threat-intelligence-report

Trends

  • The top attacker country was China with 228733 unique attackers (53%).
  • The top Trojan C&C server detected was Heodo with 45 instances detected.

Top Attackers By Country

Country Occurences Percentage
China 228733 53.00%
Australia 69389 16.00%
United States 28149 6.00%
India 20175 4.00%
South Africa 15457 3.00%
Chile 7438 1.00%
United Kingdom 7384 1.00%
Canada 5970 1.00%
Brazil 5011 1.00%
Netherlands 4274 0%
Russia 3885 0%
Italy 1882 0%
Vietnam 1807 0%
Indonesia 1797 0%
Singapore 1525 0%
Bulgaria 1340 0%
Germany 916 0%
Argentina 853 0%
Gambia 801 0%

Top Attackers by CountryChileUnited KingdomCanadaBrazilNetherlandsOther24.7%24.5%14.2%16.6%19.8%
Country Percentage of Attacks
China 24
Australia 20
United States 7
India 5
South Africa 5
Chile 7,438
United Kingdom 7,384
Canada 5,970
Brazil 5,011
Netherlands 4,274

Threat Geo-location

801228,733

Top Attacking Hosts

Host Occurrences
112.85.42.187 42879
218.92.0.189 18271
14.200.151.138 16052
202.161.116.141 16036
122.176.116.48 16011
196.250.39.188 14677

Top Network Attackers

ASN Country Name
4837 China CHINA169-BACKBONE CHINA UNICOM China169 Backbone, CN
7545 Australia TPG-INTERNET-AP TPG Telecom Limited, AU
24560 India AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services, IN
37515 South Africa iCONNECT, ZA

Remote Access Trojan C&C Servers Found

Name Number Discovered Location
Anubis 2 91.195.240.117 , 92.63.197.136
Azorult 2 45.143.138.19 , bishu.ac.ug
BetaBot 1 161.117.87.57
Heodo 45 106.248.79.174 , 112.68.254.127 , 113.190.254.245 , 114.109.179.60 , 1.217.126.11 , 1.221.254.82 , 139.130.242.43 , 173.66.96.135 , 178.153.176.124 , 180.33.6.136 , 181.126.70.117 , 181.30.61.163 , 183.87.40.21 , 183.91.3.63 , 186.86.247.171 , 188.0.135.237 , 189.179.108.157 , 189.203.177.41 , 190.151.5.130 , 190.191.82.216 , 190.201.144.85 , 190.55.181.54 , 196.6.119.137 , 198.199.112.197 , 201.137.247.222 , 209.146.22.34 , 221.165.123.72 , 24.164.79.147 , 27.109.153.201 , 37.187.72.193 , 41.215.79.182 , 41.60.200.34 , 45.73.157.243 , 47.180.91.213 , 5.32.55.214 , 58.162.218.151 , 60.231.217.199 , 73.217.39.73 , 78.210.132.35 , 86.108.77.73 , 88.249.120.205 , 88.249.181.198 , 91.205.173.150 , 91.73.169.210 , 98.174.166.205
LokiBot 3 107.175.150.73 , 5.182.211.76 , 91.134.234.202
Raccoon 1 34.65.233.80
TrickBot 19 103.94.122.254 , 146.185.253.107 , 176.31.87.209 , 185.186.77.247 , 185.99.2.149 , 195.123.218.13 , 195.123.218.14 , 195.133.146.185 , 198.8.91.10 , 212.109.223.162 , 23.95.231.187 , 5.2.76.122 , 5.2.77.116 , 78.24.221.145 , 79.174.12.245 , 85.143.219.230 , 92.63.105.138 , 92.63.98.59 , 95.181.198.151

Trojan C&C Servers Detected

Anubis

Azorult

Heodo

LokiBot

TrickBot

Other

26%

61.6%

Name
Number Discovered
Anubis
2
Azorult
2
BetaBot
1
Heodo
45
LokiBot
3
Raccoon
1
TrickBot
19


