campaign image
Xworm Enters Through the Door Follina Left Open
Xworm Follina RAT Trojan China

Security researchers have identified a new wave of attacks using XWorm malware that exploits the Follina vulnerability. XWorm is a government-sponsored remote access trojan (RAT), the Follina vulnerability is a critical vulnerability in Microsoft Windows systems that was first disclosed in 2022.

Domains Source Last Update
huhuwarcanoefestival.com SOCRadar 2023-05-31
assignments.one SOCRadar 2023-05-31
barricks.org SOCRadar 2023-05-31
template.one SOCRadar 2023-05-31
tpaerospace.one SOCRadar 2023-05-31
codezian.com SOCRadar 2023-05-31
ftp.mgcpakistan.com SOCRadar 2023-05-31
schedule.one SOCRadar 2023-05-31
purepowerinc.net SOCRadar 2023-05-31
templa.one SOCRadar 2023-05-31
myvigyan.com SOCRadar 2023-05-31
kbowlingslaw.com SOCRadar 2023-05-31
kanaskanas.com SOCRadar 2023-05-31
stnicholaschurch.ca SOCRadar 2023-05-31
zaminkaran.ir SOCRadar 2023-05-31
invoice.one SOCRadar 2023-05-31
depotejarat.ir SOCRadar 2023-05-31
list.one SOCRadar 2023-05-31
four-quadrant.one SOCRadar 2023-05-31
direct-trojan.com SOCRadar 2023-05-31
Hashes Source Last Update
de30f2ba2d8916db5ce398ed580714e2a8e75376f31dc346b0e3c898ee0ae4cf SOCRadar 2023-05-31
b79ff504eb6ec509b8b6b870dc2f0113825d859b SOCRadar 2023-05-31
8a60cadc9c823b64a80dd294c54e8c428f7ad12f846c245d3f3df1ba49cf3c62 SOCRadar 2023-05-31
63d46c697ee100fbe7388416033ea0509130e12f144decb1a913e3dc8b82f6ba SOCRadar 2023-05-31
e1d34ad42938a777d80f3ee4c206de14021f13ab79600168b85894fdb0867b3e SOCRadar 2023-05-31
d9a1c97646872be823bce7e37325f9869daa5593f3ced37024dc5188243639be SOCRadar 2023-05-31
9bf99fc32dc69f213812c3c747e8dd41fef63ad0fd0aec01a6b399aeb10a166a SOCRadar 2023-05-31
bdc52f8983b7f034e86d1628efab5faf974e8c33ea9c3bcab0fd09ca462f8322 SOCRadar 2023-05-31
40a1bbf6cc034748781b8980771a288f300e2f79dfff9e4ac70c261b3fe96e67 SOCRadar 2023-05-31
9cd785dbcceced90590f87734b8a3dbc066a26bd90d4e4db9a480889731b6d29 SOCRadar 2023-05-31
78542b48745136d9e77896ec77c7613c4386ad81 SOCRadar 2023-05-31
35369894fad416d9b89df08dad0c0c1848e2bba5 SOCRadar 2023-05-31
28d6b3140a1935cd939e8a07266c43c0482e1fea80c65b7a49cf54356dcb58bc SOCRadar 2023-05-31
328a12fdd6b485362befb392925282451d65aa23482584a49dd5b0e126218df7 SOCRadar 2023-05-31
73dc35d1fa8d1e3147a5fe6056e01f89847441ec46175ba60b24a56b7fbdf2f9 SOCRadar 2023-05-31
07251deafd605437a25d51428aade79255036d49 SOCRadar 2023-05-31
adb237144a52fc610984bd5ae8501271c5eef8ff49eff0a9d02adf4a5e36ad3b SOCRadar 2023-05-31
656a325adc19ae5c66741fcea36e01d1bc27e5a97b800778938af37f41f811fd SOCRadar 2023-05-31
4fc40af3b2e3f96e8013a7187e5cb4ce1a00a9528823f789cb8aca09c51143c6 SOCRadar 2023-05-31
11510279023a5399f5af0495d55eba28 SOCRadar 2023-05-31
8a8c3fc54739248f595ef1941a8a47936ff45fd102d7e8d23e9d4c358d5a0d24 SOCRadar 2023-05-31
ef106973aa35c6a1e39e05c6dde63e421794faba9109a2a9cb2f9cebd363e053 SOCRadar 2023-05-31
66109a8b85766255fa950425c7962781b61c934f6926ecdb9158d50ffb533147 SOCRadar 2023-05-31
59d72ff91e94a2c762285cce3bcb3e94e8d14608c2eeecacdcd6fe720c3ad5f2 SOCRadar 2023-05-31
b5661f5b3219090ba387814b7cf8d8095cfaaca9 SOCRadar 2023-05-31
6965d759dce865196f7e06ced845f0e387c4b9f63081b394c62a3c286356b411 SOCRadar 2023-05-31
7ddb331b1930f9cd3fd7e6de43119db0bbcb20bf6d23b1fbb60db12b0d983c2f SOCRadar 2023-05-31
1005feeff2ecfe6e53f53f63a2364de8418863d83e256322ca82e939dae95e45 SOCRadar 2023-05-31
16fe58bfaee64cce35f0f9470ccfd136ee9916f5befb7e599e21cff53d4506d5 SOCRadar 2023-05-31
4b9d11ad0a32fd2d76d4d8e9256f13df37b7628df9eb50b21dd11016d0a4ca22 SOCRadar 2023-05-31
ad13c0c0dfa76575218c52bd2a378ed363a0f0d5ce5b14626ee496ce52248e7a SOCRadar 2023-05-31
702631c91a8fe86b2e75f4a6b089d00b7762ff1b SOCRadar 2023-05-31
43f4eaefc6e71f8d30b2e3749475af51ce4d6740546706113cc4785b4410a14c SOCRadar 2023-05-31
814187405811f7d0e9593ae1ddf0a43ccbd9e8a37bee7688178487eeef3860c6 SOCRadar 2023-05-31
d4fdc73d563605cadf1ded9b644f21e8dae0f65870890357e5bc554bbc66bf74 SOCRadar 2023-05-31
8276104d8d47def986063b8fbafd82ad5f4cd23862ff9ede1231cefb35115a1b SOCRadar 2023-05-31
4f527d0d250607bcab4af2ba9783c2ce8e62fdc73fd52a33771d3b6df73c49e6 SOCRadar 2023-05-31
c8e326756cc1f95ff51ffe26471df16f4131fdbca2ed14f8c8d14e21010058b9 SOCRadar 2023-05-31
2ba7d799ee3ae3755fa3dc8921b3c57924fe90cb3df2b9bb02119a5eaa77399c SOCRadar 2023-05-31
df3f2f97383d4ae897b3197e8d07f474f651a053 SOCRadar 2023-05-31
15212428deeeabcd5b11a1b8383c654476a3ea1b19b804e4aca606fac285387f SOCRadar 2023-05-31
9c9f69ccc3d0063347ae372d82dc6082 SOCRadar 2023-05-31
f0942afa08c509f58b4b9f02cae4581ebf712f2f1763f1a2ffb8f9d964e335ae SOCRadar 2023-05-31
70352ca74fa8d31d6b1779b56c4fb16834d4e4c6 SOCRadar 2023-05-31
5ff75749c2d51435855afc23501105d259ed8213cd24085e1164f056ac2c2e05 SOCRadar 2023-05-31
54a55fcf5f574e9171aaf9af8aeb58c94d327dae48ed6a586393ed63aeb6841a SOCRadar 2023-05-31
97c6223e869e8bee159767d7b1f3562e747cf4b995800122edd1fc70df7a70b7 SOCRadar 2023-05-31
1b5ec95836cd52efa853ba3fa76d0849e4094b32048952a7ac0676d34f251776 SOCRadar 2023-05-31
ae5935f9e4bf6596d5b83a2d4325ab3f454867ebbad2c7f2d19694b676f23dd2 SOCRadar 2023-05-31
3c3e24c01a675b3b17bee9c8f560a33c3ecca8c44442fd5b3dd8c0f4429f279b SOCRadar 2023-05-31
43905bff6b7bdac9698c9109764e7ac3ffddddf59b9d278c648dfd8e6b1403ac SOCRadar 2023-05-31
6a1bac8fbb30f4b98da7f7ac190fb971bf91d15b41748bc63fd9cbddb96ef189 SOCRadar 2023-05-31
01407e324f0b8090467eded47a97acbdb3ef42d0f12820cd57b0bc5b87ffe510 SOCRadar 2023-05-31
1ae5589b6c358ff11a9555a7265ba5f0709be7a865e2cf51af04eb17b2a2ce18 SOCRadar 2023-05-31
a748f4e526c1a5fed7e57887ef951e451236ee3ad39cf6161d18e5c2230aca0b SOCRadar 2023-05-31
1791dd7a7c7d0688fac3626d57221ada157c57572cf9ed46ad4cab3d28dbaf91 SOCRadar 2023-05-31
3c45a698e45b8dbb1df206dec08c8792087619e54c0c9fc0f064bd9a47a84f16 SOCRadar 2023-05-31
b6b61511ea7a36015f8002922bc20ad1f42234ab SOCRadar 2023-05-31
75819879049e80de6376f146430e63a53fc4291d21f3db930ea872b82d07c77a SOCRadar 2023-05-31
cffb01d11245792b5498c051603a279b0ad1930d SOCRadar 2023-05-31
d92b31ddf25e30e7cc34239bf45c7ec913b713c4 SOCRadar 2023-05-31
bfebd31a5ae7bb79bcf7070d1d4b3496888446cff66301c4ff1f78f06d8aa601 SOCRadar 2023-05-31
