TeamTNT Threat Group targeting AWS and Cloud Services
Incident Report for Ascend Security Events
Resolved
TeamTNT Threat Group targeting AWS and Cloud Services

Source: Cisco Talos

A blog published by Cisco Talos has recently analyzed modified versions of malicious shell scripts used by the cybercrime group, TeamTNT. These shell scripts have been modified by the malware author after they became aware that security researchers published the previous version of their scripts. These scripts are primarily designed to target Amazon Web Services (AWS) but could also run in on-premise, container or other forms of Linux instances.

Several of the TeamTNT payloads analyzed focus on cryptocurrency mining, persistence and lateral movement using techniques such as discovering and deploying onto all Kubernetes pods in a local network. There is also a script with login credentials for the primary distribution server, and another with an API key that might provide remote access to a tmate shared terminal session. Some of the TeamTNT scripts even contain defense evasion functions focused on disabling Alibaba cloud security tools. The focus on compromising modern cloud environments sets TeamTNT apart from many of the other cybercriminals encountered in the wild.

These cryptocurrency mining malware payloads use the processing power of compromised devices to generate currency for the threat actors. This can result in decreased performance and lifespan of devices infected with the malware.

Indicators of Compromise:

• 5483941dcb2fb017850f3d358e4b1cc45837f30f517ebbbb0718947c5c4d5d50
• dd60805ec68e3285a2cd4f32083f10a8571e81fb99c03434359bf339011a4a4c
• 96a52109973d50174252b05be64f3ddf0182137fc4186d7a5cef989a4604010d
• f05155c8be6efbd94c0ec891494aa064a93def34b122bd70b4d225ea13fffff9
• 19575166abd57feccf7cb0a1459daf476e736b7386c54a2b3320b2fc6ae12b9d
• 84ce185b70b337342f3c43b594daa5f78737eff32bff03361349a81ac7808b78
• 6075906fbc8898515fe09a046d81ca66429c9b3052a13d6b3ca6f8294c70d207
• 6158197143f1696368e5a0b26f995b9801c2b29ca2e09d6f0aeb374a0fb3ce1b
• 024445ae9d41915af25a347e47122db2fbebb223e01acab3dd30de4b35464965
• 244c8993f9092f47c78e8e1414cc7499de94cc3126d591ec920a3dc5cef9c6af
• c991bedd44ce0425a157aa0c1fd03d39c5ae2bc019be4518fd979be780889537
• c57f61e24814c9ae17c57efaf4149504e36bd3e6171e9299fd54b6fbb1ec108c
• 5dc3daf24fcef6ccaef2fec45bbb554f8090930d92a76f5d4c5a1f2487e484e0
• 48f92bdc4c039437ba77e6c6a74bb0d4b747aa94fb815223ea6d735d04fcb733
• 030f3a45d2c0a5200a7fed4734fead988eea4bc1ec48b92e6530610ffd082afe
• b07ca49abd118bc2db92ccd436aec1f14bb8deb74c29b581842499642cc5c473
• de651f9bc4e26a09a0d1ebc63a36c6139593bef6625822d59b2ccf37452ef716
• 6075906fbc8898515fe09a046d81ca66429c9b3052a13d6b3ca6f8294c70d207
• 7856273b2378b5a46e87fd8f91411c3c068a28c20d120d953e5307d5704ae0a2
• 06e8e4e480c4f19983f58c789503dbd31ee5076935a81ed0fe1f1af69b6f1d3d
• ea02410b2983cfa8cf6740f1f0dbd41d3d07da3f8d2b64ca85defa83060cae72
• fa2a7374219d10a4835c7a6f0906184daaffd7dec2df954cfa38c3d4dd62d30d
