标题 | 简介 | 类型 | 公开时间 | ||||||||||||||||
|
|||||||||||||||||||
|
|||||||||||||||||||
详情 | |||||||||||||||||||
[SAFE-ID: JIWO-2025-1600] 作者: 特仑苏 发表于: [2018-07-11]
本文共 [939] 位读者顶过
ESET researchers have discovered a new malware campaign misusing stolen digital certificates. We spotted this malware campaign when our systems marked several files as suspicious. Interestingly, the flagged files were digitally signed using a valid D-Link Corporation code-signing certificate. The exact same certificate had been used to sign non-malicious D-Link software; therefore, the certificate was likely stolen. Having confirmed the file’s malicious nature, we notified D-Link, who launched their own investigation into the matter. As a result, the compromised digital certificate was revoked by D-Link on July 3, 2018. Figure 1. The D-Link Corporation code signing certificate used to sign malware
[出自:jiwo.org]
|
80AE7B26AC04C93AD693A2D816E8742B906CC0E3 |
62A693F5E4F92CCB5A2821239EFBE5BD792A46CD |
B01D8501F1EEAF423AA1C14FCC816FAB81AC8ED8 |
11A5D1A965A3E1391E840B11705FFC02759618F8 |
239786038B9619F9C22401B110CF0AF433E0CEAD |
C&C servers
1DB4650A89BC7C810953160C6E41A36547E8CF0B
CA160884AE90CFE6BEC5722FAC5B908BF77D9EEF
9C4F8358462FAFD83DF51459DBE4CD8E5E7F2039
13D064741B801E421E3B53BC5DABFA7031C98DD9
amazon.panasocin[.]com
office.panasocin[.]com
okinawas.ssl443[.]org
D-Link Corporation:
13:03:03:e4:57:0c:27:29:09:e2:65:dd:b8:59:de:ef
1e:50:cc:3d:d3:9b:4a:cc:5e:83:98:cc:d0:dd:53:ea
Changing Information Technology Inc:
73:65:ed:e7:f8:fb:b1:47:67:02:d2:93:08:39:6f:51