Separating the bee from the panda: CeranaKeeper making a beeline for Thailand

This intelligence report details a sophisticated malware campaign targeting multiple industries across various countries. The threat actor employs advanced tactics, techniques, and procedures (TTPs) to infiltrate networks, maintain persistence, and exfiltrate sensitive data. The malware used in this campaign is highly modular and adaptable, allowing the attackers to customize their approach for each target. The report highlights the use of social engineering, exploits for known vulnerabilities, and custom-built tools to achieve their objectives. It also provides indicators of compromise (IoCs) and recommendations for detection and mitigation. Author: AlienVault

Related Tags:
advanced persistent threat

persistence techniques

multi-industry targeting

custom malware

data exfiltration

T1567

T1133

T1074

T1078

Associated Indicators:
E7B6164B6EC7B7552C93713403507B531F625A8C64D36B60D660D66E82646696

3F81D1E70D9EE39C83B582AC3BCC1CDFE038F5DA31331CDBCD4FF1A2D15BB7C8

B25C79BA507A256C9CA12A9BD34DEF6A33F9C087578C03D083D7863C708ECA21

24E12B8B1255DF4E6619ED1A6AE1C75B17341EEF7418450E661B74B144570017

B15BA83681C4D2C2716602615288B7E64A1D4A9F4805779CEBDF5E6C2399AFB5

DAFAD19900FFF383C2790E017C958A1E92E84F7BB159A2A7136923B715A4C94F

E6AB24B826C034A6D9E152673B91159201577A3A9D626776F95222F01B7C21DB

6655C5686B9B0292CF5121FC6346341BB888704B421A85A15011456A9A2C192A

322EB20377DBDB4ACB3067A4F2AAA47631CA5ED5