⚠️ Tracking Threat Actors Using Images and Artifacts
Nachrichtenbereich: ⚠️ Malware / Trojaner / Viren
🔗 Quelle: blog.virustotal.com
Hunting early
XML files generated by Microsoft Office
-
Images:Many threat actors use images related to the organizations or entities they intend to impersonate. They do this to make documents appear legitimate and gain the trust of their victims.
-
[Content_Types].xml:This file specifies the content types and relationships within the Office Open XML (OOXML) document. It essentially defines the types of content and how they are organized within the file structure.
-
Styles.xml:Stores stylistic definitions for your document. These styles provide consistent formatting instructions for fonts, paragraph spacing, colors, numbering, lists, and much more.
Office documents
APT28 – Images
-
The first image is just a simple line with no particular meaning. It's embedded in over 100 files known by VirusTotal.
-
The second image is a hand and has 14 compressed parents.
-
The third image consists of black circles and also has over 100 compressed parents.
-
The last image is like a Word page with a table, presenting a fake EDA Roadmap of the European Commission. The image format is EMF (an old format) and it has 4 compressed parents
SideWinder – Images
Gamaredon – [Content_Types].xml and styles.xml
Styles.xml shared between threat actors
[Content_Types].xml shared between threat actors
AI to the rescue
PDF Documents
Images dropped by Acrobat Reader
Images dropped by Acrobat Reader
Email files
Campaign impersonating universities
Campaigns impersonating companies
Wrapping up
APPENDIX
[Content_types].xml shared between threat actors
[Content_Type].xml sha256 |
Shared by |
3d8578fd41d766740a1f1ddef972a081436a2d70ab1e9552a861e58d8bbf5321 |
APT33, APT32 |
4ea40d34cfcaf69aa35b405c575c7b87e35c72246f04d2d0c5f381bc50fc8b3d |
APT29, APT28 |
4f7fa7433484b4e655d185719613e2f98d017590146d15eedc1aa1d967636b3a |
FIN7, Gamaredon, APT28, APT32 |
529739886f6402a9cd5a8064ece73eef19c597ef35c0bc8d09390e8b4de9041b |
FIN7, APT33, TA505, Mustang Panda |
688dca40507fb96630f3df80442266a0354e7c24b7df86be3ea57069b25d12c6 |
Gamaredon, APT33 |
6f1ac5f0ebfb7e97d3dc4100e88eaab10016a5cac75e1251781f2ea12477af51 |
Gamaredon, Hazy Tiger, APT33, |
7796c382cd4c7c4ae3bcf2eed4091fbb20a2563ca88f2aecadb950ad9cf661f8 |
Razor Tiger, APT28, UAC-0099 |
b4fa7f3faa0510e4d969219bceec2a90e8a48ff28e060db3cdd37ce935c3779c |
Razor Tiger, SideCopy |
dfa90f373b8fd8147ee3e4bfe1ee059e536cc1b068f7ec140c3fc0e6554f331a |
Gamaredon, APT37, Mustang Panda, APT28, UAC-0099, SideCopy |
fe98b3bcf96f9c396eb9193f0f9484ef01d3017257300cc76098854b1f103b69 |
FIN7, Hazy Tiger |
ff5a5ba3730a8d2ec0cbad39e5edf4ad502107bd0ef8a5347f29262b3dfe8a43 |
Mustang Panda, APT32 |
styles.xml shared between threat actors
Styles.xml sha256 |
Shared by |
13ed55637980452662cb6838a2931a5e54fbed5881bcbae368b3d189d3a01930 |
APT28, UAC-0099, Razor Tiger |
2de1fc9c48c4b0190361c49cdb053fd39cf81e32f12c82d08f88aec34358257f |
Hazy Tiger, Gamaredon, APT33 |
59df7787c7cf5408481ae149660858d3af765a0c2cd63d6309b151380f92adb2 |
TA505, Gamaredon |
8f590f608f0719404a1731bb70a6ce2db420fd61e5a387d5b3091d47c7e21ac9 |
APT28, FIN7, Razor Tiger, APT32, APT33 |
de392cd4bf1d650a9cf8c6d24e05e0605bf4eaf1518710f0307d8aceb9e5496c |
Hazy Tiger, FIN7 |
e16f84c5fd1df6af1a1f2049f7862f4ea460765863476afb17e78edee772d35b |
APT32, SideCopy, Mustang Panda, Razor Tiger |