Skip Navigation
Get a Demo
 
 
 
 
 
 
 
 
 
Resources Blog Threat intelligence

Intelligence Insights: July 2022

Qbot returns with a vengeance, Emotet climbs the charts, and BumbleBee changes tactics.

The Red Canary Team

Each month, the Intel team provides Red Canary customers with an analysis of trending, emerging, or otherwise important threats that we’ve encountered in confirmed threat detections, intelligence reporting, and elsewhere over the preceding month. We call this report our “Intelligence Insights” and share a public version of it with the broader infosec community.

Highlights

To track pervasiveness over time, we identify the number of unique customer environments in which we observed a given threat and compare it to what we’ve seen in previous months. Here’s how the numbers shook out for June 2022:

June rankThreat nameThreat description
June rank:

1

Threat name:Threat description :

Banking trojan focused on stealing user data and banking credentials; delivered through phishing, existing Emotet infections, and malicious Windows Installer (MSI) packages

June rank:

2

Threat name:Threat description :

Open source tool that dumps credentials using various techniques

June rank:

3

Threat name:Threat description :

Collection of Python classes to construct/manipulate network protocols

June rank:

4

Threat name:Threat description :

Open source tool used to identify attack paths and relationships in Active Directory

June rank:

5*

Threat name:Threat description :

Modular banking trojan that primarily functions as a downloader or dropper of other malware; focused on stealing user data and banking credentials; typically distributed through email

June rank:

5*

Threat name:Threat description :

Dropper/downloader, often distributed through search engine redirects

June rank:

7

Threat name:Threat description :

Penetration testing tool that integrates functionality from multiple offensive security projects; can extend its functionality with a native scripting language

June rank:

8*

Threat name:Threat description :

Malware family used as part of a botnet. Some variants are worms and frequently spread via infected USB drives

June rank:

8*

Threat name:Threat description :

Activity cluster using a worm spread by external drives that leverages Windows Installer to download a malicious DLL

June rank:

8*

Threat name:Threat description :

Dropper/downloader that uses compromised WordPress sites to redirect users to adversary infrastructure posing as necessary browser updates to trick users into running malicious code

= trending up from previous month
= trending down from previous month
➡ = no change in rank from previous month

*Denotes a tie

Observations on trending threats

June saw some big changes in our top ten prevalent threats for the month. Qbot jumped to the number one spot after a major resurgence in activity. Another big mover this month was Emotet, which climbed from one of our top 20 threats in May to a tie for 5th place in June. SocGholish also moved up a few spots for a place in the top ten, while Yellow Cockatoo slipped off the list, continuing the seesaw pattern between SocGholish and Yellow Cockatoo that we’ve seen before (though we aren’t aware of any causal relationship between these two threats).

Red Canary Chatter on the Intel Team

We spend a lot of time talking to each other on this team. Here are some of our hot topics on Slack this June!

As you can see in the trends table, Qbot returned in a big way. Qbot operators were making small changes to their malicious loaders almost every day during the first half of June. Our detection analytics quickly catch Qbot behavior, but it’s still Red Canary’s goal to ideally detect threats like Qbot before they have an opportunity to execute at all. There was a ton of great work across teams this month to make sure Qbot was seen and stopped as quickly as possible in spite of the many changes. The Red Canary Intel team uses both internal detections and OSINT from researchers to help us stay up to date on rapidly changing threats.

BumbleBee is all the buzz

On June 28, Red Canary tweeted about BumbleBee. BumbleBee is a loader used by adversaries to deliver one of several payloads, including Cobalt Strike, Meterpreter (a component of Metasploit), or Sliver, an adversary emulation tool that adversaries started leveraging in October 2021.

BumbleBee is known for rapidly changing its TTPs, and in June we observed BumbleBee DLLs being delivered via IMG attachments. An LNK file within the IMG leveraged odbcconf.exe (the Windows Open Database Connectivity utility) instead of rundll32.exe to execute the BumbleBee DLL. While odbcconf.exe is a known “living off the land” binary that can execute DLL files, it’s not commonly seen in the wild. Prior to this, Red Canary has only seen this tradecraft used by red teams and Raspberry Robin.


Detection opportunity: odbcconf.exe loading DLLs

The following pseudo-detection analytic looks for odbcconf.exe loading a configuration file or DLL. The /A flag specifies an action, /F uses a response file, and /S runs in silent mode. odbcconf.exe running rgsvr actions in silent mode could indicate misuse.

process == odbcconf.exe

&&

command_line_includes == regsvr

&&

command_line_includes (/f || -f || /a || -a || /s || -s)


 

Intelligence Insights: March 2024

 

The rise of Charcoal Stork

 

Intelligence Insights: February 2024

 

Intelligence Insights: January 2024

Subscribe to our blog

 
 
Back to Top