PULSE NAME
Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack
WHITE Sofacy AlienVault 2017-11-07 Modified: 2017-11-07
11
IOCs
MEDIUM VOLUME
During our monitoring of activities around the APT28 threat group, McAfee Advanced Threat Research analysts identified a malicious Word document that appears to leverage the Microsoft Office Dynamic Data Exchange (DDE) technique that has been previously reported by Advanced Threat Research. This document likely marks the first observed use of this technique by APT28. The use of DDE with PowerShell allows an attacker to execute arbitrary code on a victim’s system regardless whether macros are enabled. (McAfee product detection is covered in the Indicators of Compromise section at the end of the document.) APT28 has recently focused on using different themes. In this case it capitalized on the recent terrorist attack in New York City. The document itself is blank. Once opened, the document contacts a control server to drop the first stage of the malware, Seduploader, onto a victim’s system.
Indicators of Compromise (4 / 11 total)
All domain URL FileHash-SHA1
TYPEINDICATORDESCRIPTIONCREATED
URL http://netmediaresources.com/config.txt 2017-11-07
URL http://netmediaresources.com/media/resource/vms.dll 2017-11-07
URL http://sendmevideo.org/SaberGuardian2017.docx 2017-11-07
URL http://sendmevideo.org/dh2025e/eh.dll 2017-11-07