threat-intelligence-report

Trends

  • The top attacker country was China with 134839 unique attackers (46.00%).
  • The top Trojan C&C server detected was Heodo with 26 instances detected.


Top Attackers By Country

CountryOccurencesPercentage
China13483946.00%
Australia7028824.00%
South Africa193766.00%
Chile181406.00%
United Kingdom99913.00%
United States63782.00%
France50181.00%
Russia38241.00%
India21600%
South Korea19540%
Italy16670%
Netherlands16430%
Indonesia15090%
Paraguay13320%
Brazil12920%
Vietnam10670%
Mexico10100%
Argentina8330%
Pakistan3520%

Threat Geo-location

Top Attacking Hosts

HostOccurrences
181.43.61.5315651
49.88.112.11714050
218.92.0.1909414
218.92.0.1914363
112.85.42.1873395
49.88.112.1162654
181.43.58.1282406
5.135.89.1972072
112.85.42.1862065
222.186.169.1921967
222.186.175.1631852
222.186.180.91845
222.186.175.1691819
222.186.30.2481717
222.186.180.2231686




Top Network Attackers

ASNCountryName
6471ChileENTEL CHILE S.A., CL
4134ChinaCHINANET-BACKBONE No.31,Jin-rong Street, CN
4837ChinaCHINA169-BACKBONE CHINA UNICOM China169 Backbone, CN
16276ItalyOVH, FR
23650ChinaCHINANET-JS-AS-AP AS Number for CHINANET jiangsu province backbone, CN


Remote Access Trojan C&C Servers Found

NameNumber DiscoveredLocation
Azorult3176.107.160.202 , 188.227.85.53 , 209.127.19.34
DiamondFox2195.123.226.145 , 86.106.93.103
Heodo26108.6.170.195 , 110.145.101.66 , 110.145.124.178 , 110.37.226.196 , 113.160.88.86 , 118.69.71.14 , 147.83.10.212 , 147.83.10.59 , 177.6.166.4 , 177.72.13.80 , 179.127.59.210 , 182.191.75.93 , 186.250.113.201 , 189.1.185.248 , 190.164.206.121 , 190.188.51.185 , 191.92.120.49 , 200.127.51.94 , 201.82.155.121 , 24.179.13.67 , 47.47.196.171 , 50.91.82.212 , 78.186.174.210 , 86.247.108.13 , 87.127.197.7 , 89.249.222.142
ISRStealer1192.185.92.172
KeyBase1111.90.142.42
Lokibot16103.253.115.205 , 103.74.123.4 , 104.18.38.156 , 104.27.169.180 , 104.28.0.190 , 131.153.22.142 , 131.153.22.219 , 192.185.75.187 , 192.185.75.206 , 194.180.224.126 , 198.23.200.241 , 198.27.81.31 , 209.127.19.34 , 209.127.19.34 , 5.152.210.188 , 89.208.196.16
RansomBuyDecrypt146.29.160.26
TrickBot2185.99.2.193 , 5.182.210.4
Zloader1217.29.57.164

Common Malware

MD5VirusTotalFileNameClaimed ProductDetection Name
88cbadec77cf90357f46a3629b6737e6https://www.virustotal.com/gui/file/1460fd00cb6addf9806a341fee9c5ab0a793762d1d97dca05fa17467c8705af7/detailsFlashHelperServices.exeFlashHelperServicesPUA.Win.File.2144flashplayer::tpd
8c80dd97c37525927c1e549cb59bcbf3https://www.virustotal.com/gui/file/85b936960fbe5100c170b777e1647ce9f0f01e3ab9742dfc23f37cb0825b30b5/detailseternalblue-2.2.0.exeN/AW32.85B936960F.5A5226262.auto.Talos
be52a2a3074a014b163096055df127a0https://www.virustotal.com/gui/file/97d8ea6cee63296eaf0fa5d97a14898d7cec6fa49fee1bf77c015ca7117a2ba7/detailsxme64-553.exeN/AWin.Trojan.Coinminer::tpd
799b30f47060ca05d80ece53866e01cchttps://www.virustotal.com/gui/file/15716598f456637a3be3d6c5ac91266142266a9910f6f3f85cfd193ec1d6ed8b/detailsmf2016341595.exeN/AW32.Generic:Gen.22fz.1201
e2ea315d9a83e7577053f52c974f6a5ahttps://www.virustotal.com/gui/file/c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f/detailsc3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f
N/A


CVEs with Recently Discovered Exploits

This is a list of recent vulnerabilities for which exploits are available.

CVE, Title, VendorDescriptionCVSS v2 Base ScoreDate CreatedDate Updated

CVE-2020-0665

Microsoft Active Directory Privilege Escalation Vulnerability

Microsoft

The vulnerability exists in Active Directory Forest trust due to a default setting that lets an attacker in the trusting forest request delegation of a TGT for an identity from the trusted forest. The vulnerability allows a remote user to escalate privileges on the system. A remote user can gain elevated privileges on the target system.9.0(AV:N/AC:L/Au:S/C:C/I:C/A:C)02/11/202002/13/2020

CVE-2020-0674

Microsoft Scripting Engine Memory Corruption Vulnerability

Microsoft

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. An attacker could then install programs view, change, or delete data or create new accounts with full user rights.7.6(AV:N/AC:H/Au:N/C:C/I:C/A:C)02/11/202002/12/2020

CVE-2020-0759

Microsoft Excel Remote Code Execution Vulnerability

Microsoft

A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. A6.8(AV:N/AC:M/Au:N/C:P/I:P/A:P)02/11/202002/14/2020

CVE-2020-8808

CORSAIR iCUE Driver Local Privilege Escalation Vulnerability

CORSAIR

The CorsairLLAccess64.sys and CorsairLLAccess32.sys drivers in CORSAIR iCUE allows local non privileged users to read and write to arbitrary physical memory locations, and consequently gain NT AUTHORITYSYSTEM privileges, via a function call such as MmMapIoSpace.7.2(AV:L/AC:L/Au:N/C:C/I:C/A:C)02/07/202002/12/2020

CVE-2019-8449

Atlassian Jira Information Disclosure Vulnerability

Atlassian

The /rest/api/latest/groupuserpicker resource in Jira allows remote attackers to enumerate usernames through an information disclosure vulnerability.5.0(AV:N/AC:L/Au:N/C:P/I:N/A:N)09/11/201902/03/2020

CVE-2019-18634

Sudo pwfeedback Buffer Overflow Vulnerability

Multi-Vendor

A potential security issue exists in sudo when the pwfeedback option is enabled in sudoers that can lead to a buffer overflow. If pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c.4.6(AV:L/AC:L/Au:N/C:P/I:P/A:P)01/29/202002/07/2020

CVE-2019-19470

Tinywall Controller Privilege Escalation Vulnerability

Tinywall

In Tinywall, unsafe usage of .NET deserialization in Named Pipe message processing allows privilege escalation to NT AUTHORITYSYSTEM for a local attacker. An attacker who has already compromised the local system could use TinyWall Controller to gain additional privileges by attaching a debugger to the running process and modifying the code in memory.7.2(AV:L/AC:L/Au:N/C:C/I:C/A:C)12/30/201901/13/2020
Details
Date Published
February 19, 2020