb1b6c9ce2d2820f8d773613402998b8dcdb024858010dec72ed SOCRadar 2023-01-31
ee2f71faced3f5b5b202c7576f0f52b9 SOCRadar 2023-01-31
cb933f1c913144a8ca6cfcfd913d6d28 SOCRadar 2023-01-31
61971d3cbf88d6658e5209de443e212100afc8f033057d9a4e79000f6f0f7cc4 SOCRadar 2023-01-31
4e4eca58b896bdb6db260f21edc7760a SOCRadar 2023-01-31
542d144a73322a30ceabb002851515a80611bf6c SOCRadar 2023-01-31
99c7cad7032ec5add3a21582a64bb149 SOCRadar 2023-01-31
5f5c18e98e5c8a5a50a1e122221f61dd SOCRadar 2023-01-31
67fe9e515686c2d8cf7eeab0c37a04426599352c SOCRadar 2023-01-31
9f61259c966f34d89b70af92b430ae40dd5f1314ee6640d16e0b7b0f4f385738 SOCRadar 2023-01-31
33fe4c6f5e7803bc0b9d977abd8b816712cbf300 SOCRadar 2023-01-31
0f385cc69a93abeaf84994e7887cb173e889d309a515b55b2205805bdfe468a3 SOCRadar 2023-01-31
a2511c5c2839bfbdf9c0f84f415d5eae168456e5d3f77f1becdbcd69fba4daa4 SOCRadar 2023-01-31
d5dab3f20d47bf4ca4910949015844d660e99ca9 SOCRadar 2023-01-31
141b2190f51397dbd0dfde0e3904b264c91b6f81febc823ff0c33da980b69944 SOCRadar 2023-01-31
952b34f6370294c5a0bb122febfaa80612fef1f32eddd48a3d0556c4286b7474 SOCRadar 2023-01-31
d1ff26ea3d2d2ced4b7e76d971a60533817048d7 SOCRadar 2023-01-31
1807549af1c8fdc5b04c564f4026e41790c554f339514d326f8b55cb7b9b4f79 SOCRadar 2023-01-31
08eb4366fc0722696edb03981f00778701266a2e57c40cd2e9d765bf8b0a34d0 SOCRadar 2023-01-31
a7c207b9b83648f69d6387780b1168e2f1eabd23ae6e162dd700ae8112f8b96c SOCRadar 2023-01-31
6310a2063687800559ae9d65cff21b0a SOCRadar 2023-01-31
01242b35b6def71e42cc985e97d618e2fabd616b16d23f7081d575364d09ca74 SOCRadar 2023-01-31
2eb3ef8a7a2c498e87f3820510752043b20cbe35b0cbd9af3f69e8b8fe482676 SOCRadar 2023-01-31
f5db51115fa0c910262828d0943171d640b4748e51c9a140d06ea81ae6ea1710 SOCRadar 2023-01-31
7b6f996cc1ad4b5e131e7bf9b1c33253 SOCRadar 2023-01-31
23cea76078dd3829bd2b7e00f2bfe2ad SOCRadar 2023-01-31
7c003b4f8b3c0ab0c3f8cb933e93d301 SOCRadar 2023-01-31
c9d3b29e0b7662dafc6a1839ad54a6fb SOCRadar 2023-01-31
8e64bacaf40110547b334eadcb0792bdc891d7ae298fbfff1367125797b6036b SOCRadar 2023-01-31
b9afe016dbdba389000b01ce7645e7eea1b0a50827cded1cbaa48fbc715197bb SOCRadar 2023-01-31
0c2ffed470e954d2bf22807ba52c1ffd1ecce15779c0afdf15c292e3444cf674 SOCRadar 2023-01-31
ab1ed31825763c481f54bd8a94d73777 SOCRadar 2023-01-31
1f842f84750048bb44843c277edeaa8469697e97c4dbf8dc571ec552266bec9f SOCRadar 2023-01-31
86ed4544eeca78dc64881a916fe1e1f73dc17f7b SOCRadar 2023-01-31
250cb957728dba0f3ae2c1c1e9bae241 SOCRadar 2023-01-31
8b8dff5d30802fd79b76ee1531e7d050184a07570201ef1cd83a7bb8fa627cb0 SOCRadar 2023-01-31
1d142c36c6cdd393fe543a6b7782f25a9cbafca17a1cfa0f3fc0f5a9431dbf3f SOCRadar 2023-01-31
d1ea4f54c19d332b01553fa8e9a838c2a4dabfb1 SOCRadar 2023-01-31
8284421bbb94f3c37f94899cdcd19afd SOCRadar 2023-01-31
b160bd46b6efc6d79bfb76cf3eeacca2300050248969decba139e9e1cbeebf53 SOCRadar 2023-01-31
3252965013ec861567510d54a97446610edba5da88648466de6b3145266386d9 SOCRadar 2023-01-31
236f5de8620a6255f9003d054f08574b SOCRadar 2023-01-31
4fc9202ff84ef84b8c5e6140b66ac3d04570daf886a7f1ae31661ade882f963e SOCRadar 2023-01-31
068117b406940ac510ed59efd1d7c7651f645a31bd70db6de16aba12c055aae6 SOCRadar 2023-01-31
79d6b1b6b1ecb446b0f49772bf4da63fcec6f6bfc7c2e1f4924cb7acbb3b4f53 SOCRadar 2023-01-31
8a3d71c668574ad6e7406d3227ba5adc5a230dd3057edddc4d0ec5f8134d76c3 SOCRadar 2023-01-31
867d41458d94e985f6b3e2bae1dfb75e14cbc57f SOCRadar 2023-01-31
62d99110a03c33157a2c844ed5ddec11 SOCRadar 2023-01-31
0d5e3483299242bf504bd3780487f66f2ec4f48a7b38baa6c6bc8ba16e4fb605 SOCRadar 2023-01-31
01971269ca3083f292f6978511b51a0f90eb1ddb SOCRadar 2023-01-31
2896c334f4ef21aec24596ae13f9b692 SOCRadar 2023-01-31
bff4dd37febd5465e0091d9ea68006be475c0191bd8c7a79a44fbf4b99544ef1 SOCRadar 2023-01-31
4306c5d152cdd86f3506f91633ef3ae7d8cf0dd25f3e37bec43423c4742f4c42 SOCRadar 2023-01-31
f1103e627311e73d5f29e877243e7ca203292f9419303c661aec57745eb4f26c SOCRadar 2023-01-31
8a06c836c05537fcd8c600141073132d28e1172d SOCRadar 2023-01-31
6d5ca42906c60caa7d3e0564b011d20b87b175cbd9d44a96673b46a82b07df68 SOCRadar 2023-01-31
7d82030186936aa9fb21256d9593d992 SOCRadar 2023-01-31
f7013ce417fcba0f36c4b9bf5f8f6e0e2b14d6ed33ff4d384c892773508e932e SOCRadar 2023-01-31
03c835b684b21ded9a4ab285e4f686a3 SOCRadar 2023-01-31
8bebb8830366bd649c488903ef8f4e166965276d SOCRadar 2023-01-31
c646199a9799b6158de419b1b7e36b46c7b7413d6c35bfffaeaa8700b2dcc427 SOCRadar 2023-01-31
246dfe16a9248d7fb90993f6f28b0ebe87964ffd2dcdb13105096cde025ca614 SOCRadar 2023-01-31
6345ac3f61b9f4ce64e82d3896baf1fa SOCRadar 2023-01-31
2841848ef59dfe7137e15119e4c9ce5e873e3607 SOCRadar 2023-01-31
25a089f2082a5fcb0f4c1a12724a5521 SOCRadar 2023-01-31
ba83831700a73661f99d38d7505b5646 SOCRadar 2023-01-31
5d304ea1a9f3c8fbe147a74b64f3390e848ba04a SOCRadar 2023-01-31
241ce8af441db2d61f3eb7852f434642739a6cc3 SOCRadar 2023-01-31
0cf6399db55d40bc790a399c6bbded375f5a278dc57a143e4b21ea3f402f551f SOCRadar 2023-01-31
