www.cisa.gov Open in urlscan Pro
2a02:26f0:3100:389::447a  Public Scan

URL: https://www.cisa.gov/news-events/analysis-reports/ar23-325a
Submission: On November 29 via api from DE — Scanned from DE

Form analysis 2 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id2">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id51" class="gstl_51 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti51" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id2" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st51" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb51" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

Skip to main content

An official website of the United States government

Here’s how you know

Here’s how you know

Official websites use .gov
A .gov website belongs to an official government organization in the United
States.

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the
.gov website. Share sensitive information only on official, secure websites.


Cybersecurity & Infrastructure Security Agency
America's Cyber Defense Agency

Search

×

search
 

Menu
Close
×

search
 

 * Topics
   Topics
   Cybersecurity Best Practices
   Cyber Threats and Advisories
   Critical Infrastructure Security and Resilience
   Election Security
   Emergency Communications
   Industrial Control Systems
   Information and Communications Technology Supply Chain Security
   Partnerships and Collaboration
   Physical Security
   Risk Management
   How can we help?
   GovernmentEducational InstitutionsIndustryState, Local, Tribal, and
   TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help
   LocallyFaith-Based CommunityExecutives
 * Spotlight
 * Resources & Tools
   Resources & Tools
   All Resources & Tools
   Services
   Programs
   Resources
   Training
   Groups
 * News & Events
   News & Events
   News
   Events
   Cybersecurity Alerts & Advisories
   Directives
   Request a CISA Speaker
   Congressional Testimony
 * Careers
   Careers
   Benefits & Perks
   HireVue Applicant Reasonable Accommodations Process
   Hiring
   Resume & Application Tips
   Students & Recent Graduates
   Veteran and Military Spouses
   Work @ CISA
 * About
   About
   Culture
   Divisions & Offices
   Regions
   Leadership
   Doing Business with CISA
   Site Links
   Reporting Employee and Contractor Misconduct
   CISA GitHub
   Contact Us

Report a Cyber Issue
America's Cyber Defense Agency
Breadcrumb
 1. Home
 2. News & Events
 3. Cybersecurity Advisories
 4. Analysis Report

Share:


Analysis Report


MAR-10478915-1.V1 CITRIX BLEED

Release Date
November 21, 2023
Alert Code
AR23-325A
Related topics:
Cyber Threats and Advisories, Malware, Phishing, and Ransomware, Incident
Detection, Response, and Prevention


  


NOTIFICATION

This report is provided "as is" for informational purposes only. The Department
of Homeland Security (DHS) does not provide any warranties of any kind regarding
any information contained herein. The DHS does not endorse any commercial
product or service referenced in this bulletin or otherwise.

This document is marked TLP:CLEAR--Recipients may share this information without
restriction. Sources may use TLP:CLEAR when information carries minimal or no
foreseeable risk of misuse, in accordance with applicable rules and procedures
for public release. Subject to standard copyright rules, TLP:CLEAR information
may be shared without restriction. For more information on the Traffic Light
Protocol (TLP), see http://www.cisa.gov/tlp.


SUMMARY

DESCRIPTION

Responding to the recently disclosed CVE-2023-4966, affecting Citrix NetScaler
ADC and NetScaler Gateway appliances, CISA received four files for analysis that
show files being used to save registry hives, dump the Local Security Authority
Subsystem Service (LSASS) process memory to disk, and attempts to establish
sessions via Windows Remote Management (WinRM). The files include:

 * Windows Batch file (.bat)
 * Windows Executable (.exe)
 * Windows Dynamic Link Library (.dll)
 * Python Script (.py)

For more information about this vulnerability, see Joint Cybersecurity
Advisory #StopRansomware: LockBit 3.0 Ransomware Affiliates Exploit CVE
2023-4966 Citrix Bleed Vulnerability.

