<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="3.9.3">Jekyll</generator><link href="http://jfl0w.github.io//feed.xml" rel="self" type="application/atom+xml" /><link href="http://jfl0w.github.io//" rel="alternate" type="text/html" /><updated>2024-01-28T03:08:02+00:00</updated><id>http://jfl0w.github.io//feed.xml</id><title type="html">Jimmy Pham</title><subtitle>BlackEch0 Security Research</subtitle><author><name>Jimmy Pham</name></author><entry><title type="html">Manjusaka: A new RAT implant malware</title><link href="http://jfl0w.github.io//manjusaka/" rel="alternate" type="text/html" title="Manjusaka: A new RAT implant malware" /><published>2022-08-27T00:00:00+00:00</published><updated>2022-08-27T00:00:00+00:00</updated><id>http://jfl0w.github.io//manjusaka</id><content type="html" xml:base="http://jfl0w.github.io//manjusaka/">&lt;p&gt;Researchers with the Cisco Talos Intelligence Group have recently discovered a new family of RAT implant malware called Manjusaka being used in the wild. Advertised as an imitation of the Cobalt Strike framework, Manjusaka is a fully functional command and control (C2) framework written in GoLang with a GUI in Simplified Chinese.&lt;/p&gt;

&lt;p&gt;Utilizing malicious Word documents (maldocs) to deliver beacon implants on infected systems, Manjusaka is freely available on GitHub and allows adversaries to easily generate new implants with custom configurations, increasing the likelihood for this framework to be widely adopted by threat actors.&lt;/p&gt;

&lt;p&gt;A C2 server binary was also discovered available on GitHub, with features that allow adversaries to monitor and administer an infected endpoint, with additional capabilities to generate Rust implant payloads for Windows and Linux.&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;/images/manjusaka.PNG&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;

&lt;h2 id=&quot;distribution-attribution-initial-access&quot;&gt;Distribution, Attribution, Initial Access&lt;/h2&gt;

&lt;p&gt;It’s important to distinguish between the developer of the malware and campaign operators. Since the C2 binary is fully functional, self contained and publicly available on GitHub, any threat actor could have downloaded it and used it in the campaign analyzed by Talos researchers. Thus, no formal attribution to any threat actors have yet been made.&lt;/p&gt;

&lt;p&gt;In the Manjusaka campaign observed by Talos researchers, maldocs were discovered baited with news of a COVID-19 outbreak in Golmud City (Qinghai Province) which included a detailed timeline of the supposed outbreak.&lt;/p&gt;

&lt;h2 id=&quot;installation-and-maintaining-persistence&quot;&gt;Installation and Maintaining Persistence&lt;/h2&gt;

&lt;p&gt;The maldoc payload is executed in three stages:&lt;/p&gt;

&lt;p&gt;Stage 1 is the initial VBA macro contained within the maldoc which executes rundll32.exe and injects Metasploit shellcodes into the process, downloading files from a remote location to proceed with Stage 2. The Stage 1 shellcode observed by Talos researchers reached out to 39[.]104[.]90[.]45/2WYz.&lt;/p&gt;

&lt;p&gt;The Stage 2 payload downloaded from the remote location is another shellcode that consists of a XOR-encoded Cobalt Strike executable, along with shellcode to decode the executable and load the Cobalt Strike beacon into memory.&lt;/p&gt;

&lt;p&gt;In Stage 3, the Cobalt Strike beacon executable is decoded by the previous stage and then executed. The beacon can reflectively load itself into the memory of the current process.&lt;/p&gt;

&lt;h2 id=&quot;operational-details&quot;&gt;Operational Details&lt;/h2&gt;

&lt;p&gt;The C2 is an ELF binary file written in GoLang, while the implants are written in the Rust programming language as EXE and ELF versions, which can allow adversaries to remotely control the infected endpoint and execute arbitrary commands.&lt;/p&gt;

