Iranian Hackers Attack Government Organizations using ForeLord Malware trump-dumpsru, pawn-shopcc

Researchers observed a new malware called ForeLord from the Iranian APT hackers via weaponized MS excel document to attacker government organizations.
Iranian Threat group called COBALT ULSTER aka MuddyWater,  Seedworm ,  TEMP.Zagros  is behind this attack and believed to be a retaliation operation from Iran after a January 2, 2020, U.S. drone strike that kills Iran security Chief Soleimani.
We have  reported last year  about this same threat group were added a new set of latest exploits to their hacking arsenal and tactics, techniques and procedures (TTPs) to target government entities and telecommunication sectors.
Researchers also observed a series of spearphishing campaigns that occurred between mid-2019 and mid-January 2020 targeted governmental organizations in Turkey, Jordan, Iraq.
ForeLord is a remote access trojan that often delivered via a malicious excel document that contains a Macro with a stealthy persistence mechanism.
In the initial stage of the attack, Threat actors launching the spearphishing emails that deliver a ZIP archive containing malicious Excel files.
This malicious excel file uses as a Macro that helps to drop the ForeLord RAT, at the same time malicious document uses cmd.exe to execute a batch script to add a key in the registry to maintain the persistence in every time victims restart the system.
Threat actors using DNS based command and control server to transfer the data and the name “Forelord” derived from one of the DNS responses “lordlordlordlord” in the part fo the C2 Protocol.
Once the threat actors gained the initial access, they dropped several tools including PasswordDumper.exe, PASS32.dll, Mimikatz and more to collect credentials, test those credentials on the network, and create a reverse SSL tunnel to provide an additional access channel to the network.
Specifically, an open-source penetration testing tool is known as CredNinja.ps1 used in this attack to collected credentials or hashes.
Threat actors used a list of valid user accounts from the target domain in conjunction with a weak password list to determine potentially accessible accounts.”
Finally, they are using another tool called Secure Socket Funneling, a network tool and toolkit to forwards stolen data from multiple sockets through a single secure TLS tunnel to a remote computer.
trump-dumpsru pawn-shopcc