Download the PDF version of this report:

MAR-10478915-1.v1 Citrix Bleed (PDF, 547.33 KB )

For a downloadable copy of IOCs associated with this MAR in JSON format, see:

AR23-325A JSON (JSON, 37.22 KB )

SUBMITTED FILES (4)

17a27b1759f10d1f6f1f51a11c0efea550e2075c2c394259af4d3f855bbcc994 (a.dll)

906602ea3c887af67bcb4531bbbb459d7c24a2efcb866bcb1e3b028a51f12ae6 (a.py)

98e79f95cf8de8ace88bf223421db5dce303b112152d66ffdf27ebdfcdf967e9 (a.bat)

e557e1440e394537cca71ed3d61372106c3c70eb6ef9f07521768f23a0974068 (a.exe)


FINDINGS

98E79F95CF8DE8ACE88BF223421DB5DCE303B112152D66FFDF27EBDFCDF967E9

DETAILS

-->

Name a.bat Size 376 bytes Type DOS batch file, ASCII text, with CRLF line
terminators MD5 52d5e2a07cd93c14f1ba170e3a3d6747 SHA1
8acaf9908229871ab33033df7b6a328ec1db56d5 SHA256
98e79f95cf8de8ace88bf223421db5dce303b112152d66ffdf27ebdfcdf967e9 SHA512
317414f28d34f8295aa76cf9f39d4fd42c9bad292458dbd2a19f08a6a8b451e271179b7ef78afd8a2fe92a2e1103d9ef5e220557febf42d91900c268b8d61b69
ssdeep 6:halw5fwmUDXSLp8k7KdXSLp8kukK7va2RK4HvEEIVpmYY:sMULS98QAS98kuZ7XPcK3
Entropy 4.675128 Malware Result unknown

ANTIVIRUS

No matches found.

YARA RULES

 * rule CISA_10478915_01 : trojan installs_other_components
   {
      meta:
          author = "CISA Code & Media Analysis"
          incident = "10478915"
          date = "2023-11-06"
          last_modified = "20231108_1500"
          actor = "n/a"
          family = "n/a"
          capabilities = "installs-other-components"
          malware_Type = "trojan"
          tool_type = "information-gathering"
          description = "Detects trojan .bat samples"
          sha256 =
   "98e79f95cf8de8ace88bf223421db5dce303b112152d66ffdf27ebdfcdf967e9"
      strings:
          $s1 = { 63 3a 5c 77 69 6e 64 6f 77 73 5c 74 61 73 6b 73 5c 7a 2e 74 78
   74 }
          $s2 = { 72 65 67 20 73 61 76 65 20 68 6b 6c 6d 5c 73 79 73 74 65 6d 20
   63 3a 5c 77 69 6e 64 6f 77 73 5c 74 61 73 6b 73 5c 65 6d }
          $s3 = { 6d 61 6b 65 63 61 62 20 63 3a 5c 75 73 65 72 73 5c 70 75 62 6c
   69 63 5c 61 2e 70 6e 67 20 63 3a 5c 77 69 6e 64 6f 77 73 5c 74 61 73 6b 73 5c
   61 2e 63 61 62 }
      condition:
          all of them
   }

SSDEEP MATCHES

No matches found.

RELATIONSHIPS

98e79f95cf... Related_To
e557e1440e394537cca71ed3d61372106c3c70eb6ef9f07521768f23a0974068 98e79f95cf...
Related_To 17a27b1759f10d1f6f1f51a11c0efea550e2075c2c394259af4d3f855bbcc994

DESCRIPTION

This file is a Windows batch file called a.bat that is used to execute the file
called a.exe with the file called a.dll as an argument. The output is printed to
a file named 'z.txt' located in the path C:\Windows\Tasks. Next, a.bat pings the
loop back internet protocol (IP) address 127.0.0[.]1 three times.

The next command it runs is reg save to save the HKLM\SYSTEM registry hive into
the C:\Windows\tasks\em directory. Again, a.bat pings the loop back address
127.0.0[.]1 one time before executing another reg save command and saves the
HKLM\SAM registry hive into the C:\Windows\Task\am directory. Next, a.bat runs
three makecab commands to create three Cabinet (.cab) files from the previously
mentioned saved registry hives and one file named C:\Users\Public\a.png. The
names of the .cab files are as follows:

--Start names and paths of .cab files created--
c:\windows\tasks\em.cab
c:\windows\tasks\am.cab
c:\windows\tasks\a.cab
--End names and paths of .cab files created--

SCREENSHOTS


Figure 1. - This is the full contents of the file a.bat.