&lt;p&gt;The malware implant sample observed by Talos researchers makes HTTP requests to a fixed address http[:]//39[.]104[.]90[.]45/global/favicon.png&lt;/p&gt;

&lt;p&gt;The C2 reply is always the same, consisting of five bytes: 0x1a1a6e0429.&lt;/p&gt;

&lt;p&gt;Based on the request and accompanying data received from the C2 server, the implant can allow the following functions to be executed on the infected endpoint:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;Execute arbitrary commands on the system using “cmd.exe /c”.&lt;/li&gt;
  &lt;li&gt;Get file information for a specified file.&lt;/li&gt;
  &lt;li&gt;Get information about current network connections (TCP and UDP) established, including local network addresses, remote addresses and  Process IDs (PIDs).&lt;/li&gt;
  &lt;li&gt;Collect browser credentials:&lt;/li&gt;
  &lt;li&gt;Specifically for Chromium-based browsers using the query: SELECT signon_realm, username_value, password_value FROM logins ;&lt;/li&gt;
  &lt;li&gt;Browsers targeted: Google Chrome, Chrome Beta, Microsoft Edge, 360 (Qihoo), QQ Browser (Tencent), Opera, Brave and Vivaldi.&lt;/li&gt;
  &lt;li&gt;Collect Wi-Fi SSID information: netsh wlan show profile &lt;WIFI_NAME&gt; key=clear&lt;/WIFI_NAME&gt;&lt;/li&gt;
  &lt;li&gt;Take screenshots of the current desktop.&lt;/li&gt;
  &lt;li&gt;Obtain comprehensive system information from the endpoint, including:&lt;/li&gt;
  &lt;li&gt;System memory global information.&lt;/li&gt;
  &lt;li&gt;Processor power information.&lt;/li&gt;
  &lt;li&gt;Current and critical temperature readings from WMI using “SELECT * FROM MSAcpi_ThermalZoneTemperature”&lt;/li&gt;
  &lt;li&gt;Information on the network interfaces connected to the system: Names&lt;/li&gt;
  &lt;li&gt;Process and System times: User time, exit time, creation time, kernel time.&lt;/li&gt;
  &lt;li&gt;Process module names.&lt;/li&gt;
  &lt;li&gt;Disk and drive information: Volume serial number, name, root path name and disk free space.&lt;/li&gt;
  &lt;li&gt;Network account names, local groups.&lt;/li&gt;
  &lt;li&gt;Windows build and major version numbers.&lt;/li&gt;
  &lt;li&gt;Activate the file management module to carry out file-related activities.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The file management capabilities of the implant include:&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;File enumeration: List files in a specified location on disk. This is essentially the “ls” command.&lt;/li&gt;
  &lt;li&gt;Create directories on the file system.&lt;/li&gt;
  &lt;li&gt;Get and set the current working directory.&lt;/li&gt;
  &lt;li&gt;Obtain the full path of a file.&lt;/li&gt;
  &lt;li&gt;Delete files and remove directories on disk.&lt;/li&gt;
  &lt;li&gt;Move files between two locations. Copy the file to a new location and delete the old copy.&lt;/li&gt;
  &lt;li&gt;Read and write data to and from the file.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id=&quot;indicators-of-compromise&quot;&gt;Indicators of Compromise&lt;/h2&gt;

&lt;h3 id=&quot;hashes&quot;&gt;Hashes&lt;/h3&gt;

&lt;h4 id=&quot;maldoc-and-cs-beacon-samples&quot;&gt;Maldoc and CS beacon samples&lt;/h4&gt;

&lt;p&gt;58a212f4c53185993a8667afa0091b1acf6ed5ca4ff8efa8ce7dae784c276927
8e7c4df8264d33e5dc9a9d739ae11a0ee6135f5a4a9e79c354121b69ea901ba6
54830a7c10e9f1f439b7650607659cdbc89d02088e1ab7dd3e2afb93f86d4915&lt;/p&gt;

