mirror of
https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections
synced 2024-06-24 07:49:57 +00:00
2018.09.27.LoJax
This commit is contained in:
parent
76be8f6c00
commit
57eb409251
1
2018/2018.09.27.LoJax/.python-version
Normal file
1
2018/2018.09.27.LoJax/.python-version
Normal file
@ -0,0 +1 @@
|
||||
2.7.15
|
BIN
2018/2018.09.27.LoJax/ESET-LoJax.pdf
Normal file
BIN
2018/2018.09.27.LoJax/ESET-LoJax.pdf
Normal file
Binary file not shown.
116
2018/2018.09.27.LoJax/lojax.adoc.IoC
Normal file
116
2018/2018.09.27.LoJax/lojax.adoc.IoC
Normal file
@ -0,0 +1,116 @@
|
||||
== LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group
|
||||
|
||||
=== ReWriter_read.exe
|
||||
|
||||
*ESET detection name*
|
||||
|
||||
- Win32/SPIFlash.A
|
||||
|
||||
*SHA-1*
|
||||
|
||||
- `ea728abe26bac161e110970051e1561fd51db93b`
|
||||
|
||||
=== ReWriter_binary.exe
|
||||
|
||||
*ESET detection name*
|
||||
|
||||
- Win32/SPIFlash.A
|
||||
|
||||
*SHA-1*
|
||||
|
||||
- `cc217342373967d1916cb20eca5ccb29caaf7c1b`
|
||||
|
||||
=== SecDxe
|
||||
|
||||
*ESET detection name*
|
||||
|
||||
- EFI/LoJax.A
|
||||
|
||||
*SHA-1*
|
||||
|
||||
- `f2be778971ad9df2082a266bd04ab657bd287413`
|
||||
|
||||
=== info_efi.exe
|
||||
|
||||
*ESET detection name*
|
||||
|
||||
- Win32/Agent.ZXZ
|
||||
|
||||
*SHA-1*
|
||||
|
||||
- `4b9e71615b37aea1eaeb5b1cfa0eee048118ff72`
|
||||
|
||||
=== autoche.exe
|
||||
|
||||
*ESET detection name*
|
||||
|
||||
- Win32/LoJax.A
|
||||
|
||||
*SHA-1*
|
||||
|
||||
- `700d7e763f59e706b4f05c69911319690f85432e`
|
||||
|
||||
=== Small agent EXE
|
||||
|
||||
*ESET detection names*
|
||||
|
||||
- Win32/Agent.ZQE
|
||||
- Win32/Agent.ZTU
|
||||
|
||||
*SHA-1*
|
||||
|
||||
- `1771e435ba25f9cdfa77168899490d87681f2029`
|
||||
- `ddaa06a4021baf980a08caea899f2904609410b9`
|
||||
- `10d571d66d3ab7b9ddf6a850cb9b8e38b07623c0`
|
||||
- `2529f6eda28d54490119d2123d22da56783c704f`
|
||||
- `e923ac79046ffa06f67d3f4c567e84a82dd7ff1b`
|
||||
- `8e138eecea8e9937a83bffe100d842d6381b6bb1`
|
||||
- `ef860dca7d7c928b68c4218007fb9069c6e654e9`
|
||||
- `e8f07caafb23eff83020406c21645d8ed0005ca6`
|
||||
- `09d2e2c26247a4a908952fee36b56b360561984f`
|
||||
- `f90ccf57e75923812c2c1da9f56166b36d1482be`
|
||||
|
||||
*C&C server domain names*
|
||||
|
||||
- `secao.org`
|
||||
- `ikmtrust.com`
|
||||
- `sysanalyticweb.com`
|
||||
- `lxwo.org`
|
||||
- `jflynci.com`
|
||||
- `remotepx.net`
|
||||
- `rdsnets.com`
|
||||
- `rpcnetconnect.com`
|
||||
- `webstp.com`
|
||||
- `elaxo.org`
|
||||
|
||||
*C&C server IP addresses*
|
||||
|
||||
- `185.77.129.106`
|
||||
- `185.144.82.239`
|
||||
- `93.113.131.103`
|
||||
- `185.86.149.54`
|
||||
- `185.86.151.104`
|
||||
- `103.41.177.43`
|
||||
- `185.86.148.184`
|
||||
- `185.94.191.65`
|
||||
- `86.106.131.54`
|
||||
|
||||
=== Small agent DLL
|
||||
|
||||
In this section, we list only the DLL for which we never obtained the corresponding EXE
|
||||
|
||||
*ESET detection name*
|
||||
|
||||
- Win32/Agent.ZQE
|
||||
|
||||
*SHA-1*
|
||||
|
||||
- `397d97e278110a48bd2cb11bb5632b99a9100dbd`
|
||||
|
||||
*C&C server domain names*
|
||||
|
||||
- `elaxo.org`
|
||||
|
||||
*C&C server IP addresses*
|
||||
|
||||
- `86.106.131.54`
|
BIN
2018/2018.09.27.LoJax/samples/060448ffd71fe2edbb5fe7c6298ad2b077e57fa6ed6d4250fbd799dd85488843.zip
Normal file
BIN
2018/2018.09.27.LoJax/samples/060448ffd71fe2edbb5fe7c6298ad2b077e57fa6ed6d4250fbd799dd85488843.zip
Normal file
Binary file not shown.
BIN
2018/2018.09.27.LoJax/samples/0860f29226069a732f988cb70ea6d51057d204d421bb709b8e759376b0c4d201.zip
Normal file
BIN
2018/2018.09.27.LoJax/samples/0860f29226069a732f988cb70ea6d51057d204d421bb709b8e759376b0c4d201.zip
Normal file
Binary file not shown.
