Phishing via Microsoft Teams Eases DarkGate Malware Infiltration

Phishing via Microsoft Teams Eases DarkGate Malware Infiltration | Trend Micro (US)

Content has been added to your Folio

Go to Folio (0)

close

Vishing via Microsoft Teams Facilitates DarkGate Malware Intrusion











Phishing via Microsoft Teams Eases DarkGate Malware Infiltration | Trend Micro (US)












Content has been added to your Folio


Trend Micro Vision One Threat Intelligence

To stay ahead of evolving threats, Trend Micro customers can access a range of Intelligence Reports and Threat Insights within Trend Micro Vision One. Threat Insights aids customers in preempting cyber threats and better prepares them for emerging threats. It furnishes comprehensive insights on threat actors, their nefarious activities, and the methodologies they employ. By leveraging this intelligence, customers can proactively fortify their environments, mitigate risks, and effectively counter threats.

Trend Micro Vision One Intelligence Reports App [IOC Sweeping]

  • Vishing via Microsoft Teams Facilitates DarkGate Malware Intrusion
  • Spike in DarkGate Activity – with a new version and new infrastructure
  • A new DARKGATE campaign was observed

Trend Micro Vision One Threat Insights App

Hunting Queries

Trend Micro Vision One Search App

To search for probable malicious activities linked to DarkGate, the below query may be employed.  This threat hunting query identifies the presence of Autoit3 and script files (.a3x) that are generated and executed.  Please note that this alert could also be triggered by regular activities.

  • eventSubId: 101 – TELEMETRY_FILE_CREATE
  • eventSubId: 2 – TELEMETRY_PROCESS_CREATE

eventSubId:101 andeventSubId:2 and (objectCmd:(Autoit3.exe or *.a3x) or processCmd:(Autoit3.exe or *.a3x))

More search queries are accessible to Vision One customers with Threat Insights Entitlement enabled.

Indicators of Compromise (IOCs)

SHA256 Indicator Detection
1cbda9a3f202e7aacc57bcf3d43ec7b1ca42564a947d6b5a778df90cddef079a  SafeStore.dll  Trojan.Win64.DARKGATE.A 
4e291266399bd8db27da0f0913c041134657f3b1cf45f340263444c050ed3ee1  SystemCert.exe  Trojan.Win32.DARKGATE.E 
faa54f7152775fa6ccaecc2fe4a6696e5b984dfa41db9a622e4d3e0f59c82d8b  StaticSrv.exe  Trojan.Win32.DARKGATE.E 
bb56354cdb241de0051b7bcc7e68099e19cc2f26256af66fad69e3d2bc8a8922  script.a3x  Trojan.AutoIt.DARKGATE.D 
e4d13af4bfc3effe4f515c2530b1b182e18ad0c0a3dacac4dd80d6edcf0b007a  spamfilter_v1.4331.vbs  Trojan.VBS.DARKGATE.B 
URL/IP Rating Category
179.60.149.194 Dangerous C&C Server
hxxp://179[.]60[.]149[.]194:8080/fdgjsdmt Dangerous Malware Accomplice

Tags

sXpIBdPeKzI9PC2p0SWMpUSM2NSxWzPyXTMLlbXmYa0R20xk

About Author

Tags: , , , , , , , ,

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.