UNC1860 and the Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks

    Date: 09/23/2024

    Severity: Medium

    Summary

    "UNC1860 and the Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks" explores Iran's covert influence in regional politics and conflicts. It delves into how Iran uses various networks—political, military, and economic—to extend its reach and assert power across the Middle East. The analysis highlights specific operations and strategies, illustrating the complexities of Iran's involvement in shaping alliances and rivalries. Through detailed case studies, the piece reveals the interplay between state and non-state actors, emphasizing the significance of these dynamics in the broader geopolitical landscape.

    Indicators of Compromise (IOC) List

    Hash

    7b2fa099d51fa3885766f6d60d768748
    
    d1e45afbfd3424612b4a4218cc7357ef
    
    fc90907e70f18c7f6a6b9d9599b6f97c
    
    46804472541ed61cc904cd14be18fe1d
    
    a500561c0b374816972094c2aa90da2a
    
    85427a8a47c4162b48d8dfb37440665d
    
    3dd829fb27353622eff34be1eabb8f18
    
    2cece71e107d12ffd74b2fb24bf339a6
    
    c8fa0ce3ae6a13af640607ea606c55f9
    
    14e54ff4805840e656efb8cd38de4751
    
    a3ea0d13848a104c28d035a9d518acc2
    
    d87ca3f830b8b53fde358bb64900f6af
    
    b26d54b7da7b2bf600104f69da4ea00f
    
    69fd67c115349abb4a313230a1692642
    
    4dd6250eb2d368f500949952eb013964
    
    4029bc4a06638bb9ac4b8528523b72f6
    
    31f2369d2e38c78f5b3f2035dba07c08
    
    2398a83f10329a107801d3d23d06f7cb
    
    4de802f7e61cb8c820a02e042b58b215
    
    929b12bc9f9e5f8e854de1d46ebf40d9
    
    bd6464f12bb6f7f02b6ffebb363d8e5f
    
    a7693e399602eb79db537c5022dd1e01
    
    da0085a97c38ead734885e5cced1847f
    
    f89be788e4adf665acf1a8ef8fcaa133
    
    e67687b4443f58d2b0a465e3af3caffe
    
    07db3058e32fe5f36823dc7092cd7d5b
    
    f292e61774c267c3787fdfcace50ea7b
    
    c90ec587e3333dabb647ebc182673460
    
    2e803d28809be2a0216f25126efde37b
    
    0c9ff0db00f04fd4c6a9160bffd85a1d
    
    f0dfb7bf01c0412891da8fa2702f4c7b
    
    126bc1c30fba27f8bf67dce4892b1e8c
    
    6626dbe74acd15d06ff6900071ef240c
    
    b34883fb1630db43e06a38cebfa0bce2
    
    fa1c6f7a5e02374b9d33de2578cb3399
    
    73fb0fe5cd96a14a4f85639223aec6a8
    
    a90236e4962620949b720f647a91f101
    
    1e6679cd25d1bb127a0bec665adcf21e
    
    efe8043e1b4214640c5f7b5ddf737653
    
    4b2c78bb2c439998cff0cc097a14b942
    
    ca3f0d25f7da0e8cde8e1f367451c77a
    
    e86e885e6c96ac72482741d8696c17fb
    
    c21eefc65cda49f17ddd1d243a7bffb5
    
    b219672bcd60ce9a81b900217b3b5864
    
    a65ee1a82975ee4c8d4e70219e1bfff5
    
    490590bfdeeedf44b3ae306409bb0d03
    
    c50ae2c4b76f0d5724ec240568c78c4f
    
    57c916da83cc634af22bde0ad44d0db3
    
