Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Qlik cactus ransomware recents artificats #928

Merged
merged 4 commits into from
May 16, 2024
Merged
Show file tree
Hide file tree
Changes from 3 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
46 changes: 46 additions & 0 deletions Targets/Apps/QlikSense.tkape
Original file line number Diff line number Diff line change
@@ -0,0 +1,46 @@
Description: Qlik Sense
Author: Abdelkarim CHORFI - CERT CWATCH - ALMOND
Version: 1.0
Id: 6e979be3-4913-4d16-a508-cc3284194c2b
RecreateDirectories: true
Targets:
-
Name: Qlik Sense Logs
Category: Software
Path: C:\ProgramData\Qlik\Sense\Log\Proxy
Recursive: true
FileMask: '*.txt'
Comment: "Collects the proxy logs for Qlik Sense"

-
Name: Qlik Sense Logs
Category: Software
Path: C:\ProgramData\Qlik\Sense\Log\Proxy
Recursive: true
FileMask: '*.log'
Comment: "Collects the proxy logs for Qlik Sense"

-
Name: Qlik Sense Logs
Category: Software
Path: C:\ProgramData\Qlik\Sense\Log\Scheduler
Recursive: true
FileMask: '*.txt'
Comment: "Collects the scheduler logs for Qlik Sense"
-
Name: Qlik Sense Logs
Category: Software
Path: C:\ProgramData\Qlik\Sense\Log\Scheduler
Recursive: true
FileMask: '*.log'
Comment: "Collects the scheduler logs for Qlik Sense"

# Documentation
# Qlik Sense is a powerful business intelligence solution that enables users to visualize and analyze complex data.
# We have seen three vulnerabilities (CVE-2023-41266, CVE-2023-41265, and CVE-2023-48365) exploited on exposed Qlik solution in a recent Cactus Ransomware Campaign:
# https://www.cybersecuritydive.com/news/cactus-ransomware-qlik-sense-cves/714578/
# https://arcticwolf.com/resources/blog/qlik-sense-exploited-in-cactus-ransomware-campaign/
# https://www.shadowserver.org/what-we-do/network-reporting/critical-vulnerable-compromised-qlik-sense-special-report/
# You can find details on the full exploit here:
# https://www.praetorian.com/blog/qlik-sense-technical-exploit/
# https://www.praetorian.com/blog/doubleqlik-bypassing-the-original-fix-for-cve-2023-41265/
29 changes: 29 additions & 0 deletions Targets/Apps/UEMS.tkape
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
Description: UEMS Manage Engine Agent
Author: Abdelkarim CHORFI - CERT CWATCH - ALMOND
Version: 1.0
Id: 3ff43bb0-ac44-4374-ac4e-dbe104d81b60
RecreateDirectories: true
Targets:
-
Name: Unified endpoint management and security solutions from ManageEngine
Category: RMM Tool
Path: C:\Program Files (x86)\ManageEngine\UEMS_Agent\logs
Recursive: true
FileMask: '*.log'
Comment: "Collects all logs for UEMS"

-
Name: Unified endpoint management and security solutions from ManageEngine
Category: RMM Tool
Path: C:\Users\%user%\AppData\Local\VirtualStore\Program Files (x86)\ManageEngine\UEMS_Agent\logs
Recursive: true
FileMask: '*.log'
Comment: "Collects Users logs for UEMS"

# Documentation
# https://www.manageengine.com/unified-endpoint-management-security.html
# UEMS Manage Engine Agent is a remote acces tool part of the ManageEngine suite.
# We have observed this tool being deployed in recent Cactus ransomware Campaign :
# https://arcticwolf.com/resources/blog/qlik-sense-exploited-in-cactus-ransomware-campaign/
# https://www.bleepingcomputer.com/news/security/cactus-ransomware-exploiting-qlik-sense-flaws-to-breach-networks/
# https://www.cybersecuritydive.com/news/cactus-ransomware-qlik-sense-cves/714578/
4 changes: 4 additions & 0 deletions Targets/Compound/RemoteAdmin.tkape
Original file line number Diff line number Diff line change
Expand Up @@ -89,6 +89,10 @@ Targets:
Name: TeamViewer
Category: ApplicationLogs
Path: TeamViewerLogs.tkape
-
Name: UEMS
Category: ApplicationLogs
Path: UEMS.tkape
-
Name: UltraViewer
Category: ApplicationLogs
Expand Down
Loading