4b5eefa1727b97b6f773be3937a8cc390f0434ddc2f01dc24b68b690fafbcc93 SOCRadar 2023-01-31
88d13669a994d2e04ec0a9940f07ab8aab8563eb845a9c13f2b0fec497df5b17 SOCRadar 2023-01-31
571f8db67d463ae80098edc7a1a0cad59153ce6592e42d370a45df46f18a4ad8 SOCRadar 2023-01-31
9b546bd99272cf4689194d698c830a2510194722 SOCRadar 2023-01-31
209ffbc8ba1e93167bca9b67e0ad3561c065595d SOCRadar 2023-01-31
b14341b1ffe9e2730394b9066c6829b4e2f59a4234765ae2e97cfc6d4593730a SOCRadar 2023-01-31
25ebe54beb3c422ccd2d90aa8ae89087f71b0bed SOCRadar 2023-01-31
72a60d799ae9e4f0a3443a2f96fb4896 SOCRadar 2023-01-31
abe9635adbfee2d2fbaea140625c49abe3baa29c44fb53a65a9cda02121583ee SOCRadar 2023-01-31
aa3f37a75d3ba2ee74955c06eb308ad0cd6bca2e SOCRadar 2023-01-31
5cd95b34782ca5acf8a34d9dc184cb880a19b6edcaf4a4553fa0619b597c2f50 SOCRadar 2023-01-31
74fbf3cc44dd070bd5cb87ca2eed03e1bbeec4fec644a25621052f0a73abbe84 SOCRadar 2023-01-31
a7172aef66bb12e1bb40a557bb41e607 SOCRadar 2023-01-31
a17c21b909c56d93d978014e63fb06926eaea8e7 SOCRadar 2023-01-31
857f28b8fe31cf5db6d45d909547b151a66532951f26cda5f3320d2d4461b583 SOCRadar 2023-01-31
f869e8fbd8aa1f037ad862cf6e8bbbf797ff49556fb100f2197be4ee196a89ae SOCRadar 2023-01-31
bd270853db17f94c2b8e4bd9fa089756a147ed45cbc44d6c2b0c78f361978906 SOCRadar 2023-01-31
af4523186fe4a5e2833bbbe14939d8c3bd352a47a2f77592d8adcb569621ce02 SOCRadar 2023-01-31
310afba59ab8e1bda3ef750a64bf39133e15c89e8c7cf4ac65ee463b26b136ba SOCRadar 2023-01-31
3fe1a3aaca999a5db936843c9bdfea14 SOCRadar 2023-01-31
9d3b268416d3fab4322cc916d32e0b2e8fa0de370acd686873d1522306124fd2 SOCRadar 2023-01-31
75b55bb34dac9d02740b9ad6b6820360 SOCRadar 2023-01-31
fd87ca28899823b37b2c239fbbd236c555bcab7768d67203f86d37ede19dd975 SOCRadar 2023-01-31
ecefd9bb8b3783a81ab934b44eb3d84df5e58f0289f089ef6760264352cf878a SOCRadar 2023-01-31
a839b2a598fc598044f9814873d7fc84 SOCRadar 2023-01-31
09e04ba053edcf4ca38541cbd735568945a5948d SOCRadar 2023-01-31
Ipv4s Source Last Update
37.44.253.21 SOCRadar 2023-01-31
217.79.43.148 SOCRadar 2023-01-31
79.141.169.220 SOCRadar 2023-01-31
31.184.198.111 SOCRadar 2023-01-31
204.13.164.118 SOCRadar 2023-01-31
192.137.100.96 SOCRadar 2023-01-31
154.35.175.225 SOCRadar 2023-01-31
222.252.53.33 SOCRadar 2023-01-31
64.52.169.174 SOCRadar 2023-01-31
216.45.55.3 SOCRadar 2023-01-31
31.184.198.84 SOCRadar 2023-01-31
31.184.198.90 SOCRadar 2023-01-31
141.98.87.124 SOCRadar 2023-01-31
159.203.70.39 SOCRadar 2023-01-31
37.120.193.123 SOCRadar 2023-01-31
31.44.184.84 SOCRadar 2023-01-31
31.184.198.74 SOCRadar 2023-01-31
185.153.199.168 SOCRadar 2023-01-31
69.30.232.138 SOCRadar 2023-01-31
62.210.54.235 SOCRadar 2023-01-31
64.235.39.82 SOCRadar 2023-01-31
107.189.10.143 SOCRadar 2023-01-31
185.153.199.163 SOCRadar 2023-01-31
128.31.0.39 SOCRadar 2023-01-31
131.188.40.189 SOCRadar 2023-01-31
37.120.247.39 SOCRadar 2023-01-31
103.27.203.197 SOCRadar 2023-01-31
38.108.119.121 SOCRadar 2023-01-31
31.184.198.82 SOCRadar 2023-01-31
31.44.184.100 SOCRadar 2023-01-31
92.222.172.39 SOCRadar 2023-01-31
192.137.101.205 SOCRadar 2023-01-31
209.76.253.84 SOCRadar 2023-01-31
157.245.70.127 SOCRadar 2023-01-31
31.184.198.80 SOCRadar 2023-01-31
104.238.134.63 SOCRadar 2023-01-31
209.127.187.245 SOCRadar 2023-01-31
86.59.21.38 SOCRadar 2023-01-31
216.45.55.30 SOCRadar 2023-01-31
84.17.52.135 SOCRadar 2023-01-31
185.153.199.164 SOCRadar 2023-01-31
194.109.206.212 SOCRadar 2023-01-31
31.184.198.83 SOCRadar 2023-01-31
108.170.31.115 SOCRadar 2023-01-31
199.58.81.140 SOCRadar 2023-01-31
185.153.199.169 SOCRadar 2023-01-31
149.255.35.131 SOCRadar 2023-01-31
31.184.194.42 SOCRadar 2023-01-31
170.39.212.69 SOCRadar 2023-01-31
193.34.167.17 SOCRadar 2023-01-31
195.54.160.149 SOCRadar 2023-01-31
45.32.229.66 SOCRadar 2023-01-31
193.23.244.244 SOCRadar 2023-01-31
213.32.39.43 SOCRadar 2023-01-31
45.91.83.176 SOCRadar 2023-01-31
45.164.21.13 SOCRadar 2023-01-31
31.184.198.86 SOCRadar 2023-01-31
185.153.199.162 SOCRadar 2023-01-31
31.184.192.44 SOCRadar 2023-01-31
45.86.162.34 SOCRadar 2023-01-31
31.44.184.82 SOCRadar 2023-01-31
46.17.106.230 SOCRadar 2023-01-31
212.192.241.230 SOCRadar 2023-01-31
31.184.198.85 SOCRadar 2023-01-31
192.137.101.46 SOCRadar 2023-01-31
92.222.172.172 SOCRadar 2023-01-31
94.103.9.79 SOCRadar 2023-01-31
185.153.199.176 SOCRadar 2023-01-31
23.227.198.246 SOCRadar 2023-01-31
103.114.163.197 SOCRadar 2023-01-31
167.71.175.165 SOCRadar 2023-01-31
31.184.199.82 SOCRadar 2023-01-31
171.25.193.9 SOCRadar 2023-01-31
104.217.8.100 SOCRadar 2023-01-31
192.137.100.98 SOCRadar 2023-01-31
144.172.83.13 SOCRadar 2023-01-31
Cves Source Last Update
CVE-2022-24521 SOCRadar 2023-01-31
CVE-2020-1472 SOCRadar 2023-01-31
Emails Source Last Update
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
[email protected] SOCRadar 2023-01-31
Domains Insert Date

