요약

-   CVE-2019-0708 취약점 Metaexploit의 모듈 코드를 공격에 활용. 시스템 침투 후 모네로 코인 마이너를 설치함.

-   IoC 

Hash : 498106fe7fa5ece30dd8d7457cabdba6

(hxxps://www.virustotal.com/gui/file/8a87a1261603af4d976faa57e49ebdd8fd8317e9dd13bd36ff2599d1031f53ce/details

Network : 109.176.117.11 port 8000 (TCP) 

   5.100.251.106 port 52057 (TCP)   

- 공격자 IP Top 3 : 

193.27.73.223 (네덜란드)

217.23.5.20 (네덜란드)

157.245.82.38 (미국)


관련 CVE정보

-  CVE-2019-0708


탐지룰 존재유무

- TippingPoint 35285: RDP: Microsoft Remote Desktop Services Remote Code Execution Vulnerability

- McAfee  RDP: Microsoft Remote Desktop MS_T120 Channel Bind Attempt

- Symantec  31527 (OS Attack: Microsoft Windows Desktop Services RCE CVE-2019-0708)

                 31529 (OS Attack: Microsoft Windows Desktop Services RCE CVE-2019-0708 2)

- Cisco  4개rule (content-replace.rules <1:50186~50189> 

* 1:50186 <-> ENABLED <-> CONTENT-REPLACE Microsoft Windows require RDP client channel list prior to encryption (content-replace.rules)

* 1:50189 <-> ENABLED <-> CONTENT-REPLACE Microsoft Windows require RDP client channel list prior to encryption (content-replace.rules)

-

참고자료

출처 : hxxps://doublepulsar.com/bluekeep-exploitation-activity-seen-in-the-wild-bd6ee6e599a6

   hxxps://www.kryptoslogic.com/blog/2019/11/bluekeep-cve-2019-0708-exploitation-spotted-in-the-wild/?source=post_page-----bd6ee6e599a6----------------------

    hxxps://twitter.com/GossiTheDog/status/1191783623411806208

+ Recent posts