e5a33b42b71f8ac1a5371888d11a0066b49a7f0c25fe74857fa07fb0c9bdff27 SOCRadar 2023-05-31
dfb8ba6c2ac264ac73f6d2c440d2c0744c043f1d8435bb798fef5380a649fc4e SOCRadar 2023-05-31
0afe54c016f4770ad2a8690ef9a06b1f53804215 SOCRadar 2023-05-31
41c68aecada65a15f4a8bea52cc25033a1b73ff7340cd3865d55c61ded566e81 SOCRadar 2023-05-31
222b1a425f75fc7998a0bbabd52277cd82bb5ec50b75f4fb67568b3b754f5406 SOCRadar 2023-05-31
6f3491d165ac055811596f2d64ad107247e19b333d79316c0ac96c93787c1e1a SOCRadar 2023-05-31
2bfae4b7bf4dd42b7f588699952b17260376da61c530d61eceb07783b8b93331 SOCRadar 2023-05-31
db1185f24c56cadec1c85a33b0efeb2d803ff00abf4c9df1e00d860683068415 SOCRadar 2023-05-31
a5ae1b866c5d8a7b3eb8427e686cf5d0264b809ed4491b47346542bf69caab65 SOCRadar 2023-05-31
9419d7a578338a714f976fb2b9eb320049422ec7059cedcc4a8baf144c4df41b SOCRadar 2023-05-31
b5da32a803b31d769d4d330e9c923d8c2dc5da1f SOCRadar 2023-05-31
0ff4aa2eb1cd681e3b77348af935bcfc56f4b7cae48bcd826000b7ff2b82b671 SOCRadar 2023-05-31
c9047fbd8b733a3f21fb28d261c9fa4eb089335a6457c6a47636cf51a86323f2 SOCRadar 2023-05-31
3acac1bb2a028372aad7f36510028823a36c5d63eeb3a72e0c5804adec204fce SOCRadar 2023-05-31
6ced4f98cd34cc2ea725273d566ea7b7 SOCRadar 2023-05-31
ae9821a3b0f44bf6be21aaa71274c9fef3b22b9e SOCRadar 2023-05-31
4de07012796040395015b6acfab5996cebb2099bfb362da9b303246580bc41b7 SOCRadar 2023-05-31
fbc916f065157cc5a13f22453c19f7dfecc3c228 SOCRadar 2023-05-31
efd195d8ef795e123bb1c1faee77459a781c003e SOCRadar 2023-05-31
90cb95264d0b555fe9a760de404196ac183a958c9cc1aad0689598e35fbb0c3b SOCRadar 2023-05-31
e6bb0019f6aa3583c42c8e197631af09f07bdc8739442893cc8086f298929e33 SOCRadar 2023-05-31
04ce543c01a4bace549f6be2d77eb62567c7b65edbbaebc0d00d760425dcd578 SOCRadar 2023-05-31
b4dd3e93356329c076c0d2cd5ac30a806daf46006bdb81199355952e9d949424 SOCRadar 2023-05-31
7a7e76553dafc2c1b6a0d804aa540ab7a80fd77b SOCRadar 2023-05-31
fc54858ae2e48c9dbe562f68107d1928 SOCRadar 2023-05-31
6e116713f7dbf7001384a4aa15ba193cf9f9f4e2e6685ead326317a78623a57e SOCRadar 2023-05-31
c443d754153180ebeee1106d5eecf1024e063413f3f92a29c6c95a08c6f2e633 SOCRadar 2023-05-31
35b9fd8856edd443a4e27727c54dd135e26220bd SOCRadar 2023-05-31
62156e5cb9fb9ede3150c39e17999d0242a8b1f9e704e09514734891beb0f78d SOCRadar 2023-05-31
ef5a7fc0c2a301b57f0723af97faea37374b91eb3b72d8ca6ffc09a095998bb2 SOCRadar 2023-05-31
c9c522936a3b964e6926bfb73adca91f0091094964ce7a768418a705ec871502 SOCRadar 2023-05-31
377fe4e55b6dde063c15c41389f3bb5aacf95443874bdcc0d02a44d6bd793780 SOCRadar 2023-05-31
e318c01fcd1f711fd063e845ca2431012086658f SOCRadar 2023-05-31
2725a14da90a6bcbfde174df8b0e95179b617aa14ec07a2d1fc71000310ad913 SOCRadar 2023-05-31
ed67cb8a6c44871ec6ffb6517d77b5e84f00b399 SOCRadar 2023-05-31
2db74e81e02dbb8b97a8d0ba9df53aaea21ce0fba15c1ecf84847489d9469141 SOCRadar 2023-05-31
2f5304b657b07839525d7d3ef50f192cde2bcab15b8fde2a6ff264f6412290df SOCRadar 2023-05-31
7ef65d74cf65128bb37a7b21729a1406 SOCRadar 2023-05-31
06e3abeed1bc98ed56d5587e9732c9d39ea41879c250dff68ce8815953fcf7ad SOCRadar 2023-05-31
207b87124f8abe2226251eb84f033e8642418fb1 SOCRadar 2023-05-31
6d86f36b2220e8d9580e6708856fa74f37f7aa35db1a708e17ecacf0de3d5d2e SOCRadar 2023-05-31
292b5a8c61eb79633590b6b13c0b41388ccad3535b55ed822b887d6d15d61be4 SOCRadar 2023-05-31
13bf9005b428f81a2f9b85fab4b52983ccf12c77582803bce9d6fcea635e78f3 SOCRadar 2023-05-31
0d17a7f60f7f5a6d5e00ed23635dd4998a5df307 SOCRadar 2023-05-31
4746941996305743c9d0bcb96ed4b2b930355cd8782098aa5600b42131314308 SOCRadar 2023-05-31
6005529195e6afac29d8c62091ee7990e92b7a80b391b03c34c8a8fbf019fce6 SOCRadar 2023-05-31
d909a2914e3706fcc141aa5d24afddd06595774d67a2900e256fbc65ff12c64f SOCRadar 2023-05-31
b3c3599ea42551a06aaefc917b72410833b52adb9f64f7cfe0bde4b17603bd43 SOCRadar 2023-05-31
30659ba72c4977c6017c45a45909442417c5bc07e7f3a2392b352d29494cb226 SOCRadar 2023-05-31
2283c3be89eb6cbf0e1579a6e398a5d1f81a50793fcca22fbc6cbdab53dc2d31 SOCRadar 2023-05-31
23b950b209cb16b084cad87c006dc7691c60dc40 SOCRadar 2023-05-31
15f8a879534143a4169c6ecd1d56132d1908443d SOCRadar 2023-05-31
9322af1c1772c02304576f64617aae1bf178297617f635d4d036ef1d317b1c7f SOCRadar 2023-05-31
3102e1238ac6ad9f97e4faaf2b24f6df4caedde9abcf7a5c04c309a38069494e SOCRadar 2023-05-31
4b9d2f4b80ef9578711c569524694905012a8080 SOCRadar 2023-05-31
8cb57a7e1e929c48716974edf55df2e9456d1443 SOCRadar 2023-05-31
0b0c70ee1612139cf7a83847cca805689aec9fbcc587a7ef8f26aa4fb9e71295 SOCRadar 2023-05-31
d0f0380f117ed5f00295d07a7f5d90a993e6f74f0f315c9ab74b146970b5061d SOCRadar 2023-05-31
ed7d361424df5f61f4f9e0a589a158cb750dec76f1d97b0e396a00c41f7ce167 SOCRadar 2023-05-31
1a517a25d55aae6af13d025b1d1edee7fb185b90155f30e195f58cbf4c6b36fe SOCRadar 2023-05-31
63adbabf3dfde36e745f4c42979260a2e946848c SOCRadar 2023-05-31
66c045eb61f2e589b1e27db284c9c518e5d0e87dcff25b096eede7047f7dd207 SOCRadar 2023-05-31
a447fee5372ccb5a4efc5daf48f497d921a7dc01d3d4f24dd3c4319da9f55ae4 SOCRadar 2023-05-31
9a7061a539333e9f833a589197a60258ebb820bba5f1f29d5b31453e8e392d0f SOCRadar 2023-05-31
55781d120a91b71da2c51ed3657a73e819493f38 SOCRadar 2023-05-31
c59f95d9c9ff830d33fb73c2a8b0ee8be6619b6823fc23210600b9fa88a8c9d4 SOCRadar 2023-05-31
e2b70c8552b38a6b8722d614254202c346190c6a187984a4450223eb536aaf4b SOCRadar 2023-05-31
f3e6621928875a322ee7230ccf186bdaa5609118c4a6d1c2f4026adfb8e88744 SOCRadar 2023-05-31
ec614c9bd5d20f97871c22b04c3e2abb95366aa5f6e5c6a4148d35ec7b8d0d62 SOCRadar 2023-05-31
ce4611b2d2e326ff7b37acdc10636f0dcd9439ba SOCRadar 2023-05-31
Ipv4s Source Last Update
212.193.30.230 SOCRadar 2023-05-31
5.42.199.235 SOCRadar 2023-05-31
95.216.102.32 SOCRadar 2023-05-31
154.12.234.207 SOCRadar 2023-05-31
109.107.179.248 SOCRadar 2023-05-31
193.149.185.229 SOCRadar 2023-05-31
198.23.172.90 SOCRadar 2023-05-31
165.22.48.183 SOCRadar 2023-05-31
209.126.2.34 SOCRadar 2023-05-31
172.245.45.213 SOCRadar 2023-05-31
212.87.204.83 SOCRadar 2023-05-31
45.133.174.122 SOCRadar 2023-05-31
179.43.187.241 SOCRadar 2023-05-31
209.126.83.213 SOCRadar 2023-05-31
154.12.250.38 SOCRadar 2023-05-31
Cves Source Last Update
CVE-2022-30190 SOCRadar 2023-05-31
Emails Source Last Update
Domains Insert Date
TTP's
The adversary is trying to get into your network.