MITRE ATT&CK TECHNIQUES

Cuba ransomware actors use the ATT&CK techniques listed in Table 6. Note: For details on TTPs listed in the table, see FBI Flash Indicators of Compromise Associated with Cuba Ransomware.

Resource Development

Technique Title

ID

Use

Compromise Infrastructure: Domains

T1584.001

Cuba ransomware actors use compromised networks to conduct their operations.

Initial Access

Technique Title

ID

Use

Valid Accounts

T1078

Cuba ransomware actors have been known to use compromised credentials to get into a victim’s network.

External Remote Services

T1133

Cuba ransomware actors may leverage external-facing remote services to gain initial access to a victim’s network.

Exploit Public-Facing Application

T1190

Cuba ransomware actors are known to exploit vulnerabilities in public-facing systems.

Phishing

T1566

Cuba ransomware actors have sent phishing emails to obtain initial access to systems.

Execution

Technique Title

ID

Use

Command and Scripting Interpreter: PowerShell

T1059.001

Cuba ransomware actors have used PowerShell to escalate privileges.

Software Deployment Tools

T1072

Cuba ransomware actors use Hancitor as a tool to spread malicious files throughout a victim’s network.

Privilege Escalation

Technique Title

ID

Use

Exploitation for Privilege Escalation

T1068

Cuba ransomware actors have exploited ZeroLogon to gain administrator privileges.

Defense Evasion

Technique Title

ID

Use

Impair Defenses: Disable or Modify Tools

T1562.001

Cuba ransomware actors leveraged a loader that disables security tools within the victim network.

Lateral Movement

Technique Title

ID

Use

Remote Services Session: RDP Hijacking

T1563.002

Cuba ransomware actors used RDP sessions to move laterally.

Credential Access

Technique Title

ID

Use

Credential Dumping: LSASS Memory

T1003.001

Cuba ransomware actors use LSASS memory to retrieve stored compromised credentials.

Steal or Forge Kerberos Tickets: Kerberoasting

T1558.003

Cuba ransomware actors used the Kerberoasting technique to identify service accounts linked to active directory.

Command and Control

Technique Title

ID

Use

Proxy: Manipulate Command and Control Communications

T1090

Industrial Spy ransomware actors use HTTP/HTTPS proxy via a C2 server to direct traffic to avoid direct connection. 

REF

Windows 10 users: Click the Windows logo and select the Power icon. In the opened menu click "Restart" while holding "Shift" button on your keyboard. In the "choose an option" window click on the "Troubleshoot", next select "Advanced options". 

In the advanced options menu select "Startup Settings" and click on the "Restart" button. In the following window you should click the "F5" button on your keyboard. This will restart your operating system in safe mode with networking.

Run Windows 10 in Safe Mode with Networking

Extract the downloaded archive and run the Autoruns.exe file.

Extract Autoruns.zip archive and run Autoruns.exe application

In the Autoruns application, click "Options" at the top and uncheck "Hide Empty Locations" and "Hide Windows Entries" options. After this procedure, click the "Refresh" icon.

Refresh Autoruns application results

Check the list provided by the Autoruns application and locate the malware file that you want to eliminate.

You should write down its full path and name. Note that some malware hides process names under legitimate Windows process names. At this stage, it is very important to avoid removing system files. After you locate the suspicious program you wish to remove, right click your mouse over its name and choose "Delete".

Delete malware in Autoruns

After removing the malware through the Autoruns application (this ensures that the malware will not run automatically on the next system startup), you should search for the malware name on your computer. Be sure to enable hidden files and folders before proceeding. If you find the filename of the malware, be sure to remove it.

Search for malware and delete it

Reboot your computer in normal mode. Following these steps should remove any malware from your computer. Note that manual threat removal requires advanced computer skills. If you do not have these skills, leave malware removal to antivirus and anti-malware programs.


The world of cyber threats is constantly evolving, and it's important for individuals and organizations to stay informed about the latest dangers. One threat that has recently emerged is the RomCom RAT (Remote Access Trojan). In this post, we'll discuss what the RomCom RAT is, how it operates, and how you can protect yourself from it.

What is the RomCom RAT?

The RomCom RAT is a type of malware that allows an attacker to gain remote access and control of a compromised system. The attackers behind the RomCom RAT have been found to use the reputation of well-known brands, such as SolarWinds, KeePass, and PDF Technologies, to carry out their attacks. This makes it difficult for victims to recognize the threat and take appropriate action.

How Does the RomCom RAT Operate?

The RomCom threat actor uses a scheme that involves imitating the original legitimate HTML code, registering similar malicious domains, altering legitimate applications, uploading the malicious bundles to fake websites, sending targeted phishing emails, and potentially using additional infection vectors. In preparation for an attack, the RomCom threat actor will perform the following steps: scraping the original legitimate HTML code from the vendor to spoof, registering a malicious domain similar to the legitimate one, altering a legitimate application, uploading the malicious bundle to a decoy website, and deploying targeted phishing emails to the victims.

Who is at Risk of a RomCom RAT Attack?

Currently, Ukraine appears to be the primary target of RomCom RAT attacks, but some English-speaking countries, such as the United Kingdom, are also being targeted. Given the location of the targets and the current geopolitical situation, it's unlikely that the RomCom RAT threat actor is motivated by cybercrime.
File Name Description Actions
0408-Threat-ReportV17.pdf DELIVERING ACTIONABLE AND CONTEXTUALIZED INTELLIGENCE TO INCREASE CYBER RESILIENCE
APT Name Aliases Target Countries Source Countries Total IOCs
RomCom
Storm-0978
None
timeline History Timeline

  • Fri, 14 Jul 2023 11:15:04 GMT
    New Report Added

    Blackberry Threat-ReportV17 report added.

  • Tue, 04 Jul 2023 00:00:00 GMT
    RomCom Threat Actor Suspected of Targeting Ukraine's NATO Membership Talks at the NATO Summit
    On July 4, the BlackBerry Threat Research and Intelligence team found two malicious documents submitted from an IP address in Hungary, sent as lures to an organization supporting Ukraine abroad, and a document targeting upcoming NATO Summit guests who may also be providing support to Ukraine. Go to Link
  • Tue, 31 Jan 2023 09:34:10 GMT
    New IOC's Added

    Total 295 IOC's added.

  • Tue, 31 Jan 2023 09:32:28 GMT
    New Apt Groups Added

    New APT Groups added.

  • Tue, 31 Jan 2023 09:10:24 GMT
    Created!

    New Campaign created.

  • Mon, 10 Oct 2022 00:00:00 GMT
    Evasion Tecniques
    On October 10, 2022, the threat actor improved evasion techniques by obfuscation of all strings, execution as a COM object, and others.Go to Link
  • Sat, 23 Jul 2022 00:00:00 GMT
    Advanced IP Scanner
    Once the victim installs a Trojanized bundle, it drops RomCom RAT to the system. 
newspaper Dark Web News










dark web image
Xeno RAT is Shared

In a hacker forum monitored by SOCRadar, Xeno RAT share is detected. https://image.socradar.com/screenshots/2023/11/01/ff07dadc-7690-411a-9b40-262d3cbdc2e3.pngWelcome to the official thread for Xeno Rat's release, a powerful and versatile remote access tool developed in C# for Windows 10 and 11. This open-source project is designed to provide you with a stable, feature-rich, and easy-to-use solution for remote computer control. Key Features Xeno Rat offers a wide range of features that set it apart from other RATs: - HVNC (Hidden Virtual Network Computing): Enjoy this premium feature for free, enhancing your remote access capabilities. - Live Microphone: Real-time audio surveillance, perfect for various use cases. - Socks5 Reverse Proxy: Proxy your internet traffic through the client with ease. - Regular Updates: The project is actively maintained, and new features are continuously added. - Built from Scratch: Xeno Rat is developed from the ground up, ensuring a unique approach to remote access. Some other features - Listen on multiple ports - Chat - Bluescreen - Message Box - Fun menu (monitor on/off, CD tray open/close, and more) - Webcam - Key Logger - Screen Control - Process Manager - File Manager - Shell - And plenty more... Legal Disclaimer Xeno Rat is intended for educational purposes only. The developer is not responsible for any misuse or damage caused by this tool. Always stay within legal and ethical boundaries. For more details and to access the project, visit Xeno Rat on GitHub. Explore the code and contribute to its development! For anyone who wants to donate, I also included a txt file with the exact same link.


