20.04.2016 Views

y5qa5B

y5qa5B

y5qa5B

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ASERT Threat Intelligence Report 2016-03: The Four-Element Sword Engagement<br />

MD5 (IEChecker.exe): 46c7d064a34c4e02bb2df56e0f8470c0 <br />

SHA-­‐256 (spearphish): 4f52292a2136eb7f9538230ae54a323c518fa44cf6de5d10ca7a04ecb6a77872 <br />

SHA-­‐256 (RTF): 0683fac0b564fe5d2096e207b374a238a811e67b87856fc19bdf8eb3d6f76b49 <br />

SHA-­‐256 (~tmp.doc): 60ef10cce9974cdc8a453d8fdd8ddf0cad49c6f07d2c4d095ff483998685b421 <br />

SHA-­‐256 (IEChecker.exe): 7a200c4df99887991c638fe625d07a4a3fc2bdc887112437752b3df5c8da79b6 <br />

Connections to Historical and Ongoing Threat Campaign Activity<br />

The analysis service cryptam.com contains this particular malware sample [20] and is using YARA to classify <br />

the sample using a tag of “apt_north_beaver_wmonder_vidgrab”. The name “north beaver” doesn’t appear to <br />

be related to a publicly known APT campaign. Vidgrab is however another name for the Grabber/Evilgrab <br />

malware. The presence of “wmonder” in the YARA rule is most likely due to the use of the older Grabber C2 <br />

domain webmonder.gicp[.]net, mentioned by Trend Micro in their 2013 2Q Report on Targeted Attack <br />

Campaigns [21]. Documents associated with the classifier “apt_north_beaver_wmonder_vidgrab” have been <br />

present since at least 2013. It is possible that there is a relationship between these earlier malicious <br />

documents and recently observed activity, or that the recent documents are simply a reflection of the <br />

continuation of prior campaign activity. <br />

Targeted Exploitation #3: Asian Press, Kivars Keylogger Payload<br />

On Jan 2, 2016 a spearphish mail was sent to the target. <br />

The subject for this message is <br />

“[BULK] TIBET, OUR BELOVED NATION <br />

AND WILL NEVER FORGET IT.” In this <br />

case, the actors have embedded the <br />

malware inside a RAR file and have <br />

positioned the RAR file as needing <br />

translation. It is not known how <br />

common it may be for authors to use <br />

the RAR format in such a case, <br />

however it does appear to be <br />

suspicious. <br />

16 Proprietary and Confidential Information of Arbor Networks, Inc.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!