&lt;h4 id=&quot;rust-samples&quot;&gt;Rust samples&lt;/h4&gt;

&lt;p&gt;8e9ecd282655f0afbdb6bd562832ae6db108166022eb43ede31c9d7aacbcc0d8
a8b8d237e71d4abe959aff4517863d9f570bba1646ec4e79209ec29dda64552f
3f3eb6fd0e844bc5dad38338b19b10851083d078feb2053ea3fe5e6651331bf2
0b03c0f3c137dacf8b093638b474f7e662f58fef37d82b835887aca2839f529b&lt;/p&gt;

&lt;h4 id=&quot;c2-binaries&quot;&gt;C2 binaries&lt;/h4&gt;

&lt;p&gt;fb5835f42d5611804aaa044150a20b13dcf595d91314ebef8cf6810407d85c64
955e9bbcdf1cb230c5f079a08995f510a3b96224545e04c1b1f9889d57dd33c1&lt;/p&gt;

&lt;h3 id=&quot;ips&quot;&gt;IPs&lt;/h3&gt;
&lt;p&gt;39[.]104[.]90[.]45&lt;/p&gt;

&lt;h3 id=&quot;urls&quot;&gt;URLs&lt;/h3&gt;
&lt;p&gt;https[://]39[.]104[.]90[.]45/2WYz&lt;/p&gt;

&lt;p&gt;http[://]39[.]104[.]90[.]45/2WYz&lt;/p&gt;

&lt;p&gt;http[://]39[.]104[.]90[.]45/submit.php&lt;/p&gt;

&lt;h4 id=&quot;user-agents&quot;&gt;User Agents&lt;/h4&gt;
&lt;p&gt;Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)&lt;/p&gt;

&lt;p&gt;Mozilla/5.0 (Windows NT 8.0; WOW64; rv:58.0) Gecko/20120102 Firefox/58&lt;/p&gt;

&lt;p&gt;Mozilla/5.0 (Windows NT 8.0; WOW64; rv:40.0) Gecko&lt;/p&gt;</content><author><name>Jimmy Pham</name></author><category term="Threat Intel Reports" /><summary type="html">Researchers with the Cisco Talos Intelligence Group have recently discovered a new family of RAT implant malware called Manjusaka being used in the wild. Advertised as an imitation of the Cobalt Strike framework, Manjusaka is a fully functional command and control (C2) framework written in GoLang with a GUI in Simplified Chinese.</summary></entry><entry><title type="html">Black Basta Ransomware</title><link href="http://jfl0w.github.io//blackbasta/" rel="alternate" type="text/html" title="Black Basta Ransomware" /><published>2022-07-15T00:00:00+00:00</published><updated>2022-07-15T00:00:00+00:00</updated><id>http://jfl0w.github.io//blackbasta</id><content type="html" xml:base="http://jfl0w.github.io//blackbasta/">&lt;p&gt;Trend Micro analyzed recent Black Basta ransomware group campaigns and observed it using the banking trojan QakBot to gain initial access and exploiting PrintNightmare vulnerability (CVE-2021-34527) to perform privileged file operations.&lt;/p&gt;

&lt;h2 id=&quot;distribution-and-initial-access&quot;&gt;Distribution and Initial Access&lt;/h2&gt;

&lt;p&gt;Black Basta has been observed using the banking trojan QakBot to gain initial access. QakBot is distributed using spear phishing emails attached with Excel files containing Excel 4.0 macros.&lt;/p&gt;

&lt;p&gt;Once the recipient enables macros, QakBot DLL files are downloaded onto the host system, which is then executed via regsvr32.exe.&lt;/p&gt;

&lt;h2 id=&quot;installation-and-maintaining-persistence&quot;&gt;Installation and Maintaining Persistence&lt;/h2&gt;

&lt;p&gt;The QakBot DLL proceeds to perform process injection using explorer.exe, after which the injected process creates a scheduled task to maintain persistence.&lt;/p&gt;