dark web image
Freedom RAT is on Sale

In a hacker forum monitored by SOCRadar, a new alleged RAT sale is detected. https://image.socradar.com/screenshots/2023/10/28/b66cb6f2-3349-4e24-b2af-fa4aa2438c55.pngRemote Administrative Tool ( R.A.T ) written fully in C language ( no dependencies ) - 40 KB. Functions { Fun : - Simple MessageBox popup - Beep Sound - Empty recycle bin Power Management : - Shutdown - Restart - Sleep File Manager : - Download - Execute - Delete - Upload Task Manager : - Kill process Stealer : - Browser logins ( URL / Logins URL / Username / Password ) Screen : - Single Screnshot function ( capture all monitors on target machine - Vertical/Horizontal ) Reverse Functions : - Reverse command prompt - Reverse powershell Clipboard : - Get clipboard content - Set clipboard content Keylogger : - Live keylogger } Functions (included in Builder) { Clipper : - Bitcoin Format -> P2PKH, P2SH, BECH32/Segwit - Ethereum - Litecoin Error Message : - Fully customizable first boot error MessageBox ( Title, Content, Icon, Buttons ) Installation Folder : - Choose between 4 different path Additional : - Disable Task Manager - Persistence - Mutex - Strong anti VM + anti debug } PRICE : 1 BTC ( Garant is welcome ) COPY AVAILABLE : 1/1 Runtime Result : hxxps[://]checkzilla[.]io/scan/fa06e69c-be42-4096-829b-0b88c6d079b6 Scantime Result : hxxps[://]avcheck[.]net/id/MdhKDasbakAb What will you get after purchase ? - Full source code of client side AND also server side + builder. - Full support for installation to your server. - I am ready to explain every line of code 1 by 1 and answer all your questions ( concerning the product ). For any question concerning this product send me a PM, I will be happy to answer you. Server side screenshot : https://image.socradar.com/screenshots/2023/10/28/c45d2cb9-f616-4020-904f-8ec3a4af9599.pnghttps://image.socradar.com/screenshots/2023/10/28/74623855-ddce-4e55-ae5f-8680d7a7d85f.png


dark web image
Source Code of Linux Rootkit is on Sale

In a hacker forum monitored by SOCRadar, a new alleged source code sale is detected for Linux Rootkit. https://image.socradar.com/screenshots/2023/10/28/8d3febc9-5350-4a00-9578-842f8661ea4e.pngSyM Linux Rootkit SyM is a universal user-mode Linux rootkit that will sustainability hold root persistence across all Linux kernel versions, and will successfully bypass any EDR or rootkit detection software. SyM will also come with a plethora of features capable of stealing important files such as SQL database backups, .git, and other configuration files; And much more. Along with being the first of it's kind SyM implements some API system call hooking that has never been seen before which makes it such a unique, and undetectable rootkit experience. C&C / C2 / backdoor methods: ICMP backdoor Use a unique magic identifier to open a reverse shell accept ( ) backdoor Use a unique magic identify to open a listening TCP server PAM backdoor Direct interactive SSH backdoor with custom hidden port, username, and password Internal System Logging: SSH Log Log all incoming and outgoing SSH authorizations in plaintext by hooking pam_vprompt, read, and write API calls Execution Log Log all normal ( including root ) user command execution flow Hiding Self / Rootkit Hide all files, processes, open ports, and all connections based on unique magic identifier Hide process map files, to prevent direct mapping of process and being able to identify rootkit Hide any file, or directory of choice All rootkit master created directories and files will be kept track of, so no need to manually add or edit anything to keep it hidden! Note: It is possible to forge or fake as any other installed software, service, or similar EDR Bypass / Evasion Hooking API calls to hide it's self from / proc * / * maps as well as many other system locations Bypassing SELinux and GRSec Bypasses and hides from SentinelOne and other similar software File Stealer By scanning and keeping tracking of a user made list of interesting files and directories the rootkit is capable of stealing anything on the fly and uploading it directly to an external server Stuff like SQL databases are stolen automatically by default! Pricing Source Code: $7500 Contact Telegram



dark web image
Anubis Stealer is on Sale

In a hacker forum monitored by SOCRadar, a new stealer tool Anubis Stealer sale is detected. https://image.socradar.com/screenshots/2023/09/29/cf4d864b-4fc9-4fd9-ac67-fc693dbdb0bb.pngAnubis Stealer 💥Descriptive 💥 Program for remotely controlling Windows computers via a Telegram bot. Written in C++ language This remote access tool stands out for its exceptional features and high reliability. It supports Windows 10 and 11, both 32-bit and 64-bit operating systems. The software is developed in C/C++, featuring an independent Stub that doesn't rely on the .NET Framework. It boasts a rich set of functionalities, including cookie and password recovery, file management, remote execution, real-time and offline keylogging, remote shell access, and process management. Additionally, it supports obtaining TOKENs for Discord, Telegram, and Steam. The clipboard feature automatically replaces cryptocurrency addresses, enhancing privacy. Importantly, it includes an anti-sandbox feature that detects and counters various virtual environments and analysis tools. The Stub, ranging in size from 500KB to 600KB, ensures efficiency. In summary, this tool is user-friendly, offers a wide range of functionalities, and is suitable for various purposes, whether you need cookie recovery, password management, file transfer, or more. 💥Features💥 Cookies Recovery: This function allows you to recover cookies from popular Chrome and Firefox browsers in JSON format. Password Recovery: This feature enables the recovery of passwords from various browsers (Chrome, Firefox, Edge.) 50+ browsers。 File Manager: With the File Manager, you can upload and download files at high speed, as well as execute and delete files on the target computer. Download & Execute: This function allows you to execute files on remote computers. Remote Shell: This function lets you send commands to the remote computer's command prompt (CMD). Process Manager: With the Process Manager, you can view and terminate processes on the remote computer. TOKEN: Discord, Telegram, and Steam. Clipboard: Automatically replaces cryptocurrency addresses in the clipboard with a predefined address, likely to perform address substitution. AntiSandbox: This feature can detect the presence of virtualization or sandboxing environments like Virtualbox, VirtualMachine, Cuckoo, Anubis, ThreatExpert, Sandboxie, QEMU, and analysis tools. Spoiler: Chromium browsers Edge Edge Beta Google Chrome Google Chrome Beta Google(x86) Opera Software ChromePlus Iridium 7Star CentBrowser Chedot Vivaldi Kometa Elements Browser Epic Privacy Browser uCozMedia Sleipnir5 ChromiumViewer Citrio Coowon liebao QIP Surf Orbitum Comodo Dragon Comodo Yandex 360Browser Maxthon3 BraveSoftware K-Melon Torch Amigo Sputnik SalamWeb BlackHawk QQBrowser Slimjet GhostBrowser Xvast 360Chrome Kinza Xpom Nichrome Blisk UCBrowser Spoiler: Gecko browsers Firefox Waterfox K-Meleon Thunderbird IceDragon Cyberfox BlackHaw Pale Moon Spoiler: Auto Stealer Example https://image.socradar.com/screenshots/2023/09/29/f057555f-e4d7-480f-b2d8-5149c0d5e3fe.pnghttps://image.socradar.com/screenshots/2023/09/29/f4e699e2-e798-4c1b-9b6e-b5eab757f318.pnghttps://image.socradar.com/screenshots/2023/09/29/add014e6-6971-4a03-8634-149b91c038e4.pngSpoiler: Control Command https://image.socradar.com/screenshots/2023/09/29/32c799e1-074b-4cb2-92e3-9bc86f3ad71f.pnghttps://image.socradar.com/screenshots/2023/09/29/fb419557-0909-4d74-9601-a59f4ea06a37.png💥Builder💥 Self-delete after the first run. Add a self-startup entry. Implement a blue screen protection (immediately trigger a blue screen if the program is terminated; this feature requires administrator privileges). Automatically collect cookies, passwords, history, credit cards, bookmarks, as well as data from Telegram, Discord, Steam, and screenshots. Cease communication if a blacklisted process is detected. Activate keylogging. Manage the clipboard and replace preset wallet addresses. Implement anti-sandbox, anti-analysis, and anti-virtual machine measures. Request administrator privileges to run the program. Spoiler: Builder 6.png 💥Subscription Prices:💥 🔥1 month - $120 $39 🔥3 months - $360 $117 🔥6 months - $720 $234 🚀 Limited Time Offer: Get an Extra Month for Free! 🎁 🔥 We've got great news for you! For the first 30 customers, we're offering an exclusive deal – simply purchase our product and receive an additional month absolutely FREE! 🔥 Don't miss out on this incredible opportunity! Act fast and be one of the privileged few to benefit from this special promotion. 🔥 Grab your extended subscription today and elevate your experience with us! 🔥 Hurry, this offer won't last forever. Make the most of it! Thank you for choosing us. We appreciate your trust in our service. 💥 Accepted cryptocurrencies: 💥 BTC, ETH,TRC20 💥Contact: Telegram Channel:💥 Click Here 💥Terms of service: 💥 Click Here


dark web image
CraxsRAT V6.7 is on Sale

 In a hacker forum monitored by SOCRadar, an alleged CraxsRAT V6.7 sale is detected. https://image.socradar.com/screenshots/2023/09/20/6fc0139b-b5cd-4df1-bb68-dee092d2cc25.pnghttps://image.socradar.com/screenshots/2023/09/20/5a8e086b-975f-4bd5-b0b7-276ce15d4605.pnghttps://image.socradar.com/screenshots/2023/09/20/731a40ae-9476-438f-9b1e-9a6b4bc8d59f.pnghttps://image.socradar.com/screenshots/2023/09/20/be396d04-6df8-4699-a111-8be77dab5ee4.pnghttps://image.socradar.com/screenshots/2023/09/20/c1d06e69-3725-4930-82a7-0a4748bedf72.pngDETAILED INFORMATION AND TG FOR DEMO: @********** - !!️ 💯 ANDROID 13 WORKS AS A PROBLEMS IN ALL DEVICES. ✅ Whatsapp Click Reach. --------------------------------------------------------------- CraxsRat V6.7. New Update Attributes. File Manager 🟢Download/Install 🟢Secure Deletion Options 🟢Thumbnail/Gallery view . 🟢 Advanced search 🟢Copy/Paste 🟢Decrypt/Decode 🟢Hidden / Unhidden File 🟢 Set Wallpaper 💠Location 🟢Live Location 💠Live Screen Control 🟢Show Screen Live 🟢Control Screen (VNC) 🟢Use Keyboard 🟢 Lock / unlock screen 🟢Take silent screenshot 💠 Call Manager 🟢 Show Incoming/Outbound Call List 🟢Delete calls 💠 Send SMS 🟢 "Improve "Send SMS" feature 🟢 Send to multiple number 🟢Send from file to list 🟢Send to all people 💠 Application Manager 🟢Show Application List 🟢 Open Application 🟢 Remove Application 🟢 Disable / enable application 💠Keylogger 🟢Online/Live keylogger 🟢Offline keylogger 🟢Save to client folder 🟢Save everything 🟢even the pin of the screen lock 💠SMS Manager 🟢Show SMS List 🟢Delete SMS 💠Extra Tools 🟢 Search Number 🟢Download Linkten Apk 🟢Show Message on Screen 🟢 Clipboard 🟢 Open Link 🟢 Run Commands 🟢 Social Media Hunter 🟢 Stealer Gmail account 🟢 Ste aler Facebook account 🟢 Stealer 2FA Google 🟢Authenticator Code 💠 Permission Manager 🟢Not allowed/ not allowed Permissions checked 🟢 Ask for Permissions from the panel 🟢Request to enable accessibility 🟢 Draw in practice 💠 Account Manager 🟢 Application Email/Number Show Your Account 💠 Auto Clicker 🟢 On the screen Watch User Touch 🟢Save User Touchs 🟢 Repeat User Touchs 💠 Web Browser 🟢Web browser Monitor 🟢Web browser Html Viewer 🟢 Open link and track / save browser 💠 Injection in real app 🟢Silent control 🟢 Work like real practice 🟢 Ask for accessibility 🟢Anti killing 🟢 Anti removal 🟢 Wake up support screen 🟢 Support Permit manager 🟢Support screenshot 🟢Support lock screen 🟢 Recrypt APK 💠 Admin Rights 🟢Executive Rights Request 🟢 Lock screen 🟢 Delete Data ( delete everything ) 💠 Camera 🟢 Take Screen Image Camera 🟢 Open Front Camera 🟢Open Back Camera 🟢Take Photo 💠 Keyboard Manager (Beta) 🟢Phone keyboard 🟢Replace with Spyroid Rat custom keyboard 🟢 Support 3 languages “English – Arabic – Chinese” 🟢Record everything the victim enters 💠 Self Distraction 🟢 Automatic ( with super mode to remove apc and data 💠Microphone Capture 🟢 Listen Talk ✅ Save 💠 Notification Listener ✅Get All Notifications ✅Save 💠 Call Listener ✅Get all call notifications ✅ Save/remove call 💠 Screen Reader Skeleton view or Scan View ✅ Skip the black screen of banks and crypto application ✅Add logo window to easily copy anything from the screen


dark web image
Remote Administration Tool Sale is Detected

In a hacker forum monitored by SOCRadar, a new alleged remote administration tool sale is detected. https://image.socradar.com/screenshots/2023/09/14/33faee49-b62f-40ac-83b9-531ac2644ef5.pngHello everyone, you can find more information about software below. Remote Administration Tool Web admin panel with GUI + realtime remote clients communications One secure encrypted connection to the management server with multiple layers of https+rsa+aes Supports proxy connections over http, socks5 (also with credentials). You can create your own chain of proxy servers to connect to the management server (if your software is located deep in the network) Can be run as a service or as a current user. Universal plug-in system: command line socks5 tunnel file manager - view remote file system directories and download files mimikatz - command line as a plugin (possibly may be unstable using multiply commands with specify environment) vnc, hvnc - custom desktop viewer (under development) keylogger - simple keylogger via RegisterRawInputDevices() (under development) meterpreter - allows you to use the meterpreter module from metasploit framework (under development) screen[snapshots/recordings] - take screenshots and record user screen (under development) collection - complete system information with lost passwords (under development) webinjects - allow the operator to replace web traffic (under development) traffic tunneling - traffic tunneling without system tools (under development) Well tested under: Windows 7 with Service Pack 1 x64 - passed Windows Vista x64 - passed Windows 8.1 x64 - passed Windows 10 x64 - passed Windows 11 x64 - passed Windows Server 2008 x64 - passed Windows Server 2022 x64 - passed Windows 7 x86 - passed Windows 8.1 x86 - passed Windows 10 x86 - passed Minimum server requirements: VPS server with KVM virtualization 2 GB of RAM 1 Central processing unit Network any The TOR service for the licensing server. User Agreements and Terms: All parts of the software you use are at your own risk Messages to the support service about any warnings of the AV software after scanning the file will be ignored AV alerts can be considered at runtime if they can be reproduced in a laboratory environment. If any critical errors are found while using the software, we will try to fix them as soon as possible, depending on the type of error, and your license will be extended for the number of days from the date we receive the report (when we reproduce it in the laboratory) to the date of correction. We use escrow for every money transfer. Only you or your team can use this software package if you transfer the software to a third party, we will block your license. Refunds are not allowed Accepted payment: BTC, Monero. We not provide any bypass or privilege escalation. We not provide encryption for any binaries. After receiving the payment within the next 2 hours, you will have an archive with: web control panel - with plugins and license file of the selected plan x64/x86 executables - for execution on remote systems is about ~1Mb/~700Kb size Domain configuration file - configured for your domain (this is separate file must be copied to the specify folder on the system) Documentation - how install and use software and plugins. Plans for 30 days: Minimum Command Line File Manager Socks 5 Mimikatz 5 Domain Configurations Price: $2,990​ Since this is a raw project at the moment, and possibly can be unstable in some situations, we are adding an additional 30 days to your plan as a bonus. Thank you.









dark web image
New OHM Android RAT is Shared

  In a hacker forum monitored by SOCRadar, a new ohm android rat sharing is detected. https://image.socradar.com/screenshots/2023/08/07/aa198091-b2ba-4f53-abee-e4b83d70562e.pnghttps://image.socradar.com/screenshots/2023/08/07/feaccbd3-4959-4188-9f60-94b8b1208911.pngOHM Android RAT+Tutorial​ ========== "Android Remote Administration Tool" is what the abbreviation stands for. It is a kind of programme or application that enables someone to operate Android devices remotely, frequently without the user's knowledge or consent. While remote administration tools have their legal uses, such as in IT assistance or device monitoring, Android RATs are frequently linked to malevolent intent. Android RATs can be used by malicious actors to acquire unauthorised access to a victim's Android smartphone and carry out a variety of tasks, such as: Spying is the practise of gathering private data without the user's knowledge, such as messages, call records, and images. Keylogging is the act of recording keystrokes in order to obtain login information or other private data. Controlling a device's features remotely, such as dialling a number, sending an email, or starting an application. Copying files and data from the target device to the server of the attacker is data theft. Using compromised devices as part of a botnet to perform DDoS assaults on specific servers is known as distributed denial of service (DDoS). Ransomware: Software that locks a device and demands payment to unlock it. It's important to remember that it's unlawful and immoral to use Android RATs for nefarious purposes. These tools may be spread through a variety of techniques, including malicious websites, infected mobile applications, and email attachments. It's essential to keep your Android smartphone's software updated, only download apps from reputable stores like the Google Play Store, and use security software to find and remove any possible risks if you want to safeguard your device from attacks of this nature. Furthermore, maintaining good digital hygiene by avoiding dubious sites and files might reduce your vulnerability to Android RAT assaults. Features Read , Delete Internal Storage Files Download Any Media to your Device from Victims Device Get GPS location Get Network Provider Location Get all the system information of Victim Device Shows all the installed apps in Victims Device Open Any Website in Victims Device Make any folder in Victims Device Show any notification in Victims Device Delete any File or Folder From Victims Internal Storage Dump SMS Play music in Victims device Change Wallpaper Vibrate Device Turn On/Off Flash Light Text To Speach Feature Runs In Background Even App is Closed Support Android v5 + No Port Forwarding Needed Fully Undetectable WipeSdcard Shows Update Page , if you want. Pre Binded Whatsapp Discord: blackhatrussiaofficial#5904 Telegram: https://t.me/*** Download OHM Android RAT OHM Android RAT OHM Android RAT Download Link





dark web image
A News About the AVrecon Botnet Infects Over 70,000 Linux Routers is Shared