    4abcf21b63781a53bbc1aa17bd8d2cbc
    
    7f5f5f290910d256e6b012f898c88bf3
    
    57cd8e220465aa8030755d4009d0117c
    
    17b27e6aa0ab6501f11bb4d2e0f829ff
    
    41f4732ed369f2224a422752860b0bc5
    
    c11a4e4a2d484513f79bd127a0387b0c
    
    1e896f026246872b2feb4f8e3e093815
    
    3d5d05f230ae702c04098de512d93d48
    
    d9719f6738dbfaa21be7f184512fe074
    
    1176381da7dea356f3377a59a6f0e799

    Gurucul Threat Detection and Incident Response (TDIR) Queries for Detection

    Hash

    md5hash IN ("7b2fa099d51fa3885766f6d60d768748","d1e45afbfd3424612b4a4218cc7357ef","fc90907e70f18c7f6a6b9d9599b6f97c","46804472541ed61cc904cd14be18fe1d","a500561c0b374816972094c2aa90da2a","85427a8a47c4162b48d8dfb37440665d","3dd829fb27353622eff34be1eabb8f18","2cece71e107d12ffd74b2fb24bf339a6","c8fa0ce3ae6a13af640607ea606c55f9","14e54ff4805840e656efb8cd38de4751","a3ea0d13848a104c28d035a9d518acc2","d87ca3f830b8b53fde358bb64900f6af","b26d54b7da7b2bf600104f69da4ea00f","69fd67c115349abb4a313230a1692642","4dd6250eb2d368f500949952eb013964","4029bc4a06638bb9ac4b8528523b72f6","31f2369d2e38c78f5b3f2035dba07c08","2398a83f10329a107801d3d23d06f7cb","4de802f7e61cb8c820a02e042b58b215","929b12bc9f9e5f8e854de1d46ebf40d9","bd6464f12bb6f7f02b6ffebb363d8e5f","a7693e399602eb79db537c5022dd1e01","da0085a97c38ead734885e5cced1847f","f89be788e4adf665acf1a8ef8fcaa133","e67687b4443f58d2b0a465e3af3caffe","07db3058e32fe5f36823dc7092cd7d5b","f292e61774c267c3787fdfcace50ea7b","c90ec587e3333dabb647ebc182673460","2e803d28809be2a0216f25126efde37b","0c9ff0db00f04fd4c6a9160bffd85a1d","f0dfb7bf01c0412891da8fa2702f4c7b","126bc1c30fba27f8bf67dce4892b1e8c","6626dbe74acd15d06ff6900071ef240c","b34883fb1630db43e06a38cebfa0bce2","fa1c6f7a5e02374b9d33de2578cb3399","73fb0fe5cd96a14a4f85639223aec6a8","a90236e4962620949b720f647a91f101","1e6679cd25d1bb127a0bec665adcf21e","efe8043e1b4214640c5f7b5ddf737653","4b2c78bb2c439998cff0cc097a14b942","ca3f0d25f7da0e8cde8e1f367451c77a","e86e885e6c96ac72482741d8696c17fb","c21eefc65cda49f17ddd1d243a7bffb5","b219672bcd60ce9a81b900217b3b5864","a65ee1a82975ee4c8d4e70219e1bfff5","490590bfdeeedf44b3ae306409bb0d03","c50ae2c4b76f0d5724ec240568c78c4f","57c916da83cc634af22bde0ad44d0db3","4abcf21b63781a53bbc1aa17bd8d2cbc","7f5f5f290910d256e6b012f898c88bf3","57cd8e220465aa8030755d4009d0117c","17b27e6aa0ab6501f11bb4d2e0f829ff","41f4732ed369f2224a422752860b0bc5","c11a4e4a2d484513f79bd127a0387b0c","1e896f026246872b2feb4f8e3e093815","3d5d05f230ae702c04098de512d93d48","d9719f6738dbfaa21be7f184512fe074","1176381da7dea356f3377a59a6f0e799")

    Reference: 

    https://cloud.google.com/blog/topics/threat-intelligence/unc1860-iran-middle-eastern-networks


    Tags

    IranBackdoor

    « Previous ArticleNext Article »

    Comments

    No records to display

    Looking for Something?
    Threat Research Categories:
    Tags