E557E1440E394537CCA71ED3D61372106C3C70EB6EF9F07521768F23A0974068

TAGS

trojan

DETAILS

-->

Name a.exe Size 145920 bytes Type PE32+ executable (console) x86-64, for MS
Windows MD5 37f7241963cf8279f7c1d322086a5194 SHA1
ec401ae8ddebef4038cedb65cc0d5ba6c1fdef28 SHA256
e557e1440e394537cca71ed3d61372106c3c70eb6ef9f07521768f23a0974068 SHA512
02c2473b90ba787fea41a9840c7dc9a9869685ca8fdca3521278e0cc986e1797e36552f41f1ac206f5ec5bdc0ac40f13cd36217aea3aad13518e9764ea92c1f7
ssdeep 3072:u8txkT6wDLf/p3ufznQbCQVlvxxV5hmWIh:NgpDbZufLQpjxJ9U Entropy 6.094246
Malware Result unknown

ANTIVIRUS

Antiy Trojan/Win64.Malgent Avira TR/Redcap.sbphc Bitdefender
Trojan.GenericKD.70103917 Emsisoft Trojan.GenericKD.70103917 (B) IKARUS
Trojan.Win64.Malgent K7 Riskware ( 00584baa1 )

YARA RULES

 * rule CISA_10478915_02 : trojan installs_other_components
   {
      meta:
          author = "CISA Code & Media Analysis"
          incident = "10478915"
          date = "2023-11-06"
          last_modified = "20231108_1500"
          actor = "n/a"
          family = "n/a"
          capabilities = "installs-other-components"
          malware_type = "trojan"
          tool_type = "unknown"
          description = "Detects trojan PE32 samples"
          sha256 =
   "e557e1440e394537cca71ed3d61372106c3c70eb6ef9f07521768f23a0974068"
      strings:
          $s1 = { 57 72 69 74 65 46 69 6c 65 }
          $s2 = { 41 70 70 50 6f 6c 69 63 79 47 65 74 50 72 6f 63 65 73 73 54 65
   72 6d 69 6e 61 74 69 6f 6e 4d 65 74 68 6f 64 }
          $s3 = { 6f 70 65 72 61 74 6f 72 20 63 6f 5f 61 77 61 69 74 }
          $s4 = { 43 6f 6d 70 6c 65 74 65 20 4f 62 6a 65 63 74 20 4c 6f 63 61 74
   6f 72 }
          $s5 = { 64 65 6c 65 74 65 5b 5d }
          $s6 = { 4e 41 4e 28 49 4e 44 29 }
      condition:
          uint16(0) == 0x5a4d and pe.imphash() ==
   "6e8ca501c45a9b85fff2378cffaa24b2" and pe.size_of_code == 84480 and all of
   them
   }

SSDEEP MATCHES

No matches found.

RELATIONSHIPS

e557e1440e... Related_To
17a27b1759f10d1f6f1f51a11c0efea550e2075c2c394259af4d3f855bbcc994 e557e1440e...
Related_To 98e79f95cf8de8ace88bf223421db5dce303b112152d66ffdf27ebdfcdf967e9

DESCRIPTION

This file is a 64-bit Windows command-line executable called a.exe that is
executed by a.bat. This file issues the Remote Procedure Call (RPC)
ncalrpc:[lsasspirpc] to the RPC end point to provide a file path to the LSASS on
the infected machine. Once the file path is returned, the malware loads the
accompanying DLL file called a.dll into the running LSASS process. If the DLL is
correctly loaded, then the malware outputs the message "[*]success" in the
console.