In a hacker forum monitored by SOCRadar, a news about the AVrecon botnet infects over 70,000 Linux routers is shared. https://image.socradar.com/screenshots/2023/07/25/89a9b028-0506-4b5f-9ec5-22f4ca85fa89.pngSince May 2021, the AVrecon Linux malware has infected more than 70,000 SOHO routers and made most of them part of a botnet that specializes in creating hidden residential proxies, according to Lumen Black Lotus Labs . Such proxies allow botnet operators to mask a wide range of malicious activities, from digital advertising fraud to password spraying attacks. Despite the fact that the AVrecon Remote Access Trojan (RAT) compromised more than 70,000 devices, only 40,000 of them became part of the botnet when the malware got a foothold on the device, according to the researchers. AVrecon managed to avoid detection almost completely for a long time, although it was first noticedback in May 2021 when malware targeted Netgear routers. Since then, the botnet has remained undetected for two years and has gradually grown, by now becoming one of the largest router-targeted botnets in the world. “We suspect that the attackers are focusing on SOHO devices, as they are less likely to be patched with various CVEs,” the experts say. “Instead of using the botnet for a quick profit, its operators took a more moderate approach and were able to go unnoticed for two years. Due to the stealthy nature of the malware, owners of infected machines rarely notice performance issues or loss of bandwidth.” After infection, the malware sends information about the hacked router to the built-in address of the command and control server. After contact is established, the hacked device is instructed to establish communication with another group of servers - the control servers of the second stage. The researchers found 15 such servers that have been operating since at least October 2021, based on x.509 certificate information. https://image.socradar.com/screenshots/2023/07/25/1934c043-f59c-4f0f-9c9c-f65e4539b2d4.pngExperts note that they managed to harm the work of AVrecon by resetting the routing for the botnet control server in their backbone network. In fact, this severed the connection between the botnet and its control infrastructure, which significantly limited the malware from performing malicious actions. “The use of encryption does not allow us to comment on the results of password spraying attacks, however, we blocked C&C servers and prevented traffic from passing through proxy servers, which made the botnet inactive in the Lumen backbone network,” the company writes.


dark web image
A New RAT Tool is on Sale

In a hacker forum monitored by SOCRadar, a new RAT tool sale is detected . https://image.socradar.com/screenshots/2023/07/12/284f0543-7cd7-4ba4-affc-36bbe6432cee.png  WrathRat *Multiple admins, Users, resellers, clients = one server. *Languages : English, Italian, Spanish *The Fastest RAT ever built, Period. 1- Super Admin panel : 1- You can create Users and Resellers 2- You can deactivate users/resellers 2- Resellers panel : You can create Users you want to rent the WrathRAT to 3- Users Panel : 1- Show device and their current LIVE Status (online or Offline) 2- Generate a new APK (Title, package name, Icon) 3- Block certain phone numbers (once the phone number is blocked the admin will be alert if the client has called the phone number) 4- Device notes (You can enter notes for each device) 5- Device Permissions 6- VNC 7- HVNC (Draws the important and not important texts, button, input fields, etc..) 9- Lock screen (shows a black screen that covers the whole screen and dims the light to make the device look like it's off) 10-Custom lock screen (You can design your own lock screen, top title, bottom title and an image "JPG or GIF") *The lock screen will also block the user touches on the device, and automatically closes the status bar if swiped down by the client 11- Call Logs (view, delete, insert calls) 12- Push notifications (able to send push notifications) 13- Apps (view, Open or uninstall device apps) 14- Block apps (Once an app is blocked it will never be opened again unless it's unblocked) 15- Keylogger (everything that is entered on the device will be shown in the panel) 16- Wakeup device (if the device screen is off you will be able to wake it up) 17- PIN/Pattern (Once this option is activated then you will be able to enter either the PIN or pattern in the device lock screen) 18- Format device 19- Call a number 20- SMS messages (View, send, delete SMS messages, a built-in SMS RAT) 21- Long click (You can perform a long click) 22- Swipe gestures 23- VNC and HVNC image quality (You can control the speed and the quality of the VNC and the HVNC) 24- Send Text (You can select any field via VNC or HVNC and you can enter any text in the selected field) 25- Remote Errors (If any error happens in the client device you will be able to view it in the panel) **There are many other features, the above are some of the functions of the WrathRAT. Payment options : 1- You can purchase the source codes. 2- You can rent the WrathRAT on a weekly basis payments.  




dark web image
A New RAT Tool is Shared

In a hacker forum monitored by SOCRadar, a new RAT tool sharing post is detected. https://image.socradar.com/screenshots/2023/06/23/f2b81d3f-8136-43ea-8620-c3954053ee00.pngSorillus Rat Cracked ========== Sorillus is Remote Access Trojan written in Java, that means that Server and Client is running on all operating systems (e.g. Windows, Linux, Mac). What is Sorillus Rat? Sorillus is a platform-independent R.A.T (Remote Access Trojan) written in Java, that can help a pentester to get full remote access to any device that can run Java. This rat can infect Linux devices as well as mac os and other os like widows. their developer is planning to make a new version that can hack android as well so its not just a cross-platform rat its stub is also cross-platform supported. Features System: •Pop-up: Display pop-up messages on the victims' screen. •Clipboard: Access and manage the victim's clipboard contents. •Open URL: Open a specified URL on the victim's browser. •Show IP: Retrieve and display the victim's IP address. •Report: Generate and send reports regarding system status and activities. •Shutdown: Remotely shut down the victim's system. Surveillance: •Screenshot: Capture screenshots of the victim's screen. •Remote desktop: View and control the victim's desktop remotely. •Remote cam: Access and view the victim's webcam remotely. •Remote microphone: Listen to audio from the victim's microphone remotely. •Key logger: Record and monitor keystrokes on the victim's system. [banner_200x200] {banner_200x200} [/banner_200x200] Fun: •Play sound: Play customized sounds on the victim's system. •Black screen: Turn the victim's screen black for privacy or focus purposes. •Image walk: Display a series of images in a slideshow format. Contact: •Text-Chat: Engage in text-based communication with the victim. Custom: •Alias: Assign customized aliases or names to victims for easier identification. •Notes: Add and manage personal notes or annotations for each victim. Debug: •Thread: Monitor and manage threads within the application. •Instances: Track and manage multiple instances of the application. Advanced Controls: •Remote Shell: Execute remote commands on the victim's system. •File Manager: Access and manage files and directories on the victim's system. •Processes: View and manage running processes on the victim's system. •Password Recovery: Recover passwords from supported browsers. •Plugins: Extend the functionality of the application with custom plugins. •Close Views: Close specific views or modules within the application. Installation: •Add Autostart: Add payload to the auto start folder so it will automatically start with startup apps. •Update Client: Update the victim's payload to the latest version. •Uninstall & Disconnect: Remove the client software and disconnect from the system. Connection: •Reconnect: Reconnect a connection with a previously connected victim. •Disconnect: Disconnect the connection with a victim. Whatsapp Discord: *****#***** Telegram: https://t.me/******


dark web image
PoC of RAT with Google Calender

In a hacker forum monitored by SOCRadar, a PoC share is detected for RAT with Google Calendar. https://image.socradar.com/screenshots/2023/06/22/732bb041-e4f3-4db3-b9dc-2be6f2b6a17d.pngGoogle Calendar RAT is a PoC of Command&Control (C2) over Google Calendar Events, This tool has been developed for those circumstances where it is difficult to create an entire red teaming infrastructure. To use GRC, only a Gmail account is required. The script creates a 'Covert Channel' by exploiting the event descriptions in Google Calendar. The target will connect directly to Google." How it works​ GCR attempt to connect to a valid shared Google Calendar link and after generating a unique ID check for any yet-to-be-executed commands. If it is not able to find any command, it creates a new one (fixed to "whoami") as a proof of connection. Every event is composed by two part: - The Title, which contains the unique ID, it means you can schedule multiple commands creating events having the same unique ID as name https://image.socradar.com/screenshots/2023/06/22/9c51ff59-1529-4f37-a2bb-db287ad7f64c.png- The Description, which contains the command to execute and the base64 encoded output using the pipe symbol as separator "|" https://image.socradar.com/screenshots/2023/06/22/c3a5ed58-3501-46a8-83a2-e5efa59f2a55.pngHow to use it​ Setup a Google service account and obtain the credentials.json file, place the file in the same directory of the script Create a new Google calendar and share it with the new created service account Edit the script to point your calendar address Once executed on the target machine an event with a unique target ID is automatically created autoexecuting the "whoami" command Use the following syntax in the event description for the communication => CLEAR_COMMAND|BASE64_OUTPUT Examples:​ "whoami|" "net users|" The date is fixed on May 30th, 2023. You can create unlimited events using the unique ID as the event name.


