Category: Lab Notes

The complexities of intelligence (late night ramblings of a madman)

I’m sure I’m not the only one who knows of someone who, as a young child, had a dog.  They liked dogs, so they learned dogs.  Dogs have four legs, and they stand on them.  One day, it became apparent …

Continue Reading

Recently, I stumbled on an odd Agent Tesla sample that downloaded a paste from pastebin.com. This is not a normal TTP for most actors who license Agent Tesla for use in their malicious campaigns. And to make things more interesting, the paste was the hexadecimal representation of the binary and …

Continue Reading

GIMP away your troubles

“Efficiency is intelligent laziness”

-David Dunham

Scripting is a great way to spend ten times the amount of time to automate something as it would have taken to just do it in the first place.  Sometimes it’s worth it because it saves you time in the long run, and sometimes …

Continue Reading

The other day I decided to take a walkabout in our data and explore what the rest of the world sees. And it didn’t take long to find a poorly constructed Brazilian tax note phish spoofing their Ministry of Economy. The actor failed with his phish template and switches between …

Continue Reading

The Emotet botnet updated their clients this morning around 6am EST.

We came across these hashes for the clients:

E1
4969b8145150d8c9d92abd66db2d17b1b54efcece75812ef77e7ef72d955bd19
E2
812e7a6ebdb40271ec0f878a559c29b459527f2e21ef6208e27d34c6808cd662

The following is a list of the C2 that were pulled from the binaries. Please use these to catch any infections that may be present within your …

Continue Reading

We have been tracking the Emotet botnet for quite some time now and noticed that they began standing up their C2 (command and control) infrastructure again on Aug 21.  Our systems caught the first servers coming alive for Epoch 2 of the botnets clients around 3pm EST.  The first servers …

Continue Reading

Smish Smash

It is interesting how paths sometimes overlap and/or converge. 

In this instance, we ended up with a reported smish (an SMS-based phish).  While SMS Phishing is something that is covered within Cofense’s Security Awareness training modules, it is not something that we see reported that often.

What makes this specific …

Continue Reading

Catching a Phresh Kit

Let’s follow this Phresh Catch and see where it takes us. We test the shortened link (the simplest of techniques to try and evade URL wrapping) and end up at a compromised GoDaddy hosted website – hxxp://teqzoft[.]com/websinfo/Confirm/websc_signin/.

Credential Phish Landing Page

Clean and basic, as long as you ignore the …

Continue Reading