• 8388b707ddacfa551642a9a20a0eb3b7d40b9bdb8024e4f9c0ce8ee9e8a56d7d
• 71af0d59f289cac9a3a80eacd011f5897e0c8a72141523c1c0a3e623eceed8a5
• cef2707760086718175235810e3e49a7bbfedce482dee09eef3d302247e97142
• e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
• 33c8591edd61c6e968e727683a63fba0352b5b6b59a0b3005628c38848dd7dd3
• 95809d96f85e1571a3120c7c09a7f34fa84cb5902ad5172398dc2bb0ff1dd24a
• 5e1af7f4e6cf89cff44ee209399a9fab3bfd8f1ca9703fb54cee05cce2b16d4c
• 78facfc012957637c52763a17b94fd21f1e85f5dfaf26e459c1e4a9041e6f0e0
• 0085bf33d4e4e051a15a1bd70636055d709aeef79025080afc7a8148ece55339
• 6c8a2ba339141b93c67f9d79d86a469da75bfbc69f128a6ed702a6e3925d5a29
• af2cf9af17f6db338ba3079b312f182593bad19fab9075a77698f162ce127758
• 3c4ddcf3e6bff60d52479d0d17c908e4813926e9729cf0a2bade843f8d8d4cb1
• f82ea98d1dc5d14817c80937b91b381e9cd29d82367a2dfbde60cfb073ea4316
• a46c870d1667a3ee31d2ba8969c9024bdb521ae8aad2079b672ce8416d85e8df
• 2d85b47cdb87a81d5fbac6000b8ee89daa1d8a3c8fbb5d2bce7a840dd348ff1d
• da4a2ae560a6fad9c80182212da3440d678264b4d2d440c94168e36a530490a5
• 721d15556bd3c22f3b4c6240ff9c6d58bfa60b73b3793fa8cdc64b9e89521c5b
• a4000315471cf197c0552aeec0e7afbe0a935b86ff9afe5b1443812d3f7185fa
• 0dab485f5eacbbaa62c2dd5385a67becf2c352f2ebedd2b5184ab4fba89d8f19
• 220737c1ee400061e886eab23471f98dba38fa8e0098a018ea75d479dceece05
• 451a4cbb6b931d8bb8392f08e7c9ec517b1b1ef06f42e1c8105e4feaafd6b157
• 5b12c3838e47f7bc6e5388408a1701eb12c4bbfcd9c19efd418781304590d201
• 79bb16aa326a401e9cd1716d0ea1d6e1fdfdac945a7b4f4f4480be3a1e77cdd3
• 17862610ea8190e3ed4d22099d324d9058b15c941ce97236405fc80d3c50d747
• 0ae5c1ddf91f8d5e64d58eb5395bf2216cc86d462255868e98cfb70a5a21813f
• 7bb1bd97dc93f0acf22eff6a5cbd9be685d18c8dbc982a24219928159c916c69
• 9315e055f4570b7a392447300dcc2ec06f09b57858c131a35e012bd0bb2356cd
• b158fc11e1d4aeaf9d3111a285cd353eaff6627e328737a5a242d7ec219f4121
• 1b72088fc6d780da95465f80ab26ba094d89232ff30a41b1b0113c355cfffa57
• c57f61e24814c9ae17c57efaf4149504e36bd3e6171e9299fd54b6fbb1ec108c
• 33c8591edd61c6e968e727683a63fba0352b5b6b59a0b3005628c38848dd7dd3
• 95809d96f85e1571a3120c7c09a7f34fa84cb5902ad5172398dc2bb0ff1dd24a
• 9315e055f4570b7a392447300dcc2ec06f09b57858c131a35e012bd0bb2356cd
• b158fc11e1d4aeaf9d3111a285cd353eaff6627e328737a5a242d7ec219f4121
• 45.9.148[.]108
• 45.9.148[.]182
• 85.214.149[.]236
• 94.130.12[.]30
• 94.130.12[.]27
• chimaera[.]cc
• teamtnt[.]red

As a result, Ascend Technologies has pushed the detection ability of the known IOCs across our EDR, SIEM, and anti-malware platforms. These IOCs include IPs and hash values which will give us the ability to detect and alert. As is the case with most malware, end users are targeted which makes maintaining a robust security posture highly important, including end-user training, to develop safe and secure internet browsing habits.

Author: Evan Obal

Source: https://blog.talosintelligence.com/2022/04/teamtnt-targeting-aws-alibaba.html
Posted May 04, 2022 - 12:50 CDT