2024-08-21 Talos Intelligence 
Cisco Talos has identified a new RAT family named “MoonPeak,” a variant of the open-source XenoRAT malware. This RAT is currently being developed by the North Korean state-sponsored threat actor group UAT-5394.
 UAT-5394 moved from relying on cloud services to setting up their own infrastructure.
Servers identified in this campaign include 95.164.86.148, which served as a MoonPeak C2 on Port 9999, and 167.88.173.173, a server that was initially thought to be linked to the Gamaredon APT but was later found to be under UAT-5394’s control. This server was used to compile MoonPeak v2 malware and connect to other C2s over Ports 9966 and 8936.
Talos also uncovered multiple test VMs, including 45.87.153.79 and 45.95.11.52, used to validate MoonPeak infections.  MoonPeak RAT modifies the original XenoRAT source code by changing the client namespace from “xeno rat client” to “cmdline.” This change prevents MoonPeak from connecting to out-of-the-box XenoRAT C2 servers and ensures that any unauthorized or rogue implants cannot connect to their custom MoonPeak servers. 
Download


File Information
├── MoonPeak Powershell
│   ├── GzCompress ps1 27202534cc03a398308475146f6710b790aa31361931d4fe1b495c31c3ed54f7 ps1 
│   ├── GzCompress2RTF ps1 15eee641978ac318dabc397d9c39fb4cb8e1a854883d8c2401f6f04845a79b4b ps1 
│   ├── GzCompress2RTF ps1 3e39fc595db9db1706828b0791161440dc1571eaa07b523df9b721ad65e2369b ps1 
│   ├── calc ps1 6bf8a19deb443bde013678f3ff83ab9db4ddc47838cd9d00935888e00b30cee6 ps1 
│   └── calc ps1 72a25d959d12e3efe9604aee4b1e7e4db1ef590848d207007419838ddbad5e3f ps1 
├── MoonPeakv1
│   ├── cmdline 0b8897103135d92b89a83093f00d1da845a1eae63da7b57f638bab48a779808e exe 
│   ├── cmdline 2b35ef3080dcc13e2d907f681443f3fc3eda832ae66b0458ca5c97050f849306 exe 
│   ├── cmdline 4108c5096a62c0a6664eed781c39bb042eb0adf166fcc5d64d7c89139d525d4f exe 
│   ├── cmdline 44e492d5b9c48c1df7ef5e0fe9a732f271234219d8377cf909a431a386759555 exe 
│   ├── cmdline 4599a9421e83fb0e2c005e5d9ac171305192beabe965f3385accaf2647be3e8e exe 
│   ├── cmdline 58fdc1b6ce4744d6331f8e2efc4652d754e803cae4cc16101fc78438184995e6 exe 
│   ├── cmdline 6a3839788c0dafe591718a3fb6316d12ccd8e82dbcb41ce40e66b743f2dd344d exe 
│   ├── cmdline 97ba8d30cf8393c39f61f7e63266914ecafd07bd49911370afb866399446f37d exe 
│   ├── cmdline a80a35649f638049244a06dd4fb6eca4de0757ef566bfbe1affe1c8bf1d96b04 exe 
│   ├── cmdline b8233fe9e903ca08b9b1836fe6197e7d3e98e36b13815d8662de09832367a98a exe 
│   ├── cmdline f4aa4c6942a87087530494cba770a1dcbc263514d874f12ba93a64b1edbae21c exe 
│   └── cmdline facf3b40a2b99cc15eee7b7aee3b36a57f0951cda45931fcde311c0cc21cdc71 exe 
├── MoonPeakv2
│   ├── cmdline 148c69a7a1e06dc06e52db5c3f5895de6adc3d79498bc3ccc2cbd8fdf28b2070 exe 
│   ├── cmdline 1ad43ddfce147c1ec71b37011d522c11999a974811fead11fee6761ceb920b10 exe 
│   ├── cmdline 458641936e2b41c425161a9b892d2aa08d1de2bc0db446f214b5f87a6a506432 exe 
│   └── cmdline 8a4fbcdec5c08e6324e3142f8b8c41da5b8e714b9398c425c47189f17a51d07b exe 
└── moonpeak-malware-infrastructure-north-korea html

Article Link: contagio: 2024-08-21 MoonPeak malware from North Korean UAT-5394 Samples