Initial Access consists of techniques that use various entry vectors to gain their initial foothold within a network. Techniques used to gain a foothold include targeted spearphishing and exploiting weaknesses on public-facing web servers. Footholds gained through initial access may allow for continued access, like valid accounts and use of external remote services, or may be limited-use due to changing passwords.

Techniques
Techniques: 9
IDNameDescription
T1189Drive-by CompromiseAdversaries may gain access to a system through a user visiting a website over the normal course of browsing. With this technique, the user's web browser is typically targeted for exploitation, but adversaries may also use compromised websites for non-exploitation behavior such as acquiring Application Access Token.
T1190Exploit Public-Facing ApplicationAdversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network. The weakness in the system can be a software bug, a temporary glitch, or a misconfiguration.
T1133External Remote ServicesAdversaries may leverage external-facing remote services to initially access and/or persist within a network. Remote services such as VPNs, Citrix, and other access mechanisms allow users to connect to internal enterprise network resources from external locations. There are often remote service gateways that manage connections and credential authentication for these services. Services such as Windows Remote Management and VNC can also be used externally.
T1200Hardware AdditionsAdversaries may introduce computer accessories, networking hardware, or other computing devices into a system or network that can be used as a vector to gain access. Rather than just connecting and distributing payloads via removable storage (i.e. Replication Through Removable Media), more robust hardware additions can be used to introduce new functionalities and/or features into a system that can then be abused.
T1566PhishingAdversaries may send phishing messages to gain access to victim systems. All forms of phishing are electronically delivered social engineering. Phishing can be targeted, known as spearphishing. In spearphishing, a specific individual, company, or industry will be targeted by the adversary. More generally, adversaries can conduct non-targeted phishing, such as in mass malware spam campaigns.
.001Spearphishing AttachmentAdversaries may send spearphishing emails with a malicious attachment in an attempt to gain access to victim systems. Spearphishing attachment is a specific variant of spearphishing. Spearphishing attachment is different from other forms of spearphishing in that it employs the use of malware attached to an email. All forms of spearphishing are electronically delivered social engineering targeted at a specific individual, company, or industry. In this scenario, adversaries attach a file to the spearphishing email and usually rely upon User Execution to gain execution. Spearphishing may also involve social engineering techniques, such as posing as a trusted source.
.002Spearphishing LinkAdversaries may send spearphishing emails with a malicious link in an attempt to gain access to victim systems. Spearphishing with a link is a specific variant of spearphishing. It is different from other forms of spearphishing in that it employs the use of links to download malware contained in email, instead of attaching malicious files to the email itself, to avoid defenses that may inspect email attachments. Spearphishing may also involve social engineering techniques, such as posing as a trusted source.
.003Spearphishing via ServiceAdversaries may send spearphishing messages via third-party services in an attempt to gain access to victim systems. Spearphishing via service is a specific variant of spearphishing. It is different from other forms of spearphishing in that it employs the use of third party services rather than directly via enterprise email channels.
T1091Replication Through Removable MediaAdversaries may move onto systems, possibly those on disconnected or air-gapped networks, by copying malware to removable media and taking advantage of Autorun features when the media is inserted into a system and executes. In the case of Lateral Movement, this may occur through modification of executable files stored on removable media or by copying malware and renaming it to look like a legitimate file to trick users into executing it on a separate system. In the case of Initial Access, this may occur through manual manipulation of the media, modification of systems used to initially format the media, or modification to the media's firmware itself.
T1195Supply Chain CompromiseAdversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise.
.001Compromise Software Dependencies and Development ToolsAdversaries may manipulate software dependencies and development tools prior to receipt by a final consumer for the purpose of data or system compromise. Applications often depend on external software to function properly. Popular open source projects that are used as dependencies in many applications may be targeted as a means to add malicious code to users of the dependency.
.002Compromise Software Supply ChainAdversaries may manipulate application software prior to receipt by a final consumer for the purpose of data or system compromise. Supply chain compromise of software can take place in a number of ways, including manipulation of the application source code, manipulation of the update/distribution mechanism for that software, or replacing compiled releases with a modified version.
.003Compromise Hardware Supply ChainAdversaries may manipulate hardware components in products prior to receipt by a final consumer for the purpose of data or system compromise. By modifying hardware or firmware in the supply chain, adversaries can insert a backdoor into consumer networks that may be difficult to detect and give the adversary a high degree of control over the system. Hardware backdoors may be inserted into various devices, such as servers, workstations, network infrastructure, or peripherals.
T1199Trusted RelationshipAdversaries may breach or otherwise leverage organizations who have access to intended victims. Access through trusted third party relationship abuses an existing connection that may not be protected or receives less scrutiny than standard mechanisms of gaining access to a network.
T1078Valid AccountsAdversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Compromised credentials may be used to bypass access controls placed on various resources on systems within the network and may even be used for persistent access to remote systems and externally available services, such as VPNs, Outlook Web Access, network devices, and remote desktop. Compromised credentials may also grant an adversary increased privilege to specific systems or access to restricted areas of the network. Adversaries may choose not to use malware or tools in conjunction with the legitimate access those credentials provide to make it harder to detect their presence.
.001Default AccountsAdversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Default accounts are those that are built-into an OS, such as the Guest or Administrator accounts on Windows systems. Default accounts also include default factory/provider set accounts on other types of systems, software, or devices, including the root user account in AWS and the default service account in Kubernetes.
.002Domain AccountsAdversaries may obtain and abuse credentials of a domain account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Domain accounts are those managed by Active Directory Domain Services where access and permissions are configured across systems and services that are part of that domain. Domain accounts can cover users, administrators, and services.
.003Local AccountsAdversaries may obtain and abuse credentials of a local account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Local accounts are those configured by an organization for use by users, remote support, services, or for administration on a single system or service.
.004Cloud AccountsAdversaries may obtain and abuse credentials of a cloud account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Cloud accounts are those created and configured by an organization for use by users, remote support, services, or for administration of resources within a cloud service provider or SaaS application. In some cases, cloud accounts may be federated with traditional identity management systems, such as Windows Active Directory.
Remediations
The malware remediation process starts with personnel identifying and reporting malware and any security gaps that create opportunities for malware attacks. 
Investing in resources to train personnel on reporting suspected malware can significantly reduce the risk of malware attacks. Specifically, new hire onboarding and refresher training processes help educate personnel about malware remediation steps. 
Reporting Suspected Phishing Attacks
Threat actors commonly exploit phishing attacks to deploy malware on targets’ devices (e.g., computers, phones, tablets). Phishing emails are one of the most common sources of malware attacks.
The essential malware remediation steps for reporting phishing attacks include:

Identify signs of phishing – Training personnel on how to identify common phishing attempts will help mitigate malware attacks. This is an essential cybersecurity practice for preventing phishing, as the attack targets people rather than network or security infrastructure. Personnel can identify phishing attacks based on:
Malicious links in emails, leading to unsecured websites
Links to compromised forms that request users to enter sensitive credentials
Emails of an urgent nature, albeit likely containing wording and grammatical errors
Flag phishing attempts – Once your employees have identified phishing attempts, they must flag the phishing emails by:
Forwarding emails to an internal cybersecurity team for further action
Moving emails directly to a spam folder for internal security review
Blocking sender email addresses used in previous phishing attempts
Submit phishing reports – You can also establish a security policy for employees to report phishing emails to relevant cybersecurity regulators, including:
The US Computer Emergency and Readiness Team (US-CERT), which partners with the Anti-Phishing Working Group (APWG)
Google’s Safe Browsing phishing reporting tool
Federal Trade Commission’s (FTC) fraud reporting tool
FBI’s internet crime reporting tool
Establishing a security policy for your employees to report phishing attacks is essential to the malware remediation process.
Conclusions 
Malware developers with little or no responsibilities can create malicious programs and sell them on various forums for monetary gain. Threat actors are provided with highly impactful and dangerous features, such as ransomware and HVNC modules to attract more customers. You must have a system in place to keep yourself abreast with TTPs of newly launched threats or if there are new attack techniques adopted by existing cybercriminal groups.

