Shadow Chaser Group(@ShadowChasing1) 's Twitter Profile Photo

Today our researchers have found sample which maybe belongs to ( ) Group
ITW:3510590280406fa30eda94b3ae39058d
filename:TT - PR Advertisement 2022.doc
ITW:BAACA607BCE6BC4AD1DC694984C8DCE5
filename:media.dll
file path:C:\ProgramData\Microsoft Windows Media\media.dll

Today our researchers have found sample which maybe belongs to #Oceanlotus(#APT32) Group
ITW:3510590280406fa30eda94b3ae39058d
filename:TT - PR Advertisement 2022.doc
ITW:BAACA607BCE6BC4AD1DC694984C8DCE5
filename:media.dll
file path:C:\ProgramData\Microsoft Windows Media\media.dll
account_circle
blackorbird(@blackorbird) 's Twitter Profile Photo

APT Operation/Group Mid-2022 Summary Report
use tinyPortMapper forward traffic to Cobaltstrike sever , and New mips-architecture malware named 'Caja' discovered on controlled devices(IOT/Linux).
github.com/blackorbird/AP…

APT Operation/Group Mid-2022 Summary Report
#Oceanlotus use tinyPortMapper forward traffic to Cobaltstrike sever , and New mips-architecture malware named 'Caja' discovered on controlled devices(IOT/Linux).
github.com/blackorbird/AP…
account_circle
blackorbird(@blackorbird) 's Twitter Profile Photo

botnet : Torii/Caja
eu-draytek[.]com
top[.]haletteompson[.]com
mp.weixin.qq.com/s/v2wiJe-YPG0n…
mp-weixin-qq-com.translate.goog/s/v2wiJe-YPG0n…

#OceanLotus botnet : Torii/Caja
eu-draytek[.]com
top[.]haletteompson[.]com
mp.weixin.qq.com/s/v2wiJe-YPG0n…
mp-weixin-qq-com.translate.goog/s/v2wiJe-YPG0n…
account_circle
Aaron Jornet(@RexorVc0) 's Twitter Profile Photo

32

🐻Imitating 29

📍🇻🇳
💥🌏

⛓️ > Fake BMW PDF.LNK > mshta runs .HTA > Persistence > SC is loaded > Cobalt Strike >

🔗Chuangyu 404 Threat Intelligence: mp.weixin.qq.com/s/IB2w86cXcpmG…

#APT #OceanLotus #APT32 #Threat #Malware

🐻Imitating #APT29 #CozyBear

📍🇻🇳
💥🌏

⛓️ #Phishing > Fake BMW PDF.LNK > mshta runs .HTA > Persistence > SC is loaded > Cobalt Strike > #C2 

🔗Chuangyu 404 Threat Intelligence: mp.weixin.qq.com/s/IB2w86cXcpmG…
account_circle
Jazi(@h2jazi) 's Twitter Profile Photo

It looks like an old sample of has been submitted to VT today:

5b87ef34d174361f35b65c5ee684f1c3
2018年9月工作报告修改意见.doc

9b4c57e61f4df3b546aedf58b2f299cf
Log_Error.jpg

ristineho[.]com

It looks like an old sample of #OceanLotus #APT has been submitted to VT today:

5b87ef34d174361f35b65c5ee684f1c3
2018年9月工作报告修改意见.doc

9b4c57e61f4df3b546aedf58b2f299cf
Log_Error.jpg

ristineho[.]com
account_circle
سايبر دايبر(@CyberDaiber) 's Twitter Profile Photo

مجموعة القرصنة المعروفة باسم APT32 أو OceanLotus لديها الآن نسخة جديدة من البرامج الضارة لاختراق نظام تشغيل ماك لذلك ننصح الجميع بعدم الضغط فوق الروابط أو تنزيل المرفقات من رسائل البريد الإلكتروني الواردة من مصادر مشبوهة أو غير معروفة