1 post – 1 participant

Read full topic

​2024-08-21 Talos Intelligence MoonPeak malware from North Korean actors unveils new details on attacker infrastructure  

Cisco Talos has identified a new RAT family named “MoonPeak,” a variant of the open-source XenoRAT malware. This RAT is currently being developed by the North Korean state-sponsored threat actor group UAT-5394. UAT-5394 moved from relying on cloud services to setting up their own infrastructure.Servers identified in this campaign include 95.164.86.148, which served as a MoonPeak C2 on Port 9999, and 167.88.173.173, a server that was initially thought to be linked to the Gamaredon APT but was later found to be under UAT-5394’s control. This server was used to compile MoonPeak v2 malware and connect to other C2s over Ports 9966 and 8936.Talos also uncovered multiple test VMs, including 45.87.153.79 and 45.95.11.52, used to validate MoonPeak infections.  MoonPeak RAT modifies the original XenoRAT source code by changing the client namespace from “xeno rat client” to “cmdline.” This change prevents MoonPeak from connecting to out-of-the-box XenoRAT C2 servers and ensures that any unauthorized or rogue implants cannot connect to their custom MoonPeak servers. 

Download

Download  (you can email me if you need the password scheme)

File Information

├── MoonPeak Powershell│   ├── GzCompress ps1 27202534cc03a398308475146f6710b790aa31361931d4fe1b495c31c3ed54f7 ps1 │   ├── GzCompress2RTF ps1 15eee641978ac318dabc397d9c39fb4cb8e1a854883d8c2401f6f04845a79b4b ps1 │   ├── GzCompress2RTF ps1 3e39fc595db9db1706828b0791161440dc1571eaa07b523df9b721ad65e2369b ps1 │   ├── calc ps1 6bf8a19deb443bde013678f3ff83ab9db4ddc47838cd9d00935888e00b30cee6 ps1 │   └── calc ps1 72a25d959d12e3efe9604aee4b1e7e4db1ef590848d207007419838ddbad5e3f ps1 ├── MoonPeakv1│   ├── cmdline 0b8897103135d92b89a83093f00d1da845a1eae63da7b57f638bab48a779808e exe │   ├── cmdline 2b35ef3080dcc13e2d907f681443f3fc3eda832ae66b0458ca5c97050f849306 exe │   ├── cmdline 4108c5096a62c0a6664eed781c39bb042eb0adf166fcc5d64d7c89139d525d4f exe │   ├── cmdline 44e492d5b9c48c1df7ef5e0fe9a732f271234219d8377cf909a431a386759555 exe │   ├── cmdline 4599a9421e83fb0e2c005e5d9ac171305192beabe965f3385accaf2647be3e8e exe │   ├── cmdline 58fdc1b6ce4744d6331f8e2efc4652d754e803cae4cc16101fc78438184995e6 exe │   ├── cmdline 6a3839788c0dafe591718a3fb6316d12ccd8e82dbcb41ce40e66b743f2dd344d exe │   ├── cmdline 97ba8d30cf8393c39f61f7e63266914ecafd07bd49911370afb866399446f37d exe │   ├── cmdline a80a35649f638049244a06dd4fb6eca4de0757ef566bfbe1affe1c8bf1d96b04 exe │   ├── cmdline b8233fe9e903ca08b9b1836fe6197e7d3e98e36b13815d8662de09832367a98a exe │   ├── cmdline f4aa4c6942a87087530494cba770a1dcbc263514d874f12ba93a64b1edbae21c exe │   └── cmdline facf3b40a2b99cc15eee7b7aee3b36a57f0951cda45931fcde311c0cc21cdc71 exe ├── MoonPeakv2│   ├── cmdline 148c69a7a1e06dc06e52db5c3f5895de6adc3d79498bc3ccc2cbd8fdf28b2070 exe │   ├── cmdline 1ad43ddfce147c1ec71b37011d522c11999a974811fead11fee6761ceb920b10 exe │   ├── cmdline 458641936e2b41c425161a9b892d2aa08d1de2bc0db446f214b5f87a6a506432 exe │   └── cmdline 8a4fbcdec5c08e6324e3142f8b8c41da5b8e714b9398c425c47189f17a51d07b exe └── moonpeak-malware-infrastructure-north-korea html

Article Link: contagio: 2024-08-21 MoonPeak malware from North Korean UAT-5394 Samples
1 post – 1 participant
Read full topic