File Name Description Actions
12.ATIP_Analysis Report on Follina.CVE-2022-30190.Vulnerability_20220627.pdf Follina Report
APT Name Aliases Target Countries Source Countries Total IOCs
timeline History Timeline

  • Wed, 31 May 2023 09:26:48 GMT
    New Report Added

    12.ATIP_Analysis%20Report%20on%20Follina.CVE-2022-30190.Vulnerability_20220627.pdf report added.

  • Wed, 31 May 2023 09:22:56 GMT
    New IOC's Added

    Total 231 IOC's added.

  • Wed, 31 May 2023 09:09:37 GMT
    Created!

    New Campaign created.

  • Fri, 12 May 2023 00:00:00 GMT
    XWorm Malware Exploits Follina Vulnerability in New Wave of Attacks
    Cybersecurity researchers have discovered an ongoing phishing campaign that makes use of a unique attack chain to deliver the XWorm malware on targeted systems.
  • Mon, 24 Apr 2023 00:00:00 GMT
    Malicious PDF delivering XWORM 3.1 Payload
    Delivering Malicious PDF documents as email attachments is the easiest way for threat actors to get into the victim’s machine be it phishing, or embedded scripts for delivering malware payloads.
    This time SonicWall Capture Labs threat research team has observed PDF being used to deliver Xworm 3.1 malware.Go to Link
  • Thu, 20 Apr 2023 00:00:00 GMT
    XWORM RAT Security researchers warn of rapid malware proliferation
    Security experts warn about a fast-spreading malware with disturbing features. Some computers have already been infected.Go to Link
  • Tue, 30 Aug 2022 00:00:00 GMT
    XWorm RAT Found in New EvilCoder Project
    A global threat intelligence provider studied Evilcoder, a project meant for selling malicious tools to execute malicious HNVC modules and ransomware attacks online. Furthermore, it was found distributing XWorm RAT. Go to Link
     
newspaper Dark Web News










dark web image
Xeno RAT is Shared

In a hacker forum monitored by SOCRadar, Xeno RAT share is detected. https://image.socradar.com/screenshots/2023/11/01/ff07dadc-7690-411a-9b40-262d3cbdc2e3.pngWelcome to the official thread for Xeno Rat's release, a powerful and versatile remote access tool developed in C# for Windows 10 and 11. This open-source project is designed to provide you with a stable, feature-rich, and easy-to-use solution for remote computer control. Key Features Xeno Rat offers a wide range of features that set it apart from other RATs: - HVNC (Hidden Virtual Network Computing): Enjoy this premium feature for free, enhancing your remote access capabilities. - Live Microphone: Real-time audio surveillance, perfect for various use cases. - Socks5 Reverse Proxy: Proxy your internet traffic through the client with ease. - Regular Updates: The project is actively maintained, and new features are continuously added. - Built from Scratch: Xeno Rat is developed from the ground up, ensuring a unique approach to remote access. Some other features - Listen on multiple ports - Chat - Bluescreen - Message Box - Fun menu (monitor on/off, CD tray open/close, and more) - Webcam - Key Logger - Screen Control - Process Manager - File Manager - Shell - And plenty more... Legal Disclaimer Xeno Rat is intended for educational purposes only. The developer is not responsible for any misuse or damage caused by this tool. Always stay within legal and ethical boundaries. For more details and to access the project, visit Xeno Rat on GitHub. Explore the code and contribute to its development! For anyone who wants to donate, I also included a txt file with the exact same link.


dark web image
Freedom RAT is on Sale

In a hacker forum monitored by SOCRadar, a new alleged RAT sale is detected. https://image.socradar.com/screenshots/2023/10/28/b66cb6f2-3349-4e24-b2af-fa4aa2438c55.pngRemote Administrative Tool ( R.A.T ) written fully in C language ( no dependencies ) - 40 KB. Functions { Fun : - Simple MessageBox popup - Beep Sound - Empty recycle bin Power Management : - Shutdown - Restart - Sleep File Manager : - Download - Execute - Delete - Upload Task Manager : - Kill process Stealer : - Browser logins ( URL / Logins URL / Username / Password ) Screen : - Single Screnshot function ( capture all monitors on target machine - Vertical/Horizontal ) Reverse Functions : - Reverse command prompt - Reverse powershell Clipboard : - Get clipboard content - Set clipboard content Keylogger : - Live keylogger } Functions (included in Builder) { Clipper : - Bitcoin Format -> P2PKH, P2SH, BECH32/Segwit - Ethereum - Litecoin Error Message : - Fully customizable first boot error MessageBox ( Title, Content, Icon, Buttons ) Installation Folder : - Choose between 4 different path Additional : - Disable Task Manager - Persistence - Mutex - Strong anti VM + anti debug } PRICE : 1 BTC ( Garant is welcome ) COPY AVAILABLE : 1/1 Runtime Result : hxxps[://]checkzilla[.]io/scan/fa06e69c-be42-4096-829b-0b88c6d079b6 Scantime Result : hxxps[://]avcheck[.]net/id/MdhKDasbakAb What will you get after purchase ? - Full source code of client side AND also server side + builder. - Full support for installation to your server. - I am ready to explain every line of code 1 by 1 and answer all your questions ( concerning the product ). For any question concerning this product send me a PM, I will be happy to answer you. Server side screenshot : https://image.socradar.com/screenshots/2023/10/28/c45d2cb9-f616-4020-904f-8ec3a4af9599.pnghttps://image.socradar.com/screenshots/2023/10/28/74623855-ddce-4e55-ae5f-8680d7a7d85f.png


dark web image
Source Code of Linux Rootkit is on Sale

In a hacker forum monitored by SOCRadar, a new alleged source code sale is detected for Linux Rootkit. https://image.socradar.com/screenshots/2023/10/28/8d3febc9-5350-4a00-9578-842f8661ea4e.pngSyM Linux Rootkit SyM is a universal user-mode Linux rootkit that will sustainability hold root persistence across all Linux kernel versions, and will successfully bypass any EDR or rootkit detection software. SyM will also come with a plethora of features capable of stealing important files such as SQL database backups, .git, and other configuration files; And much more. Along with being the first of it's kind SyM implements some API system call hooking that has never been seen before which makes it such a unique, and undetectable rootkit experience. C&C / C2 / backdoor methods: ICMP backdoor Use a unique magic identifier to open a reverse shell accept ( ) backdoor Use a unique magic identify to open a listening TCP server PAM backdoor Direct interactive SSH backdoor with custom hidden port, username, and password Internal System Logging: SSH Log Log all incoming and outgoing SSH authorizations in plaintext by hooking pam_vprompt, read, and write API calls Execution Log Log all normal ( including root ) user command execution flow Hiding Self / Rootkit Hide all files, processes, open ports, and all connections based on unique magic identifier Hide process map files, to prevent direct mapping of process and being able to identify rootkit Hide any file, or directory of choice All rootkit master created directories and files will be kept track of, so no need to manually add or edit anything to keep it hidden! Note: It is possible to forge or fake as any other installed software, service, or similar EDR Bypass / Evasion Hooking API calls to hide it's self from / proc * / * maps as well as many other system locations Bypassing SELinux and GRSec Bypasses and hides from SentinelOne and other similar software File Stealer By scanning and keeping tracking of a user made list of interesting files and directories the rootkit is capable of stealing anything on the fly and uploading it directly to an external server Stuff like SQL databases are stolen automatically by default! Pricing Source Code: $7500 Contact Telegram