17A27B1759F10D1F6F1F51A11C0EFEA550E2075C2C394259AF4D3F855BBCC994

TAGS

trojan

DETAILS

-->

Name a.dll Size 106496 bytes Type PE32+ executable (DLL) (console) x86-64, for
MS Windows MD5 206b8b9624ee446cad18335702d6da19 SHA1
364ef2431a8614b4ef9240afa00cd12bfba3119b SHA256
17a27b1759f10d1f6f1f51a11c0efea550e2075c2c394259af4d3f855bbcc994 SHA512
efa720237bd2773719d7f8e377f63f93d25a691a6f2b8f52ff9ecbd1495c215690d01400d8b7fd9bb79b47de09817d72c82676b67ed70ecf61b002c7d8e9e11d
ssdeep 3072:oCNLoO2N+p5Fm6nfZvD8sLVdN9dtFiokDFMYLcu:j1o/+34YRvDtFiwu Entropy
5.940807 Malware Result unknown

ANTIVIRUS

Antiy Trojan/Win64.Agent Bitdefender Trojan.GenericKD.70057986 Emsisoft
Trojan.GenericKD.70057986 (B) ESET a variant of Win64/Agent.DAU trojan IKARUS
Trojan.Win64.Agent K7 Trojan ( 005ad67a1 ) Zillya! Trojan.Agent.Win64.39686

YARA RULES

 * rule CISA_10478915_03 : trojan steals_authentication_credentials
   credential_exploitation
   {
      meta:
          author = "CISA Code & Media Analysis"
          incident = "10478915"
          date = "2023-11-06"
          last_modified = "20231108_1500"
          actor = "n/a"
          family = "n/a"
          capabilities = "steals-authentication-credentials"
          malware_type = "trojan"
          tool_type = "credential-exploitation"
          description = "Detects trojan DLL samples"
          sha256 =
   "17a27b1759f10d1f6f1f51a11c0efea550e2075c2c394259af4d3f855bbcc994"
      strings:
          $s1 = { 64 65 6c 65 74 65 }
          $s2 = { 3c 2f 74 72 75 73 74 49 6e 66 6f 3e }
          $s3 = { 42 61 73 65 20 43 6c 61 73 73 20 44 65 73 63 72 69 70 74 6f 72
   20 61 74 20 28 }
          $s4 = { 49 6e 69 74 69 61 6c 69 7a 65 43 72 69 74 69 63 61 6c 53 65 63
   74 69 6f 6e 45 78 }
          $s5 = { 46 69 6e 64 46 69 72 73 74 46 69 6c 65 45 78 57 }
          $s6 = { 47 65 74 54 69 63 6b 43 6f 75 6e 74 }
      condition:
          uint16(0) == 0x5a4d and pe.subsystem == pe.SUBSYSTEM_WINDOWS_CUI and
   pe.size_of_code == 56832 and all of them
   }

SSDEEP MATCHES

No matches found.

RELATIONSHIPS

17a27b1759... Related_To
e557e1440e394537cca71ed3d61372106c3c70eb6ef9f07521768f23a0974068 17a27b1759...
Related_To 98e79f95cf8de8ace88bf223421db5dce303b112152d66ffdf27ebdfcdf967e9

DESCRIPTION

This file is a 64-bit Windows DLL called a.dll that is executed by a.bat as a
parameter for the file a.exe. The file a.exe loads this file into the running
LSASS process on the infected machine. The file a.dll calls the Windows API
CreateFileW to create a file called a.png in the path C:\Users\Public.

Next, a.dll loads DbgCore.dll then utilizes MiniDumpWriteDump function to dump
LSASS process memory to disk. If successful, the dumped process memory is
written to a.png. Once this is complete, the file a.bat specifies that the file
a.png is used to create the cabinet file called a.cab in the path
C:\Windows\Tasks.

SCREENSHOTS


Figure 2. - This is the call to the register R14, which contains the
MiniDumpWriteDump function that is being leveraged to dump the LSASS process
memory to disk.

