PULSE NAME
An Update on Winnti
WHITE Winnti AlienVault 2017-10-17 Modified: 2017-10-17
20
IOCs
MEDIUM VOLUME
The group continues to primarily use publicly available pentesting tools outside of the US. In the multiple incidents we have been involved in, the group has relied heavily on BeEF and Cobalt Strike. Cobalt Strike has been their primary toolset for command and control within the victim networks, while BeEF has been used to assist in the initial infection process. On the network traffic analysis end, post compromise activity results in some interesting but not unexpected activity. First, Winnti uses Cobalt Strike to collect credentials and move laterally. The stolen credentials may be used for remote access into the victim network if applicable. The group also continues to focus on theft of code signing certificates and internal documentation, including company files and internal communication history (chats/emails).
Indicators of Compromise (20)
All domain FileHash-MD5
TYPEINDICATORDESCRIPTIONCREATED
domain alienlol.com 2017-10-17
domain awsstatics.com 2017-10-17
domain dnslog.mobi 2017-10-17
domain exoticlol.com 2017-10-17
domain google-searching.com 2017-10-17
domain immigrantlol.com 2017-10-17
domain martianlol.com 2017-10-17
domain microsoftsec.com 2017-10-17
domain outerlol.com 2017-10-17
domain sqlmapff.com 2017-10-17
domain ssrsec.com 2017-10-17
domain strangelol.com 2017-10-17
FileHash-MD5 19d12c8c98c1f21810efb43edc816c83 2017-10-17
FileHash-MD5 371acda8d719426b6a8867767260b9ce 2017-10-17
FileHash-MD5 42693ebe598ef575834d4f82adbd6593 2017-10-17
FileHash-MD5 5e769c5f1a0679e997ee59f4f93840a5 2017-10-17
FileHash-MD5 8cd778cd9b5e7201383f83e5927db6bf 2017-10-17
FileHash-MD5 8cf9db604b45bbf48f5d334dedf65e5b 2017-10-17
FileHash-MD5 d5d223f0112574d8a0e9e56bc94353ba 2017-10-17
FileHash-MD5 e798cfe49e6afb61f58d79a53f06d785 2017-10-17