dark web image
Anubis Stealer is on Sale

In a hacker forum monitored by SOCRadar, a new stealer tool Anubis Stealer sale is detected. https://image.socradar.com/screenshots/2023/09/29/cf4d864b-4fc9-4fd9-ac67-fc693dbdb0bb.pngAnubis Stealer 💥Descriptive 💥 Program for remotely controlling Windows computers via a Telegram bot. Written in C++ language This remote access tool stands out for its exceptional features and high reliability. It supports Windows 10 and 11, both 32-bit and 64-bit operating systems. The software is developed in C/C++, featuring an independent Stub that doesn't rely on the .NET Framework. It boasts a rich set of functionalities, including cookie and password recovery, file management, remote execution, real-time and offline keylogging, remote shell access, and process management. Additionally, it supports obtaining TOKENs for Discord, Telegram, and Steam. The clipboard feature automatically replaces cryptocurrency addresses, enhancing privacy. Importantly, it includes an anti-sandbox feature that detects and counters various virtual environments and analysis tools. The Stub, ranging in size from 500KB to 600KB, ensures efficiency. In summary, this tool is user-friendly, offers a wide range of functionalities, and is suitable for various purposes, whether you need cookie recovery, password management, file transfer, or more. 💥Features💥 Cookies Recovery: This function allows you to recover cookies from popular Chrome and Firefox browsers in JSON format. Password Recovery: This feature enables the recovery of passwords from various browsers (Chrome, Firefox, Edge.) 50+ browsers。 File Manager: With the File Manager, you can upload and download files at high speed, as well as execute and delete files on the target computer. Download & Execute: This function allows you to execute files on remote computers. Remote Shell: This function lets you send commands to the remote computer's command prompt (CMD). Process Manager: With the Process Manager, you can view and terminate processes on the remote computer. TOKEN: Discord, Telegram, and Steam. Clipboard: Automatically replaces cryptocurrency addresses in the clipboard with a predefined address, likely to perform address substitution. AntiSandbox: This feature can detect the presence of virtualization or sandboxing environments like Virtualbox, VirtualMachine, Cuckoo, Anubis, ThreatExpert, Sandboxie, QEMU, and analysis tools. Spoiler: Chromium browsers Edge Edge Beta Google Chrome Google Chrome Beta Google(x86) Opera Software ChromePlus Iridium 7Star CentBrowser Chedot Vivaldi Kometa Elements Browser Epic Privacy Browser uCozMedia Sleipnir5 ChromiumViewer Citrio Coowon liebao QIP Surf Orbitum Comodo Dragon Comodo Yandex 360Browser Maxthon3 BraveSoftware K-Melon Torch Amigo Sputnik SalamWeb BlackHawk QQBrowser Slimjet GhostBrowser Xvast 360Chrome Kinza Xpom Nichrome Blisk UCBrowser Spoiler: Gecko browsers Firefox Waterfox K-Meleon Thunderbird IceDragon Cyberfox BlackHaw Pale Moon Spoiler: Auto Stealer Example https://image.socradar.com/screenshots/2023/09/29/f057555f-e4d7-480f-b2d8-5149c0d5e3fe.pnghttps://image.socradar.com/screenshots/2023/09/29/f4e699e2-e798-4c1b-9b6e-b5eab757f318.pnghttps://image.socradar.com/screenshots/2023/09/29/add014e6-6971-4a03-8634-149b91c038e4.pngSpoiler: Control Command https://image.socradar.com/screenshots/2023/09/29/32c799e1-074b-4cb2-92e3-9bc86f3ad71f.pnghttps://image.socradar.com/screenshots/2023/09/29/fb419557-0909-4d74-9601-a59f4ea06a37.png💥Builder💥 Self-delete after the first run. Add a self-startup entry. Implement a blue screen protection (immediately trigger a blue screen if the program is terminated; this feature requires administrator privileges). Automatically collect cookies, passwords, history, credit cards, bookmarks, as well as data from Telegram, Discord, Steam, and screenshots. Cease communication if a blacklisted process is detected. Activate keylogging. Manage the clipboard and replace preset wallet addresses. Implement anti-sandbox, anti-analysis, and anti-virtual machine measures. Request administrator privileges to run the program. Spoiler: Builder 6.png 💥Subscription Prices:💥 🔥1 month - $120 $39 🔥3 months - $360 $117 🔥6 months - $720 $234 🚀 Limited Time Offer: Get an Extra Month for Free! 🎁 🔥 We've got great news for you! For the first 30 customers, we're offering an exclusive deal – simply purchase our product and receive an additional month absolutely FREE! 🔥 Don't miss out on this incredible opportunity! Act fast and be one of the privileged few to benefit from this special promotion. 🔥 Grab your extended subscription today and elevate your experience with us! 🔥 Hurry, this offer won't last forever. Make the most of it! Thank you for choosing us. We appreciate your trust in our service. 💥 Accepted cryptocurrencies: 💥 BTC, ETH,TRC20 💥Contact: Telegram Channel:💥 Click Here 💥Terms of service: 💥 Click Here


dark web image
CraxsRAT V6.7 is on Sale

 In a hacker forum monitored by SOCRadar, an alleged CraxsRAT V6.7 sale is detected. https://image.socradar.com/screenshots/2023/09/20/6fc0139b-b5cd-4df1-bb68-dee092d2cc25.pnghttps://image.socradar.com/screenshots/2023/09/20/5a8e086b-975f-4bd5-b0b7-276ce15d4605.pnghttps://image.socradar.com/screenshots/2023/09/20/731a40ae-9476-438f-9b1e-9a6b4bc8d59f.pnghttps://image.socradar.com/screenshots/2023/09/20/be396d04-6df8-4699-a111-8be77dab5ee4.pnghttps://image.socradar.com/screenshots/2023/09/20/c1d06e69-3725-4930-82a7-0a4748bedf72.pngDETAILED INFORMATION AND TG FOR DEMO: @********** - !!️ 💯 ANDROID 13 WORKS AS A PROBLEMS IN ALL DEVICES. ✅ Whatsapp Click Reach. --------------------------------------------------------------- CraxsRat V6.7. New Update Attributes. File Manager 🟢Download/Install 🟢Secure Deletion Options 🟢Thumbnail/Gallery view . 🟢 Advanced search 🟢Copy/Paste 🟢Decrypt/Decode 🟢Hidden / Unhidden File 🟢 Set Wallpaper 💠Location 🟢Live Location 💠Live Screen Control 🟢Show Screen Live 🟢Control Screen (VNC) 🟢Use Keyboard 🟢 Lock / unlock screen 🟢Take silent screenshot 💠 Call Manager 🟢 Show Incoming/Outbound Call List 🟢Delete calls 💠 Send SMS 🟢 "Improve "Send SMS" feature 🟢 Send to multiple number 🟢Send from file to list 🟢Send to all people 💠 Application Manager 🟢Show Application List 🟢 Open Application 🟢 Remove Application 🟢 Disable / enable application 💠Keylogger 🟢Online/Live keylogger 🟢Offline keylogger 🟢Save to client folder 🟢Save everything 🟢even the pin of the screen lock 💠SMS Manager 🟢Show SMS List 🟢Delete SMS 💠Extra Tools 🟢 Search Number 🟢Download Linkten Apk 🟢Show Message on Screen 🟢 Clipboard 🟢 Open Link 🟢 Run Commands 🟢 Social Media Hunter 🟢 Stealer Gmail account 🟢 Ste aler Facebook account 🟢 Stealer 2FA Google 🟢Authenticator Code 💠 Permission Manager 🟢Not allowed/ not allowed Permissions checked 🟢 Ask for Permissions from the panel 🟢Request to enable accessibility 🟢 Draw in practice 💠 Account Manager 🟢 Application Email/Number Show Your Account 💠 Auto Clicker 🟢 On the screen Watch User Touch 🟢Save User Touchs 🟢 Repeat User Touchs 💠 Web Browser 🟢Web browser Monitor 🟢Web browser Html Viewer 🟢 Open link and track / save browser 💠 Injection in real app 🟢Silent control 🟢 Work like real practice 🟢 Ask for accessibility 🟢Anti killing 🟢 Anti removal 🟢 Wake up support screen 🟢 Support Permit manager 🟢Support screenshot 🟢Support lock screen 🟢 Recrypt APK 💠 Admin Rights 🟢Executive Rights Request 🟢 Lock screen 🟢 Delete Data ( delete everything ) 💠 Camera 🟢 Take Screen Image Camera 🟢 Open Front Camera 🟢Open Back Camera 🟢Take Photo 💠 Keyboard Manager (Beta) 🟢Phone keyboard 🟢Replace with Spyroid Rat custom keyboard 🟢 Support 3 languages “English – Arabic – Chinese” 🟢Record everything the victim enters 💠 Self Distraction 🟢 Automatic ( with super mode to remove apc and data 💠Microphone Capture 🟢 Listen Talk ✅ Save 💠 Notification Listener ✅Get All Notifications ✅Save 💠 Call Listener ✅Get all call notifications ✅ Save/remove call 💠 Screen Reader Skeleton view or Scan View ✅ Skip the black screen of banks and crypto application ✅Add logo window to easily copy anything from the screen


