otx.alienvault.com
Open in
urlscan Pro
99.84.88.117
Public Scan
URL:
https://otx.alienvault.com/pulse/64e378cb25cd6eeab226ccb3
Submission: On August 21 via api from US — Scanned from DE
Submission: On August 21 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
× Loading... * Browse * Scan Endpoints * Create Pulse * Submit Sample * API Integration * Login | Sign Up All * Login | Sign Up * Share Actions Subscribers (242151) Suggest Edit Clone Embed Download Report Spam CUBA RANSOMWARE DEPLOYS NEW TOOLS: TARGETS CRITICAL INFRASTRUCTURE SECTOR IN THE U.S. AND IT INTEGRATOR IN LATIN AMERICA * Created 1 hour ago by AlienVault * Public * TLP: White Researchers has discovered and documented new tools used by the Cuba ransomware threat group. Cuba ransomware is currently into the fourth year of its operation and shows no sign of slowing down. In the first half of 2023 alone, the operators behind Cuba ransomware were the perpetrators of several high-profile attacks across disparate industries. Reference: https://blogs.blackberry.com/en/2023/08/cuba-ransomware-deploys-new-tools-targets-critical-infrastructure-sector-in-the-usa-and-it-integrator-in-latin-america Tags: primary article, cybersecurity, cuba, cuba ransomware, bughatch, dlls, united, ttps, cuban, republic, profero, russianspeaking, cobalt strike, metasploit, powershell, colddraw, fidel Adversary: Cuba Industry: Critical Infrastructure Targeted Countries: Cuba , United States of America , Mexico , Guatemala , Panama , Colombia , Ecuador , Chile Malware Families: COLDDRAW , Fidel , BUGHATCH , Cobalt Strike , Cuba Att&ck IDs: T1016 - System Network Configuration Discovery , T1018 - Remote System Discovery , T1036 - Masquerading , T1057 - Process Discovery , T1059 - Command and Scripting Interpreter , T1068 - Exploitation for Privilege Escalation , T1071 - Application Layer Protocol , T1078 - Valid Accounts , T1083 - File and Directory Discovery , T1090 - Proxy , T1105 - Ingress Tool Transfer , T1106 - Native API , T1124 - System Time Discovery , T1133 - External Remote Services , T1135 - Network Share Discovery , T1140 - Deobfuscate/Decode Files or Information , T1204 - User Execution , T1211 - Exploitation for Defense Evasion , T1212 - Exploitation for Credential Access , T1218 - Signed Binary Proxy Execution , T1219 - Remote Access Software , T1543 - Create or Modify System Process , T1548 - Abuse Elevation Control Mechanism , T1562 - Impair Defenses , T1569 - System Services , T1570 - Lateral Tool Transfer , T1027 - Obfuscated Files or Information , T1021 - Remote Services , T1110 - Brute Force , T1574 - Hijack Execution Flow , T1497 - Virtualization/Sandbox Evasion , T1095 - Non-Application Layer Protocol , T1553 - Subvert Trust Controls , T1566 - Phishing Endpoint Security Scan your endpoints for IOCs from this Pulse! Learn more * Indicators of Compromise (21) * Related Pulses (54) * Comments (0) * History (0) CVE (2)FileHash-SHA256 (9)FileHash-MD5 (5)FileHash-SHA1 (5) TYPES OF INDICATORS Show 10 25 50 100 entries Search: type indicator Role title Added Active related Pulses FileHash-SHA256cf87a44c575d391df668123b05c207eef04b91e54300d1cbbec2f48f5209d4a4Aug 21, 2023, 2:46:35 PM4FileHash-SHA256bd93d88cb70f1e33ff83de4d084bb2b247d0b2a9cec61ae45745f2da85ca82d2Aug 21, 2023, 2:46:35 PM6FileHash-SHA2569b1b15a3aacb0e786a608726c3abfc94968915cedcbd239ddf903c4a54bfcf0cWin64:DangerousSig\ [Trj]Aug 21, 2023, 2:46:35 PM24FileHash-SHA256765d84ae85561bf5dbc1187da2b2cef91da9f222bcc6cf2c12cacd36e44bcffdAug 21, 2023, 2:46:35 PM4FileHash-SHA25658ba30052d249805caae0107a0e2a5a3cb85f3000ba5479fafb7767e2a5a78f3Aug 21, 2023, 2:46:35 PM4FileHash-SHA2564b5229b3250c8c08b98cb710d6c056144271de099a57ae09f5d2097fc41bd4f1Aug 21, 2023, 2:46:35 PM15FileHash-SHA2563a8b7c1fe9bd9451c0a51e4122605efc98e7e4e13ed117139a13e4749e211ed0stack_stringAug 21, 2023, 2:46:35 PM36FileHash-SHA2561c2d7f19f8c12e055e1ba8cdf5334e6cb5510847783fbe36121a35ad70f09eb3Aug 21, 2023, 2:46:35 PM4FileHash-SHA256075de997497262a9d105afeadaaefc6348b25ce0e0126505c24aa9396c251e85Aug 21, 2023, 2:46:35 PM4FileHash-SHA1a804ebec7e341b4d98d9e94f6e4860a55ea1638dWin64:DangerousSig\ [Trj]Aug 21, 2023, 2:46:35 PM21 SHOWING 1 TO 10 OF 21 ENTRIES 1 2 3 Next COMMENTS You must be logged in to leave a comment. Refresh Comments * © Copyright 2023 AlienVault, Inc. * Legal * Status