&lt;p&gt;Qakbot then installs a Cobeacon, a Cobalt Strike beacon backdoor variant, establishing a named pipe for communication.&lt;/p&gt;

&lt;h2 id=&quot;network-discovery-and-defense-evasion&quot;&gt;Network Discovery and Defense Evasion&lt;/h2&gt;

&lt;p&gt;After QakBot has been installed, it proceeds to download and execute Cobeacon via a fileless PowerShell script containing several layers of obfuscation:&lt;/p&gt;
&lt;ul&gt;
  &lt;li&gt;It’s first layer of obfuscation is a Base64-encoded PowerShell command, establishing a pipe for communication.&lt;/li&gt;
  &lt;li&gt;The second layer of obfuscation involves loading and reading of an archive file in memory&lt;/li&gt;
  &lt;li&gt;The third layer of obfuscation contains the decoded script for running the Base64-encoded shellcode&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id=&quot;privilege-escalation&quot;&gt;Privilege Escalation&lt;/h2&gt;

&lt;p&gt;In addition to OakBot and Cobeacon, Black Basta has also been observed exploiting the PrintNightmare vulnerability which targets the Windows Print Spooler Service (spoolsv.exe) to deliver its payload (spider.dll) and perform escalated&lt;/p&gt;

&lt;h2 id=&quot;lateral-movement&quot;&gt;Lateral Movement&lt;/h2&gt;

&lt;p&gt;Black Basta threat actors were observed using the Coroxy backdoor alongside the network utility tool Netcat to move laterally across the network.&lt;/p&gt;

&lt;h2 id=&quot;data-exfiltration&quot;&gt;Data Exfiltration&lt;/h2&gt;

&lt;p&gt;The Cobeacon backdoor establishes a pipe for communication which may be possibly used for data exfiltration purposes once information has been collected from a targeted system.
The Coroxy backdoor in conjunction with netcat is also another possible communication channel.&lt;/p&gt;

&lt;h2 id=&quot;operational-details&quot;&gt;Operational Details&lt;/h2&gt;

&lt;p&gt;Once the attackers gained a wide foothold in the target network, they executed the Black Basta ransomware to encrypt files while the infected system is in safe mode, appending the encrypted files with the .basta extension. Black Basta ransomware injects into an existing Windows service and launches its decryptor executable.&lt;/p&gt;

&lt;p&gt;The ransomware then utilizes the ChaCha20 algorithm to encrypt files. Each folder on the encrypted drive contains a readme.txt file containing information about the attack and links along with a unique ID to enter a negotiation chat session with the threat actors. The wallpaper is changed to display: “Your network is encrypted by the Black Basta group.”&lt;/p&gt;

&lt;h3 id=&quot;threat-actor-objectives&quot;&gt;Threat Actor Objectives&lt;/h3&gt;
&lt;p&gt;Black Basta ransomware group employs a double extortion scheme that involves stealing confidential data before encrypting it so they can threaten victims with the public release of the stolen data if payment is not made within seven days of the attack.
To fulfil their extortion objectives, they release this information on their Tor website, Basta News, if the victim does not pay the ransom.&lt;/p&gt;

