PULSE NAME
Privileges and Credentials: Phished at the Request of Counsel
WHITE Shell Crew AlienVault 2017-06-06 Modified: 2019-12-06
28
IOCs
MEDIUM VOLUME
In May and June 2017, FireEye observed a phishing campaign targeting at least seven global law and investment firms. We have associated this campaign with APT19, a group that we assess is composed of freelancers, with some degree of sponsorship by the Chinese government. APT19 used three different techniques to attempt to compromise targets. In early May, the phishing lures leveraged RTF attachments that exploited the Microsoft Windows vulnerability described in CVE 2017-0199. Toward the end of May, APT19 switched to using macro-enabled Microsoft Excel (XLSM) documents. In the most recent versions, APT19 added an application whitelisting bypass to the macro-enabled Microsoft Excel (XLSM) documents. At least one observed phishing lure delivered a Cobalt Strike payload.
Indicators of Compromise (8 / 28 total)
All URL hostname FileHash-MD5 email CVE YARA
TYPEINDICATORDESCRIPTIONCREATED
FileHash-MD5 0bef39d0e10b1edfe77617f494d733a8 2017-06-06
FileHash-MD5 0e6da59f10e1c4685bb5b35a30fc8fb6 2017-06-06
FileHash-MD5 1151619d06a461456b310096db6bc548 2017-06-06
FileHash-MD5 30f149479c02b741e897cdb9ecd22da7 2017-06-06
FileHash-MD5 38125a991efc6ab02f7134db0ebe21b6 2017-06-06
FileHash-MD5 3a1dca21bfe72368f2dd46eb4d9b48c4 2017-06-06
FileHash-MD5 bae0b39197a1ac9e24bdf9a9483b18ea 2017-06-06
FileHash-MD5 cebd0e9e05749665d893e78c452607e2 2017-06-06