dark web image
A New RAT Malware is on Sale

In a hacker forum monitored by SOCRadar, a new RAT malware sale is detected. https://image.socradar.com/screenshots/2023/06/08/52561476-73d6-42c1-a88b-342c87ffa460.pngPrice $15K / month OR $100K Lifetime ABOUT THE PROJECT I want to introduce to you a private RAT with over 20,000 hours of development (since 2017). This RAT is called Dark-Gate. The goal of this malware service is to provide you all the necessary steps for distribute, hold & work with your bots from a single place. You can read about the Malware analysis from version 1.0 (5 years ago) here hxxps[://]www[.]fortinet[.]com/blog/threat-research/enter-the-darkgate-new-cryptocurrency-mining-and-ransomware-campaign Since then, every single feature has been meticulously curated to bypass AV's at runtime, during any possible moment PAYLOAD DELIVERY The builder; which is conveniently built into the server (GUI), includes the option for 6 different forms of payload delivery (so you never need to look elsewhere) LNK MSI  AUTOIT  (recommended) VBS  EXE + 2 DLL's & More to come FEATURES DOWNLOAD & EXECUTE ANY FILE DIRECTLY TO MEMORY (Native, .NET x86 and x64 files) HVNC & HANYDESK REMOTE DESKTOP HIGH QUALITY FILE MANAGER, WITH FAST FILE SEARCH AND IMAGE PREVIEW REVERSE PROXY KEYLOGGER WITH ADVANCED CONTROL PANEL (SUPPORTS EVEN UNICODE TEXT) PRIVILEGE ESCALATION (NORMAL TO ADMIN / ADMIN TO SYSTEM) WINDOWS DEFENDER EXCLUSION (IT WILL ADD C:/ FOLDER TO EXCLUSIONS ) DISCORD TOKEN, BROWSER HISTORY, COOKIE STEALER, SKYPE, BROWSER RECOVERY SPECIAL BROWSER EXTENSION FOR LOADING COOKIES DIRECTLY INTO A BROWSER PROFILE ADVANCED MANUAL INJECTION PANEL CHANGE DOMAINS AT ANY TIME FROM ALL BOTS (Global extension) CHANGE MINER DOMAIN AT ANY TIME FROM ALL BOTS (Global extension) REALTIME NOTIFICATION WATCHDOG (Global extension) ADVANCED CRYPTO MINER SUPPORTING CPU AND MULTIPLE GPU COINS (Global extension) ROOTKIT WITHOUT NEED OF ADMINISTRATOR RIGHTS OR .SYS FILES (COMPLETLY HIDE FROM TASKMANAGER) INVISIBLE STARTUP, IMPOSIBLE TO SEE THE STARTUP ENTRY EVEN WITH ADVANCED TOOLS



dark web image
New RAT is Shared

 In a hacker forum monitored by SOCRadar, a new RAT share is detected. https://image.socradar.com/screenshots/2023/06/07/8e930b3f-b88e-45eb-958e-38d27211d1b9.pngANARCHY PANEL RAT 4.7 Cracked ========== Tools:Icon Changer - Multi Binder [Icon - Assembly] | Fud Downloader [HTA-VBS-JS-WSF] - XHVNC - BlockClients Features: Information, Monitor [Mouse - Keyboard - AutoSave] , Run File [Disk - Link - Memory - Script - RunPE] , WebCam [AutoSave] , Microphone , System Sound , Open Url [Visible - Invisible] , TCP Connections , ActiveWindows , Process Manager , Clipboard Manager , Shell , Installed Programs , DDos Attack , VB.Net Compiler , Location Manager [GPS - IP] , File Manager , Client [Restart - Close - Uninstall - Update - Block - Note] Options: Power [Shutdown - Restart - Logoff] , BlankScreen [Enable - Disable] , TaskMgr [Enable - Disable] , Regedit [Enable - Disable] , UAC [Enable - Disable] , Firewall [Enable - Disable] ,.NET 3.5 Install , Disable Update , Run Shell, Invoke-BSOD Password Recovery : Bookmarks - Browsers - All-In-One - DicordTokens , FileZilla - ProduKey - WifiKeys - Email Clients [banner_200x200] {banner_200x200} [/banner_200x200] Pastime : CD ROOM [Open - Close] , DesktopIcons [Show - Hide] , SwapMouse [Swap - Normal] , TaskBar [Show - Hide] , Screen [ON-OFF] , Volume [Up - Down - MUTE] , Start [Show - Hide] , Clock [Show - Hide] , Text Speak , Explorer [Start - Kill] , Tray Notify [Show - Hide] Extra 1 : KeyLogger , Client Chat ,FileSeacher ,USB Spread , Bot killer , PreventSleep , Message Box ,Change Wallpaper , DeleteRestorePoints , UAC Bypass [RunAs - Cmstp - Computerdefaults - DismCore] , Run Clipper [All Cryptocurrencies] Extra 2 : Ransomware [Encrypt - Decrypt] , Ngrok Installer , HVNC , Hidden RDP ,WDDisable , W.D.Exclusion , Install [Startup - Registry - schtasks] Requirements : ? .Net Framework 4.5 [Controller] ? .NET Framework 4.0 [Client] Discord: ***#** Telegram: https://t.me/****


dark web image
GobRAT: Sophisticated Remote Access Trojan, Targeting Linux Routers, Emerges in Japan