&lt;h2 id=&quot;indicators-of-compromise&quot;&gt;Indicators of Compromise&lt;/h2&gt;
&lt;h3 id=&quot;hashes&quot;&gt;Hashes&lt;/h3&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Sha256&lt;/th&gt;
      &lt;th&gt;TrendMicro Detection Signature&lt;/th&gt;
    &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;01fafd51bb42f032b08b1c30130b963843fea0493500e871d6a6a87e555c7bac&lt;/td&gt;
      &lt;td&gt;Ransom.Win32.BLACKBASTA.YXCEP&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;72a48f8592d89eb53a18821a54fd791298fcc0b3fc6bf9397fd71498527e7c0e&lt;/td&gt;
      &lt;td&gt;Trojan.X97M.QAKBOT.YXCFH&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;580ce8b7f5a373d5d7fbfbfef5204d18b8f9407b0c2cbf3bcae808f4d642076a&lt;/td&gt;
      &lt;td&gt;Backdoor.Win32.COROXY.YACEKT&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;130af6a91aa9ecbf70456a0bee87f947bf4ddc2d2775459e3feac563007e1aed&lt;/td&gt;
      &lt;td&gt;Trojan.Win64.QUAKNIGHTMARE.YACEJT&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;c7eb0facf612dbf76f5e3fe665fe0c4bfed48d94edc872952a065139720e3166&lt;/td&gt;
      &lt;td&gt;TrojanSpy.Win32.QAKBOT.YXCEEZ&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;ffa7f0e7a2bb0edf4b7785b99aa39c96d1fe891eb6f89a65d76a57ff04ef17ab&lt;/td&gt;
      &lt;td&gt;TrojanSpy.Win32.QAKBOT.YACEJT&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;2083e4c80ade0ac39365365d55b243dbac2a1b5c3a700aad383c110db073f2d9&lt;/td&gt;
      &lt;td&gt;TrojanSpy.Win32.QAKBOT.YACEJT&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;1e7174f3d815c12562c5c1978af6abbf2d81df16a8724d2a1cf596065f3f15a2&lt;/td&gt;
      &lt;td&gt;TrojanSpy.Win32.QAKBOT.YACEJT&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;2d906ed670b24ebc3f6c54e7be5a32096058388886737b1541d793ff5d134ccb&lt;/td&gt;
      &lt;td&gt;TrojanSpy.Win32.QAKBOT.YACEJT&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;72fde47d3895b134784b19d664897b36ea6b9b8e19a602a0aaff5183c4ec7d24&lt;/td&gt;
      &lt;td&gt;TrojanSpy.Win32.QAKBOT.YACEJT&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;2e890fd02c3e0d85d69c698853494c1bab381c38d5272baa2a3c2bc0387684c1&lt;/td&gt;
      &lt;td&gt;TrojanSpy.Win32.QAKBOT.YACEJT&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;c9df12fbfcae3ac0894c1234e376945bc8268acdc20de72c8dd16bf1fab6bb70&lt;/td&gt;
      &lt;td&gt;Ransom.Win32.BLACKBASTA.YACEJ&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;8882186bace198be59147bcabae6643d2a7a490ad08298a4428a8e64e24907ad&lt;/td&gt;
      &lt;td&gt;Ransom.Win32.BLACKBASTA.YACEJ&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;0e2b951ae07183c44416ff6fa8d7b8924348701efa75dd3cb14c708537471d27&lt;/td&gt;
      &lt;td&gt;Ransom.Win32.BLACKBASTA.YACEJ&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;0d3af630c03350935a902d0cce4dc64c5cfff8012b2ffc2f4ce5040fdec524ed&lt;/td&gt;
      &lt;td&gt;Ransom.Win32.BLACKBASTA.YACEJ&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;df35b45ed34eaca32cda6089acbfe638d2d1a3593d74019b6717afed90dbd5f8&lt;/td&gt;
      &lt;td&gt;Ransom.Win32.BLACKBASTA.YACEJ&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;3fe73707c2042fefe56d0f277a3c91b5c943393cf42c2a4c683867d6866116fc&lt;/td&gt;
      &lt;td&gt;Ransom.Win32.BLACKBASTA.YACEJ&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;433e572e880c40c7b73f9b4befbe81a5dca1185ba2b2c58b59a5a10a501d4236&lt;/td&gt;
      &lt;td&gt;Ransom.Win32.BLACKBASTA.A.note&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;c4683097a2615252eeddab06c54872efb14c2ee2da8997b1c73844e582081a79&lt;/td&gt;
      &lt;td&gt;PUA.Win32.Netcat.B&lt;/td&gt;
    &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;

