IronNet Threat Research

526 posts

IronNet Threat Research banner
IronNet Threat Research

IronNet Threat Research

@IronNetTR

Transforming NDR through Collective Defense Interested in a trial or demo of IronRadar? Reach out to [email protected]

شامل ہوئے Temmuz 2018
37 فالونگ941 فالوورز
پن کیا گیا ٹویٹ
IronNet Threat Research
IronNet Threat Research@IronNetTR·
We have taken in feedback from the community and simplified our model to be more flexible, tailored to fit organizations of all sizes, with enhanced support options at higher tiers. If you're interested in learning more, feel free to reach out! #threatintel #IronRadar
IronNet Threat Research tweet media
English
0
1
0
1.1K
IronNet Threat Research
IronNet Threat Research@IronNetTR·
Network: 38.62.245[.]50 coinmarkettcap[.]com[.]ng ASN: #24SHELLS Filenames & Hashes: contract_review.exe - 85937170a95daf74d6dcb1c270b7d7387e1ce557cfca6efa4281644fe4c4592b - XWorm putty.exe - 9f96931855f7a2b61a6ba1f0bb14bd3c088c0c2d3a51da28b517569b5c305a57 - NESHTA 3/4
English
1
0
0
356
IronNet Threat Research
IronNet Threat Research@IronNetTR·
While continuing to refine IronRadar's open-dir detection capabilities, we uncovered an initial access vector associated with a suspected coinminer/spyware phishing campaign. Censys query: "((putty.exe) and labels=`open-dir`) and services.port=`3389`". 1/4
English
1
0
1
460
IronNet Threat Research
IronNet Threat Research@IronNetTR·
36.6.140[.]140 - 2 VT 36.152.66[.]126 - 0 VT 117.57.95[.]3 - 0 VT 118.122.131[.]36 - 0 VT 120.234.199[.]52 - 0 VT 122.228.208[.]190 - 0 VT 125.65.88[.]195 - 0 VT 125.67.171[.]132 - 0 VT 171.221.12[.]241 - 0 VT 182.149.112[.]154 - 0 VT 3/3
Tiếng Việt
0
0
0
187
IronNet Threat Research
IronNet Threat Research@IronNetTR·
Using 'ludashisetup[.]exe' as a search filter, we identified 11 additional Open-Dirs that were unrated. All of these contained malicious and/or suspicious files. Censys Query: (ludashisetup.exe) and labels='open-dir' 2/3
English
1
0
0
181
IronNet Threat Research
IronNet Threat Research@IronNetTR·
While researching an Open-Dir, we identified a file (ludashisetup[.]exe). Although this appears to be low severity, tagged as PUP/Riskware, it was cohosted with numerous malicious/sus binaries, which we decided to look into. #ThreatIntelligence #ThreatIntel #malware #C2 1/3
English
1
1
2
341
IronNet Threat Research
IronNet Threat Research@IronNetTR·
Domains: postutleveringssted[.]com - 8 VT banshee-stealer[.]com/login/ - 2 VT Banshee Stealer refbofa39b[.]com - 1 VT refdcu20n[.]com - 2 VT topgamecheats[.]dev - 19 VT Amadey wedominatelawsuits[.]top/panel/login - 14 VT Mint Stealer #ThreatIntel #Malware #C2 3/3
Nederlands
0
0
0
177
IronNet Threat Research
IronNet Threat Research@IronNetTR·
ASN: Silent Connection LTD IPs: 154.216.16[.]105 - 0 VT 154.216.16[.]183 - 0 VT 154.216.17[.]240 - 0 VT 154.216.18[.]134 - 0 VT 154.216.18[.]135 - 0 VT 154.216.19[.]213 - 0 VT 2/3
English
1
0
0
134
IronNet Threat Research
IronNet Threat Research@IronNetTR·
In April, we reported on a TLS cert (cryptohopperai[.]org) associated with a network cluster hosting various malware, to include Amadey and other stealer malware. A new active cluster has been identified using this TLS cert with numerous IPs and Domains, most unreported 1/3
English
1
0
1
194
IronNet Threat Research
IronNet Threat Research@IronNetTR·
Implementing new Remcos detections for #IronRadar, an RDP Hostname (WIN-SVPD50JM3QK) was identified which correlated to over 170 IPs within ASN 'RootLayer Web Services'. The vast majority of these are rated malicious and are hosting various malware strains. 1/2
English
1
2
1
1K
IronNet Threat Research
IronNet Threat Research@IronNetTR·
IronNet TR has identified an OpenDIR (154.213.186[.]220) hosting 7 BashLite/GAFGYT payloads. Currently 1/93 on VT Hosted Files: pXdN91.armv4l pXdN91.armv5l pXdN91.armv6l pXdN91.mips pXdN91.mipsel pXdN91.sh4 pXdN91.x68 #ThreatIntel #Malware #C2
English
1
1
4
396
IronNet Threat Research
IronNet Threat Research@IronNetTR·
179.14.10[.]24 - 0 VT AsyncRAT (Documento.vbs) 181.235.7[.]20 - 0 VT Remcos (sostener.vbs) 186.169.58[.]119 - 9 VT Remcos 188.126.90[.]17 - 0 VT NjRAT | LimeRAT 190.9.223[.]135 - 7 VT 191.93.113[.]10 - 20 VT AsyncRAT #ThreatIntel #Malware #C2
English
0
0
1
198
IronNet Threat Research
IronNet Threat Research@IronNetTR·
46.246.12[.]14 - 12 VT DCRAT 46.246.80[.]10 - 4 VT DCRAT | NJRAT 46.246.86[.]12 - 3 VT DCRAT 46.246.86[.]23 - 0 VT Remcos (wecqa2ra7nvcx.exe) 89.117.23[.]25 - 14 VT DCRAT | Remcos 178.73.192[.]11 - 11 VT DCRAT
Čeština
1
0
0
128
IronNet Threat Research
IronNet Threat Research@IronNetTR·
IronNet TR has discovered a RemcosRAT indicator 89.117.23[.]25 found to be hosting multiple open-dir domains containing the file sostener.vbs (identified as Remcos). Further investigation associates this file as part of a larger RAT campaign (12 IPs - Remcos, Async, DCRAT)
English
1
1
2
531