Attribution
In August 2021, a disgruntled CONTI affiliate leaked training documents, playbooks, and tools used to assist in CONTI ransomware operations. Mandiant has determined that some of the activity listed above overlaps with techniques in the playbooks disclosed in August.
At this time, due to the public release of this information, other unaffiliated actors may be replicating the techniques for their own motives and objectives. These victims seem to operate in a wide range of industries. The threat group’s motivations are currently unknown, but we suspect that the group is financially motivated based on the seemingly industry-agnostic leading to ransomware activity.
Managed Defense Threat Hunting
Experienced defenders from Managed Defense are constantly inspired by Mandiant’s global cyber threat intelligence and incident response experiences gained on the frontlines of the world’s most consequential cyber-attacks. Fueled by up-to-the-minute threat intelligence, the Managed Defense threat hunting team designs and conducts hunt missions to reveal the stealthiest threat actors. Mandiant threat hunting combines powerful data analytics, automation and elite experts with intuition and frontline experience. You can follow our hunters as their work unfolds in the Managed Defense portal. Each mission is mapped to the MITRE ATT&CK framework and includes related intelligence so you can take decisive action throughout your environment.
Technical Indicators & Warnings
MD5
1440caafb45e52b0b315c7467fcde11f
2077d8a65c8b08d64123c4ba3f03cbdd
2141919f65ab3ff4eab25e5032e25598
229152f0b00d55796780b00c233bf641
29bc15a6f0ff99084e986c3e6ab1208c
2b16a731a2e4dedfa3db0bf3068614bc
32885d012fa3b50199d7cde9735bcb8a
32cd02c4cd8938645a744b915056d133
3393bd9d04be1ff4e537464e1b79d078
3abbec0420aaf7a9960d9eabc08006d5
3e06c87faede153d4dab5ef1066fe0d7
3ed96f460438e7fddaa48e96c65cb44c
428166c513ed98c72e35fe127a9b5be6
48942b45679b3646000ac2fb6a99e0ed
5376112bebb371cdbe6b2a996fb6dae6
5cae01aea8ed390ce9bec17b6c1237e4
5cae01aea8ed390ce9bec17b6c1237e4
60db9dff2e50e00e937661d2a6950562
67a4f35cae2896e3922f6f4ab5966e2b
67a4f35cae2896e3922f6f4ab5966e2b
6ad4e37221adf3861bfa99a1c1d5faaa
6cd13e6429148e7f076b479664084488
7127cbc56e42fc59a09fd9006dd09daa
7575ecc5ac5ac568054eb36a5c8656c4
849b46e14df68dd687e71c7df8223082
8eb5f0bbd73b5ca32e60deb34e435320
9ed2084c6c01935dc5bb2508357be5a6
9f03ad59cb06b40e6187ef6d22d3b76b
a046e40693a33a1db2aec6d171d352ce
a0b793ff07493951ed392cdc641d3d62
a45c0a83ce2ea52d8edf915b1e169b8f
b4a8b58857649fad1cf8f247a0496c95
b850920c95b694f63aa47fc991396457
b9c9da113335874d0341f0ac1f5e225d
bd20223cb57c55559db81f17ef616070
c02916697ed71e5868d8ea456a4a1871
c08de039a30c3d3e1b1d18a9d353f44c
c12452167e810cde373d7a59d3302370
c9be3451e713382ecf0f7da656cef657
cb1fcc1c0c35cd4e0515b8bf02ba3303
d14b4a96edf70c74afe3d99101daaff8
e33847174fbd2b09abc418c1338fceec
e5decd05056634eace35396a22148bf1
e66ba648666c823433c473e6cfc2e4fc
e6c2dd8956074363e7d6708fb8063001
e6c2dd8956074363e7d6708fb8063001
f535505f337708fbb41cdd0830c6a2d4
Network Indicators
cmdadminu[.]com
zoomvideo-s[.]com
cloudfiletehnology[.]com
commandaadmin[.]com
clouds222[.]com
websekir[.]com
team-viewer[.]site
zoomvideo[.]site
sweepcakesoffers[.]com
pornofilmspremium[.]com
kdsjdsadas[.]online
bartmaaz[.]com
firsone1[.]online
178.21.11[.]77
193.124.18[.]128
YARA
rule M_Hunting_Downloader_BATLOADER_1
{
meta:
author = "Mandiant"
date_created = "2021-10-28"
date_modified = "2021-10-28"
version = "1.0"
description = "Detects strings for BATLOADER sample"
md5 = "6cd13e6429148e7f076b479664084488"
strings:
$s1 = "launch.bat" ascii
$s2 = "Error writing to batch file:" ascii
$s3 = "cmd.exe" ascii
$s4 = "/C" ascii
$s5 = "You entered an invalid email, please enter the email that was registered on website." ascii
condition:
uint16(0) == 0x5A4D and filesize > 4KB and filesize < 5MB and all of them
}
MITRE ATT&CK Mapping
ATT&CK Tactic Category | Techniques |
Reconnaissance |
Search Open Websites/Domains (T1593.002)
|
Resource Development |
Compromise Infrastructure (T1584) Stage Capabilities (T1608)
Develop Capabilities (T1587)
|
Initial Access | Supply Chain Compromise (T1195) |
Execution |
User Execution (T1204)
Command and Scripting Interpreter (T1059)
|
Persistence |
Boot or Logon Autostart Execution (T1547)
|
Privilege Escalation | External Remote Services (T1133) |
Defense Evasion |
Masquerading (T1036) Obfuscated Files or Information (T1027) Indicator Removal on Host (T1070)
Signed Binary Proxy Execution (T1218)
Impair Defenses (T1562)
|
Credential Access | Steal or Forge Kerberos Tickets: Kerberoasting (T1558) |
Discovery |
System Information Discovery (T1082) System Network Configuration Discovery (T1016) |
Command and Control | Remote Access Software (T1219) |
Acknowledgements
Special Thanks to Alip Asri in creating the IOCs for the Hunting Missions. And Ana Maria Martinez Gomez, Tufail Ahmed, Stephen Eckels, Dhanesh Kizhakkinan and Jacob Thompson for their assistance on the topic.
Source: https://www.mandiant.com/resources/seo-poisoning-batloader-atera