&lt;h3 id=&quot;ips&quot;&gt;IPs&lt;/h3&gt;

&lt;p&gt;24[.]178[.]196[.]44:2222&lt;/p&gt;

&lt;p&gt;37[.]186[.]54[.]185:995&lt;/p&gt;

&lt;p&gt;39[.]44[.]144[.]182:995&lt;/p&gt;

&lt;p&gt;45[.]63[.]1[.]88:443&lt;/p&gt;

&lt;p&gt;46[.]176[.]222[.]241:995&lt;/p&gt;

&lt;p&gt;47[.]23[.]89[.]126:995&lt;/p&gt;

&lt;p&gt;72[.]12[.]115[.]15:22&lt;/p&gt;

&lt;p&gt;72[.]76[.]94[.]52:443&lt;/p&gt;

&lt;p&gt;72[.]252[.]157[.]37:995&lt;/p&gt;

&lt;p&gt;72[.]252[.]157[.]212:990&lt;/p&gt;

&lt;p&gt;73[.]67[.]152[.]122:2222&lt;/p&gt;

&lt;p&gt;75[.]99[.]168[.]46:61201&lt;/p&gt;

&lt;p&gt;103[.]246[.]242[.]230:443&lt;/p&gt;

&lt;p&gt;113[.]89[.]5[.]177:995&lt;/p&gt;

&lt;p&gt;148[.]0[.]57[.]82:443&lt;/p&gt;

&lt;p&gt;167[.]86[.]165[.]191:443&lt;/p&gt;

&lt;p&gt;173[.]174[.]216[.]185:443&lt;/p&gt;

&lt;p&gt;180[.]129[.]20[.]53:995&lt;/p&gt;

&lt;p&gt;190[.]252[.]242[.]214:443&lt;/p&gt;

&lt;p&gt;217[.]128[.]122[.]16:2222&lt;/p&gt;

&lt;h3 id=&quot;urls&quot;&gt;URLs&lt;/h3&gt;

&lt;p&gt;elblogdeloscachanillas[.]com[.]mx/S3sY8RQ10/Ophn[.]png&lt;/p&gt;

&lt;p&gt;lalualex[.]com/ApUUBp1ccd/Ophn[.]png&lt;/p&gt;

&lt;p&gt;lizety[.]com/mJYvpo2xhx/Ophn[.]png&lt;/p&gt;

&lt;h3 id=&quot;mitre-attck-techniques&quot;&gt;MITRE ATT&amp;amp;CK® Techniques&lt;/h3&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Tactic&lt;/th&gt;
      &lt;th&gt;Technique ID&lt;/th&gt;
      &lt;th&gt;Technique Name&lt;/th&gt;
    &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;Execution&lt;/td&gt;
      &lt;td&gt;T1059&lt;/td&gt;
      &lt;td&gt;Command and Scripting Interpreter&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;Defence Evasion&lt;/td&gt;
      &lt;td&gt;T1112 T1027 T1562.001&lt;/td&gt;
      &lt;td&gt;Modify Registry Obfuscated Files or Information Impair Defences: Disable or Modify Tools&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;Discovery&lt;/td&gt;
      &lt;td&gt;T1082 T1083&lt;/td&gt;
      &lt;td&gt;System Information Discovery File and Directory Discovery&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;Impact&lt;/td&gt;
      &lt;td&gt;T1490 T1489 T1486&lt;/td&gt;
      &lt;td&gt;Inhibit System Recovery Service Stop,Data Encrypted for Impact&lt;/td&gt;
    &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;</content><author><name>Jimmy Pham</name></author><category term="Threat Intel Reports" /><summary type="html">Trend Micro analyzed recent Black Basta ransomware group campaigns and observed it using the banking trojan QakBot to gain initial access and exploiting PrintNightmare vulnerability (CVE-2021-34527) to perform privileged file operations.</summary></entry></feed>