Threats Feed|MuddyWater|Last Updated 25/07/2024|AuthorCertfa Radar|Publish Date05/03/2021

MuddyWater Expands Its Reach: A Deep Dive into the Earth Vetala Intrusion

  • Actor Motivations: Espionage,Exfiltration
  • Attack Vectors: Backdoor,Malware,Spear Phishing
  • Attack Complexity: High
  • Threat Risk: High Impact/High Probability

Threat Overview

The MuddyWater threat group, through an intrusion set named Earth Vetala, targeted various organizations in Azerbaijan, Bahrain, Israel, Saudi Arabia, and the United Arab Emirates. The group used spear-phishing emails to distribute malicious packages, predominantly aiming at Government Agencies, Academia, and the Tourism sector. MuddyWater deployed post-exploitation tools to dump passwords and establish a persistent presence within targeted systems. They used multiple C&C servers to execute obfuscated PowerShell scripts and were persistent in attempting multiple techniques to establish connectivity despite repeated failures.

Detected Targets

TypeDescriptionConfidence
SectorGovernment Agencies and Services
Verified
SectorTourism
Verified
SectorUniversity
Verified
RegionAzerbaijan
Verified
RegionBahrain
Verified
RegionIsrael
Verified
RegionSaudi Arabia
Verified
RegionUnited Arab Emirates
Verified

Extracted IOCs

  • 0cd6f593cc58ba3ac40f9803d97a6162a308ec3caa53e1ea1ce7f977f2e667d3
  • 304ea86131c4d105d35ebbf2784d44ea24f0328fb483db29b7ad5ffe514454f8
  • 3495b0a6508f1af0f95906efeba36148296dccd2ab8ffb4e569254b683584fea
  • 3e4e179a7a6718eedf36608bd7130b62a5a464ac301a211c3c8e37c7e4b0b32b
  • 468e331fd3f9c41399e3e90f6fe033379ab69ced5e11b35665790d4a4b7cf254
  • 5e2642f33115c3505bb1d83b137e7f2b18e141930975636e6230cdd4292990dd
  • 61f83466b512eb12fc82441259a5205f076254546a7726a2e3e983011898e4e2
  • 70cab18770795ea23e15851fa49be03314dc081fc44cdf76e8f0c9b889515c1b
  • 78b1ab1b8196dc236fa6ad4014dd6add142b3cab583e116da7e8886bc47a7347
  • 79fd822627b72bd2fbe9eae43cf98c99c2ecaa5649b7a3a4cfdc3ef8f977f2e6
  • 8bee2012e1f79d882ae635a82b65f88eaf053498a6b268c594b0d7d601b1212f
  • 9b345d2d9f52cda989a0780acadf45350b423957fb7b7668b9193afca3e0cd27
  • b2f429efdb1801892ec8a2bcdd00a44d6ee31df04721482a1927fc6df554cdcf
  • ccdddd1ebf3c5de2e68b4dcb8fbc7d4ed32e8f39f6fdf71ac022a7b4d0aa4131
  • f664670044dbd967ff9a5d8d8f345be294053e0bae80886cc275f105d8e7a376
  • f865531608a4150ea5d77ef3dd148209881fc8d831b2cfb8ca95ceb5868e1393
  • fb414beebfb9ecbc6cb9b35c1d2adc48102529d358c7a8997e903923f7eda1a2
  • 23[.]94.50.197
  • 23[.]95.215.100
  • 87[.]236.212.184
download

Tip: 20 related IOCs (3 IP, 0 domain, 0 URL, 0 email, 17 file hash) to this threat have been found.

Overlaps

MuddyWaterMuddyWater Espionage Campaign: A Deep Dive into Malware and Tactics

Source: Picussecurity - March 2022

Detection (three cases): 468e331fd3f9c41399e3e90f6fe033379ab69ced5e11b35665790d4a4b7cf254, 70cab18770795ea23e15851fa49be03314dc081fc44cdf76e8f0c9b889515c1b, ccdddd1ebf3c5de2e68b4dcb8fbc7d4ed32e8f39f6fdf71ac022a7b4d0aa4131

UNC3313The Rise Of GRAMDOOR And STARWHALE In The Middle East: UNC3313 Suspected

Source: Mandiant - February 2022

Detection (one case): 87[.]236.212.184

SeedwormSeedworm Group Suspected in Sweeping Espionage Campaign Across Telecom and IT Services

Source: Symantec - December 2021

Detection (two cases): 61f83466b512eb12fc82441259a5205f076254546a7726a2e3e983011898e4e2, ccdddd1ebf3c5de2e68b4dcb8fbc7d4ed32e8f39f6fdf71ac022a7b4d0aa4131

Static KittenStatic Kitten Launches Cyberespionage Attack on UAE and Kuwait Government Sectors

Source: Anomali - February 2021

Detection (two cases): 3e4e179a7a6718eedf36608bd7130b62a5a464ac301a211c3c8e37c7e4b0b32b, b2f429efdb1801892ec8a2bcdd00a44d6ee31df04721482a1927fc6df554cdcf

Hint: Overlaps are extracted automatically by examining the IOCs associated with all indexed threats and actors.