Regeorg

Tool updated a month ago (2024-11-29T13:36:38.131Z)
Download STIX
Preview STIX
Regeorg is a threat actor known for its malicious activities, primarily involving the use of ReGeorg or Neo-reGeorg to set up a proxy and tunnel network traffic following the compromise of a victim website. This group also employs ProxyChains to run Nmap within the compromised network. In one instance, LuckyMouse operators initiated their attack by dropping the Nbtscan tool in C:\programdata\, followed by the installation of a variant of the ReGeorg webshell. They then issued a GET request using curl and attempted to install their SysUpdate (aka Soldier) modular backdoor that uses the aforementioned IP address as its C&C server. Mandiant, a cybersecurity firm, observed instances where UNC3542, another threat actor, used timestomping to alter the Standard Information timestamps of the REGEORG web shell to match other files in the same directory. This alternate access was facilitated by a REGEORG web shell previously placed on a DMZ web server. The threat actors primarily aim for an organization's files and start exploiting them using largely basic and publicly available tools like remote desktop protocol (RDP) for lateral movement, and the reGeorg Web shell. Further investigations have revealed the use of multiple web shells in these attacks, including reGeorg, China Chopper, and AspxSpy. These are all publicly available tools. Incident response investigations conducted by ANSSI confirmed the use of Mimikatz and reGeorg tools by APT28, with the former being a popular collector of sensitive information and the latter a tunnel creation tool. The group can follow up with several commodity web shells, tunneling tools, attack frameworks, and living-off-the-land binaries. This highlights the extensive range of tools and techniques at the disposal of these threat actors, increasing the complexity and severity of their potential impact.
Description last updated: 2024-11-21T10:46:46.070Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Web Shell
Proxy
Webshell
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
Alias DescriptionAssociation TypeVotes
The China Chopper Malware is associated with Regeorg. China Chopper is a well-known malware that has been used extensively by Chinese-speaking actors, including the BRONZE UNION group. The malware is designed to exploit and damage computer systems, often without the knowledge of the user. It can infiltrate systems through suspicious downloads, emails, Unspecified
2
The ASPXSpy Malware is associated with Regeorg. ASPXSpy is a type of malware, specifically a web shell, that has been used by various threat actors to exploit and damage computer systems. The earliest deployment attempts date back to 2022 when this malicious software was deployed to multiple hosted websites. It's typically installed on vulnerableUnspecified
2
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
Alias DescriptionAssociation TypeVotes
The APT28 Threat Actor is associated with Regeorg. APT28, also known as Fancy Bear, Pawn Storm, Sofacy Group, Sednit, and STRONTIUM, is a threat actor linked to Russia. The group has been associated with cyber espionage campaigns across Central Asia and has historically targeted areas of national security, military operations, and geopolitical influis related to
2