dark web image
Remote Administration Tool Sale is Detected

In a hacker forum monitored by SOCRadar, a new alleged remote administration tool sale is detected. https://image.socradar.com/screenshots/2023/09/14/33faee49-b62f-40ac-83b9-531ac2644ef5.pngHello everyone, you can find more information about software below. Remote Administration Tool Web admin panel with GUI + realtime remote clients communications One secure encrypted connection to the management server with multiple layers of https+rsa+aes Supports proxy connections over http, socks5 (also with credentials). You can create your own chain of proxy servers to connect to the management server (if your software is located deep in the network) Can be run as a service or as a current user. Universal plug-in system: command line socks5 tunnel file manager - view remote file system directories and download files mimikatz - command line as a plugin (possibly may be unstable using multiply commands with specify environment) vnc, hvnc - custom desktop viewer (under development) keylogger - simple keylogger via RegisterRawInputDevices() (under development) meterpreter - allows you to use the meterpreter module from metasploit framework (under development) screen[snapshots/recordings] - take screenshots and record user screen (under development) collection - complete system information with lost passwords (under development) webinjects - allow the operator to replace web traffic (under development) traffic tunneling - traffic tunneling without system tools (under development) Well tested under: Windows 7 with Service Pack 1 x64 - passed Windows Vista x64 - passed Windows 8.1 x64 - passed Windows 10 x64 - passed Windows 11 x64 - passed Windows Server 2008 x64 - passed Windows Server 2022 x64 - passed Windows 7 x86 - passed Windows 8.1 x86 - passed Windows 10 x86 - passed Minimum server requirements: VPS server with KVM virtualization 2 GB of RAM 1 Central processing unit Network any The TOR service for the licensing server. User Agreements and Terms: All parts of the software you use are at your own risk Messages to the support service about any warnings of the AV software after scanning the file will be ignored AV alerts can be considered at runtime if they can be reproduced in a laboratory environment. If any critical errors are found while using the software, we will try to fix them as soon as possible, depending on the type of error, and your license will be extended for the number of days from the date we receive the report (when we reproduce it in the laboratory) to the date of correction. We use escrow for every money transfer. Only you or your team can use this software package if you transfer the software to a third party, we will block your license. Refunds are not allowed Accepted payment: BTC, Monero. We not provide any bypass or privilege escalation. We not provide encryption for any binaries. After receiving the payment within the next 2 hours, you will have an archive with: web control panel - with plugins and license file of the selected plan x64/x86 executables - for execution on remote systems is about ~1Mb/~700Kb size Domain configuration file - configured for your domain (this is separate file must be copied to the specify folder on the system) Documentation - how install and use software and plugins. Plans for 30 days: Minimum Command Line File Manager Socks 5 Mimikatz 5 Domain Configurations Price: $2,990​ Since this is a raw project at the moment, and possibly can be unstable in some situations, we are adding an additional 30 days to your plan as a bonus. Thank you.










dark web image
New OHM Android RAT is Shared

  In a hacker forum monitored by SOCRadar, a new ohm android rat sharing is detected. https://image.socradar.com/screenshots/2023/08/07/aa198091-b2ba-4f53-abee-e4b83d70562e.pnghttps://image.socradar.com/screenshots/2023/08/07/feaccbd3-4959-4188-9f60-94b8b1208911.pngOHM Android RAT+Tutorial​ ========== "Android Remote Administration Tool" is what the abbreviation stands for. It is a kind of programme or application that enables someone to operate Android devices remotely, frequently without the user's knowledge or consent. While remote administration tools have their legal uses, such as in IT assistance or device monitoring, Android RATs are frequently linked to malevolent intent. Android RATs can be used by malicious actors to acquire unauthorised access to a victim's Android smartphone and carry out a variety of tasks, such as: Spying is the practise of gathering private data without the user's knowledge, such as messages, call records, and images. Keylogging is the act of recording keystrokes in order to obtain login information or other private data. Controlling a device's features remotely, such as dialling a number, sending an email, or starting an application. Copying files and data from the target device to the server of the attacker is data theft. Using compromised devices as part of a botnet to perform DDoS assaults on specific servers is known as distributed denial of service (DDoS). Ransomware: Software that locks a device and demands payment to unlock it. It's important to remember that it's unlawful and immoral to use Android RATs for nefarious purposes. These tools may be spread through a variety of techniques, including malicious websites, infected mobile applications, and email attachments. It's essential to keep your Android smartphone's software updated, only download apps from reputable stores like the Google Play Store, and use security software to find and remove any possible risks if you want to safeguard your device from attacks of this nature. Furthermore, maintaining good digital hygiene by avoiding dubious sites and files might reduce your vulnerability to Android RAT assaults. Features Read , Delete Internal Storage Files Download Any Media to your Device from Victims Device Get GPS location Get Network Provider Location Get all the system information of Victim Device Shows all the installed apps in Victims Device Open Any Website in Victims Device Make any folder in Victims Device Show any notification in Victims Device Delete any File or Folder From Victims Internal Storage Dump SMS Play music in Victims device Change Wallpaper Vibrate Device Turn On/Off Flash Light Text To Speach Feature Runs In Background Even App is Closed Support Android v5 + No Port Forwarding Needed Fully Undetectable WipeSdcard Shows Update Page , if you want. Pre Binded Whatsapp Discord: blackhatrussiaofficial#5904 Telegram: https://t.me/*** Download OHM Android RAT OHM Android RAT OHM Android RAT Download Link





dark web image
A News About the AVrecon Botnet Infects Over 70,000 Linux Routers is Shared

In a hacker forum monitored by SOCRadar, a news about the AVrecon botnet infects over 70,000 Linux routers is shared. https://image.socradar.com/screenshots/2023/07/25/89a9b028-0506-4b5f-9ec5-22f4ca85fa89.pngSince May 2021, the AVrecon Linux malware has infected more than 70,000 SOHO routers and made most of them part of a botnet that specializes in creating hidden residential proxies, according to Lumen Black Lotus Labs . Such proxies allow botnet operators to mask a wide range of malicious activities, from digital advertising fraud to password spraying attacks. Despite the fact that the AVrecon Remote Access Trojan (RAT) compromised more than 70,000 devices, only 40,000 of them became part of the botnet when the malware got a foothold on the device, according to the researchers. AVrecon managed to avoid detection almost completely for a long time, although it was first noticedback in May 2021 when malware targeted Netgear routers. Since then, the botnet has remained undetected for two years and has gradually grown, by now becoming one of the largest router-targeted botnets in the world. “We suspect that the attackers are focusing on SOHO devices, as they are less likely to be patched with various CVEs,” the experts say. “Instead of using the botnet for a quick profit, its operators took a more moderate approach and were able to go unnoticed for two years. Due to the stealthy nature of the malware, owners of infected machines rarely notice performance issues or loss of bandwidth.” After infection, the malware sends information about the hacked router to the built-in address of the command and control server. After contact is established, the hacked device is instructed to establish communication with another group of servers - the control servers of the second stage. The researchers found 15 such servers that have been operating since at least October 2021, based on x.509 certificate information. https://image.socradar.com/screenshots/2023/07/25/1934c043-f59c-4f0f-9c9c-f65e4539b2d4.pngExperts note that they managed to harm the work of AVrecon by resetting the routing for the botnet control server in their backbone network. In fact, this severed the connection between the botnet and its control infrastructure, which significantly limited the malware from performing malicious actions. “The use of encryption does not allow us to comment on the results of password spraying attacks, however, we blocked C&C servers and prevented traffic from passing through proxy servers, which made the botnet inactive in the Lumen backbone network,” the company writes.


dark web image
A New RAT Tool is on Sale

In a hacker forum monitored by SOCRadar, a new RAT tool sale is detected . https://image.socradar.com/screenshots/2023/07/12/284f0543-7cd7-4ba4-affc-36bbe6432cee.png  WrathRat *Multiple admins, Users, resellers, clients = one server. *Languages : English, Italian, Spanish *The Fastest RAT ever built, Period. 1- Super Admin panel : 1- You can create Users and Resellers 2- You can deactivate users/resellers 2- Resellers panel : You can create Users you want to rent the WrathRAT to 3- Users Panel : 1- Show device and their current LIVE Status (online or Offline) 2- Generate a new APK (Title, package name, Icon) 3- Block certain phone numbers (once the phone number is blocked the admin will be alert if the client has called the phone number) 4- Device notes (You can enter notes for each device) 5- Device Permissions 6- VNC 7- HVNC (Draws the important and not important texts, button, input fields, etc..) 9- Lock screen (shows a black screen that covers the whole screen and dims the light to make the device look like it's off) 10-Custom lock screen (You can design your own lock screen, top title, bottom title and an image "JPG or GIF") *The lock screen will also block the user touches on the device, and automatically closes the status bar if swiped down by the client 11- Call Logs (view, delete, insert calls) 12- Push notifications (able to send push notifications) 13- Apps (view, Open or uninstall device apps) 14- Block apps (Once an app is blocked it will never be opened again unless it's unblocked) 15- Keylogger (everything that is entered on the device will be shown in the panel) 16- Wakeup device (if the device screen is off you will be able to wake it up) 17- PIN/Pattern (Once this option is activated then you will be able to enter either the PIN or pattern in the device lock screen) 18- Format device 19- Call a number 20- SMS messages (View, send, delete SMS messages, a built-in SMS RAT) 21- Long click (You can perform a long click) 22- Swipe gestures 23- VNC and HVNC image quality (You can control the speed and the quality of the VNC and the HVNC) 24- Send Text (You can select any field via VNC or HVNC and you can enter any text in the selected field) 25- Remote Errors (If any error happens in the client device you will be able to view it in the panel) **There are many other features, the above are some of the functions of the WrathRAT. Payment options : 1- You can purchase the source codes. 2- You can rent the WrathRAT on a weekly basis payments.  




