threat-intelligence-report


TRENDS 

  • The top attacker country was China with 2390 unique attackers (27.90%). 
  • The top Exploit event was Miscellaneous with 63% of occurrences. 
  • The top Trojan C&C server detected was Formbook with 8428 instances detected. 

TOP ATTACKER COUNTRIES 

COUNTRY 

OCCURRENCES 

PERCENTAGE% 

China 

2390 

27.90% 

United States 

1370 

16% 

India 

470 

5.50% 

Vietnam 

441 

5.20% 

Brazil 

422 

4.90% 

Republic of Korea 

409 

4.80% 

Taiwan 

373 

4.40% 

Russian 

345 

4% 

France 

318 

3.70% 

United Kingdom 

247 

2.90% 

Indonesia 

185 

2.20% 

Mexico 

182 

2.10% 

Italy 

170 

2% 

Germany 

151 

1.80% 

Turkey 

149 

1.70% 

Thailand 

139 

1.60% 

Canada 

132 

1.50% 

Hong Kong 

116 

1.40% 

Malaysia 

115 

1.30% 

TOP ATTACKER HOSTS 

HOST 

OCCURRENCES 

110.249.212.46 

15 

37.49.227.202 

13 

198.108.66.208 

13 

172.104.67.101 

12 

216.158.228.158 

12 

209.141.61.79 

12 

104.37.187.18 

11 

45.37.70.146 

11 

222.186.15.91 

10 

TOP NETWORK ATTACKERS 

ORIGIN AS                     

COUNTRY   

NAME: 

AS4837 

China 

China Unicom Hebei province network 

AS208666 

Netherlands 

XEMU 

AS237 

United States 

Merit Network Inc 

AS63949 

United States 

Linode 

AS19318 

United States 

Interserver, Inc 

AS53667 

United States 

FranTech Solutions 

AS11426 

United States 

Charter Communications Inc 

AS23650 

China 

CHINANET jiangsu province network 

TOP EVENTS NIDS AND EXPLOITS 

REMOTE ACCESS TROJAN C&C SERVERS FOUND 

 
 
 

TROJAN, C&C SERVERS 

NUMBERS OF IPS 

FORMBOOK 

8428 

EMOTET 

4621 

LOKIBOT 

2939 

AZORULT 

1504 

NANOCORE 

1415 

DANABOT 

1343 

URSNIF 

1078 

PONY 

969 

NJRAT 

731 

REMCOS 

584 

AGENT TESLA 

553 

ADWIND 

463 

NETWIRE 

443 

PREDATOR THE THIEF 

411 

SMOKE LOADER 

407 

TRICKBOT 

302 

AVEMARIA 

276 

GANDCRAB 

266 

VIDAR 

226 

HAWKEYE 

216 

REVENGE 

190 

QUASART RAT 

185 

HANCITOR 

145 

GLUPTEBA 

94 

COMMON MALWARE 

MD5 

TYPICAL FILENAME 

CLAIMED PRODUCT 

DETECTION NAME 

47b97de62ae8b2b927542aa5d7f3c858 

qmreportupload.exe 

qmreportupload 

Win.Trojan.Generic::in10.talos 

8c80dd97c37525927c1e549cb59bcbf3 

eternalblue-2.2.0.exe 

N/A 

 W32.85B936960F.5A5226262.auto.Talos 

e2ea315d9a83e7577053f52c974f6a5a 

c3e530cc005583b47322b6649ddc0dab1b64bcf22b124a492606763c52fb048f.bin 

N/A 

W32.AgentWDCR:Gen.21gn.1201 

88cbadec77cf90357f46a3629b6737e6 

FlashHelperServices.exe 

Flash Helper Services 

PUA.Win.File.2144flashplayer::tpd 

799b30f47060ca05d80ece53866e01cc 

mf2016341595.exe 

N/A 

W32.Generic:Gen.22fz.1201 

CVES FOR WHICH PUBLIC EXPLOITS HAVE BEEN DETECTED
 

CVE 

DESCRIPTION 

CVSS SCORE 

CVE-2020-4198 

IBM Tivoli Netcool/OMNIbus_GUI 8.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 174909. 

V3.1: 5.4 MEDIUM 

Published: March 03, 2020; 09:15:11 AM -05:00 

V2: 3.5 LOW 

CVE-2020-5403 

Reactor Netty HttpServer, versions 0.9.3 and 0.9.4, is exposed to a URISyntaxException that causes the connection to be closed prematurely instead of producing a 400 response. 

(not available) 

Published: March 03, 2020; 02:15:15 PM -05:00 

CVE-2020-5404 

The HttpClient from Reactor Netty, versions 0.9.x prior to 0.9.5, and versions 0.8.x prior to 0.8.16, may be used incorrectly, leading to a credentials leak during a redirect to a different domain. In order for this to happen, the HttpClient must have been explicitly configured to follow redirects. 

(not available) 

Published: March 03, 2020; 01:15:12 PM -05:00 

CVE-2020-1893 

Insufficient boundary checks when decoding JSON inTryParse reads out of bounds memory, potentially leading to DOS. This issue affects HHVM 4.45.0, 4.44.0, 4.43.0, 4.42.0, 4.41.0, 4.40.0, 4.39.0, versions between 4.33.0 and 4.38.0 (inclusive), versions between 4.9.0 and 4.32.0 (inclusive), and versions prior to 4.8.7. 

(not available) 

Published: March 03, 2020; 10:15:12 AM -05:00 

Details
Date Published
March 04, 2020