BIN
2018/2018.09.27.LoJax/samples/27dd9de09e22efa2ef12e9e2f462fa9da83684bdb4ec900dd86439c5758107d9.zip
Normal file
BIN
2018/2018.09.27.LoJax/samples/27dd9de09e22efa2ef12e9e2f462fa9da83684bdb4ec900dd86439c5758107d9.zip
Normal file
Binary file not shown.
BIN
2018/2018.09.27.LoJax/samples/37f15647c26d475db805048d6592aa153533ac5f4373145c75e24012a51ad9f8.zip
Normal file
BIN
2018/2018.09.27.LoJax/samples/37f15647c26d475db805048d6592aa153533ac5f4373145c75e24012a51ad9f8.zip
Normal file
Binary file not shown.
BIN
2018/2018.09.27.LoJax/samples/500f426f98d4c00d29825f976b9457a274aed781a560a60e89cba4805cd47186.zip
Normal file
BIN
2018/2018.09.27.LoJax/samples/500f426f98d4c00d29825f976b9457a274aed781a560a60e89cba4805cd47186.zip
Normal file
Binary file not shown.
BIN
2018/2018.09.27.LoJax/samples/539cdc37c34eebb28a74f0dceeee0331e6ac6f4682e55fddd69d6f9de7ab9b77.zip
Normal file
BIN
2018/2018.09.27.LoJax/samples/539cdc37c34eebb28a74f0dceeee0331e6ac6f4682e55fddd69d6f9de7ab9b77.zip
Normal file
Binary file not shown.
BIN
2018/2018.09.27.LoJax/samples/634795a3acbae8964bb31e3ebed7f29208844978a512fc26a8b9a51901f9cab9.zip
Normal file
BIN
2018/2018.09.27.LoJax/samples/634795a3acbae8964bb31e3ebed7f29208844978a512fc26a8b9a51901f9cab9.zip
Normal file
Binary file not shown.
BIN
2018/2018.09.27.LoJax/samples/81e96c07e6c9cb02f72c0943a42ff9f8f09a09c508f8bbaa1142a9ee4f1326cf.zip
Normal file
BIN
2018/2018.09.27.LoJax/samples/81e96c07e6c9cb02f72c0943a42ff9f8f09a09c508f8bbaa1142a9ee4f1326cf.zip
Normal file
Binary file not shown.
BIN
2018/2018.09.27.LoJax/samples/a97b1a792f7b53929a1c01bad9fc2bd606a15e8e32755daa15570e356baa0112.zip
Normal file
BIN
2018/2018.09.27.LoJax/samples/a97b1a792f7b53929a1c01bad9fc2bd606a15e8e32755daa15570e356baa0112.zip
Normal file
Binary file not shown.
BIN
2018/2018.09.27.LoJax/samples/dcbfd12321fa7c4fa9a72486ced578fdc00dcee79e6d95aa481791f044a55af3.zip
Normal file
BIN
2018/2018.09.27.LoJax/samples/dcbfd12321fa7c4fa9a72486ced578fdc00dcee79e6d95aa481791f044a55af3.zip
Normal file
Binary file not shown.
BIN
2018/2018.09.27.LoJax/samples/eb4e174db15646f71cb1d2c471e5794a8429ca29369c8eff6042122cc6dc6845.zip
Normal file
BIN
2018/2018.09.27.LoJax/samples/eb4e174db15646f71cb1d2c471e5794a8429ca29369c8eff6042122cc6dc6845.zip
Normal file
Binary file not shown.
BIN
2018/2018.09.27.LoJax/samples/fa8de430fb491d898ee4e557977f036f2aae5f019c3b0552c9e0223da748fc27.zip
Normal file
BIN
2018/2018.09.27.LoJax/samples/fa8de430fb491d898ee4e557977f036f2aae5f019c3b0552c9e0223da748fc27.zip
Normal file
Binary file not shown.
@ -16,6 +16,7 @@ Please fire issue to me if any lost APT/Malware events/campaigns.
|
||||
* [APT search](https://cse.google.com/cse/publicurl?cx=003248445720253387346:turlh5vi4xc)
|
||||
|
||||
## 2018
|
||||
* Sep 27 - [[ESET] LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group](https://www.welivesecurity.com/wp-content/uploads/2018/09/ESET-LoJax.pdf) | [Local](../../blob/master/2018/2018.09.27.LoJax)
|
||||
* Sep 20 - [[360] (Non-English) (CN) PoisonVine](https://ti.360.net/uploads/2018/09/20/6f8ad451646c9eda1f75c5d31f39f668.pdf) | [Local](../../blob/master/2018/2018.09.20.Poison_Trumpet_Vine_Operation)
|
||||
* Sep 13 - [[Fireeye] APT10 Targeting Japanese Corporations Using Updated TTPs](https://www.fireeye.com/blog/threat-research/2018/09/apt10-targeting-japanese-corporations-using-updated-ttps.html) | [Local](../../blob/master/2018/2018.09.13.APT10_Targeting_Japanese)
|
||||
* Sep 10 - [[Kaspersky] LuckyMouse signs malicious NDISProxy driver with certificate of Chinese IT company](https://securelist.com/luckymouse-ndisproxy-driver/87914) | [Local](../../blob/master/2018/2018.09.07.Goblin_Panda_targets_Cambodia)
|
||||
|
Loading…
Reference in New Issue
Block a user