dark web image
A New RAT Tool is Shared

In a hacker forum monitored by SOCRadar, a new RAT tool sharing post is detected. https://image.socradar.com/screenshots/2023/06/23/f2b81d3f-8136-43ea-8620-c3954053ee00.pngSorillus Rat Cracked ========== Sorillus is Remote Access Trojan written in Java, that means that Server and Client is running on all operating systems (e.g. Windows, Linux, Mac). What is Sorillus Rat? Sorillus is a platform-independent R.A.T (Remote Access Trojan) written in Java, that can help a pentester to get full remote access to any device that can run Java. This rat can infect Linux devices as well as mac os and other os like widows. their developer is planning to make a new version that can hack android as well so its not just a cross-platform rat its stub is also cross-platform supported. Features System: •Pop-up: Display pop-up messages on the victims' screen. •Clipboard: Access and manage the victim's clipboard contents. •Open URL: Open a specified URL on the victim's browser. •Show IP: Retrieve and display the victim's IP address. •Report: Generate and send reports regarding system status and activities. •Shutdown: Remotely shut down the victim's system. Surveillance: •Screenshot: Capture screenshots of the victim's screen. •Remote desktop: View and control the victim's desktop remotely. •Remote cam: Access and view the victim's webcam remotely. •Remote microphone: Listen to audio from the victim's microphone remotely. •Key logger: Record and monitor keystrokes on the victim's system. [banner_200x200] {banner_200x200} [/banner_200x200] Fun: •Play sound: Play customized sounds on the victim's system. •Black screen: Turn the victim's screen black for privacy or focus purposes. •Image walk: Display a series of images in a slideshow format. Contact: •Text-Chat: Engage in text-based communication with the victim. Custom: •Alias: Assign customized aliases or names to victims for easier identification. •Notes: Add and manage personal notes or annotations for each victim. Debug: •Thread: Monitor and manage threads within the application. •Instances: Track and manage multiple instances of the application. Advanced Controls: •Remote Shell: Execute remote commands on the victim's system. •File Manager: Access and manage files and directories on the victim's system. •Processes: View and manage running processes on the victim's system. •Password Recovery: Recover passwords from supported browsers. •Plugins: Extend the functionality of the application with custom plugins. •Close Views: Close specific views or modules within the application. Installation: •Add Autostart: Add payload to the auto start folder so it will automatically start with startup apps. •Update Client: Update the victim's payload to the latest version. •Uninstall & Disconnect: Remove the client software and disconnect from the system. Connection: •Reconnect: Reconnect a connection with a previously connected victim. •Disconnect: Disconnect the connection with a victim. Whatsapp Discord: *****#***** Telegram: https://t.me/******


dark web image
PoC of RAT with Google Calender

In a hacker forum monitored by SOCRadar, a PoC share is detected for RAT with Google Calendar. https://image.socradar.com/screenshots/2023/06/22/732bb041-e4f3-4db3-b9dc-2be6f2b6a17d.pngGoogle Calendar RAT is a PoC of Command&Control (C2) over Google Calendar Events, This tool has been developed for those circumstances where it is difficult to create an entire red teaming infrastructure. To use GRC, only a Gmail account is required. The script creates a 'Covert Channel' by exploiting the event descriptions in Google Calendar. The target will connect directly to Google." How it works​ GCR attempt to connect to a valid shared Google Calendar link and after generating a unique ID check for any yet-to-be-executed commands. If it is not able to find any command, it creates a new one (fixed to "whoami") as a proof of connection. Every event is composed by two part: - The Title, which contains the unique ID, it means you can schedule multiple commands creating events having the same unique ID as name https://image.socradar.com/screenshots/2023/06/22/9c51ff59-1529-4f37-a2bb-db287ad7f64c.png- The Description, which contains the command to execute and the base64 encoded output using the pipe symbol as separator "|" https://image.socradar.com/screenshots/2023/06/22/c3a5ed58-3501-46a8-83a2-e5efa59f2a55.pngHow to use it​ Setup a Google service account and obtain the credentials.json file, place the file in the same directory of the script Create a new Google calendar and share it with the new created service account Edit the script to point your calendar address Once executed on the target machine an event with a unique target ID is automatically created autoexecuting the "whoami" command Use the following syntax in the event description for the communication => CLEAR_COMMAND|BASE64_OUTPUT Examples:​ "whoami|" "net users|" The date is fixed on May 30th, 2023. You can create unlimited events using the unique ID as the event name.



dark web image
A New RAT Malware is on Sale

In a hacker forum monitored by SOCRadar, a new RAT malware sale is detected. https://image.socradar.com/screenshots/2023/06/08/52561476-73d6-42c1-a88b-342c87ffa460.pngPrice $15K / month OR $100K Lifetime ABOUT THE PROJECT I want to introduce to you a private RAT with over 20,000 hours of development (since 2017). This RAT is called Dark-Gate. The goal of this malware service is to provide you all the necessary steps for distribute, hold & work with your bots from a single place. You can read about the Malware analysis from version 1.0 (5 years ago) here hxxps[://]www[.]fortinet[.]com/blog/threat-research/enter-the-darkgate-new-cryptocurrency-mining-and-ransomware-campaign Since then, every single feature has been meticulously curated to bypass AV's at runtime, during any possible moment PAYLOAD DELIVERY The builder; which is conveniently built into the server (GUI), includes the option for 6 different forms of payload delivery (so you never need to look elsewhere) LNK MSI  AUTOIT  (recommended) VBS  EXE + 2 DLL's & More to come FEATURES DOWNLOAD & EXECUTE ANY FILE DIRECTLY TO MEMORY (Native, .NET x86 and x64 files) HVNC & HANYDESK REMOTE DESKTOP HIGH QUALITY FILE MANAGER, WITH FAST FILE SEARCH AND IMAGE PREVIEW REVERSE PROXY KEYLOGGER WITH ADVANCED CONTROL PANEL (SUPPORTS EVEN UNICODE TEXT) PRIVILEGE ESCALATION (NORMAL TO ADMIN / ADMIN TO SYSTEM) WINDOWS DEFENDER EXCLUSION (IT WILL ADD C:/ FOLDER TO EXCLUSIONS ) DISCORD TOKEN, BROWSER HISTORY, COOKIE STEALER, SKYPE, BROWSER RECOVERY SPECIAL BROWSER EXTENSION FOR LOADING COOKIES DIRECTLY INTO A BROWSER PROFILE ADVANCED MANUAL INJECTION PANEL CHANGE DOMAINS AT ANY TIME FROM ALL BOTS (Global extension) CHANGE MINER DOMAIN AT ANY TIME FROM ALL BOTS (Global extension) REALTIME NOTIFICATION WATCHDOG (Global extension) ADVANCED CRYPTO MINER SUPPORTING CPU AND MULTIPLE GPU COINS (Global extension) ROOTKIT WITHOUT NEED OF ADMINISTRATOR RIGHTS OR .SYS FILES (COMPLETLY HIDE FROM TASKMANAGER) INVISIBLE STARTUP, IMPOSIBLE TO SEE THE STARTUP ENTRY EVEN WITH ADVANCED TOOLS



dark web image
New RAT is Shared

 In a hacker forum monitored by SOCRadar, a new RAT share is detected. https://image.socradar.com/screenshots/2023/06/07/8e930b3f-b88e-45eb-958e-38d27211d1b9.pngANARCHY PANEL RAT 4.7 Cracked ========== Tools:Icon Changer - Multi Binder [Icon - Assembly] | Fud Downloader [HTA-VBS-JS-WSF] - XHVNC - BlockClients Features: Information, Monitor [Mouse - Keyboard - AutoSave] , Run File [Disk - Link - Memory - Script - RunPE] , WebCam [AutoSave] , Microphone , System Sound , Open Url [Visible - Invisible] , TCP Connections , ActiveWindows , Process Manager , Clipboard Manager , Shell , Installed Programs , DDos Attack , VB.Net Compiler , Location Manager [GPS - IP] , File Manager , Client [Restart - Close - Uninstall - Update - Block - Note] Options: Power [Shutdown - Restart - Logoff] , BlankScreen [Enable - Disable] , TaskMgr [Enable - Disable] , Regedit [Enable - Disable] , UAC [Enable - Disable] , Firewall [Enable - Disable] ,.NET 3.5 Install , Disable Update , Run Shell, Invoke-BSOD Password Recovery : Bookmarks - Browsers - All-In-One - DicordTokens , FileZilla - ProduKey - WifiKeys - Email Clients [banner_200x200] {banner_200x200} [/banner_200x200] Pastime : CD ROOM [Open - Close] , DesktopIcons [Show - Hide] , SwapMouse [Swap - Normal] , TaskBar [Show - Hide] , Screen [ON-OFF] , Volume [Up - Down - MUTE] , Start [Show - Hide] , Clock [Show - Hide] , Text Speak , Explorer [Start - Kill] , Tray Notify [Show - Hide] Extra 1 : KeyLogger , Client Chat ,FileSeacher ,USB Spread , Bot killer , PreventSleep , Message Box ,Change Wallpaper , DeleteRestorePoints , UAC Bypass [RunAs - Cmstp - Computerdefaults - DismCore] , Run Clipper [All Cryptocurrencies] Extra 2 : Ransomware [Encrypt - Decrypt] , Ngrok Installer , HVNC , Hidden RDP ,WDDisable , W.D.Exclusion , Install [Startup - Registry - schtasks] Requirements : ? .Net Framework 4.5 [Controller] ? .NET Framework 4.0 [Client] Discord: ***#** Telegram: https://t.me/****


dark web image
GobRAT: Sophisticated Remote Access Trojan, Targeting Linux Routers, Emerges in Japan