Common Malware

MD5
VirusTotal
FileName
Claimed Product
Detection Name
5142c
721e7
18206
5b299
951a5
4d4fe
80
https://www.
virustotal.com/
gui/file/d73ea7
6f6f07f96b33
7335213418b5
8e3fbc7e4b51
9fec0ef3fbd19
c1d335d81/
details
Flash
Helper
Services
.exe
Flash
Helper
Service
PUA.Win.
Adware.Flashserv::
1201
121e1
634bf
18768
80242
7f0a1
3f039
a9
https://www.
virustotal.com/
gui/file/5fc600
351bade74c27
91fc526bca6b
b606355cc65
e5253f7f7912
54db58ee7fa/
details
AA_v3
.exe
AmmyyAdmin
W32.SPR:
Variant.22fn.1201
c2406
fc0fce
67ae7
9e625
01332
5e2a6
8
https://www.
virustotal.com/
gui/file/1c3ed4
60a7f78a43ba
b0ae575056d
00c629f35cf7
e72443b4e87
4ede0f305871/
details
SegurazoIC
.exe
Digital
Communications
Inc.
PUA.Win.
Adware.Ursu::
95.sbx.tg
56f11
ce911
9632b
a360e
5b3dd
0a89a
cd
https://www.
virustotal.com/
gui/file/d8b59
4956ed5483
6817e38b36
5dafdc69aa7
e07776f83d
d0f706278d
ef8ad2d1/
details
xme64-540
.exe
N/A
PUA.Win.
Tool.Coinminer::
100.sbx.tg
e2ea3
15d9a
83e75
77053
f52c9
74f6a
5a
https://www.
virustotal.com/
gui/file/c3e53
0cc005583b
47322b6649
ddc0dab1b6
4bcf22b124a
492606763c
52fb048f/
details
c3e530cc0
05583b47
322b6649
ddc0dab1b
64bcf22b1
24a49260
6763c52fb
048f.bin
N/A
W32.AgentWDCR:
Gen.21gn.1201

CVEs with Recently Discovered Exploits

This is a list of recent vulnerabilities for which exploits are available.

CVE, Title, Vendor
Description
CVSS v2 Base Score
Date Created
Date Updated
CVE-
2019-
16278
Nostromo
Web Server Unauthen-ticated Remote Code Execution Vulnerability
Nazgul
A remote code execution vulnerability exists in Nostromo Web Server. This issue is caused by a directory traversal in the function http_verify in nostromo nhttpd allowing an attacker to achieve remote code execution via a crafted HTTP request. After successful exploitation of this vulnerability an attacker can achieve remote code execution via a crafted HTTP request.
7.5(AV:
N/AC:
L/Au:
N/C:
P/I:
P/A:P)
10/14/2019
10/31/2019
CVE-
2019-
5596
FreeBSD Privilege Escalation Vulnerability
FreeBSD
In FreeBSD, a bug in the reference count implementation for UNIX domain sockets can cause a file structure to be incorrectly released potentially allowing a malicious local user to gain root privileges or escape from a jail. FreeBSD attempts to handle the case where the receiving process does not provide a sufficiently large buffer for an incoming control message containing rights. The code which performs this operation failed to release a reference obtained on the file corresponding to a received right. This bug can be used to cause the reference counter to wrap around and free the file structure.
7.2 (AV:
L/AC:
L/Au:
N/C:
C/I:
C/A:C)
02/12/2019
12/30/2019
CVE-
2019-
1405
Microsoft UPnP Local Privilege Elevation Vulnerability
Microsoft
An elevation of privilege vulnerability exists when the Windows Universal Plug and Play service improperly allows COM object creation. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges.
7.2(AV:
L/AC:
L/Au:
N/C:
C/I:
C/A:C)
11/12/2019
12/18/2019
CVE-
2019-
19726
OpenBSD Dynamic Loader chpass Privilege Escalation Vulnerability
Pulse Secure
Qualys discovered a local privilege escalation in OpenBSD's dynamic loader (ld.so). This vulnerability is exploitable in the default installation (via the set-user-ID executable chpass or passwd) and yields full root privileges. OpenBSD allows local users to escalate to root because a check for LD_LIBRARY_PATH in setuid programs can be defeated by setting a very small RLIMIT_DATA resource limit. When executing chpass or passwd (which are setuid root), _dl_setup_env in ld.so tries to strip LD_LIBRARY_PATH from the environment, but fails when it cannot allocate memory. Thus, the attacker is able to execute their own library code as root.
7.2(AV:
L/AC:
L/Au:
N/C:
C/I:
C/A:C)
12/11/2019
12/27/2019
CVE-
2019-
1184
Windows Shell COM Server Registrar Local Privilege Escalation Vulnerability
Microsoft
An elevation of privilege vulnerability exists when Windows Core Shell COM Server Registrar improperly handles COM calls. An attacker who successfully exploited this vulnerability could potentially set certain items to run at a higher level and thereby elevate permissions.
7.2(AV:
L/AC:
L/Au:
N/C:
C/I:
C/A:C)
08/14/2019
08/19/2019
CVE-
2019-
19844
Django count Hijack Vulnerability
Django
Django allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. Django's password-reset form uses a case-insensitive query to retrieve accounts matching the email address requesting the password reset.
5.0(AV:
N/AC:
L/Au:
N/C:
N/I:
P/A:N)
12/18/2019
01/07/2020
Details
Date Published
January 15, 2020