otx.alienvault.com Open in urlscan Pro
99.86.4.91  Public Scan

URL: https://otx.alienvault.com/pulse/6213ad9cfa105eaa69e553d2?scan=1&utm_userid=swimlanecyou&utm_medium=inproduct&utm_source=ot...
Submission: On February 23 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

<form _ngcontent-ydo-c132="" novalidate="" class="login ng-untouched ng-pristine ng-invalid" id="welcomeLoginForm-pulse-detail" __bizdiag="-695151727" __biza="WJ__">
  <div _ngcontent-ydo-c132="" class="form-group"><label _ngcontent-ydo-c132="" for="id_login">Username</label><input _ngcontent-ydo-c132="" container="body" formcontrolname="login" id="id_login" name="login" placement="right" type="text"
      class="form-control input-alienvault ng-untouched ng-pristine ng-invalid"><!----></div>
  <div _ngcontent-ydo-c132="" class="form-group"><label _ngcontent-ydo-c132="" for="id_password">Password</label><input _ngcontent-ydo-c132="" container="body" formcontrolname="password" id="id_password" name="password" placement="right"
      type="password" class="form-control input-alienvault ng-untouched ng-pristine ng-invalid"><!----></div><button _ngcontent-ydo-c132="" id="loginBtn" type="submit" class="btn btn-att disabled" disabled=""> Log in
    <i _ngcontent-ydo-c132="" aria-hidden="true" class="fa fa-chevron-right smaller"></i></button>
  <div _ngcontent-ydo-c132="" class="remember-checkbox"><label _ngcontent-ydo-c132=""><input _ngcontent-ydo-c132="" id="id_remember" name="remember" type="checkbox"> REMEMBER ME</label></div>
</form>

Text Content

×

   
 * Browse
 * Scan Endpoints
 * Create Pulse
 * Submit Sample
 * API Integration
   
   
 * Login | Sign Up
   

All
   
 * Login | Sign Up
   
 * 
   


Share
Actions
Subscribers (176286)
Suggest Edit
Clone
Embed
Download
Report Spam



TEAMTNT CRYPTOMINING EXPLOSION

 * Created 2 days ago
   
 * Modified 2 days ago by AlienVault
 * Public
 * TLP: White

Over the past year the TeamTNT threat actor has been very active. TeamTNT is one
of the predominant cryptojacking threat actors currently targeting Linux
servers. This blog investigates the threat actor’s activity and their Tactics,
Techniques and Procedures (TTPs)—providing all of this information in one place
so security teams can better detect and prevent attacks from TeamTNT.

Reference:
https://www.intezer.com/blog/malware-analysis/teamtnt-cryptomining-explosion/
Tags:
xmrig miner, teamtnt, tsunami, diamorphine, docker, kubernetes, worm, mirai
Adversary:
TeamTNT
Malware Families:
XMRig Miner , Diamorphine , Summer , Tsunami , TeamTNT , Watchdogd , Ezuri
Att&ck IDs:
T1059 - Command and Scripting Interpreter , T1525 - Implant Internal Image ,
T1014 - Rootkit , T1036 - Masquerading , T1033 - System Owner/User Discovery ,
T1003 - OS Credential Dumping , T1102 - Web Service , T1071 - Application Layer
Protocol , T1113 - Screen Capture , T1021 - Remote Services , T1566 - Phishing ,
T1049 - System Network Connections Discovery , T1218 - Signed Binary Proxy
Execution , T1046 - Network Service Scanning , T1027 - Obfuscated Files or
Information , T1574 - Hijack Execution Flow , T1530 - Data from Cloud Storage
Object , T1543 - Create or Modify System Process , T1082 - System Information
Discovery , T1485 - Data Destruction , T1490 - Inhibit System Recovery , T1070 -
Indicator Removal on Host

Endpoint Security
Scan your endpoints for IOCs from this Pulse!
Learn more
 * Indicators of Compromise (287)
 * Related Pulses (120)
 * Comments (0)
 * History (0)

Domain (3)Other (13)URL (4)FileHash-SHA256 (114)FileHash-MD5 (75)FileHash-SHA1
(75)

TYPES OF INDICATORS

China (8)Switzerland (1)Germany (2)Netherlands (1)

THREAT INFRASTRUCTURE

Show
10 25 50 100
entries
Search:

type

indicator

Role

title

Added

Active

related Pulses

hostnamethe.borg.wtfFeb 21, 2022, 3:19:58 PM8

hostnameteamtnt.twilightparadox.comFeb 21, 2022, 3:19:58 PM1

hostnameirc.borg.wtfFeb 21, 2022, 3:19:58 PM11

domainteamtnt.redFeb 21, 2022, 3:19:58 PM31

domainkaiserfranz.ccFeb 21, 2022, 3:19:58 PM6

URLhttp://teamtnt.red/blog/Kubernetes.txt.Feb 21, 2022, 3:19:58 PM1

URLhttp://45.9.148.123/MoneroOcean/sh/init.shFeb 21, 2022, 3:19:58 PM1

URLhttp://45.9.148.123/COVID19/init.shPOSIX shell script, ASCII text executable,
with very long linesFeb 21, 2022, 3:19:58 PM1

IPv485.214.149.236Feb 21, 2022, 3:19:58 PM32

IPv445.9.150.36Feb 21, 2022, 3:19:58 PM13


SHOWING 1 TO 10 OF 287 ENTRIES
1
2
3
4
5
...
29
Next


COMMENTS

You must be logged in to leave a comment.

Refresh Comments

 * © Copyright 2022 AlienVault, Inc.
   
 * Legal
   
 * Status
   


Login to Initiate Scan
×
 * Sign Up
 * Log In

or
Username
Password
Log in
REMEMBER ME

Recover Your Password | Resend Verification Email