In recent cybersecurity news, a new and highly sophisticated remote access trojan (RAT) called GobRAT has emerged, specifically targeting Linux routers. This Go language-based malware has been observed infecting routers in Japan, leveraging vulnerabilities and open WEBUIs to gain unauthorized access. This advanced malware has recently been identified by JPCERT/CC. Attack Flow  GobRAT's infiltration begins with the attacker identifying routers with publicly accessible web interfaces (WEBUIs) as potential targets. Through the exploitation of vulnerabilities within the router's scripts, the attacker gains a foothold and successfully infects the system with GobRAT. Central to this process is the Loader Script, which acts as the initial loader, responsible for performing a range of critical functions. https://image.socradar.com/screenshots/2023/05/29/67d6a31a-5502-48c1-9612-ee723a17ca68.pngFigure 1. Demonstrates how the attack progresses until GobRAT successfully infects the router. (Source: JPCERT/CC) The Loader Script assumes the role of a versatile utility, featuring functionalities such as script generation, GobRAT downloading, firewall disabling, creation of a persistent Start Script, and the execution of a Daemon Script. Notably, the Loader Script incorporates a hard-coded SSH public key, potentially offering a backdoor entry point for the attacker. Persistence is achieved through the registration of the Start Script's file path in the crontab, ensuring GobRAT's continuous operation. The Start Script assumes a pivotal role in executing GobRAT within the compromised router. Distinguishing itself with a unique characteristic, the script logs the system's startup time in a file named "restart.log." To obfuscate its presence, GobRAT is executed under the guise of a legitimate process, appearing as "apached." GobRAT boasts an extensive repertoire of 22 executed commands, dictated by instructions received from the C2 server. Tailored for router environments, the commands encompass functions such as obtaining machine information, executing reverse shells, file read/write operations, C2 reconfiguration, SOCKS5 proxy initiation, execution of files in specific directories, and even attempts to log in to services like SSH, Telnet, Redis, MySQL, and PostgreSQL running on other machines. You can read the JPCERT/CC analysis here. (https://blogs.jpcert.or.jp/en/2023/05/gobrat.html)IOCs C2 https[:]//su.vealcat[.]com http[:]//su.vealcat[.]com:58888 https[:]//ktlvz.dnsfailover[.]net http[:]//ktlvz.dnsfailover[.]net:58888 su[.]vealcat[.]com ktlvz[.]dnsfailover[.]net wpksi[.]mefound[.]com Hashes of Scripts (SHA-256) 060acb2a5df6560acab9989d6f019fb311d88d5511f3eda0effcbd9fc6bd12bb feaef47defd8b4988e09c8b11967e20211b54e16e6df488780e2490d7c7fa02a 3e44c807a25a56f4068b5b8186eee5002eed6f26d665a8b791c472ad154585d1 60bcd645450e4c846238cf0e7226dc40c84c96eba99f6b2cffcd0ab4a391c8b3 Malware files (SHA-256) a8b914df166fd0c94106f004e8ca0ca80a36c6f2623f87a4e9afe7d86b5b2e3a aeed77896de38802b85a19bfcb8f2a1d567538ddc1b045bcdb29cb9e05919b60 6748c22d76b8803e2deb3dad1e1fa7a8d8ff1e968eb340311fd82ea5d7277019 e133e05d6941ef1c2e3281f1abb837c3e152fdeaffefde84ffe25338fe02c56d 43dc911a2e396791dc5a0f8996ae77ac527add02118adf66ac5c56291269527e af0292e4de92032ede613dc69373de7f5a182d9cbba1ed49f589ef484ad1ee3e 2c1566a2e03c63b67fbdd80b4a67535e9ed969ea3e3013f0ba503cfa58e287e3 98c05ae70e69e3585fc026e67b356421f0b3d6ab45b45e8cc5eb35f16fef130c 300a92a67940cfafeed1cf1c0af25f4869598ae58e615ecc559434111ab717cd a363dea1efda1991d6c10cc637e3ab7d8e4af4bd2d3938036f03633a2cb20e88 0c280f0b7c16c0d299e306d2c97b0bff3015352d2b3299cf485de189782a4e25 f962b594a847f47473488a2b860094da45190738f2825d82afc308b2a250b5fb 4ceb27da700807be6aa3221022ef59ce6e9f1cda52838ae716746c1bbdee7c3d 3e1a03f1dd10c3e050b5f455f37e946c214762ed9516996418d34a246daed521 3bee59d74c24ef33351dc31ba697b99d41c8898685d143cd48bccdff707547c0 c71ff7514c8b7c448a8c1982308aaffed94f435a65c9fdc8f0249a13095f665e Enhancing Security Measures with SOCRadar Threat actors and Advanced Persistent Threat (APT) groups use various techniques and tools to accomplish their goals. Monitoring and comprehending these adversaries’ actions is critical. It offers valuable insights into their current Tactics, Techniques, and Procedures (TTPs) that may be more important than frequently altered Indicators of Compromise (IoCs). SOCRadar notifies you about threat groups’ actions and enables you to establish use cases that more efficiently identify and thwart malicious activities. https://image.socradar.com/screenshots/2023/05/29/2c1ea86f-46cd-4c77-a7eb-02c2de8cbad8.pngSOCRadar Threat Actor / Malware Tracking page


dark web image
A New Malware Share is Detected

In a hacker forum monitored by SOCRadar, a new RAT malware share is detected for Android. https://image.socradar.com/screenshots/2023/05/28/8877761f-0d79-4ce9-b8df-f04b28599240.pngEverspy Rat - The most powerful Rat for Android (Free, unrestricted use) Everspy 2023 is a powerful software designed for remote monitoring and control of a user's cell phone. With a comprehensive range of features, it allows the user to discreetly access and manipulate various aspects of the target device. From screen control and call recording to intercepting messages and accessing contacts, Everspy offers extensive control over the device's functionalities. Additionally, it includes advanced capabilities such as bypassing banking app security, capturing keystrokes through a keylogger, and even wiping data from the phone. Everspy operates stealthily, remaining undetectable while providing continuous updates for enhancements and fixes. It is a versatile tool for monitoring and managing targeted devices, ensuring maximum control and flexibility for various applications. https://image.socradar.com/screenshots/2023/05/28/d0a2c30f-1404-4082-b2d3-6228b09c742b.pngFeatures 1. Screen Control: Enables full control of the user's cell phone with touch interaction. 2. Ghost Mode (Available only in the Ultimate version): Displays an image on the user's device during control for discreet operation. 3. Ghost Mode Push Notification (Available only in the Ultimate version): Sends a push notification to the user's device, appearing as an Android update screen, prompting them to update while Ghost Mode is active. 4. Freeze Screen: Temporarily freezes the user's screen while maintaining control. 5. Bypass Banking App Security: Overcomes security measures in some banking applications that display a black screen to protect against remote access or screen recording. 6. PNG Exploit (No longer functional, currently unavailable): Formerly camouflaged malicious files as PNG image files, resulting in immediate device infection. 7. Automatic Permission Granting: All necessary permissions are automatically granted once Accessibility is activated. 8. Fully Undetectable APK: The malicious app installs without raising any alerts or triggering detection mechanisms. 9. Call Recording: Records all user phone calls offline. 10. Future Updates: Continuous updates and corrections are available within the Everspy folder. Simply run the Everspy Update file to download the latest enhancements and fixes. 11. Phisher: Displays fake apps, such as Gmail and Facebook, to capture user access. 12. Messages: Sends and intercepts SMS through the user's cell phone. 13. Contacts: Intercept and access contacts on the user's cell phone. 14. Camera: Accesses the front and rear cameras. 15. Wipe Data: Erases all data on the user's phone, restoring it to factory settings. 16. Edit Socket: Adds or removes TCP ports and IP addresses for server and client connections. 17. Download APK: Downloads files of various types to the user's device, excluding APK files. 18. Open a Link: Opens a specified link in the user's default browser. 19. Toaster: Displays a message on the user's screen. 20. Notifications: Intercepts notifications on the user's cell phone. 21. File Manager: Views and has full control over files on the user's device. 22. Applications: Views and opens apps on the user's device. 23. Keylogger: Captures and records the user's keystrokes, both offline and online. 24. Accounts: Views connected user accounts. 25. Call Logs: Views all outgoing and incoming calls on the user's device. 26. Info: Views device specifications and details of the user's cell phone. 27. Location: Provides precise location tracking of the user. Disclaimer The user assumes full and exclusive responsibility for the utilization of the everspy tool and acknowledges that any material, personal information, images, or other damages of any nature that may arise from the use of the everspy tool are solely their own responsibility. The Everspy Rat is a malicious software that requires all antivirus and firewall protections on the computer to be completely disabled before it can be used.


Subscribe