906602EA3C887AF67BCB4531BBBB459D7C24A2EFCB866BCB1E3B028A51F12AE6

DETAILS

-->

Name a.py Size 2645 bytes Type Python script, ASCII text executable, with CRLF
line terminators MD5 9cff554fa65c1b207da66683b295d4ad SHA1
b8e74921d7923c808a0423e6e46807c4f0699b6e SHA256
906602ea3c887af67bcb4531bbbb459d7c24a2efcb866bcb1e3b028a51f12ae6 SHA512
131621770e1899d81e6ff312b3245fe4e4013c36f82818a82fdd319982e6b742a72d906b6fb86c422bb720cd648f927b905a8fc193299ad7d8b3947e766abbd3
ssdeep
48:BpsnUP6s3ceBg5YbFYNXEtUyzzYyUyh0+FVzYA6P+Fqbaug9trYhTHhIQG86w09:BuUP6sseBIOqXEvpcrb89Z2THCQ6P
Entropy 4.748972 Malware Result unknown

ANTIVIRUS

No matches found.

YARA RULES

 * rule CISA_10478915_04 : backdoor communicates_with_c2 remote_access
   {
      meta:
          author = "CISA Code & Media Analysis"
          incident = "10478915"
          date = "2023-11-06"
          last_modified = "20231108_1500"
          actor = "n/a"
          family = "n/a"
          capabilities = "communicates-with-c2"
          malware_type = "backdoor"
          tool_type = "remote-access"
          description = "Detects trojan python samples"
          sha256 =
   "906602ea3c887af67bcb4531bbbb459d7c24a2efcb866bcb1e3b028a51f12ae6"
      strings:
          $s1 = { 70 6f 72 74 20 3d 20 34 34 33 20 69 66 20 22 68 74 74 70 73 22
   }
          $s2 = { 6b 77 61 72 67 73 2e 67 65 74 28 22 68 61 73 68 70 61 73 73 77
   64 22 29 3a }
          $s3 = { 77 69 6e 72 6d 2e 53 65 73 73 69 6f 6e 20 62 61 73 69 63 20 65
   72 72 6f 72 }
          $s4 = { 57 69 6e 64 77 6f 73 63 6d 64 2e 72 75 6e 5f 63 6d 64 28 73 74
   72 28 63 6d 64 29 29 }
      condition:
          all of them
   }

SSDEEP MATCHES

No matches found.

DESCRIPTION

This file is a Python script called a.py that attempts to leverage WinRM to
establish a session. The script attempts to authenticate to the remote machine
using NT LAN Manager (NTLM) if the keyword "hashpasswd" is present. If the
keyword "hashpasswd" is not present, then the script attempts to authenticate
using basic authentication. Once a WinRM session is established with the remote
machine, the script has the ability to execute command line arguments on the
remote machine. If there is no command specified, then a default command of
“whoami” is run.

SCREENSHOTS


Figure 3. - This is the portion of the Python script that shows the command line
options.

Figure 4. - This is the function showing how the script decides between using
NTLM or basic authentication based on the keyword "hashpasswd".


RELATIONSHIP SUMMARY

98e79f95cf... Related_To
e557e1440e394537cca71ed3d61372106c3c70eb6ef9f07521768f23a0974068 98e79f95cf...
Related_To 17a27b1759f10d1f6f1f51a11c0efea550e2075c2c394259af4d3f855bbcc994
e557e1440e... Related_To
17a27b1759f10d1f6f1f51a11c0efea550e2075c2c394259af4d3f855bbcc994 e557e1440e...
Related_To 98e79f95cf8de8ace88bf223421db5dce303b112152d66ffdf27ebdfcdf967e9
17a27b1759... Related_To
e557e1440e394537cca71ed3d61372106c3c70eb6ef9f07521768f23a0974068 17a27b1759...
Related_To 98e79f95cf8de8ace88bf223421db5dce303b112152d66ffdf27ebdfcdf967e9


RECOMMENDATIONS

CISA recommends that users and administrators consider using the following best
practices to strengthen the security posture of their organization's systems.
Any configuration changes should be reviewed by system owners and administrators
prior to implementation to avoid unwanted impacts.

 * Maintain up-to-date antivirus signatures and engines.
 * Keep operating system patches up-to-date.
 * Disable File and Printer sharing services. If these services are required,
   use strong passwords or Active Directory authentication.
 * Restrict users' ability (permissions) to install and run unwanted software
   applications. Do not add users to the local administrators group unless
   required.
 * Enforce a strong password policy and implement regular password changes.
 * Exercise caution when opening e-mail attachments even if the attachment is
   expected and the sender appears to be known.
 * Enable a personal firewall on agency workstations, configured to deny
   unsolicited connection requests.
 * Disable unnecessary services on agency workstations and servers.
 * Scan for and remove suspicious e-mail attachments; ensure the scanned
   attachment is its "true file type" (i.e., the extension matches the file
   header).
 * Monitor users' web browsing habits; restrict access to sites with unfavorable
   content.
 * Exercise caution when using removable media (e.g., USB thumb drives, external
   drives, CDs, etc.).
 * Scan all software downloaded from the Internet prior to executing.
 * Maintain situational awareness of the latest threats and implement
   appropriate Access Control Lists (ACLs).

Additional information on malware incident prevention and handling can be found
in National Institute of Standards and Technology (NIST) Special Publication
800-83, "Guide to Malware Incident Prevention & Handling for Desktops and
Laptops".


CONTACT INFORMATION

 * 1-888-282-0870
 * CISA Service Desk(link sends email) (UNCLASS)
 * CISA SIPR(link sends email) (SIPRNET)
 * CISA IC(link sends email) (JWICS)

CISA continuously strives to improve its products and services. You can help by
answering a very short series of questions about this product at the following
URL: https://us-cert.cisa.gov/forms/feedback/


DOCUMENT FAQ

What is a MIFR? A Malware Initial Findings Report (MIFR) is intended to provide
organizations with malware analysis in a timely manner. In most instances this
report will provide initial indicators for computer and network defense. To
request additional analysis, please contact CISA and provide information
regarding the level of desired analysis.

What is a MAR? A Malware Analysis Report (MAR) is intended to provide
organizations with more detailed malware analysis acquired via manual reverse
engineering. To request additional analysis, please contact CISA and provide
information regarding the level of desired analysis.

Can I edit this document? This document is not to be edited in any way by
recipients. All comments or questions related to this document should be
directed to the CISA at 1-888-282-0870 or CISA Service Desk(link sends email).

Can I submit malware to CISA? Malware samples can be submitted via three
methods:

 * Web: https://malware.us-cert.gov
 * E-Mail: submit@malware.us-cert.gov(link sends email)
 * FTP: ftp.malware.us-cert.gov (anonymous)

CISA encourages you to report any suspicious activity, including cybersecurity
incidents, possible malicious code, software vulnerabilities, and
phishing-related scams. Reporting forms can be found on CISA's homepage at
www.cisa.gov.

This product is provided subject to this Notification and this Privacy &
Use policy.


TAGS

Topics
Cyber Threats and Advisories, Malware, Phishing, and Ransomware, Incident
Detection, Response, and Prevention


PLEASE SHARE YOUR THOUGHTS

We recently updated our anonymous product survey; we’d welcome your feedback.


RELATED ADVISORIES

Sep 07, 2023
Analysis Report | AR23-250A


MAR-10454006.R5.V1 SUBMARINE, SKIPJACK, SEASPRAY, WHIRLPOOL, AND SALTWATER
BACKDOORS

Sep 07, 2023
Analysis Report | AR23-250A


MAR-10430311-1.V1 MULTIPLE NATION-STATE THREAT ACTORS EXPLOIT CVE-2022-47966 AND
CVE-2022-42475

Aug 31, 2023
Analysis Report | AR23-243A


INFAMOUS CHISEL MALWARE ANALYSIS REPORT

Aug 18, 2023
Analysis Report | AR23-230A


MAR-10459736.R1.V1 WHIRLPOOL BACKDOOR

Return to top
 * Topics
 * Spotlight
 * Resources & Tools
 * News & Events
 * Careers
 * About

Cybersecurity & Infrastructure Security Agency
 * Facebook
 * Twitter
 * LinkedIn
 * YouTube
 * Instagram
 * RSS

CISA Central 888-282-0870 Central@cisa.dhs.gov(link sends email)
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
 * About CISA
 * Accessibility
 * Budget and Performance
 * DHS.gov
 * FOIA Requests
 * No FEAR Act
 * Office of Inspector General
 * Privacy Policy
 * Subscribe
 * The White House
 * USA.gov
 * Website Feedback