مجموعة القرصنة المعروفة باسم APT32 أو OceanLotus لديها الآن نسخة جديدة من البرامج الضارة لاختراق نظام تشغيل ماك لذلك ننصح الجميع بعدم الضغط فوق الروابط أو تنزيل المرفقات من رسائل البريد الإلكتروني الواردة من مصادر مشبوهة أو غير معروفة
account_circle
Binni Shah(@binitamshah) 's Twitter Profile Photo

Malicious Payloads - Hiding beneath the WAV : threatvector.cylance.com/en_us/home/mal… cc Anuj Soni

How the OceanLotus Threat Group leveraged steganography to conceal malicious backdoor payloads within image files : s7d2.scene7.com/is/content/cyl… (pdf)

Malicious Payloads - Hiding beneath the WAV : threatvector.cylance.com/en_us/home/mal… cc @asoni

How the OceanLotus Threat Group leveraged steganography to conceal malicious backdoor payloads within image files : s7d2.scene7.com/is/content/cyl… (pdf)
account_circle
BlackBerry(@BlackBerry) 's Twitter Profile Photo

Get a glimpse inside the mind of the adversary and the techniques being used by OceanLotus (aka APT32) bddy.me/2Z2JgNK

Get a glimpse inside the mind of the adversary and the techniques being used by OceanLotus (aka APT32) bddy.me/2Z2JgNK
account_circle
Arkbird(@Arkbird_SOLG) 's Twitter Profile Photo

Recent maldoc which targets Japan people, the picture used is from a sample picture for the passport, this remembers oceanlotus group at used it similar samples for their fakes CV.
C2: 103.140.187.183
Ref : app.any.run/tasks/90643f1b…
cc: moto_sato @Rmy

Recent maldoc which targets Japan people, the picture used is from a sample picture for the passport, this remembers oceanlotus group at used it similar samples for their fakes CV.
C2: 103.140.187.183
Ref : app.any.run/tasks/90643f1b…
cc: @58_158_177_102 @Rmy_Reserve
account_circle
Objective-See Foundation(@objective_see) 's Twitter Profile Photo

Cat Self (Cat) & Adam Pennington (@_whatshisface) of MITRE explore what’s unique about ATT&CK (@MITREattack) for macOS, and the work they're doing to improve it in '21 🙌🏽🍎

Talk (& title) & delivery: A+++
'Becoming a Yogi on Mac ATT&CK w/ OceanLotus Postures'

Cat Self (@coolestcatiknow) & Adam Pennington (@_whatshisface) of MITRE explore what’s unique about ATT&CK (@MITREattack) for macOS, and the work they're doing to improve it in '21 🙌🏽🍎

Talk (& title) & delivery: A+++
'Becoming a Yogi on Mac ATT&CK w/ OceanLotus Postures' #OBTS
account_circle
vx-underground(@vxunderground) 's Twitter Profile Photo

We have concluded our APT32 (OceanLotus) sample and paper collection.

Check out the papers & samples here: vx-underground.org/apts.html

***Note: More will be added later - much more content to expand 😎

We have concluded our APT32 (OceanLotus) sample and paper collection.

Check out the papers & samples here: vx-underground.org/apts.html

***Note: More will be added later - much more content to expand 😎
account_circle
Kimberly(@StopMalvertisin) 's Twitter Profile Photo

Extracting the VBA project from the Web Archive File using
Sample used: 3510590280406fa30eda94b3ae39058d
First we need to extract the ActiveMime (.mso) from the document. I've used Cerbero from Cerbero Labs and paste the Base64 string into CyberChef.

Extracting the #OceanLotus #APT32 VBA project from the Web Archive File using #CyberChef
Sample used: 3510590280406fa30eda94b3ae39058d
First we need to extract the ActiveMime (.mso) from the document. I've used Cerbero from @cprofiler and paste the Base64 string into CyberChef.
account_circle