In recent cybersecurity news, a new and highly sophisticated remote access trojan (RAT) called GobRAT has emerged, specifically targeting Linux routers. This Go language-based malware has been observed infecting routers in Japan, leveraging vulnerabilities and open WEBUIs to gain unauthorized access. This advanced malware has recently been identified by JPCERT/CC. Attack Flow  GobRAT's infiltration begins with the attacker identifying routers with publicly accessible web interfaces (WEBUIs) as potential targets. Through the exploitation of vulnerabilities within the router's scripts, the attacker gains a foothold and successfully infects the system with GobRAT. Central to this process is the Loader Script, which acts as the initial loader, responsible for performing a range of critical functions. https://image.socradar.com/screenshots/2023/05/29/67d6a31a-5502-48c1-9612-ee723a17ca68.pngFigure 1. Demonstrates how the attack progresses until GobRAT successfully infects the router. (Source: JPCERT/CC) The Loader Script assumes the role of a versatile utility, featuring functionalities such as script generation, GobRAT downloading, firewall disabling, creation of a persistent Start Script, and the execution of a Daemon Script. Notably, the Loader Script incorporates a hard-coded SSH public key, potentially offering a backdoor entry point for the attacker. Persistence is achieved through the registration of the Start Script's file path in the crontab, ensuring GobRAT's continuous operation. The Start Script assumes a pivotal role in executing GobRAT within the compromised router. Distinguishing itself with a unique characteristic, the script logs the system's startup time in a file named "restart.log." To obfuscate its presence, GobRAT is executed under the guise of a legitimate process, appearing as "apached." GobRAT boasts an extensive repertoire of 22 executed commands, dictated by instructions received from the C2 server. Tailored for router environments, the commands encompass functions such as obtaining machine information, executing reverse shells, file read/write operations, C2 reconfiguration, SOCKS5 proxy initiation, execution of files in specific directories, and even attempts to log in to services like SSH, Telnet, Redis, MySQL, and PostgreSQL running on other machines. You can read the JPCERT/CC analysis here. (https://blogs.jpcert.or.jp/en/2023/05/gobrat.html)IOCs C2 https[:]//su.vealcat[.]com http[:]//su.vealcat[.]com:58888 https[:]//ktlvz.dnsfailover[.]net http[:]//ktlvz.dnsfailover[.]net:58888 su[.]vealcat[.]com ktlvz[.]dnsfailover[.]net wpksi[.]mefound[.]com Hashes of Scripts (SHA-256) 060acb2a5df6560acab9989d6f019fb311d88d5511f3eda0effcbd9fc6bd12bb feaef47defd8b4988e09c8b11967e20211b54e16e6df488780e2490d7c7fa02a 3e44c807a25a56f4068b5b8186eee5002eed6f26d665a8b791c472ad154585d1 60bcd645450e4c846238cf0e7226dc40c84c96eba99f6b2cffcd0ab4a391c8b3 Malware files (SHA-256) a8b914df166fd0c94106f004e8ca0ca80a36c6f2623f87a4e9afe7d86b5b2e3a aeed77896de38802b85a19bfcb8f2a1d567538ddc1b045bcdb29cb9e05919b60 6748c22d76b8803e2deb3dad1e1fa7a8d8ff1e968eb340311fd82ea5d7277019 e133e05d6941ef1c2e3281f1abb837c3e152fdeaffefde84ffe25338fe02c56d 43dc911a2e396791dc5a0f8996ae77ac527add02118adf66ac5c56291269527e af0292e4de92032ede613dc69373de7f5a182d9cbba1ed49f589ef484ad1ee3e 2c1566a2e03c63b67fbdd80b4a67535e9ed969ea3e3013f0ba503cfa58e287e3 98c05ae70e69e3585fc026e67b356421f0b3d6ab45b45e8cc5eb35f16fef130c 300a92a67940cfafeed1cf1c0af25f4869598ae58e615ecc559434111ab717cd a363dea1efda1991d6c10cc637e3ab7d8e4af4bd2d3938036f03633a2cb20e88 0c280f0b7c16c0d299e306d2c97b0bff3015352d2b3299cf485de189782a4e25 f962b594a847f47473488a2b860094da45190738f2825d82afc308b2a250b5fb 4ceb27da700807be6aa3221022ef59ce6e9f1cda52838ae716746c1bbdee7c3d 3e1a03f1dd10c3e050b5f455f37e946c214762ed9516996418d34a246daed521 3bee59d74c24ef33351dc31ba697b99d41c8898685d143cd48bccdff707547c0 c71ff7514c8b7c448a8c1982308aaffed94f435a65c9fdc8f0249a13095f665e Enhancing Security Measures with SOCRadar Threat actors and Advanced Persistent Threat (APT) groups use various techniques and tools to accomplish their goals. Monitoring and comprehending these adversaries’ actions is critical. It offers valuable insights into their current Tactics, Techniques, and Procedures (TTPs) that may be more important than frequently altered Indicators of Compromise (IoCs). SOCRadar notifies you about threat groups’ actions and enables you to establish use cases that more efficiently identify and thwart malicious activities. https://image.socradar.com/screenshots/2023/05/29/2c1ea86f-46cd-4c77-a7eb-02c2de8cbad8.pngSOCRadar Threat Actor / Malware Tracking page


dark web image
A New Malware Share is Detected

In a hacker forum monitored by SOCRadar, a new RAT malware share is detected for Android. https://image.socradar.com/screenshots/2023/05/28/8877761f-0d79-4ce9-b8df-f04b28599240.pngEverspy Rat - The most powerful Rat for Android (Free, unrestricted use) Everspy 2023 is a powerful software designed for remote monitoring and control of a user's cell phone. With a comprehensive range of features, it allows the user to discreetly access and manipulate various aspects of the target device. From screen control and call recording to intercepting messages and accessing contacts, Everspy offers extensive control over the device's functionalities. Additionally, it includes advanced capabilities such as bypassing banking app security, capturing keystrokes through a keylogger, and even wiping data from the phone. Everspy operates stealthily, remaining undetectable while providing continuous updates for enhancements and fixes. It is a versatile tool for monitoring and managing targeted devices, ensuring maximum control and flexibility for various applications. https://image.socradar.com/screenshots/2023/05/28/d0a2c30f-1404-4082-b2d3-6228b09c742b.pngFeatures 1. Screen Control: Enables full control of the user's cell phone with touch interaction. 2. Ghost Mode (Available only in the Ultimate version): Displays an image on the user's device during control for discreet operation. 3. Ghost Mode Push Notification (Available only in the Ultimate version): Sends a push notification to the user's device, appearing as an Android update screen, prompting them to update while Ghost Mode is active. 4. Freeze Screen: Temporarily freezes the user's screen while maintaining control. 5. Bypass Banking App Security: Overcomes security measures in some banking applications that display a black screen to protect against remote access or screen recording. 6. PNG Exploit (No longer functional, currently unavailable): Formerly camouflaged malicious files as PNG image files, resulting in immediate device infection. 7. Automatic Permission Granting: All necessary permissions are automatically granted once Accessibility is activated. 8. Fully Undetectable APK: The malicious app installs without raising any alerts or triggering detection mechanisms. 9. Call Recording: Records all user phone calls offline. 10. Future Updates: Continuous updates and corrections are available within the Everspy folder. Simply run the Everspy Update file to download the latest enhancements and fixes. 11. Phisher: Displays fake apps, such as Gmail and Facebook, to capture user access. 12. Messages: Sends and intercepts SMS through the user's cell phone. 13. Contacts: Intercept and access contacts on the user's cell phone. 14. Camera: Accesses the front and rear cameras. 15. Wipe Data: Erases all data on the user's phone, restoring it to factory settings. 16. Edit Socket: Adds or removes TCP ports and IP addresses for server and client connections. 17. Download APK: Downloads files of various types to the user's device, excluding APK files. 18. Open a Link: Opens a specified link in the user's default browser. 19. Toaster: Displays a message on the user's screen. 20. Notifications: Intercepts notifications on the user's cell phone. 21. File Manager: Views and has full control over files on the user's device. 22. Applications: Views and opens apps on the user's device. 23. Keylogger: Captures and records the user's keystrokes, both offline and online. 24. Accounts: Views connected user accounts. 25. Call Logs: Views all outgoing and incoming calls on the user's device. 26. Info: Views device specifications and details of the user's cell phone. 27. Location: Provides precise location tracking of the user. Disclaimer The user assumes full and exclusive responsibility for the utilization of the everspy tool and acknowledges that any material, personal information, images, or other damages of any nature that may arise from the use of the everspy tool are solely their own responsibility. The Everspy Rat is a malicious software that requires all antivirus and firewall protections on the computer to be completely disabled before it can be used.


dark web image
New RAT is Shared

 In a hacker forum monitored by SOCRadar, a new RAT sharing is detected. https://image.socradar.com/screenshots/2023/05/23/468820d5-95f5-4aac-8e62-7a070a4e8733.pngRafel Rat+Tutorial Rafel is Remote Access Tool Used to Control Victims Using WebPanel With More Advance Features.. ========== Main Features : Admin Permission Add App To White List(Ignore Battery Optimisation) Looks Like Legit Mod App Runs In Background Even App is Closed(May not work on some Devices) Accessibility Feature(Cause Erros in some device --> ignore it) Support Android v5 - v12 No Port Forwarding Needed Acquire Wakelock Fully Undetectable Bypass PlayProtect WipeSdcard Lock Device Screen Change Wallpaper Ransomware Vibrate Device Delete Calls Logs Notify Victims Via Discord steal notifications(send through discord) Added AutoStart For (poco,xiaomi,oppo,vivo,LetV,Honor) Building Apk With Android Studio Open Project BlackMart in Android Studio Put the command.php link of server in InternalService.class class Now open NotificationListener.java and enter replace with your discord webhook url Build the Project Zipalign and sign the Apk... Building Apk with ApkEasyTool: Download BlackMartapk and decompile with Apktool and navigate to smali_classes2\com\velociraptor\raptor Open InternalService.smali Replace this with your Panel Url const-string v0, "https://your-webpanel-url/public/commands.php" Now open NotificationListener.smali and enter replace with your discord webhook url Building Server. Upload Files in server Folder to Your HostingPanel Now Open login.php Enter Username Hande Password Ercel Note : Make Sure your webhosting site uses Https and should have valid connection...I recommend 000webhost.com You can now use panel to send commands and also refresh after it Discord: ***#*** Telegram: https://t.me/**** Download Rafel Rat Rafel Rat Rafel Rat Download Link



Subscribe