#TA577

Just Another Blue TeamerLeeArchinal@ioc.exchange
2024-05-01

Happy Wednesday everyone!

The Proofpoint Threat Research team paired up with the Team Cymru to dissect the #Latrodectus malware. "First seen being used by #TA577 and more recently #TA578, Latrodectus is a downloader that likes to evade sandbox environments." The researchers take a deep dive into the code to see what information they could extract and found PLENTY!

After you are done reading, why not take a Cyborg Security Community Hunt Package to hunt for a threat like this? In the article, the researchers mention that the malware sets an AutoRun registry key for persistence, which is a common technique used by different adversaries and malware due to the capability and functionality of those registry keys. So, take this hunt package with you, it's dangerous out there! Enjoy and Happy Hunting!

Autorun or ASEP Registry Key Modification
hunter.cyborgsecurity.io/resea

Source of article:
proofpoint.com/us/blog/threat-

#CyberSecurity #ITSecurity #InfoSec #BlueTeam #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting #readoftheday #huntoftheday #getHunting

2024-04-04

Proofpoint and Team Cymru collaborated on a report on Latrodectus malware. Latrodectus is an up-and-coming downloader with various sandbox evasion functionality. It first appeared in email threat campaigns in late November 2023. Latrodectus shares infrastructure overlap with historic IcedID operations. It is being distributed by financially motivated TA577, as well as TA578. Proofpoint provides malware analysis, C2 infrastructure, links to IcedID, and list of IOC. πŸ”— proofpoint.com/us/blog/threat-

#Latrodectus #threatintel #IcedID ##IOC #TA577 #TA578 #cybercrime

2024-03-26

Proofpoint warned that the TA577 cybercrime group, acting as initial access brokers (IAB), pivoting to stealing the NT LAN Manager (NTLM) hashes. Two distinct email-based campaigns that TA577 carried out on 26-27 February 2024 targeted hundreds of businesses. No IOC provided but Proofpoint lists defense-in-depthβ€―steps to defend against this. πŸ”— proofpoint.com/us/blog/identit

cc: @selenalarson

#TA577 #cybercrime #threatintel #IAB

Selena Larsonselenalarson
2024-03-04

is a messy b that lives for drama. Learn more about their wild attack chain we spotted attempting to steal NTLM data. Great work by the team @Ffforward and Kelsey proofpoint.com/us/blog/threat-

2024-03-04

New blog post! In this one I look at a Java-based dropper for Pikabot that TA577 used in mid-February 2024.
forensicitguy.github.io/dissec
#malware #pikabot #ta577

2023-11-20

#DarkGate gained popularity among threat actors (e.g: #TA577, #DuckTail), our #RE analysis details the internals of the malware, how it implements technique to evade defenses: Union-API, token theft via UpdateProcThreadAttribute, APC injection.

blog.sekoia.io/darkgate-intern

2023-10-24

Fake sites impersonating Zoom download page distributes #DarkGate Loader:
zoomadvertisingofferr.]com
zoomadvertisingooffer.]com

DarkGate C2: 81.19.135.]17 (likely #TA577 payload, A1111 botnet)

hxxps://zoomadvertisingofferr.]com/ZoomInstaller.msi

tria.ge/231021-dsawbaec67

π™½π™΄πšƒπšπ™΄πš‚π™΄π™²netresec@infosec.exchange
2023-10-18

This #IcedID #BackConnect C2 server keeps telling the bot to sleep for 60 seconds. This goes on for 3 hours. No reverse shell, no VNC, no file manager 😿

HELLO #TA577, IT’S TIME TO WAKE UP!!

IcedID BackConnect C2 traffic to 159.89.124.188:443. C2 server keeps sending "Sleep 60 seconds" commands to the bot.
Selena Larsonselenalarson
2023-02-01

returned yesterday from their month long break to deliver via URLs to zipped OneNote. came back too (after the blog was sent for publishing) with OneNote attachments to deliver Qbot.

Opalsec :verified:Opalsec@infosec.exchange
2023-01-31

#TA570 and #TA577 actors, distributing #Qakbot/#Qbot #malware have gotten in on the #OneNote action, delivering lures going undetected by many AV engines.

Highest number of flags is 2/60 based on this C2 IP called by malicious OneNote lures:

virustotal.com/gui/ip-address/

TA570/Obama Sample: bazaar.abuse.ch/sample/b45ace5

TA577/BB## Sample: bazaar.abuse.ch/sample/bd040a7

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst